K201 Exam: (Post Lecture Quiz Questions, Poll Questions, Lecture Koin Challenges)

Ace your homework & exams now with Quizwiz!

Business A is experiencing a high rate of employee turnover due to Business B having a better benefits package. How to resolve this issue and keep employees at Business A involves which type of business processes? Structured Dynamic

Dynamic

If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse. True False

True

The goal of AI research is to create strong AI that can complete all the same tasks a human can. True False

True (?)

True or False: Indiana University's network is best described as a Local Area Network (LAN). True False

True (?)

________ applications are programs that are written to use a particular operating system. a. Thin-client b. Native c. Browser d. Web

b. Native

Porter's five forces model is used to assess ________. a. Industry structure b. Market share c. Internal competition d. Life cycles of products

????

The state of Indiana does not have many bison or buffalo farms. Red Frazier Bison is located near Bloomington and provides natural bison meat to a popular local restaurant, Upland Brewing Company. Is Red Frazier's supplier power strong or weak? Strong Weak

????

Which of the following is NOT an example of an unsupervised data mining technique? a. Regression analysis b. Cluster analysis c. Market-basket analysis d. Decision trees

????

Which value chain activity would be most concerned with how many users clicked on a company's advertisement on Instagram? a. Inbound logistics b. Operations/Manufacturing c. Outbound Logistics d. Sales and Marketing e. Customer Service

????

The ________ architecture best describes Cloud computing models. a. service-oriented b. peer-to-peer c. open source d. thick-client

???? (not a. service-oriented)

SmartToy's current strategy is to gain a larger share of the high-end toy market by embedding artificial intelligence into its teddy bears. Shortly after, SmartToy's market share increases fivefold. This is an example of the company's ________. a. reliability b. conformity c. effectiveness d. efficiency

???? (not b. conformity)

Which of the following types of networks best describes the Cloud? a. the Internet and internets b. Personal area network (PAN) c. Wide area network (WAN) d. Local area network (LAN)

???? (not c. Wide area network (WAN))

The total number of retweets a company has on one of their tweets is an example of a __________ social media metric. a. user engagement b. web site traffic c. conversion rate d. brand awareness

???? (not c. conversion rate) maybe brand awareness?

Self-driving cars are likely to ________. a. reduced car insurance cost b. cause more accidents c. cost less than other types of cars d. have increased fuel consumption

???? (not c. cost less than other types of cars)

If you use your smart phone as a hotspot to connect to the Internet on your tablet you are using a ________. a. personal area network b. wide area network c. local area network d. metro area network

???? (not c. local area network) maybe personal area network

Sarah was so happy with the new video app she had downloaded to her phone that she left a positive review. A few days later, she noticed that her phone's upload speed was dramatically slower. Sarah was probably the victim of a(n) ________ attack. a. worm b. trojan horse c. spyware d. payload

???? (not c. spyware)

What is a good solution to assist an organization when there is a need to reduce data? a. Averaging the columns b. Clean the data c. Statistical sampling d. Integrate the data

???? (not d. Integrate the data)

What is having a major impact on ERP vendors? a. Market size b. System analysts c. The cloud d. Lazy users

???? (not d. Lazy users)

All of these issues are results of data integrity problems except ________, a. the system will develop a poor reputation b. the system will give users too much information c. inconsistent results d. incorrect results

???? (not d. incorrect results)

Some organizations ________ by using information systems to lock in customers. a. decrease the threat of new entrants b. increase competitive rivalry c. increase the threat of substitution d. increase switching cost

???? (not decrease the threat of new entrants)

An innovation that creates a new market and value network and eventually disrupts an existing market and value network is known as a disruptive innovation. Which of the following most represents a totally new market? a. 3-D printing b. Internet of Things c. Self-driving cars d. Augemented Reality

???? (not self-driving cars)

All team members should always agree on every decision and only give each other positive feedback. True False

False

Due to the complex nature of SMIS systems, they contain 7 components as opposed to the traditional 5 components of other information systems.. True False

False

Dynamic processes are standardized processes that involve day-to-day operations. True False

False

Google was the first ever search engine which allowed them to create a first mover advantage over rivals. True False

False

IUanyWare is an example of a thick-client application. True False

False

In order to gain a competitive advantage, a company must create a new technology before their rivals. True False

False

Microsoft Access is a Database. True False

False

Diego, the CEO of a bicycle parts manufacturer, asks Abby, the manager of the IS department, for a report of which parts were frequently ordered but ordered in small quantities. Which type of publishing is this? Push publishing Pull publishing

Pull publishing

Canvas is an example of which type of application? Thick-client Thin-client

Thin-client

Mobile systems users move not only geographically but also from device to device. True False

True

The contents of unsaved documents on a volatile storage device are lost when the power is off. True False

True

The critical path is the sequence of activities that determines the earliest date by which the project can be completed. True False

True

Which of the following statements is TRUE about the relationship between business processes and information systems? a. A business process need not relate to any information system, but an information system relates to at least one business process. b. Information systems incorporate all business process activities and hence, should be developed before business processes. c. The relationship between business processes and information systems is one-to-one. d. Developing information systems before business processes ensures that all activities are considered in the development process.

a. A business process need not relate to any information system, but an information system relates to at least one business process.

Which of the following statements is FALSE? a. BI systems have four of the standard IS components: hardware, software, data, and people. b. The software component of a BI system is called a BI application. c. BI systems process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals.

a. BI systems have four of the standard IS components: hardware, software, data, and people.

What is the goal of information systems security? a. Balance the trade-off between costs and risks b. To never have a security breach c. Stop every single potential threat to the system d. Punish users who violate the security policies

a. Balance the trade-off between costs and risks

Lego involves consumers in the creation of new sets on its Lego Ideas site where people can submit their own Lego creations and if they get enough votes, Lego puts them into production. This is an example of using social media to do what? a. Crowdsource b. Crowd fund c. Improve process effectiveness d. Improve process efficiency

a. Crowdsource

Physical security is an example of a ______ a. Data safeguard b. Procedural safeguard c. Technical safeguard d. Human safeguard

a. Data safeguard

Future jobs will essentially require _______________ skills to test ideas on a small scale, before taking bigger risks. a. experimentation b. collaboration c. systems thinking d. interpersonal

a. Experimentation

A ________ shows the tasks, dates, and dependencies for the tasks of a project. a. Gantt chart b. fusion chart c. control chart d. Pareto chart

a. Gantt chart

What is the most important step in developing a database? a. Gathering the requirements for the database b. Building the data model c. Creating the tables, queries, forms, and reports d. Creating the database application

a. Gathering the requirements for the database

As you get ready to schedule classes for next semester, you might ask a friend for advice about which professor to choose. This is an example of social capital adding value in which way? a. Information b. Influence c. Social credentials d. Personal reinforcement

a. Information

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? a. Internet of things (IoT) b. Digital Reality Devices c. Driving Cars d. 3D printing e. Cryptocurrencies

a. Internet of things (IoT)

An employee has to decide how many supplies to order from a certain vendor. What type of decision is this? a. Structured operational b. Unstructured Strategic c. Unstructured Managerial d. Structured Managerial

a. Structured operational

What are the three tiers in the three-tier architecture? a. User, server, database b. User, web, cloud c. Browser, web, server d. User, browser, web, server, database

a. User, server, database

The employees at a single ALDI location choose which items are closest to the door each week. What is the scope for this process? a. Workgroup b. Enterprise c. Inter-Enterprise

a. Workgroup

Most social media companies rely on ________ for revenue. a. advertising b. software license fees c. users d. venture capital

a. advertising

Asynchronous communication occurs when team members ________. a. cannot arrive at consensus after discussions b. can arrive at consensus after discussions

a. cannot arrive at consensus after discussions

Fixing or adapting a new system to changes in its features and functionality is completed during the ________ phase. a. maintenance b. requirements c. as-is modeling d. implementation

a. maintenance

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. a. parallel b. pilot c. phased d. plunge

a. parallel

A business ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function. a. process b. breakdown schedule c. enterprise d. work group

a. process

Taking time to foster genuine connections with your professors, classmates, etc. now with hopes of it leading to opportunities in the future is an example of investing in your __________. a. social capital b. personal capital c. human capital d. resource capital

a. social capital

ERP vendors sometimes train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________. a. train the trainer b. top-down training c. employ the employer d. on-the-job training

a. train the trainer

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. a. unauthorized data disclosure b. incorrect data modification c. faulty services d. loss of infrastructure

a. unauthorized data disclosure

A ________ is a type of virus that self-propagates using the Internet or other computer network. a. worm b. sniffer c. Trojan horse d. Phisher

a. worm

Which of the following features distinguishes a LAN from a WAN? a. A WAN has a limit on the number of users. b. A LAN connects computers in a single location. c. A LAN has stringent hardware requirements. d. A WAN has low bandwidth.

b. A LAN connects computers in a single location.

________ is the process of making systems operate without human intervention. a. Artificial intelligence (AI) b. Automation c. Knowledge management d. Computer programming

b. Automation

What is the software component of a BI System called? a. Business Intelligence b. BI Application c. Data Mining software d. Knowledge Workers e. None of the above

b. BI Application (?)

________ are used for computer data because they are easy to represent a. physically. b. Bits c. USB drives d. Bytes e. Files

b. Bits

________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. a. Association b. Collaboration c. Cooperation d. Participation

b. Collaboration

The ______________ component of the 5-component model bridges the computer side to the human side of the model. a. hardware b. data c. people d. software

b. Data

Which of the following statements is TRUE about data marts? a. Data mart users possess the data management expertise that data warehouse employees have. b. Data marts address the needs of a particular department or functional area of a business. d. Data marts are larger than data warehouses. d. Data marts contain only metadata for data warehouses.

b. Data marts address the needs of a particular department or functional area of a business. (?)

Which phase in the SDLC is considered the MOST important? a. Define System b. Determine Requirements c. Design System Components d. Implement System e. Maintain System

b. Determine Requirements

_______ are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities. a. Operational processes b. Dynamic processes c. Inherent processes d. Structured processes

b. Dynamic processes

Emily routinely tries new promotional offers to reach first-time customers and then monitors the impact of these marketing campaigns. Which of the following skills does Emily exhibit? a. Systems Thinking b. Experimentation c. Abstract Reasoning d. Collaboration

b. Experimentation

Which of the following is an example of an analytical tool? a. WinRunner b. Facebook Page Insights c. Pidgin d. FileMaker Pro

b. Facebook Page Insights

_______ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. a. Application software b. Firmware c. Spyware d. Vertical-market software

b. Firmware

______________________ is a content structure that emerges from the processing of many user tags. a. Taxonomy b. Folksonomy c. Enterprise Social Network d. Influencer

b. Folksonomy

n Premiere, you created a relationship between the tblEmployee table and the tblEmployeeTraining table. Both tables contain an EmployeeID field. What type of Key is the EmployeeID field in thetblEmployeeTraining table? a. Primary key b. Foreign key c. Composite key d. Mon Key

b. Foreign key

Which of the following is a characteristic of an inter-enterprise information system? a. It increases data duplication among departments. b. Its problem solutions affect multiple organizations. c. It is flexible and easily adaptable to organizational changes. d. It does not require users to have any formal training.

b. Its problem solutions affect multiple organizations.

The process of training a system to correctly recognize grocery products that are placed in a cart and charge customers without the need for a formal checkout lane can be done via __________________________. a. The Turing test b. Machine learning c. RFM analysis d. Knowledge management

b. Machine learning

In Access, which of the defining characteristics of a Database is met by the Design view of a table? a. SQL b. Metadata c. Tables or Files d. Relationships among rows in tables

b. Metadata

In information systems security, which of the following is true about managing risk? a. All organizations except financial institutions should invest heavily in security safeguards. b. Organizations should implement safeguards that balance the trade-off between risk and cost. c. Firewalls are classified as human safeguards. d. Checking someone's social media profile before hiring them is a technical safeguard.

b. Organizations should implement safeguards that balance the trade-off between risk and cost.

Virtualization technology strengthens which characteristic of cloud computing? a. Elasticity b. Pooled resources c. Over the internet

b. Pooled resources

_______ is the investment in social relations with the expectation of returns in the marketplace. a. Media capital b. Social capital c. Social stock d. Market stock

b. Social capital

www.one.iu.edu is a(n) ______________________________ a. IP address b. Uniform Resource Locator c. Transmission Control Protocol d. Internet Service Provider

b. Uniform Resource Locator (?)

Which of the following types of decisions would tend to require the most collaboration? a. Structured operational decisions b. Unstructured strategic decisions c. Unstructured managerial decisions d. Structured strategic decisions

b. Unstructured strategic decisions

Which role is ALDI with their Twitter account @AldiUSA? a. Provider b. User c. Community d. Sponsor

b. User

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships. a. Continuous data b. User-generated content c. Secondary data d. Folksonomy

b. User-generated content

A scheduling information system used by a receptionist at a doctor's office is an example of how an information system improves the quality of a process by ____. a. controlling data quality b. augmenting a human who is performing an activity c. performing an activity d. controlling process flow

b. augmenting a human who is performing an activity

Using a physical characteristic to authenticate users is an example of ________. a. SSO b. biometric authentication c. PIN d. human safeguards

b. biometric authentication

Alisha's startup has another record month. She posts pictures of her best selling handbag to Facebook and Instagram. Her friends and customers leave her positive comments. Alisha's post and her friends' comments are an example of ________. a. continuous data b. content data c. secondary data d. connection data

b. content data

Amanda is at her first IU Basketball game. She posts a selfie to Instagram getting several likes and comments. Her post along with the likes and comments are examples of _____________. a. secondary data b. content data c. continuous data d. connection data

b. content data

The situation that occurs when the addition of resources creates inefficiencies is known as ________. a. marginal utility b. diseconomies of scale c. marginal returns d. economies of scale

b. diseconomies of scale

With regard to cloud computing, the term __________ means that leased computing resources can be increased or decreased dynamically. a. dynamic b. elastic c. strategic d. flexible

b. elastic

Java, C#, and VB.NET are examples of ________. a. structured queries b. object-oriented languages c. thin-client applications d. client operating systems

b. object-oriented languages

Project teams who never provide each other critical feedback may lead to __________________. a. better quality deliverables b. poor decision making c. a positive team experience d. a stronger sense of community among its team members

b. poor decision making

When a company like ALDI uses business intelligence (BI) to answer questions like "How can we reduce food waste?" it's using BI for ________. a. project management b. problem solving c. deciding d. informing

b. problem solving

The application Microsoft Teams would be a _________component of a collaboration information system. a. hardware b. software c. procedures d. data

b. software

Which of the following is NOT a data acquisition process? a. obtaining b. updating c. relating d. cataloging

b. updating

The systems development life cycle (SDLC) process follows a linear sequence from requirements to design to implementation. Therefore, the systems development life cycle (SDLC) process is also known as the ________. a. scrum process b. waterfall method c. swim-lane method d. agile development method

b. waterfall method

In Premiere, each record in the tblTransaction must identify at least one member from the tblMember. Yet, some members never make a single purchase while others make frequent purchases. This shows a ________ relationship between the two tables. a. M:1 b. N:M c. 1:N d. 0:00

c. 1:N

Which of the following would be least affected by the threat of substitutes? a. A used car dealership in New York b. A convenience store that sells toiletry items c. A company that develops and patents a new method for capturing solar energy d. A corner coffee shop in Seattle

c. A company that develops and patents a new method for capturing solar energy

In which phase of the customer life cycle do lead-tracking processes occur? a. Marketing b. Loss/Churn c. Customer aquisition d. Relationship management

c. Customer aquisition

A Customer Relationship Management (CRM) Information System is what time of information system? a. Inter-enterprise information system b. Workgroup information system c. Enterprise information system

c. Enterprise information system

Which of the following industries is least likely to be disrupted by increased production and use of self-driving cars? a. Ride-hailing (e.g. Uber) b. Public transit c. Farm machinery d. New and Used Car Sales

c. Farm machinery

Which of the following scope classifications would most likely include information systems that are the most difficult to change? a. Workgroup b. Enterprise c. Inter-Enterprise

c. Inter-Enterprise

Which of the following statements is consistent with the central idea of business process design? a. Technology should be used to supplement the existing value chain. b. Technology should be used to modify and improve all business processes. c. Organizations should create new business processes instead of improving existing systems. d. Business processes should focus on improving individual functional systems.

c. Organizations should create new business processes instead of improving existing systems.

If you travel a lot for your job and need to rent a car in each city you visit, that is like which cloud service offering? a. Traditional On-Premises b. Infrastructure as a Service (IaaS) c. Platform as a Service (PaaS) d. Software as a Service (SaaS)

c. Platform as a Service (PaaS)

______________ is a completely computer-generated non-real world with interactive digital objects. a. Reality b. Augmented Reality c. Virtual Reality d. Mixed Reality

c. Virtual Reality

The most crucial characteristic of good data is its ____________. a. sufficiency b. relevance c. accuracy d. timeliness

c. accuracy

Company A engages in a low-cost strategy. If Company A improves their business process by reducing the time it takes to fulfill customer orders while improving order accuracy, and using fewer resources, it improves the business process in which way(s)? a. effectiveness b. efficiency c. both efficiency and effectiveness

c. both efficiency and effectiveness

The storage of ________ differentiates social media information systems (SMIS) from Web site applications. a. content data b. continuous data c. connection data d. secondary data

c. connection data

Metadata is/are ________. a. server-side processing code b. data that are encrypted c. data that describes data d. error logs of databases

c. data that describes data

The internet (and web browsers with graphical user interfaces) played a key role in the ______________. a. industrial revolution b. information age c. digital revolution d. age of the "mega" four companies'

c. digital revolution

A group engaging in only positive feedback is prone to _____. a. cooperation b. constructive criticism c. groupthink d. collaboration

c. groupthink

information systems exist to ______________. a. establish customer loyalty b. increase the competitive rivalry in an industry c. help organizations achieve their strategies d. store and manage data

c. help organizations achieve their strategies

According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________. a. recognition b. popularity c. influence d. security

c. influence

A database is used instead of a spreadsheet when ________. a. lists of data involve a single theme b. structures of data lists are simple c. involve data with multiple themes d. users do not want to store all data in one place

c. involve data with multiple themes

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. a. native application b. client operating system c. mobile system d. nonmobile system

c. mobile system

The process of converting a poorly structured table into two or more well-structured tables is called ________. a. equivocation b. validation c. normalization d. stabilization

c. normalization

Lynn's job requires her to assign delivery territories to different transportation team executives. She also contacts fleet supervisors to arrange trucks for transportation of finished goods. Which activity of the value chain is Lynn executing? a. sales b. marketing c. outbound logistics d. inbound logistics

c. outbound logistics

Which of these is NOT like the others? a. phishing b. pretending c. sniffing d. spoofing

c. sniffing

A(n) ________ is a formal description of a system's response to use and misuse scenarios. a. analysis b. activity log c. test plan d. policy

c. test plan

The connection between a VPN client and a VPN server is called a(n) ________. a. access point b. hyperlink c. tunnel d. data highway

c. tunnel

When using a VPN, a connection is made between a VPN Client and a VPN Server. What is the name of that connection? a. terminal b. pathway c. tunnel d. private bridge

c. tunnel

Which of the following is NOT a criteria for successful collaboration?a. Growth in team capability b. Successful outcome c. Meaningful and satisfying experience d. Being the first team done

d. Being the first team done

________ is a wireless protocol designed for transmitting data over short distances, replacing cables. a. IPv6 b. PaaS c. IPv4 d. Bluetooth

d. Bluetooth

In a BPMN process diagram, dotted arrows depict the flow of ________ in the process. a. Control b. Decisions c. Raw materials d. Data

d. Data

During which of the following stages do teams document project results and information for future teams? a. Doing b. Planning c. Starting d. Finalizing

d. Finalizing

Which of the following is classified as a technical safeguard? a. Cookies b. Key escrow c. Backup and recovery d. Firewalls

d. Firewalls

Which of the following is the most basic cloud offering? a. CDN b. VPN c. SaaS d. IaaS

d. IaaS

In the context of the system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced. a. Pilot b. Phased c. Parallel d. Plunge

d. Plunge

Which component of a SMIS is Facebook's Mark Zuckerberg currently struggling with as it pertains to their policies on user content and advertisements? a. Hardware b. Software c. Data d. Procedures

d. Procedures

A ________ is a quantitative way of describing when, how often, and how much a customer spends. a. neural network b. decision tree c. cluster analysis d. RFM analysis

d. RFM analysis

Microsoft offers subscriptions of Office 365, Exchange, Skype for Business, and SharePoint applications as a ________ "in the cloud." a. Moocs b. IaaS c. PaaS d. SaaS

d. SaaS

Which of the following is TRUE of traditional database application programs? a. The application logic is contained in a program on the client-side computer. b. Application forms, reports, and queries are displayed and processed using a browser application. c. They are thin-client applications that need not be preinstalled on the users' computers. d. They are written in object-oriented languages such as C++ and VisualBasic.

d. They are written in object-oriented languages such as C++ and VisualBasic.

A data model describes the ________ and ________ that will be stored in the database. a. tables, queries b. fields, field properties c. fields, records d. data, relationships

d. data, relationships

AI-enabled machines need humans because they lack ________. a. the ability to perform routine tasks b. the ability to think like humans c. oil d. instincts

d. instincts

The purpose of a database is to ________. a. store information b. generate reports describing customer behavior c. store knowledge d. keep track of things with related multiple themes

d. keep track of things with related multiple themes

A loan approval officer at a bank is a ________. a. BI user b. database specialist c. data analyst d. knowledge worker

d. knowledge worker

To prevent the ________ problem, some type of locking must be used to coordinate the activities of users who know nothing about one another. a. integrity b. referential c. single user d. lost update

d. lost update

Which of the following are the steps, in order, of the business process management (BPM) cycle? a. model processes; implement processes; assess results; create components b. create components; model processes; implement processes; assess results c. implement processes; create components; model processes; assess results d. model processes; create components; implement processes; assess results

d. model processes; create components; implement processes; assess results

IBM's Watson uses ________ or the ability of a computer system to understand spoken human language. a. common sense b. spatial analysis c. context clues d. natural language processing (NLP)

d. natural language processing (NLP)

In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works. a. parallel b. pilot c. plunge d. phased

d. phased

In the context of the system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced. a. parallel b. phased c. pilot d. plunge

d. plunge

The modification or deletion of data in a database is an example of ________ operations of a database management system. a. analytical b. statistical c. administrative d. processing

d. processing


Related study sets