Jerrys Final
Studies of actual managerial performance indicate that managers perform work at a pace of _______ different activities each day. A. 600 B. 160 C. 60 D. 1600 E. 16
A. 600
________ are data files used to identify and protect online transactions using a trusted third party. A. Digital certificates B. Analog certificates C. SSL D. Digital confirmations E. Analog confirmations
A. Digital certificates
Which of the knowledge management systems' IS activities involve search engines? A. Disseminate B. Store C. Feedback D. Apply E. Acquire
A. Disseminate
Organizational learning is the result of knowledge ________. A. application B. acquisition C. scenarios D. dissemination E. storage
A. application
The field of management information systems (MIS) deals with ________ issues as well as technical issues related to the development and use of information systems in an organization. A. behavioral B. management C. software D. hardware E. personnel
A. behavioral
The data and software tools for organizing, analyzing, and providing access to data to help managers and other enterprise users make more informed decisions are referred to as ________ systems. A. business intelligence B. decision-support C. transaction processing D. executive support E. management information
A. business intelligence
A(n) ________ is a database that stores historic and current data for the use of decision makers in the organization. A. data warehouse B. in-memory database C. non-traditional database management system D. flat-file system E. transaction processing system
A. data warehouse
A manager's ________ role includes handling disputes. A. decisional B. informational C. data worker D. functional E. service
A. decisional
A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A. A. field B. file C. bit D. record E. byte
A. field
The strategy used by an expert system to search the rule base to arrive at a conclusion is called ________. A. the inference engine B. genetic algorithm C. information chaining D. backward chaining E. neural network
A. the inference engine
Which of the following systems would BEST support managers who focus on unique problems for which the procedure to arrive at a solution may not be fully predefined in advance? A. Decision-support B. Business intelligence C. Executive support D. Management information E. Transaction processing
A. Decision-support
Storing past experiences in the form of cases is a KM method called ________. A. case-based reasoning (CBR) B. case-based approach (CBA) C. knowledge reasoning (KR) D. knowledge approach (KA) E. knowledge-based reasoning (KBR)
A. case-based reasoning (CBR)
What is structured knowledge? A. Tacit knowledge that exists in formal documents. B. Explicit knowledge that exists in formal documents, as well as in formal rules. C. Any knowledge that is in a structured format recognized by computer. D. Tacit knowledge that exists in SQL format. E. Explicit knowledge that exists in SQL format.
B. Explicit knowledge that exists in formal documents, as well as in formal rules.
The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records. A. Privacy Act of 2000 B. Privacy Act of 1974 C. HIPA 1990 D. FERPA Act of 1999 E. Data Act of 2000
B. Privacy Act of 1974
A(n) ________, such as a clerk, uses data for things such as scheduling. A. production worker B. data worker C. hourly worker D. business function E. knowledge worker
B. data worker
A person, place, or thing which is stored in a database is called a(n) ________. A. bit B. entity C. file D. object E. attribute
B. entity
Information systems can be used to create products and services that are personalized to meet a specific customer's requirements, termed __________. A. product differentiation B. mass customization C. customer intimacy D. product capitalization E. information domination
B. mass customization
E-commerce has become more ________. A. stable, mobile, and less expensive B. social, mobile, and local C. individual, static, and global D. mobile, private, and global E. secure, private, and less expensive
B. social, mobile, and local
What is a touch point? A. The time when a sales person meets a customer B. A position on a screen (app) where the user touches (interacts) C. A method of interaction with a customer D. A position on Web page where the user clicks E. Software used for sales training enabling sales people's knowledge of products
C. A method of interaction with a customer
________ businesses gather and sell personal information to government agencies. A. Data preservation B. Advertising C. Data broker D. Fraud detection E. Identity protection
C. Data broker
What is a Web beacon? A. A Bing initiative to increase traffic to OneDrive B. A Google program to direct clicks to a Web site C. Small software programs that keep a record of users' online clickstream D. A small program that calls to browsers to visit a Web site E. A Web program that forces users to click on a link
C. Small software programs that keep a record of users' online clickstream
What are knowledge work systems? A. Specialized systems running a working AI to derive knowledge from the Internet. B. Specialized systems running a working AI to automate the business processes. C. Specialized systems for discovering and creating new knowledge. D. Specialized systems for working knowledge. E. Specialized systems running a working AI to create new more efficient business processes.
C. Specialized systems for discovering and creating new knowledge.
Data mining and big data analytics are examples of ________. A. BI and analytics for DSS platforms B. managerial users and methods C. a business analytics toolset D. BI and analytics for DSS user interfaces E. business intelligence infrastructure
C. a business analytics toolset
An extranet is a system that shares data ________. A. within an organization's accounting area B. within an organization's productions area C. across multiple organizations D. within a single home E. within an organization
C. across multiple organizations
A ________ is a component in the computer system data hierarchy that consists of multiple records of the same type. A. record B. field C. file D. bit E. byte
C. file
The ________ role is NOT one of the activities that managers are expected to perform in an organization. A. informational B. interpersonal C. high velocity D. counseling support E. decisional
C. high velocity
A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data. A. database B. data model C. information policy D. data requirements E. database approach
C. information policy
All of the following are general controls EXCEPT ________ controls. A. software B. data security C. input D. implementation E. hardware
C. input
________ use a more flexible data model and are designed for big data. A. Legacy systems B. Data warehouses C. Non-relational database management systems D. Online analytical processing systems E. Relational databases
C. Non-relational database management systems
What type of attack consists of malware that comes with a downloaded file that a user intentionally requests, such as a free game or coupon? A. SQL injection attack B. AppWorm C. drive-by download D. Rootkit attack E. Worm
C. drive-by download
________ consists of processes and tools to identify the valid users of a system. A. Security process B. Login accounts C. A security policy D. Identity management E. An acceptable use policy
D. Identity management
What makes a Blockchain system possible and attractive to business firms? A. Blockchain systems always include remote maintenance and support capabilities. B. Blockchain makes it easier for competitors to collude, ultimately to the detriment of consumers. C. Blockchain is easily implemented across larger enterprises. D. Its encryption and authentication processes make it highly secure for storing many kinds of data. E. It is free open source software (OSS), which means that the copyright holder grants users rights and privileges.
D. Its encryption and authentication processes make it highly secure for storing many kinds of data.
________ encompasses a set of assumptions about what an organization should produce, how it is produced, and for whom. A. Disruptive technology B. Standard operating procedure C. Organizational environment D. Organizational culture E. Business process
D. Organizational culture
When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a ________. A. bull distortion B. process distortion C. process error D. bullwhip effect E. bulltrap effect
D. bullwhip effect
From an information technology perspective, ________ includes the infrastructure for warehousing, integrating, reporting, and analyzing data from the business environment. A. data (D) B. management information systems (MIS) C. information systems (IS) D. business intelligence (BI)
D. business intelligence (BI)
_______ model of management describes the five traditional functions of managers as planning, organizing, coordinating, deciding, and controlling. A. distributed B. behavioral C. trickle down D. classical E. economic
D. classical
The most common source of business system failure is (are) ________. A. software bugs B. viruses C. cyber crime D. data quality E. facility catastrophes
D. data quality
One downside to complex enterprise software occurs when it ________. A. increases collaboration among departments B. utilizes databases C. increases sharing of information D. degrades system performance E. requires training
D. degrades system performance
About 80 percent of online B2B e-commerce is still based on proprietary systems for ____________. A. electronic information interchange (EII) B. digital data interchange(DDI) C. binary data interchange (BDI) D. electronic data interchange (EDI) E. digital information interchange (DII)
D. electronic data interchange (EDI)
Information systems can ________ the organization by empowering lower-level employees. A. heighten B. reduce C. establish D. flatten E. hinder
D. flatten
Using Internet technology to create an internal system is called a(n) ________. A. digital firm B. Internet C. brick and mortar D. intranet E. enterprise system
D. intranet
The fact that universal technical standards for the Internet and electronic commerce exist lowers ________ costs, making it cheaper for merchants to sell their goods. A. product information B. supplier identification C. product development D. market entry E. customer search
D. market entry
All of the following are examples of functional business processes EXCEPT ________. A. paying creditors B. hiring employees C. identifying customers D. shipping a product E. assembling the product
D. shipping a product
A lead chef quitting at a restaurant and taking his secret recipes with him or her is considered ________ knowledge. A. structured B. semi-structured C. database D. tacit E. cloud computing
D. tacit
The knowledge an employee has in his mind that has not been documented is called ________. A. loose knowledge B. explicit knowledge C. explicit intelligence D. tacit knowledge E. tacit information
D. tacit knowledge
In 2017, American business spent ________ on information systems hardware, software, and telecommunications equipment. A. $100 million B. $10 million C. $1 million D. $1 trillion E. $100 billion
D. $1 trillion
Which of the following is NOT an example of a company's transaction processing system? A. UPS package tracking system B. Marriott reservation system C. Amazon.com's payroll records D. Walmart's internal email system E. Delta flight reservation system
D. Walmart's internal email system
Which below is the correct definition of "war driving"? A. After gaining access to a wireless signal "lock it up" and "drive" off, leaving the access point inaccessible B. Unauthorized access to a satellite ISP C. Eavesdroppers physically steal a wireless network router to gain access D. Gaining access to a network using physical force E. Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
E. Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
How do information systems improve business processes? A. Information systems make business processes less expensive. B. Information systems help workers maintain independence as they fill customer orders. C. Information systems modernize business processes every two years. D. Information systems make business processes spanning many different functional areas easier to manage. E. Information systems improve the efficiency and/or effectiveness of business processes.
E. Information systems improve the efficiency and/or effectiveness of business processes.
________ includes computer viruses, worms, and Trojan horses. A. Firewall B. Wi-fi C. Click fraud D. Security E. Malware
E. Malware
An approach to the study of information systems that focuses on changes in attitude, management, and organization policy is called the ________. A. sociotechnical approach B. technical approach C. psychological approach D. sociological approach E. behavioral approach
E. behavioral approach
Databases, data warehouses, data marts, and analytic platforms are part of the ________. A. BI and analytics for DSS platform B. managerial users and methods C. user interface D. business analytics toolset E. business intelligence infrastructure
E. business intelligence infrastructure
Viruses differ from worms because worms ________. A. are more dangerous than all viruses B. are only sent as attachments C. are less dangerous than all viruses D. cannot operate on their own E. can operate on their own without attaching to other computer program files
E. can operate on their own without attaching to other computer program files
When technology must be changed and designed to fit the needs of the organization and individuals, it may need to be ________ to adjust the fit between the organizational needs and the technology. A. discarded B. reverse engineered C. deprecated D. optimized E. de-optimized
E. de-optimized
All of the following are technology trends that raise ethical issues EXCEPT ________. A. data storage costs rapidly decline B. network advances C. computing power doubles every 18 months D. data analysis advances E. disruptive technologies
E. disruptive technologies
Business processes that cross many different functional areas and require coordination across departments are supported by ________ among the participants. A. a top-down company approach B. more senior management that encourage loyalty C. less knowledge sharing and more independent work D. several static ways of communicating E. flows of material, information, and knowledge
E. flows of material, information, and knowledge
ReviewQuiz:Chapter 8 RAT Question 4, Chapter Quiz 8.1.5 Test Score: 93.33%, 28 of 30 points Points: 1 of 1 Close If someone loads a program that tracks everything you type, the specific spyware is a(n) ________. A. digital footprint B. SQL injection attack C. denial-of-service attack D. data mining error E. key logger
E. key logger
Combining data from multiple sources to create digital dossiers of detailed information on individuals is called ________. A. phishing B. spoofing C. hacking D. sniffing E. profiling
E. profiling
All of the following are interrelated changes in the technology area that impact businesses EXCEPT ________. A. the widespread adoption of the mobile computing platform B. the growth of cloud computing C. the Internet of Things D. the growing business use of big data E. quantum computing
E. quantum computing
The ________ of the web makes it possible to deliver messages with text, audio, and video simultaneously to large numbers of people. A. information density B. universal standards C. interactivity D. global reach E. richness
E. richness
The information systems approach to this textbook is the ________. A. database approach B. system network approach C. technical approach D. behavioral approach E. sociotechnical approach
E. sociotechnical approach
According to the value chain model, technology is considered a ________ of the firm. A. processing activity B. primary activity C. business intelligence activity D. data mining activity E. support activity
E. support activity
In the United States, the claim to privacy is protected primarily by ________. A. state government B. professional societies C. local government D. individual organizations E. the First Amendment
E. the First Amendment