MIS part of final exam by Ashleigh

Ace your homework & exams now with Quizwiz!

iteration and feedback.

Two key characteristics of collaboration​ are:

their dispersed operations

Because of _____, a company's nationality is not always obvious.

database model

A ____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.

honeytoken

A _____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.

mission statement

A _____ is a paragraph that communicates the most important overarching goal of the organization for the next few years.

worm

A _____ is a type of malware that spreads in a network without human intervention.

system

A _____ is an array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.

database administrator

A _____ is responsible for the databases and data warehouses of an organization—a very sensitive and powerful position.

dynamically modified

A _____ model is one that is automatically adjusted based on changing relationships among variables.

data flow diagram

A carefully drawn _____ can provide a useful representation of a system, whether existing or planned.

iteration

A collaborative team has developed an initial work​ product, provides feedback to the team members on the work​ product, and then revises the work product in response to the feedback. This process continues so that the result is far better than it would have been if any one team member had worked alone. This process illustrates the power of​__________ for the collaborative team.

social engineering

A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee's password to fix a problem. This is an example of _____.

data management

A decision support system's _____ module is a database or data warehouse that provides the data for the intelligence phase of decision making.

database

A large collection of electronic records is called a(n) _____.

shared content with version management

A team that is sharing project data by posting files in Google Drive is using the​ ____________ method of sharing content.

transaction

A(n) _____ is a business event such as a sale, a purchase, the hiring of a new employee, and the like.

decision support system (DSS)

A(n) _____ is a computer-based information system designed to help knowledge workers select one of many alternative solutions to a problem.

intranet

A(n) _____ is a network used only by the employees of an organization.

use case

A(n) _____ is an activity that the system executes in response to a user.

unstructured problem

A(n) _____ is one for which there is no algorithm to follow to reach an optimal solution.

expert system

A(n) _____ is required when it is not possible to exploit expertise by coupling quantitative data from a database with decision models.

primary key

A(n) _____ is the field by which records in a table are uniquely identified.

country-of-origin principle

According to the _____ , all legal matters are confined to the country from which a site operates.

support

After the planning phase, the SDLC includes four major phases: analysis, design, implementation, and _____.

maintenance

Although _____, part of the support phase of a system's lifecycle, is viewed by IS professionals as lacking in glamour, it should not be taken lightly or left to less-experienced professionals.

CRM systems

Both data-mining and OLAP software are often integrated into _____ for the purpose of collecting business intelligence about customers.

linear regression

Among the general statistical models, a(n) _____ model is the best-fit straight-line relationship between two variables, such as sales and the money spent on marketing.

certificate authority (CA)

An issuer of digital certificates is called a _____.

Unicode

As computers convert to operating systems that support _____, displaying different character sets should be less of a problem.

SQL Server

BI software has become so popular in large companies that Microsoft decided to integrate such software into its popular database management system, _____.

data warehouses

Business intelligence applications access large pools of data, usually transactional records stored in large databases called _____.

pure play

Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called _____ retailers.

models

Businesses use _____ to analyze data.

disaster recovery programs

CIOs often find the tasks of earmarking funds for _____ difficult because they cannot show the return on investment (ROI) of such planning.

multimedia

Clicking different areas of a map can zoom in and out as well as bring up related information in the form of other maps or text, utilizing the _____ capabilities of the web to the fullest.

encryption

Coding a message into a form unreadable to an interceptor is called _____.

spyware

Companies such as Razorfish, DoubleClick, and Engage Software use _____ to collect consumer data.

EAN bar code

Compared to the Universal Product Code (UPC), the additional bar in the _____ identifies a product's country of origin.

mine

Data warehouses could be regarded as a type of _____, where new useful information is the precious find.

semi-structured

Determining which stock will yield the highest return by the end of the year is an example of a(n) _____ problem.​

standards

Differences in _____ must be considered when integrating information systems internationally, even within the same company.

laws regarding free speech

Different _____ can significantly impact what a company may or may not display from its servers.

Errors in personal data

Identify the risk factor in decision support systems that lead to ethical issues.

discussion forums

If a student team decides to conduct a synchronous virtual​ meeting, it may choose to use any of the following tools EXCEPT​ ________.

convenience stores

In Japan, many people who order merchandise online prefer to pick it up at _____ called "konbini," and pay there for what they purchased.

spear phishing

In _____, criminals use personal information to attack organizational systems.

brownouts

In _____, the voltage of the power decreases, or there are very short interruptions in the flow of power.

data mining

In banking, _____ is employed to find profitable customers and patterns of fraud.

transformation

In the _____ phase of transferring data from a transactional database to a data warehouse, specialists "cleanse" the data and modify it into a form that allows insertion into the data warehouse.

search engines

In the context of B2B trading, online advertising is done mainly in two ways: through _____ and through banners.

seize a large market share

In the context of conflicting interests, the goal of an organization's corporate management is to _____.

knowledge

Information that can be gleaned from stored data is _____.

broadband

International information systems that incorporate graphics and interactivity to convey information over the web require _____ communication lines.

late mover

JetBlue obtained the strategic advantage of the _____ by implementing the latest available technologies of fast databases, VoIP, and a slick website.

systems development life cycle (SDLC)

Large ISs that address structured problems are usually conceived, planned, developed, and maintained within a framework called the _____.

information

Managers should focus on the asset they must protect, which in most cases is _____, not applications.

transaction data

Many organizations have found that if they accumulate _____, they can use it for important management decisions, such as researching market trends or tracking down fraud.

dimensional databases

OLAP applications are usually installed on a special server that communicates with both the user's computer and the server or servers that contain a data warehouse or _____.

targeting

On the Web, _____ includes identifying the sites your audience frequently visits.

affiliate program

On the web, an example of alliances is a(n) _____.

forecasting

One objective of data mining is _____, the discovering of patterns in data that can lead to reasonable predictions.

reduce costs

One way to increase market share is to lower prices, and the best way to lower prices is to _____.

are no different from other databases

Online databases that are used with web browsers _____.

data warehouses

Organizations must use software tools to process data into meaningful information to make _____ useful.​

neural networks

Rather than containing a set of IF-THEN rules, more sophisticated ESs use _____, which are designed to mimic the way a human brain learns.

unified modeling language

Several diagramming sets were developed by the 1970s, but in the late-1990s, a de facto standard emerged: _____.

SQL queries

Since OLAP applications are designed to process large amounts of records and produce summaries, they are usually significantly faster than relational applications such as those using _____.

decision support systems (DSSs)

Some companies offer _____ specifically designed to analyze shoppers' behavior at their sites based on captured data such as pages viewed, options clicked, and the sequence of pages shoppers viewed.

data-mining

Some companies use _____ techniques to try to predict what customers are likely to purchase in the future.

hits

Some hosting companies charge extra fees for shared hosting if the site experiences activity above a predetermined amount of data that is transferred, or number of visits from Web surfers, known as _____.

audit trail

Sometimes a(n) _____ is automatically created using data, such as the date and time of a transaction or the name or password of the user updating the file.

insider trading

The American Stock Exchange (AMEX) has a special department to prevent _____ of the securities under its supervision.

standards

The United States uses Fahrenheit temperatures, while other countries use Celsius temperatures. This portrays differences in _____.

European Union (EU)

The _____ enforces a privacy law called the Directive on Data Privacy.

chief information officer

The _____ is responsible for all aspects of an organization's ISs and is often a corporate vice president.

dialog module

The _____ prompts the user to select a model, allowing the user to access the database and select data for the decision process or to set criteria for selecting such data.

PATRIOT Act

The _____, as it is popularly known, gives law enforcement agencies surveillance and wiretapping rights they did not have before 2001.

enterprise resource planning (ERP) systems

The combination of customer relationship management (CRM) and supply chain management (SCM) systems is referred to as _____.

integration

The concept of extracting business intelligence from large data warehouses often involves _____ of several information systems.

e-commerce jurisdiction

The country-of-origin and country-of-destination principles deal with the issue of _____.

direct marketing

The data-mining application that identifies which prospective clients should be included in a mailing or email list to obtain the highest response rate is known as _____.

benefits outweigh the costs

The development of a new information system is economically justified if the _____.

business-to-consumer (B2C) commerce

The emergence of the web as a global medium for information exchange has made it an important vehicle for both business-to-business (B2B) and _____.

procuring raw materials

The first phase in the supply chain is _____.

investigation

The first step in systems analysis is _____, which determines whether there is a real need for a system and whether the system as conceived is feasible.

delivery

The implementation of a new IS, also called _____, consists of two steps: conversion and training.

customer relationship management

The main goals of _____ systems are to increase the quality of customer service, reduce the amount of labor involved in serving customers, and learn as much as possible about the service preferences of individual customers.

business intelligence​

The meaningful information gleaned from data warehouses using software tools is referred to as _____.​

A.Microsoft SharePoint

The most​ complex, fully-featured collaboration tool that is popular in business today is​ _________.

semantic layer

The part of the BI software application that parses the questions entered by employees is known as the _____.​

dashboard

The popular name of an interface for business intelligence tools is _____.

glocalization

The process of _____ enables organizations to plan and carefully design their global sites to cater to local needs and preferences.

free open source software

The recent trend in less rich countries is to adopt _____ to avoid high costs.

character

The smallest piece of data is called a _____.

supply chain

The term _____ refers to the sequence of activities involved in producing a product or service.

dialog

The three major components of a DSS are a data management module, a model management module, and a(n) _____ module.

probabilities

To determine how much security is enough security, experts are employed to estimate the cost and _____ of damages, as well as the cost of security measures.

return on investment (ROI)

To find the _____, the net present value of the system is calculated by combining the net present value of the costs of the system with the net present value of the benefits of the system.

autocategorization

To group knowledge into manageable data, companies use _____ software.

demilitarized zone

To increase security, some companies implement the _____ approach.

interfaces

To make the use of BI tools convenient for executives, companies that develop BI tools create _____ that help the executives to quickly grasp business situations.

radio frequency identification (RFID)

When a pattern of defects is discovered in a product, _____ helps pinpoint the plant at which it was produced and the particular lot from which it came.

electronic product code

When a radio frequency identification tag is attached to a product, it contains a(n) _____.

beta sites

When a system is developed by a software vendor for a wide market rather than for a specific client, conversion often takes place at _____.

databases

When organizations use a customer relationship management (CRM) system, the _____ of such systems provide data for the DSS.

Team members provide and receive critical feedback.

Which of the following is a required element for successful​ collaboration?

The same technology is used.

Which of the following is a result of forming strategic alliances?

Collaboration

Which of the following is characterized by a group of people working together to achieve a common​ goal, via a process of feedback and​ iteration?

Define the problem.

Which of the following is said to be the first and most important step in problem​ solving?

Online reverse auctioning

Which of the following patents does Priceline.com hold that prevents competitors from entering its business space?

podcasting

While blogging is publishing text and other visual material, _____ is publishing sound and video.

Hijacking

_____ a computer means using some or all of the resources of a computer linked to a public network without the consent of its owner.

Mashups

_____ are applications that combine features of two or more online applications.

Spreadsheets

_____ are excellent tools for building both the data and the models that decision support systems need.

Switching costs

_____ are expenses incurred when a customer stops buying a product or service from one business and starts buying it from another.

Access controls

_____ are measures taken to ensure that only those who are authorized can use a computer or network or to certain applications or data.

Systems analysts

_____ are normally responsible for developing cost analyses, design considerations, implementation timelines, and feasibility studies of a computer system before making recommendations to senior management.

Security concerns

_____ are the main reasons behind the slow adoption of new forms of electronic payments.

Effectiveness

_____ defines the degree to which a goal is achieved.

OLAP

_____ enables managers to see summaries and ratios of the intersection of any two dimensions in a database.

Dedicated hosting

_____ has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.

Geographic information systems

_____ have been used to provide service via the Web, such as helping residents find locations of different services on a city map or plan travel routes.

Spyware

_____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.

Reengineering

_____ involves adoption of new machinery and elimination of management layers.

Big Data

_____ involves high volumes of data compiled from traditional, ordinary business activities, as well as newer, nontraditional sources.

Case-based reasoning

_____ is a methodology of solving a new problem established on the solutions of similar problems.

SSO (single sign-on)

_____ is a security measure in which users are required to identify themselves only once before accessing several different systems which are linked through a network.

Project portfolio management

_____ is a set of processes and methods used by project managers to determine which projects will meet the organization's operational and financial goals in relation to its strategic objectives as well as the needs of its customers.

Change management

_____ is a structured, disciplined approach that facilitates the adoption of new or modified systems by various groups and individuals within an organization.

Wordfast

_____ is a tool used to translate MS-Word documents to multiple languages.

Efficiency

_____ is determined by the relationship between resources expended and the benefits gained in achieving a goal.

Certification

_____ is meant to guarantee that the experts have passed tests that ensure their skills.

​XML

_____ is one of the primary languages used to compose and retrieve webages and support the presentation of pictures with marked areas.

Knowledge management

_____ is the attempt by organizations to put procedures and technologies in place to transfer individual knowledge into databases.

Data

_____ is the raw material in the production of information.

HTTPS

_____ is the secure version of HTTP.

Spam

_____ is the term for any unsolicited commercial email.

Agile methods

_____ make extensive use of iterative programming, involving users often, and keeping programmers open to modifications while the development is still under way.

Instant messaging

_____ might be thought of as "real-time e-mail," because, unlike e-mail, it is synchronous in exchanging information.

Denial of service (DoS)

_____ occurs when a website receives an overwhelming number of information requests, such as merely logging on to a site.

Alliances

_____ provide customers with cheaper combined service and the convenience of one-stop shopping.

Accounts receivable

_____ records sums owed to the organization and by whom.

Product differentiation

_____ refers to the competitive advantage that a company can achieve by persuading customers that its product or service is better than its competitors'.

Keylogging

_____ software records individual keystrokes.

Biometrics

_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.

Mission-critical applications

_____, those without which the business cannot conduct its operations, are given the highest priority by the disaster recovery coordinator.

Search advertising

_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective.

E-commerce

______ refers to the buying and selling goods and services via a telecommunications network.


Related study sets

4.2 Operating Systems and 4.3 System Software

View Set

Understanding Human Behavior Section I

View Set

CPOLS WARRANTLESS SERCH AND SEIZURE VEHICLES

View Set

Life Practice Test One - Missed Answers

View Set

Anatomy & Physiology (BIO 425) - Chapter 7 Bone Tissue

View Set

MSSC - Manufacturing Processes and Production

View Set