MIS 3302 Ch 1 - 14 Final Review
encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies.
E-business
is a major factor in the widespread use of global information systems.
E-business
All of the following are among the advantages of green computing except:
Eliminates server virtualization needs
Which of the following approaches for developing information systems increases the risk of leaking confidential information to competitors?
Outsourcing
During the implementation phase of the systems development life cycle (SDLC), in ____ conversion, the old and new systems run simultaneously for a short time to ensure the new system works correctly.
Parallel
Which type of access control is used to protect systems from unauthorized access?
Passwords
are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations
Peer-to-peer e-commerce platforms
During the ____ phase of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem.
Planning
Which geographic object of a geographic information system (GIS) is most likely used to show a particular zip code or a large tourist attraction?
Points
In the context of electronic exchange of information, which is used by companies to improve the efficiency and effectiveness of the supply chain process?
The Internet and established Web protocols
Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
The brokerage model
Context-aware computing
Widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals is known as:
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
confidentiality
In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.
copyrights
A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.
corporate network
When a Web page changes, _____ update their indexes and databases automatically to reflect the change.
crawler-based directories
In the context of intellectual property, ____ is registering, selling, or using a domain name to profit from someone else's trademark.
cybersquatting
Computer networks, database systems, point-of-sale (POS) systems, etc., are a few examples of information technologies that support information systems in__________.
decision making
In a management information system, structuring the data component to define what type of data is collected and in what form is usually easy if an organization has _____
defined its strategic goals, objectives, and critical factors
The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
definition
Computer-aided systems engineering (CASE) tools are typically used during the _____ phase of the systems development life cycle (SDLC).
design
Asynchronous software enables team members to work together at _____
different times
Most executive information systems include a _____, which integrates information from multiple sources and presents it in a unified, understandable format, often as charts and graphs
digital dashboard
Which feature of an executive information system (EIS) enables users to examine and analyze information?
digital dashboard
Service and support are more important in e-commerce than in traditional commerce because e-commerce companies _____.
do not have a physical location to help maintain current customers
Jack is a gamer, and every time he plays at a gaming center, he pays five dollars using a card that he recharges electronically every week. It is evident that Jack uses _____ as the mode of payment.
e-cash
In some states, certain computer manufacturers collect a fee called a(n) ____, in order to dispose of a computer after its useful life.
e-waste
A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.
parallel port
In situations where an information system needs to be designed from scratch, the SDLC model is _____.
particularly suitable
Decisions related to _____ are considered structured decisions at the operational management level of an organization
payroll
In a blockchain environment, the distributed network is protected through ___that makes the network accessible only to the authorized users.
permission or private
A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.
personal
In _____ conversion of the implementation phase of the systems development life cycle (SDLC), as each module of a new system is converted, the corresponding part of an old system is retired.
phased-in-phased-out
During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language.
physical
In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the _____ part, and backtracks to find the right solution
then
The main difference among an electronic payment system and cryptocurrency is not having a(n) ____ between the sender and receiver
third party such as a bank or a financial institution
Identify one advantage of multichannel retailing
Improves customer satisfaction and customer loyalty
Which is true of assembly language?
Uses a series of shortcodes, or mnemonics, to represent data or instructions.
All of the following are a type of biometric authentication except:
VPN recognition
In the context of machine learning, an artificial neural network (ANN) is most likely used for
oil and gas exploration
A(n) _____ is an input device used to grade multiple-choice and true/false tests.
optical mark recognition system
uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment
Virtual reality
Which is a software component of a management information system (MIS)?
Commercial programs
A ____ is a tool used in systems analysis and design model that shows a process at a more general level and is helpful for showing top management and the task force how a process works.
Context diagram
computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, where we are, and whom we are with-offer recommendations
Contextual
Disadvantages of collaboration software include _____
-lack of human touch and other nonverbal cues -unnecessary meetings -security problems
Which is a generic top-level domain (TLD) name used for backbone, regional, and commercial networks?
.net
An American Standard Code for Information Interchange (ASCII) file defines up to _____ characters.
128
WiMAX usually has a range of about _______ for fixed stations.
30 miles
Under the General Data Protection Regulation (GDPR), violators could be fined up to ___ percent of the company's global annual revenue depending on the nature of the violation.
4
In India, nearly _____ of Internet users use their own local language online.
47
As of 2015, approximately _____ percent of Internet content was in English.
55
is one of the most popular password managers.
Dashlane
In the context of fuzzy logic, which defines membership in a black-or-white fashion?
A dynamic set
A ____ is a tool used in systems analysis and design model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses.
Data flow diagram
Identify an advantage of a mouse over a trackball.
A mouse is more precise in positioning the pointer than a trackball.
The international DIY Association wants its users to be able to connect with an off-site infrastructure over the internet. Scalability and collaboration are more important to this organization than security and privacy. Which of the following cloud computing options would be most suitable for the International DIY Association?
A public cloud.
allows data to be stored in multiple places to improve a system's reliability.
A redundant array of independent disks
In a customer relationship management (CRM) system, which is effective in tracking and analyzing customers' buying patterns?
Data-mining tools
Computer networks, database systems, POS systems, RFID tags, etc., are examples of information technologies that support information systems in ___.
Decision making
In the context of business analytics, which method reviews past events, analyzes the data, and reports on what happened in a given period?
Descriptive analytics
are indexes of information, based on keywords embedded in documents, that allow search engines to find what Internet users are looking for.
Directories
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
Disaster Recovery Plan (DRP)
In service organizations, one of the major links in the supply chain includes ____.
Distribution centers
The data _____component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.
AND operator
When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met.
AND operator
Which is an example of an e-marketplace
An e-distributor
Which component of an expert system uses forward and backward chaining to manipulate a series of rules
An inference engine
In a natural-language processing (NLP) system, the ______ activity involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content
Analysis
Which of the following is not considered an advantage of Power BI?
Analytics may be misinterpreted and offer support for a decision that may not be ethical
______are used when data is fuzzy and uncertainty is involved
Artificial neural networks
help determine the price of goods and services when there is no set price in the marketplace
Auctions
How are desktop and mobile operating systems similar?
Both feature a graphical user interface (GUI).
is high when customers have many choices and low when they have few choices.
Buyer power
is an executive position created for overseeing knowledge management within an organization
Chief knowledge officer
In the context of Web marketing, the ___is computed by dividing the number of clicks an ad gets by the total impressions bought.
Click through rate
which is used for online storage and backup involves multiple virtual servers that are usually hosted by third parties.
Cloud storage
are conducted media that can be used for both data and voice transmissions.
Coaxial cables
is a search for specific information or patterns using input from multiple business partners and data sources
Collaborative filtering
A computer with a 32-bit processor can perform calculations with larger numbers better than a 64-bit system.
False
An object code must be translated into source code for a computer to read and execute it.
False
Data markets focus on business functions for the marketing department of an organization
False
MIS software includes only software developed in-house.
False
Networking is one of the five forces named by Michael Porter for analyzing an organization.
False
The arithmetic logic unit and the control unit are part of the BasicFalse Input/Output System.
False
Under the GDPR, users must be notified regarding any types of data breaches within 12 hours of learning of the breach.
False
Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers.
False
When solving problems, the users of an information system must avoid using informal information—such as rumors, unconfirmed reports, and stories.
False
According to Peter G. Keen, a former MIT professor, which is a benefit of a decision support system (DSS)?
Fast response to unexpected situations
Teletech, an international textile company, uses a database to store data on the number of products, suppliers, and sales personnel. The process component of the information system conducts analysis on the data to provide information about sales. Which can be used by Teletech to generate predictions for its next sales period?
Forecasting models
Explicit knowledge is ____ knowledge.
Formal
All of the following are true about General Data Protection Regulation (GDPR) except:
GDPR does not cover EU employees
mimic the process of natural evolution to generate solutions to optimization and search problems
Genetic algorithms
Which biometric security measure compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?
Hand geometry
In the context of expert systems, ____ consists of common sense, rules of thumb, educated guesses, and instinctive judgments.
Heuistics
In a ___model, the relationships among records form a treelike structure
Hierarchical Model
Identify a true statement about the General Data Protection Regulation (GDPR).
If any organization's Web site collects any of the regulated data from EU users, it is liable to comply to GDPR.
All of the following are a part of cloud computing services except
Information as a Service (IaaS)
During the ____ phase of the decision-making process, a decision maker examines the organization's environment for conditions that need decision
Intelligence
Which programs carry out repetitive tasks and can be programmed to make decisions based on specified conditions
Intelligent agents
Which software is capable of reasoning and following rule-based processes?
Intelligent agents
James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the Internet Corporation for Assigned Names and Numbers (ICANN) to his computer system is 115.248.178.233. This numerical code is referred to as a(n) _____.
Internet Protocol address
When information is transferred from one network to another, domain names are converted to _____ by the Domain Name System (DNS) protocol.
Internet Protocol addresses
Unstructured decisions are often used in _____.
Introducing a new product
All of the following are true about 5G, or fifth generation of cellular networks except:
It does not mean that a hospital can serve more patients
All of the following are true in agile approach for systems development except:
It does not provide collaboration among team members
All of the following are true about data-driven decision making except
It does not require analytical tools to interpret gathered data
All of the following are true about SQL except:
It does not support relational database design
In a management support system, why is it important to keep lines of communication open?
It ensures support staff feel included in the decision-making process.
Which statement is true of a global information system (GIS)?
It facilitates communication between headquarters and subsidiaries in other countries
In the context of using information technologies for a competitive advantage, which statement is true of a top-line strategy?
It focuses on generating new revenue by offering new products and services.
In the context of a GIS, which is true of high coordination?
It gives flexibility in responding to competitors in different markets.
All of the following is true about an artificial neural network, or ANN except
It is an optimization tool
All of the following is true about CRM, or Customer Relationship Management except
It is replacing the human resource department
Which statement best describes spyware?
It is software that secretly gathers information about users while they browse the Web.
Which statement is true of database marketing?
It makes an organization responsive to the needs of its customers.
In the context of personalization technology, which of the following is a drawback of collaborative filtering (CF)?
It needs a large sample of users and content to work well.
Which statement is true of Web-based electronic data interchange (Open EDI)
It reduces the cost of transmitting documents
External users of an organization's information system are ____.
Its customers, contractors, and suppliers
In the context of information technology in workplaces, which allows adding new tasks to employees' responsibilities?
Job upgrading
The name of Facebook's cryptocurrency is _____.
Libra
Which is considered a key decision in supply chain management (SCM) related to manufacturing
Location
Which of the following is considered a basic task in the context of computer operations?
Logical operations
Marketing strategies in a customer relationship management (CRM) system focus on ____.
Long-term relationships with customers
consists of a series of 0s and 1s representing data or instructions.
Machine language
In a ____ structure, production, sales, and marketing are decentralized and financial management remains the parent company's responsibility.
Multinational
Rather than containing a set of if-then rules, more sophisticated expert systems use ____, which are designed to mimic the way a human brain learns.
Neural networks
All of the following are true about data science and big data except:
No digital data is stored in traditional databases
Which component of a data model describes methods and calculations that can be performed on data, such as updating and querying data?
Operations
Which of the following are two popular data visualization platforms?
Power BI and Tableau
Which layer of the Open Systems Interconnection (OSI) model formats message packets?
Presentation
Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?
Protecting patients' computer records
What information can be censored if the content is deemed offensive to a political, religious, or cultural group?
Public
In the context of Internet-enabled supply chain management (SCM), which SCM activity involves bargaining and renegotiating prices and term agreements?
Purchasing/procurement
What can serve as search engines, site reminders, or personal surfing assistants?
Shopping and information agents
Identify a true statement about collaboration software
Shyness is not as much of an issue when using it as in face-to-face meetings
help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.
Social networking sites
In the context of application software providers (ASPs), which of the following is also known as on-demand software
Software as a service
of a global information system (GIS) involves broad and long-term goals
Strategic support
Defined its strategic goals, objectives, and critical factors.
Structuring the data component, in a management information system, to define what type of data is collected and in what form is usually easy if the organization has _______.
In the context of computer operations, which of the following is considered an arithmetic operation?
Subtraction
All of the following are true about telepresence except:
Telepresence does not require retrofitting classrooms and equipment
is a series of well-defined phases performed in sequence that serves as a framework for developing an information system or project.
The systems development life cycle
is one of the forces of the Five Forces Model created by Michael Porter
The threat of new entrants
a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.
Voice recognition
is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.
Wi-Fi Protected Access
Which statement is true of application-filtering firewalls?
They are more expensive than packet-filtering firewalls
Which is true of fourth-generation languages (4GLs)?
They are the easiest computer languages to use.
In the context of information privacy, which is true of cookies?
They provide information about users' location.
In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.
Time Division Multiple Access
_____, a more recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.
Transport Layer Security
A knowledge management system must include a decision support tool.
True
Foursquare is a social networking site
True
In a cloud-based enterprise system, cloud providers are responsible for providing hardware, software, and other needed utility programs.
True
Sales constitute one component in a typical enterprise resource planning system.
True
Which statement is true of extreme programming (XP)?
Two programmers perform activities different from the other at different workstations.
In the context of communication media, _____ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.
conducted
Which type of software enables team members to store, share, and work together on different files?
collaboration software
In the context of the components of a typical expert system, _____ is similar to a database, but in addition to storing facts and figures it keeps track of rules and explanations associated with facts
a knowledge base
In fuzzy logic, a degree of membership indicates _________.
a value between 0 and 1
An omnichannel strategy enables a business to sell its products and services through:
a.Web sites b.Brick-and-mortar stores c.Mobile apps d.All of the above
Horizontal scaling of a client/server architecture means _____.
adding more workstations
Which approach to set up a distributed database management system (DDBMS) combines the fragmentation approach and the replication approach?
allocation
Spoofing happens when:
an illegitimate program poses as a legitimate one.
Codes written for one type of computer using _____ do not work on another type of computer.
assembly language
A _____ is a type of an intentional computer and network threat.
backdoor
Syndication feeds are one way of announcing the availability of a _____.
backlink
Bandwidth is often expressed as _____.
bits per second
Intelligent agents are also known as _____.
bots
Information literacy is understanding the role of information in gathering and using _____.
business intelligence
A(n) _____ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible.
extranet
A redundant array of independent disks (RAID) is considered a ________ security system?
fault-tolerant
A cloud-based enterprise system offers more _____ than traditional computing methods
flexibility and scale
While designing a management support system, it's important to remember that executives' main concern is _____.
getting the information they need in the simplest way
In the context of green computing, properly recycling an unwanted digital device is considered _______.
green disposal
In a global information system (GIS), high coordination:
helps maintain control of market needs around the world
In a(n) _____, nodes with the same parents are called twins or siblings.
hierarchical model
A _____ works well for companies that are geographically dispersed.
hierarchical topology
In the third-party exchange marketplace model, media buying is an example of a _____.
horizontal market
The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.
hypermedia
The embedded references in hypermedia documents are called _____.
hypertext
During the _____ phase of the decision-making process, ideas are converted into actions
implementation
In the context of Web marketing, the term ad _____ refers to one user viewing one ad.
impression
In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:
in spear phishing, the attack is targeted toward a specific person or a group.
In the context of the components of an expert system, a(n) _____ is similar to the model base component of a decision support system
inference engine
Which is an artificial intelligence application that can be used for Web marketing?
intelligent agent
E-commerce activities that take place within an organization's data communication network are part of _____ e-commerce.
intrabusiness
Identify one advantage of multichannel retailing
involves using more than one channel to sell and deliver merchandise and services to consumers
In the context of information privacy, which of the following is true of spam?
it is sent in bulk using automated mailing software.
During the maintenance phase of the software development life cycle, the maintenance team takes steps to _____.
keep the system up and running
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.
legal, but unethical
A(n) _____ is a common output device for soft copy.
liquid crystal display
Compared to campus-based learning, MOOCs offer __________.
lower costs and greater flexibility
During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced.
maintenance
During the _____ phase of the systems development life cycle (SDLC), a team assesses how a system is working and takes steps to keep the system up and running.
maintenance
The four Ms of resources in information systems are _____.
manpower, machinery, materials, and money
A customer relationship management (CRM) system uses customer contact information for targeted _____.
marketing
In the context of the knowledge base component of an expert system, _____ knowledge, enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution
meta-
In data warehouses, _____ is information about data-its content, quality, condition, origin, and other characteristics.
metadata
Which system performs tasks similar to a database management system (DBMS)?
model base management
In the _____ sales channel, a customer uses only one channel of a given business to purchase an item, including in-store, on a cell phone, or on the company's Web site.
multichannel
A _____ is an organization with assets and operations in at least one country other than its home country.
multinational corporation
Researchers are using nanotechnology to develop _____ for a "clot-busting" drug
nanocapsules
In a(n)___, each record can have multiple parent and child records.
network model
In the context of grid computing, each participant in a grid is referred to as a(n) _____.
node
A routing table lists _____.
nodes on a network
The purpose of an information system's _____ component is to generate the most useful type of information for making decisions.
process
In the context of a manufacturing firm's supply chain management (SCM) system, the _____ flow area manages the movement of goods all the way from suppliers to customers, including customer service and support
product
The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes:
protecting medical providers' notes and records.
Social networking sites can reduce organizations' costs by _____.
providing an inexpensive medium for targeting a large customer base
Communication media that use an antenna for transmitting data through air or water are called _____.
radiated media
Transmission of data across satellites is an example of data communication through _____.
radiated media
In a(n) _____ access file structure, records can be accessed in any order, regardless of their physical locations in storage media.
random
Convergence is possible now because of a combination of technological innovation, changes in market structure, and ________.
regulatory reform
Nanomaterials, if added to golf balls, can increase the _____ of the golf balls
responsiveness
One instance of regulatory practices hindering the success of a global information system occurs when a country _____.
restricts the type of hardware and software that can be imported or used
In the context of the features of a decision support system (DSS), ______ analysis enables you to apply different variables in decision making.
sensitivity analysis
A collaboration system supports decision makers by providing access to_____
shared environment and information
The ___ pillar of hypersociality realizes that the benefits of leveraging social media are much greater than its negatives.
social messiness versus process hierarchy
With the _____ model, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software
software as a service
In the context of information privacy, junk e-mail is also known as _____.
spam
A geographic information system (GIS) with analytical capabilities evaluates the impact of decisions by interpreting ______data.
spatial
In the field of pharmaceutical research, quantum computing can be used to ______.
speed up the time it takes to bring a new drug to market
One of the issues with a global information system is that too much _____ can decrease an organization's flexibility in responding to local preferences-even time differences.
standardization
Using the _____ model, e-commerce sites sell digital products and services.
subscription
Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power.
superposition
In a typical intranet configuration, the ___________ must define each user's level of access.
system administrator
Identify one difference between task management software and project management software.
task management software is relatively easy to learn and is accessible nearly on all platforms whereas project management software is all about collaboration and coordination in order to finish a project.
In the decision support system (DSS) environment, the _____ focuses on how a DSS is implemented and usually addresses questions about data storage, user access, response time, and security measures
technical designer
The variety dimension of big data refers to the combination of _____.
the diversity of types of forms of data
The data component of an information system is
the input to the information system
Blockchain technology can be used in the mortgage approval process to give borrowers _____.
the option of storing their financial information in a secure network
During the implementation phase of the systems development life cycle (SDLC), _____.
the solution is transferred from paper to action, and a team configures the system and procures components for it
In the context of big data, velocity is _________.
the speed with which the data has to be gathered and processed
During the maintenance phase of the software development life cycle, the team may decide to start the SDLC cycle over if:
the system is not working correctly
Control in a global information system requires _____.
the use of defined behaviors for different processes
In an organization with a(n) ____ structure, the parent company and all subsidiaries work together in designing policies, procedures, and logistics for delivering products and services.
transnational
In the context of the types of organizations that do business across national borders, the architecture of the global information system (GIS) in a(n) _____ structure requires a higher level of standardization and uniformity for global efficiency, and yet it must maintain local responsiveness
transnational
When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.
typosquatting
In _____, a geographic information system (GIS) is used to track changes in ridership on mass-transit systems
urban planning
Unlike data in databases, data in data warehouses is:
used for analytical purposes.
In the context of networking, on-demand computing is also known as ____ computing
utility
In the context of a global information system (GIS), _____ networks offer electronic data interchange standards, encryption, secure e-mail, data synchronization, and other services to conduct international business.
value-added
In the context of executive information systems (EISs), _______ allows managers to flag data that is unusual or out of normal boundaries.
variance reporting
In the third-party exchange marketplace model, the sale of medical products is an example of a ____.
vertical market
In the third-party exchange marketplace model, the sale of medical products is an example of a _______.
vertical market
In the context of decision makers using information technology, which decision-making analyses is available in spreadsheet programs, such as Microsoft Excel
what-if analysis
In the context of the types of decision-making analyses, what type of analysis is commonly used in transaction-processing systems and management information systems?
what-is
support m-commerce applications.
wireless wide area networks
In the uniform resource locator (URL) http://www.csub.edu/~hbidgoli/books.html, _____ represents the name of the directory in which files are stored.
www.csub.edu