MIS 390

Ace your homework & exams now with Quizwiz!

A network that spans a college or corporate facility is called a:

**INCORRECT** WAN.

________ is spyware that logs and transmits everything a user types.

A keylogger

Which of the following is a computer-based system that attempts to emulate how humans think and act?

AI technology

Which of the following is the first step in the knowledge management value chain?

Acquire

Which of the following is not a major feature of organizations that impacts the use of information systems?

Agency costs

Which of the following is a private corporate network extended to authorized users outside the organization?

An extranet

Which signal types are represented by a continuous waveform?

Analog

Firms that allow employees to use their own devices are embracing which of the following?

BYOD

Which of the following statements about wireless security is false? SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs. Radio frequency bands are easy to scan. An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network. Intruders can force a user's NIC to associate with a rogue access point. Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Which of the following types of system would you use to manage relationships with your customers?

CRM

Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete?

Competitive forces model

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

DDoS

Which of the following types of information systems is especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance?

DSS

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

Data dictionary

Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data?

Data management

You are advising a video production company on the best type of knowledge management system to help them archive digital video and sound clips. Which of the following will suit their needs?

Digital asset management system

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process

Which of the following are the three major types of knowledge management systems?

Enterprise-wide knowledge management systems, KWS, and intelligent techniques

Maintaining the organization's financial records is a central purpose of which main business function?

Finance and accounting

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?

Green computing

Which main business function is responsible for maintaining employee records?

Human resources

Which of the following is not one of the current key technology trends that raise ethical issues?

Increase in data quality

Which of the following best describes the effect that new information technology has on society?

It has a ripple effect, raising new ethical, social, and political issues.

Which of the following statements about botnets is false? Eighty percent of the world's malware is delivered by botnets. Botnets are often used to perpetrate DDoS attacks. Ninety percent of the world's spam is delivered by botnets. Botnets are often used for click fraud. It is not possible to make a smartphone part of a botnet.

It is not possible to make a smartphone part of a botnet.

Which of the following would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making?

KMS

Measures defined by management and used to internally evaluate the success of a firm's financial, business process, customer, and learning and growth are called

KPIs

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

Kant's Categorical Imperative

Which of the following is a tool for the management, delivery, tracking, and assessment of various types of employee learning?

Learning management system

Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates which of the following strategies?

Low-cost leadership

The total number of food items with storage temperature problems is an example of which of the following?

Meaningful information

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

Modem

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

NORA

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

National Information Infrastructure Protection Act

Which of the following has a large number of sensing and processing nodes that continuously interact with each other?

Neural networks

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

On-demand

Which of the following substitute products would be of most concern for a cable TV distributor?

On-demand Internet television

In a business hierarchy, which of the following levels is responsible for monitoring the daily activities of the business?

Operational management

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?

Packet (switching)

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

Profiling

CryptoLocker is an example of which of the following?

Ransomware

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Ransomware

________ means that you accept the potential costs and obligations for the decisions you make.

Responsibility

Which of the following industries has the lowest barrier to entry?

Small retailer

Which of the following is not an example of a wearable computing device?

Smartphones

Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes?

Supply chain management system

A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives?

Survival

On which of the following protocols is the Internet based?

TCP/IP

Which of the following is not an example of the moral dimensions of the Information Age identified in the text?

The emergence of giant tech firms that dominate their markets

Which of the following tools would you use to evaluate and choose a collaboration tool for your organization?

The time/space collaboration and social tool matrix

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

Total cost of ownership

Which of the following is the single greatest cause of network security breaches?

User lack of knowledge

Which of the following is a recent addition to the mobile digital platform?

Wearable computing devices

An inference engine is

a strategy used to search through the collection of rules and formulate conclusions

Augmented reality is

a technology for enhancing visualization by overlaying digital data and images onto a physical real-world environment

A MOOC is

a type of online course

The leading methodology for understanding the really important information needed by a firm's executives is called the ________ method.

balanced scorecard

Evil twins are:

bogus wireless network access points that look legitimate to users.

The telephone system is an example of a ________ network.

circuit-switched

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

click fraud.

All of the following are technologies used to analyze and manage big data except: Hadoop. analytic platforms. in-memory computing. cloud computing. noSQL.

cloud computing.

Interpretations of Moore's law assert that:

computing power doubles every 18 months.

The ________ phase of decision-making involves identifying and exploring various solutions to a problem.

design

Bandwidth is the:

difference between the highest and lowest frequencies that can be accommodated on a single channel.

All of the following are competitive forces in Porter's model except

disruptive technologies.

In ________, digital technology and the Internet are used to execute the major business processes in the enterprise.

e-business

A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.

enterprise

A schematic of the entire database that describes the relationships in a database is called a(n):

entity-relationship diagram.

Group Decision Support Systems (GDSS)

facilitate the solution of unstructured problems

Data mining allows users to:

find hidden relationships in data.

As discussed in the chapter text, the three main reasons that investments in information technology do not always produce positive results are

information quality, organizational culture, and management filters

Data collected at checkout counters in a grocery store is an example of

input

The three activities in an information system that produce the information organizations use to control operations are

input, processing, and output

Apple's Siri application is an example of

intelligent agents

The Internet increases the bargaining power of customers by

making information available to everyone.

Firms use a ________ strategy to provide a specialized product or service for a narrow target market more effectively than their competitors do.

market niche

According to the ________ definition of organizations, an organization is seen as a means by which capital and labor are transformed by the organization into outputs to the environment.

microeconomic

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization.

Decisions regarding managing and monitoring day-to-day business activities are referred to as ________ intelligence.

operational

In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.

opt-in

The practice of contracting custom software development to an outside firm is commonly referred to as:

outsourcing.

The logical view of a database:

presents data as they would be perceived by end users.

A field identified in a table as holding the unique identifier of the table's records is called the:

primary key.

A(n) ________ represent data as two-dimensional tables.

relational DBMS

The ________ function is responsible for making sure customers are aware of the company's products.

sales and marketing

In a relational database, the three basic operations used to develop useful sets of data are:

select, project, and join.

In a hierarchical organization, the upper level consists of

senior management

The three principal levels within a business organization hierarchy are

senior management, middle management, and operational management

An employee clicks a link in an email from what looks like a coworker and is taken to a fraudulent website, which asks for personal information. This is an example of:

spear phishing.

A pivot table is a(n)

spreadsheet tool that displays two or more dimensions of data in a convenient format

If you can follow a definite procedure to make a business decision, you are making a(n) ________ decision.

structured

All of the following are capabilities of enterprise social networking tools except the ability to set up member profiles the ability to share, store, and manage content tagging and social bookmarking supply chain management the ability to establish groups and team workspaces

supply chain management

OLAP enables:

support of multidimensional data analysis, enabling users to view the same data in different ways using multiple dimensions.

The text defines ________ as expertise of organizational members that has not been formally documented.

tacit knowledge

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

technology standards.

Thomas Friedman's description of the world as "flat" refers to

the flattening of economic and cultural advantages of developed countries

According to ________, you should take the action that produces the least harm.

the risk aversion principle

The domain .gov is a(n):

top-level domain.

When there is no well-understood or agreed-on procedure for making a decision, it is said to be

unstructured

A network that covers entire geographical regions is most commonly referred to as a(n):

wide area network.


Related study sets

10 ASP Biology term 3 collection

View Set

ACE Health Coach Chapter 11 Quiz

View Set