K204 UMIS Exam Questions

Ace your homework & exams now with Quizwiz!

A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship. 1. 1:N 2. 1:01 3. N:M 4. M:1

N:M

Which of the following is true for the relationship between business processes and information systems? 1. Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction. 2. Information systems incorporate all business process activities, and hence should be developed before business processes. 3. Starting from processes and working toward information systems is the best option to anticipate future demands and new business processes. 4. Developing information systems before business processes ensures that all activities are considered in the development process.

Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.

What are the four phases of collaboration? 1. Starting, Planning, Doing, Finalizing 2. Thinking, Talking, Acting, Completing 3. Talking, Working, Discussing, Revising 4. No answer text provided.

Starting, Planning, Doing, Finalizing

How does knowledge management (KM) benefit organizations? Briefly explain your chosen answer. 1. improve process quality 2. increase team strength 3. a and b 4. it doesn't benefit organizations

a and b

Which of these is an example of incorrect data modification? 1. a denial of service attack 2. accidentally posting company-internal data to a publicly accessible site 3. accidentally deleting customer data while attempting to perform a backup 4. crashing a floor buffer into a server rack

accidentally deleting customer data while attempting to perform a backup

Which of these is an example of unauthorized data disclosure? 1. a service shutting down when a computationally intensive process overloads the system 2. a database being restored from an outdated backup 3. an employee sharing their login credentials with a scammer who is pretending to perform a company security audit 4. a construction crew cutting a fiber optic cable

an employee sharing their login credentials with a scammer who is pretending to perform a company security audit

What is the most important quality to have as a collaborator? 1. being nice 2. being knowledgeable about the business world 3. being able to give and receive critical feedback 4. being organized

being able to give and receive critical feedback

________ is defined as information containing patterns, relationships, and trends. 1. Process mining 2. Business process management 3. Business intelligence 4. Spatial intelligence

business intelligence

A ________ is an application program that runs on a server-tier computer and manages processes such as items in a shopping cart. 1. database tier 2. web server 3. database 4. commerce server

commerce server

________ is the dynamic social media process of employing users to participate in product design or product redesign. 1. homesourcing 2. outsourcing 3. showrooming 4. crowdsourcing

crowdsourcing

In the Five-Component Model, which component is considered the "bridge" that connects the computer side of the model to the human side? 1. hardware 2. software 3. data 4. procedures 5. people

data

A _____________ is a logical representation of a database that describes the data and relationships that will be stored in the database. 1. data model 2. crow's feet diagram 3. database design schema 4. requirements document

data model

Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________. 1. OLAP cube 2. neural network 3. data warehouse 4. Web server

data warehouse

The centerpiece of an ERP application is the: 1. database 2. sales application 3. relationship management application 4. human resources application

database

A ___________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business. 1. datamart 2. datamine 3. datacube 4. data model

datamart

Which type of relationship would be necessary to have between the Employee and Sales entities in a grocery store database? 1. N:M 2. 1:N 3. 1:1 4. M:M

1:N

When a company tries to offer the same products at a lower cost they are trying to __________ a customer's buyer power. 1. increase 2. decrease 3. maintain 4. none of these

decrease

In which phase of the Systems Development Life Cycle (SDLC) should you determine project cost feasibility? 1. Define System 2. Determine Requirements 3. Design System Components 4. Implement System 5. Maintain System

define system

The process a company goes through to determine whether or not to invest in a new location is a ____________ process. 1. structured 2. dynamic 3. difficult 4. strategic

dynamic

In a data model, a(n) ________ represents something that a user wants to track. 1. record 2. byte 3. entity 4. primary key

entity

________ is a major task when implementing enterprise systems. 1. virtualization 2. encapsulation 3. gap identification 4. data duplication

gap identifcation

In the Five-Component Model, which component is the easiest to change? 1. hardware 2. software 3. data 4. procedures 5. people

hardware

The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________. 1. low threat of substitutions 2. high bargaining power of suppliers 3. high levels of rivalry 4. low bargaining power of customers

high levels of rivalry

Which of the following protocols guarantees secure data transmission? 1. http 2. ftp 3. smtp 4. https

https

Example of technical safeguards include: 1. identification and authentication, encryption, firewalls, malware protection, and application design 2. defining data policies, rights, and responsibilities 3. hiring and screening, training, and account administration

identification and authentication, encryption, firewalls, malware protection, and application design

The two key characteristics of collaboration are: 1. organization and enthusiasm 2. iteration and feedback 3. listening and an open mind 4. timeliness and self-management

iteration and feedback

Which of the following is a common description of information? 1. information presented in a meaningful context 2. unbiased information 3. recorded facts or figures 4. knowledge derived from facts or figures

knowledge derived from facts or figures

The primary risk of peer-to-peer support in the context of social media and customer service is ________. 1. lack of investment 2. loss of control 3. loss credibility 4. lack of privacy

loss of control

Identify a characteristic that is a disadvantage of cloud-based hosting. 1. loss of control over data location 2. ongoing support costs 3. increased management requirements 4. significant development effort

loss of control over data location

________ are large-scale high-speed centralized computers, used for internal corporate data processing needs. 1. Thin clients 2. Hosts 3. Mainframes 4. Clients

mainframes

Which of the following is an accurate representation of the steps in the business process management cycle? 1. model processes; implement processes; assess results; create components 2. create components; model processes; implement processes; assess results 3. implement processes; create components; model processes; asses results 4. model processes; create components; implement processes; assess results

model processes; create components; implement processes; assess results

Transforming inputs into the final products describes which primary activity? 1. Operations/Manufacturing 2. Outbound Logistics 3. Customer Service 4. Sales and Marketing

operations/manufacturing

In the context of security, which of the following is true about managing risk? 1. organizations should implement safeguards that balance the trade-off between risk and cost 2. all organizations except financial institutions should invest heavily in security safeguards 3. organizations should not take cost into account when it comes to implementing safeguards

organizations should implement safeguards that balance the trade-off between risk and cost

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? 1. inbound logistics 2. operations 3. customer service 4. outbound logistics

outbound logistics

Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services? 1. traditional marketing 2. pay-per-click 3. user participation 4. venture capital

pay-per-click

You follow certain steps to access the supplementary readings for a course when using your organization's library management system. The steps that you follow are examples of the ________ component of an information system. 1. procedure 2. data 3. software 4. hardware

procedure

A low inventory report that is automatically generated when the number of items reaches a certain number is an example of___________. 1. push publishing 2. pull publishing 3. automated publishing 4. BI publishing

push publishing

The sales manager of a firm wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keywords (criteria) into a ________ to obtain the information that she wants. 1. report 2. reference 3. data entry 4. query

query

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more products? 1. marketing 2. customer acquisition 3. relationship management 4. loss/churn

relationship management

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement? 1. structural capital 2. social capital 3. process capital 4. human capital

social capital

Organizations that play the role of providing platforms that enable the creation of social networks, or social relationships among people with common interests are know as: 1. social media providers 2. welfare organizers 3. social media sponsors 4. application providers

social media providers

What type of decision requires the most collaboration? 1. managerial 2. operational 3. strategic 4. no answer text provided

strategic

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs. 1. collaboration 2. experimentation 3. interpersonal 4. systems thinking

systems thinking

Which of these is one of Porter's 5 forces that determine industry structure? 1. inbound logistics 2. customer service 3. threat of new entrants 4. differentiation

threat of new entrants

A ________ is a balancing of three critical factors: requirements, cost, and time. 1. WBS 2. trade-off 3. test plan 4. critical path

trade-off

Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems? 1. giving employees ultimatums and deadlines 2. paying employees outright for transitioning to the new system 3. coercing employees to learn the new system 4. training employees on the successful use of the new system

training employees on the successful use of the new system

organizations should implement safeguards that balance the trade-off between risk and cost 1. true 2. false

true

________ are collections of related tasks that receive inputs and produce outputs. 1. Activities 2. Repositories 3. Resources 4. Models

Activities

What are the four primary purposes of collaborative teams? 1. Become informed, make decisions, solve problems, manage projects 2. Solve issues, conduct projects, work together, use technology 3. Discover problems, split up tasks, work efficiently, reach solutions 4. Be efficient, produce new ideas, solve problems, use technology

Become informed, make decisions, solve problems, manage projects

Which of the following is a function of an Internet service provider? 1. It serves as a user's gateway to the Internet. 2. It describes how messages must be processed for wired transmission. 3. It connects computers within a LAN. 4. It transmits data over short distances, replacing cables.

It serves as a user's gateway to the Internet.


Related study sets

test over Daniel,Ezra, Esther and Nehemiah

View Set

ch 71 Care of Patients with Acute Kidney Injury and Chronic Kidney Disease

View Set

Sociology 101 final ch.11,12,13,14&17

View Set

Immigration and Demographic Change

View Set