MISY 3310 Chapter 5 - 7 Test 2
A foreign key provides details about data.
False
A primary key is a foreign key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
False
A warm site is a separate and fully equipped facility where the company can move after a deisaster and resume business
False
A warm site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
False
Accurate information asks if the aggregate or summary information in agreement with detailed information.
False
T/F Mobile and wireless networks are identical and the terms can be used synonymously.
False Mobile means the technology can travel with the user, where Wireless, on the other hand, refers to any type of operation accomplished without the use of a hard-wired connection.
The Purchasing Information record can be created automatically from a Purchase Order if the Info Update indicator is not set. T/F
False
There are three ways the distribution channel can deliver goods and services to the customer: direct, wholesale, and mail order. T/F
False
To set up parameter ID values, follow this menu path: System > User profile > Set data. T/F
False
Usability is how quickly a third-party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability or availability.
False
VPNs are often used to connect to a corporate server. VPN stands for a Valued Partner Network.
False
War driving allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls.
False
When you click on the check mark in the green circle, SAP R/3 will automatically save your transaction and then proceed to the next step.
False
T/F Longitude represents a north/south measurement of position.
False Latitude represents a north/south measurement of position.
T/F A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map.
False This is the definition of a geographic information system (GIS).
What is the difference between hardware and software?
Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks.
What are active RFID tags?
Have their own transmitter and a power source (typically a battery).
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
Hot site
In terms of big data what is volume?
Includes the scale of data.
In terms of big data what is veracity?
Includes the uncertainty of data, including biases, noise, and abnormalities.
Which of the following is a disadvantage of database-stored information?
Increased information redundancy
What are the three pressures driving sustainable MIS infrastructures?
Increases in electronic waste, energy waste, and carbon emissions
What does standardization of data elements accomplish?
Increases the quality of information. Greater accuracy. Completeness and completeness.
Backup and recovery plan, disaster recovery plan, business continuity planning are all elements of a(n) ________ MIS infrastructure.
Information
To create an SSL connection, a web server requires a ________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.
SSL certificate
What refers to how well a system can adapt to increased demands?
Scalability
Which of the following describes how well a system can scale up, or adapt to the increased demands or growth?
Scalability
What is an access point (AP)?
The computer or network device that serves as an interface between devices and the network.
What is supply chain management (SCM)?
The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.
What is war chalking?
The practice of tagging pavement with codes displaying where Wi-Fi access is available.
What is software?
The set of instructions the hardware executes to carry out specific tasks.
What is data latency?
The time it takes for data to be stored or retrieved.
The two data types in SAP R/3 are:
Transaction data and master data
What are the two different categories for information type?
Transactional and analytical
A backup is an exact copy of a system's information.
True
A client is a computer designed to request information from a server.
True
A cold site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
True
A content creator is the person responsible for creating the original website content.
True
A data mart contains a subset of data warehouse information.
True
A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
True
A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources.
True
A network is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate.
True
A personal area network (PAN) provides communication for devices owned by a single user that work over a short distance.
True
A repository is a central location in which data is stored and managed.
True
A sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources...
True
A wireless LAN (WLAN) is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
True
A wireless access point (WAP) enables devices to connect to a wireless network to communicate with each other.
True
Accurate information asks if there is an incorrect value in the information.
True
An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes.
True
Databases offer many security features including passwords to provide authentication, access levels to determine who can access the data, and access controls to determine what type of access they have to the information.
True
ETL stands for extraction, transformation, and loading.
True
Grid computing is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem.
True
High availability occurs when a system is continuously operational at all times.
True
Incident management is the process responsible for managing how incidents are identified and corrected.
True
Internet Protocol TV (IPTV), which distributes digital video content using IP across the Internet and private IP networks.
True
Maintainability means the system quickly transforms to support environmental changes.
True
Material master data is organized by views.
True
The packet header lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data.
True
T/F A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
True A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
What takes information entered into a given system and sends it automatically to all upstream systems and processes?
backward integration
identity management
broad administrative area that deals with identifying individuals in a system and controlling their access to resources within system by associating user rights and restrictions with the established identity.
` What technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems?
broadband over power line
Human resources ERP components track
employee information including payroll, benefits, compensation, and performance assessment and ensure compliance with all laws.
business critical integrity constraints
enforce business rules vital to an organizations success and often require more insight and knowledge than relational integrity constraints
market basket analysis
evaluates such items as websites and checkout scanner information to detect customers buying behavior
data scientist
extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
1. A local area network (LAN) spans a large geographic area such as a state, province, or country.
false
A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map.
false
War driving is the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war driving tell other users the kind of access available, the speed of the network, and if the network is secured.
false
WiMax is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data. `
false
Wireless networks offer many business advantages but can often slow employee productivity and workflow processes.
false
Wireless technology offers the opportunity to redesign and often complicates the work flow processes to be faster, yet more expensive, and more time-consuming.
false
With grid computing a problem is broken into pieces and distributed to many machines, allowing _________ processing than could occur with a single system.
faster
static information
fixed data incapable of change in the event of a user action
logical view of information
focuses on how individual users logically access information to meet their own particular business needs.
Call scripting systems
gather product details and issue-resolution information that can be automatically generated into a script for the representative to read to the customer.
query-by-example (QBE) tool
helps users graphically design the answer to a question against a database
What are areas around access points where users can connect to the Internet via Wi-Fi?
hotspots
real time information
immediate and up to date information
Where is the information about customers, materials, and vendors stored?
in master data files
Wi-Fi infrastructure
includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal.
data validation
includes the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data.
data drive website
interactive website kept constantly updated and relevant to the needs of its customers using a database.
Which of the metrics below represents the time it takes to manufacture a product and deliver it to the retailer?
inventory cycle time
________ determines if a product is available, if the product will be supplied from stock on hand, from make-to-order production, and if it will be shipped from another plant or warehouse.
inventory sourcing
Peer-to-peer (P2P)
is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
Production and materials management
is a core ERP component.
primary key
is a field or group of fields that uniquely identifies a given record in a table
A wireless LAN (WLAN)
is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
Balanced scorecard
is a management system, as well as a measurement system, that a firm uses to translate business strategies into executable tasks.
3D printing
is a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model.
Electronic data interchange (EDI)
is a standard format for the electronic exchange of information between supply chain participants.
IP address
is a unique number that identifies where computers are located on the network.
data steward
is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the mis department and the business.
The primary concern with mobile ERP
is security of sensitive data, including trade secrets, financial data, and customer data.
data stewardship
is the management and oversight of an organizations data set to help provide business users with high-quality data that is easily accessible in a consistent manner.
War consumerization
is the practice of tagging pavement with codes displaying where Wi-Fi access is available.
Which of the following operational CRM technologies does the marketing department typically use?
list generator, campaign management, cross-selling and up-selling
What is a packet header?
lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data a single unit of binary data routed through a network
What do both GPS and GIS use?
location-based services (LBS) applications that use location information to provide a service
data warehouse
logical collection of information gathered from many different operational databases that supports business analysis activities and decision-making tasks
data models
logical data structures that detail the relationships among data elements using graphics or pictures
Elogistics
manages the transportation and storage of goods.
algorithms
mathematical formulas placed in software that performs an analysis on a data set
information integrity
measure of quality of information
An RFID accelerometer
measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
A wireless MAN (WMAN) is a metropolitan area network that uses ________ to transmit and receive data?
radio signals
Which business application uses electronic tags and labels to identify objects wirelessly over short distances?
radio-frequency identification
Inbound logistics acquires
raw materials and resources and distributes them to manufacturing as required.
data governance
refers to the overall management of the availability, usability, integrity, and security of company data.
affinity grouping analysis
reveals the relationship between variables along with the nature and frequency of the relationships
relational integrity constraints
rules that enforce basic and fundamental information based constraints
integrity constraints
rules that help ensure the quality of information
The core of customer order management is the: ___________.
sales order
What is a computer dedicated to providing information in response to requests?
server
The _________ is the logical or physical location where deliveries are created and managed.
shipping point
data element
smallest or basic unit of information
What is the set of instructions the hardware executes to carry out speci
software
What modifies existing software according to the business's or user's requirements?
software customization
In which of the five basic supply chain activities do you build relationships with suppliers to procure raw materials?
source
A wide area network (WAN)
spans a large geographic area such as a state, province, or country.
prediction
statement about what will happen or might happen in the future.
What includes fixed data incapable of change in the event of a user action?
static information
There are many things that happen after a goods receipt is received from the vendor. All of the following things happen except:
stock values are not updated.
data lake
storage repository that holds a vast amount of raw data in its original format until the business needs it
relational database model
stores information in the form of logically related two dimensional tables
The ________ MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
sustainable
What is computer-aided design/computer-aided manufacturing (CAD/CAM)?
systems used to create the digital designs and then manufacture the products
Streaming is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
tRUE
A forward integration
takes information entered into a given system and sends it automatically to all downstream systems and processes.
data map
technique for establishing a match or balance between the source data and the target data warehouse
cluster analysis
technique used to divide information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible
What allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data?
telecommuting
What is an access point (AP)?
the computer or network device that serves as an interface between devices and the network
information granularity
the extent of detail within the information (fine and detailed or coarse and abstract)
content creator
the person responsible for creating the original website content
Estimated-time-enroute (ETE) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.
true
Estimated-time-of-arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.
true
GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.
true
Eprocurement is the
Eprocurement is
The increased demand in technology devices has caused an increase in discarded devices, a phenomenon known as ________.
Ewaste
A client is a computer dedicated to providing information in response to requests.
FALSE
Flexibility represents the maximum throughput a system can deliver, for example the capacity of a hard drive represents the size or volume.
FALSE
Hardware is a computer dedicated to providing information in response to requests.
FALSE
Hardware is the set of instructions the hardware executes to carry out speci
FALSE
MMSDB creates, reads, updates, and deletes data in a database while controlling access and security.
FLASE
Each year, businesses lose time and money because of system crashes and failures. Which of the following helps to protect a system from crashes and failures?
Failover,Fault tolerance,Backup and recovery plans
A DBMS provides details about data.
False
What measures how quickly a system performs a process or transaction?
Performance
What is an infrastructure built for notifying people in the event of an emergency?
Emergency notificaiton service
War chalking is deliberately searching for Wi-Fi signals while driving by in a vehicle.
false
Fault tolerance is the ability of
A computer system to continue functioning even with a failed component
What is a disaster recovery plan?
A detailed process for recovering information or a system in the event of a catastrophic disaster.
Why would a company use an intranet?
-Intranets are used for business operations and management. -Intranets are used for communications and collaboration. -Intranets are used for web publishing.
What is the standard Internet protocol, which provides the technical foundation for the public Internet? 1. Data streaming and DSL protocols 2. Transmission control protocol/Internet protocol (TCP/IP) 3. Data streaming rules and regulations 4. Internet protocol/Transmission control protocol (IP/TCP)
2. Transmission control protocol/Internet protocol (TCP/IP)
Data-driven decision management is usually undertaken as a way to gain a competitive advantage. A study from the MIT Center for Digital Business found that organizations driven most by data-based decision making had ________ productivity rates and ________ profits.
4% higher, 6% higher
What is big data?
A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
What is a network?
A communications system created by linking two or more devices and establishing a standard methodology in which they can communicate.
What is peer-to-peer (P2P)?
A computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
What is a client/server network?
A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients.
What is a foreign key?
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables
What is a global positioning system (GPS)?
A satellite-based navigation system providing extremely accurate position, time, and speed information.
What is a warm site?
A separate facility with computer equipment that requires installation and configuration.
What is a file transfer protocol (FTP)?
A simple network protocol that allows the transfer of files between two computers on the Internet.
What is a packet?
A single unit of binary data routed through a network.
What is regression?
A statistical process for estimating the relationships among variables.
What is an RFID reader (RFID interrogator)?
A transmitter/receiver that reads the contents of RFID tags in the area.
What is Bluetooth?
A wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
Wi-Fi protected access (WPA) a wireless security protocol to protect Wi-Fi networks.
A wireless security protocol to protect Wi-Fi networks.
What is the digital divide?
A worldwide gap giving advantage to those with access to technology
Which term refers to the varying levels that define what a user can access, view, or perform when operating a system?
Accessibility
What are the seven characteristics of an agile MIS infrastructure?
Accessibility, availability, maintainability, portability, reliability, scalability, and usability
Which characteristics support an agile MIS infrastructure?
Accessibility, availability, maintainability, portability, reliability, scalability, usability
Which of the following lists include all of the five characteristics common to high-quality information?
Accuracy, completeness, consistency, timeliness, and uniqueness
What focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization?
Advanced analytics
Accessibility, availability, maintainability, portability, reliability, scalability, usability are all elements of a ________ MIS infrastructure.
Agile
The ________ MIS infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation.
Agile
What are the ramifications of improper electronic recycling, when analyzing the example of a single desktop computer?
All of the above
Which of the below offers a common example of a LAN? College campus Home office City library All of the above
All of the above A common example of a Local Area Network (LAN) is an office, local city library, or home.
What is a benefit of network convergence? The weaving together of voice, data, and video Multiple services offered from a single vendor Multiple devices supported by one provider All of the above
All of the above Network convergence then allows the weaving together of voice, data, and video. The benefits of network convergence allow for multiple services, multiple devices, but one network, one vendor, and one bill.
What does standardization of data elements accomplish?
All of the above.
What occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention?
Asset tracking
What is information that people use to support their decision-making efforts?
BUSINESS INTELLIGENCE
Which characteristics support an information MIS infrastructure?
Backup and recovery plan, disaster recovery plan, business continuity plan
Which of the following describes the difference between a backup plan and a recovery plan?
Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure
What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time?
Bandwidth
What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time? Bandwidth Frequency Access Protocol
Bandwidth
Which of the following terms refers to the smallest element of data and has a value of either 0 or 1?
Bit
What does the disaster recovery cost curve chart?
Both A and B: The cost to the organization of the unavailability of technology, The cost to the organization of recovering from a disaster over time
What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps?
Broadband
Most people request real-time information without understanding that continual ________ is one of its biggest pitfalls.
CHARGE
Which tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip?
CHIPLESS RFID
Why is CRM one of the most valuable assets a company can acquire?
CRM has proven to increase customer loyalty and retention and an organization's profitability
Voice over IP is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
Chip, antenna
_______ is the highest level in the SAP system.
Client
What uses resources and applications hosted remotely on the Internet?
Cloud computing
The primary purpose of a data warehouse is to ________.
Combine strategic information
_______ represents an independent legal accounting unit and is also a balanced set of books, required by law.
Company code
Which of the following reflects Moore's Law?
Computer chip performance per dollar doubles every 18 months
In a client-server environment, a client is a
Computer connected to the server
What is hardware?
Consists of the physical devices associated with a computer system.
What is domain name system (DNS)?
Converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.
Which of the following includes the three primary network access technologies?
DSL, Cable Modem, Broadband
What facilitates the accessibility of business-critical data in a timely, secure, and affordable manner?
Data as a service (DaaS)
What is the overall management of the availability, usability, integrity, and security of company data?
Data governance
What are the primary differences between a data warehouse and a data mart?
Data warehouses have a more organization-wide focus, data marts have functional focus
Which of the following allows high-speed digital data transmission over standard telephone lines? Digital subscriber line (DSL) Data subscription service (DSS) Dominance service line (DSL) Data converter input (DCI)
Digital subscriber line (DSL)
What has the ability to recover information or systems in the event of catastrophic disasters?
Disaster recovery
What is Internet Protocol TV (IPTV)?
Distributes digital video content using IP across the Internet and private IP networks.
_______ defines how different goods and services reach the customer.
Distribution Channel
What are passive RFID tags?
Do not have a power source.
An MIS infrastructure is ___________ and ____________.
Dynamic and continually changing
An MIS infrastructure is ________and ________.
Dynamic and continually changing
What includes data that change based on user actions?
Dynamic information
An MIS infrastructure is ___________ and ____________.
Dynamic; continually changing
What occurs when paper maps are laid edge-to-edge and items that run across maps and do not match are reconfigured to match?
Edge Matching
Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip. T/F ***Chipless RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
False
An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes.
False
Classification segments a heterogeneous population of more homogeneous subgroups.
False
Comparative analysis can help managers with competitive monitoring where a company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products.
False
Customer orders, purchase orders, production orders, and customer payment data are usually stored in the Master Data files. T/F
False
Network convergence includes TCP/IP and FTP.
False
Portability describes how well a system can scale up, or adapt to the increased demands of growth.
False
T/F Wireless networks offer many business advantages but can often slow employee productivity and workflow processes.
False Wireless networks have many advantages for businesses which include enhancing mobility, providing immediate data access, increase location and monitoring capability, improve workflow, provide mobile business opportunities, and provide alternatives to wiring.
What are advanced analytics?
Focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization.
DreamWorks Animation Company used which sustainable infrastructure component to complete many of its
Grid computing
What is an aggregation of geographically dispersed computing resources, coordinated to solve a common problem?
Grid computing
Which characteristics support a sustainable MIS infrastructure?
Grid computing, cloud computing, and virtualization
What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability?
HYBRID CLOUD
Cloud computing allows users to connect via a web browser and stores all of your software documents "in the cloud," which means that there may conceivably be no more need for users to have ____________.
Hard drives, physical servers, software or processing power
John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What does John's role at Internal Computer Specialists focus on
Hardware
John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What does John's role at Internal Computer Specialists focus on fixing?
Hardware
John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What role at Internal Computer Specialists was John hired to fix?
Hardware
Jessica started her own online company, which specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate ensuring the best possible experience for her customers. Which of the below is a critical component in Jessica's MIS infrastructure?
Hardware and software, Client, Server (ALL)
Suzan started her own online company, which specializes in selling vintage baseball memorabilia. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate, ensuring the best possible experience for her customers. Which of the following is a critical component in Suzan's MIS infrastructure?
Hardware and software, client, server
What is the difference between hardware and software?
Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks
Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis?
Information MIS infrastructure
What are the three cloud computing service delivery models? Infrastructure
Infrastructure as a Service, Software as a Service, Platform as a Service
What are the three cloud computing service delivery models?
Infrastructure as a Service, Software as a Service, Platform as a Service
What service delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model?
Infrastructure as a service (IaaS)
What is enterprise resource planning?
Integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprisewide information on all business operations
What is the largest and most important network that has evolved into a global information superhighway? Internet Intranet Extranet LAN
Internet The largest and most important network that has evolved into a global information superhighway is the Internet.
Which of the following statements is FALSE?
Inventory sourcing occurs when a quotation is made.
Which of the following would not be considered part of the accurate characteristic of high-quality information?
Is aggregate information in agreement with detailed information?
Which of the following would not be considered part of the complete characteristic of high-quality information?
Is each transaction represented only once in the information?
What is the primary problem with redundant information?
It is difficult to determine which values are the most accurate It is difficult to determine which values are the most current It is often inconsistent
What represents a north/south measurement of position?
Latitude
Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environmental changes?
Maintainability
Why were data warehouses created?
Many companies had information scattered across multiple systems with different formats Completing reporting requests from numerous operational systems took days or weeks Numbers and types of operational databases increased as businesses grew
Within the beginning stage of the data warehouse models process, which of the following are included in the internal databases?
Marketing, sales, inventory, and billing
What is a large computer network usually spanning a city or a specific infrastructure like a college?
Metropolitan area network (MAN)
What is a device that enables a computer to transmit and receive data? Broadband Modem Bandwidth ISP
Modem
The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include _____________________. New system provider (NSP), Current system provider (CSP), and Order entry system provider (OSP) National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP) Net server point (NSP), Radio server point (RSP), and Internet server point (ISP) None of the above
National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP) The Internet Hierarchy levels from top to bottom are National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP).
What do data warehouses support?
OLAP and analytical processing
What is asset tracking?
Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention.
What lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data?
PACKET HEADER
What are the five basic supply chain management components?
Plan, source, make, deliver, and return
A _______ can be a production facility or a warehouse.
Plant
A _______ is a physical site where value is added to the product or service.
Plant
Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?
Portability
What is data mining?
Process of analyzing data to extract information not offered by the raw data alone
What is the standard that specifies the format of data as well as the rules to be followed during transmission? Bandwidth Bit rate Protocol Transmission record
Protocol
What is a real-time system?
Provides real-time information in response to query requests
What is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds?
RFID ACCELEROMETER
Building and deploying flexible systems can allow for ___________.
Reconfigurations, Easy updates and changes, Solutions for unexpected business environmental changes
Which of the following is a benefit of a solid MIS infrastructure?
Reduces costs, improves productivity, optimizes business operations
What is wireless?
Refers to any type of operation accomplished without the use of a hard-wired connection.
What is portability?
Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.
What is availability?
Refers to the time frames when the system is operational.
What ensures systems are functioning correctly and providing accurate information?
Reliability
What delivers applications over the cloud using a pay-per-use revenue model?
SOFTWARE AS A SERVICE
Corporate social responsibility is a company's acknowledged responsibility to ________.
Society
Which of the following identifies the primary location where data is collected?
Source data.
What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred?
Streaming
What are the three business functions an MIS infrastructure supports?
Supports operations, change, and the environment or sustainability
What is a Platform as a Service (PaaS)?
Supports the deployment of entire systems including hardware, networking, and applications using pay-per-use revenue model
Grid computing, cloud computing, and virtualization are all elements of a ________ MIS infrastructure.
Sustainable
The ________ MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
Sustainable
The __________ MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
Sustainable
Which of the following is a business-critical integrity constraint?
System will not allow returns of fresh produce after 15 days past delivery
Which of the following includes the three primary network protocols?
TCP/IP, FTP, DHCP
What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage?
TECHNOLOGY FAILURE
A data steward is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business.
TRUE
A repeater receives and repeats a signal to reduce its attenuation and extend its range.
TRUE
Distributed computing processes and manages algorithms across many machines in a computing environment.
TRUE
Failback occurs when the primary machine recovers and resumes operations, taking over from the secondary server.
TRUE
Foreign key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
TRUE
Reports for each sales person, product, and part are examples of detail or fine information granularities.
TRUE
Which of the below is a WAN?
The Internet
Since many larger companies use SAP, knowledge of SAP is a good thing to put on your resume. T/F
True
Software is the set of instructions the hardware executes to carry out specific tasks.
True
Some of the information contained in the Purchasing Information record about vendors would be current prices and delivery costs for the purchasing organization, purchase order price history, and vendor evaluation data.
True
T/F Enhancing mobility is one of the greatest advantages provided by wireless networks. It allows activities that were formerly tied to physical locations to be performed almost anywhere.
True
T/F IP address is a unique number that identifies where computers are located on the network.
True
T/F National service providers (NSPs), private companies that own and maintain the worldwide backbone that supports the Internet. These include Sprint, Verizon, MCI (previously UUNet/WorldCom), AT&T, NTT, Level3, Century Link, and Cable & Wireless Worldwide.
True
T/F A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.
True
T/F A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs, and to wide area networks.
True
What are semi-passive RFID tags?
Uses a battery to run the microchip's circuitry but communicate by drawing power from the RFID reader.
What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?
Utility computing
What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple 'virtual' machines all on a single computing device?
Virtualization
Within the sites that support disaster recovery, __________ is a separate facility with computer equipment that requires installation and configuration.
Warm site
Which of the following questions can materials management help a company answer?
What are our current inventory levels? What items are running low in the warehouse? What items are at risk of spoiling in the warehouse
What does a business continuity plan typically include?
What does a business continuity plan typically include?
Which question below represents a CRM reporting technology example..
What is the total revenue by customer?
What question below would a company need to answer when first establishing a backup and recovery plan?
What types of storage mechanism will meet the needs of the company? How often does the company need to backup its information? What types of recovery systems does the company infrastructure need? (ALL)
The optimal disaster recovery plan in terms of cost and time is where on the disaster recovery cost curve?
Where the two cost effects intersect
What spans a large geographic area such as a state, province, or country, similar to the Internet?
Wide area network (WAN)
What spans a large geographic area such as a state, province, or country, similar to the Internet? Metropolitan area network (MAN) Local area network (LAN) Wide area network (WAN) Secure area network (SAN)
Wide area network (WAN)
What is uplift modeling?
a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products
What is customer relationship management (CRM)?
a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
What is latitude?
a north/south measurement of position
extraction, transformation, and loading (ETL)
a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse.
What is a protocol?
a standard that specifies the format of data as well as the rules to be followed during transmission
Mobile application management (MAM)
administers and delivers applications to corporate and personal smart phones and tablets.
Enterprise resource planning (ERP) integrates...
all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so employees can make decisions by viewing enterprisewide information about all business operations.
Which of the following questions is an example of how managers can use BI to answer tough business questions?
all of the above
A two-tier ERP architecture
allows an organization to have an on-premises ERP system along with cloud ERP applications.
What is collaborative engineering?
allows an organization to reduce the cost and time required during the design process of a product
relational database management system
allows users to create, read, update, and delete data in relational database.
entity
also called a table, stores information about a person, place, thing or transaction.
attributes
also called columns or fields, data elements associated with an entity.
data driven decision management
an approach tot business governance that values decisions that can be backed up with verifiable data
A client in SAP R/3 is:
an independent environment in the system and the highest level in the SAP organizational hierarchy.
data point
an individual item on a graph or chart
Wireless, on the other hand, refers to...
any type of operation accomplished without the use of a hard-wired connection.
fast data
application of big data analytics to smaller data sets in near real or real time in order to solve a problem
dynamic catalog
area of a website that stores information about products in a database
structured query language (SQL)
asks users to write lines of code to answer questions against database
What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls?
attenuation
What uses GPS tracking to track vehicles?
automatic vehicle location
Analytical CRM supports
back-office operations and strategic analysis and includes all systems that do not deal directly with the customers.
data artist
business analytics specialist who uses visual tools to help people understand complex data
data broker
business that collects personal information about consumers and sells it to other organizations
comparative analysis
can compare two or more data sets to identify patterns and trends
repository
central location in which data is stored and managed
data aggregation
collection of data from various sources for the purpose of data processing
record
collection of related data elements
cube
common term for the representation of multidimensional information
data dictionary
compiles all of the metadata about the data elements in the data model.
data mart
contains a subset of data warehouse information
database management system (DBMS)
creates, reads, updates, and deletes data in a database while controlling access and security
The three main parts of the purchase order cycle are:
creating a purchase order, creating a goods receipt, and receiving an invoice.
virtualization
creation of a virtual version of computing resources such as an operating system, a server, a storage device, or network resources.
Three kinds of master data are critical to sales order processing. They are:
customer, material, pricing
dynamic information
data that change based on user actions
recommendation engine
data-mining algorithm that analyzes a customers purchases and actions on a website and then uses the data to recommend complementary products
What is at the heart of any ERP system?
database
Front-office operations
deal directly with the customer.
physical view of information
deals with the physical storage of information on a device
business rule
defines how a company performs certain aspects of its business and typically results in a yes/no answer or true/false answer
In the basic supply chain,
deliver refers to planning for transportation of goods to customers.
data visualization
describes technologies that allow users to see data to transform info into a business perspective
estimation analysis
determines values for an unknown continuous variable behavior or estimated future value
What are the two most prevalent types of broadband access?
digital subscriber line and cable connection
A disaster recovery plan contains a ________ that outlines the costs to support the plan.
disaster recovery plan
Partner relationship management (PRM)
discovers optimal sales channels by selecting the right partners and identifying mutual customers.
A Sales Area is a valid combination of the Sales Organization, the Distribution Channel, and ________.
division
Which of the following is not a common form of data mining analysis?
division organization
information redundancy
duplication of data or storage of same data in multiple places
What occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match?
edge matching
A repeater represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals.
false
A wireless LAN (WLAN) is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
false
Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
false
Active RFID tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.
false
Attenuation is a single unit of binary data routed through a network.
false
Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer.
false
GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications.
false
IP address is a simple network protocol that allows the transfer of files between two computers on the Internet.
false
LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory.
false
Latitude represents an east/west measurement of position.
false
Longitude represents a north/south measurement of position
false
Mobile and wireless networks are identical and the terms can be used synonymously
false
Network convergence is the integration of communication channels into a single service.
false
Passive RFID tags have their own transmitter and a power source (typically a battery).
false
Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
false
Traceroute formats include a packet header, packet body containing the original message, and packet footer.
false
Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match.
false
VPNs are often used to connect to a corporate server. VPN stands for a Valued Partner Network.
false
data visualization tools
move beyond excel graphics and charts into sophisticated analysis techniques such as controls, instruments, maps, time series, graphs, and more
information integrity issues
occur when a system produces incorrect, inconsistent, or duplicate data.
data gap analysis
occurs when a company examines its data to determine if it can meet business expectations while identifying possible data gaps or where missing data might exist
information inconsistency
occurs when the same data element has different values .
analysis paralysis
occurs when the user goes into an emotional state of overanalyzing a situation
What targets sales opportunities by finding new customers or companies for future sales?
opportunity management system
CRM reporting technologies
organizations identify their customers across other applications.
data set
organized collection of data
content editor
person responsible for updating and maintaining the website content
info graphics
present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format.
foreign key
primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
data profiling
process of collection statistics and information about data in an existing source
anomaly detection
process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set
classification analysis
process of organizing data into categories or groups for its most effective and efficient use
data replication
process of sharing information to ensure consistency between multiple data sources
information cleansing or scrubbing
process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
distributed computing
processes and manages algorithms across many machines in a computing environment
3D printing supports
procurement.
metadata
provides details about data
real time system
provides real time information in response to requests.
master data management (MDM)
the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers suppliers products sales employees and other critical entities that are commonly integrated across organizational systems.
Procurement is
the purchasing of goods and services to meet the needs of the supply chain.
data latency
the time it takes for data to be stored or retrieved
Computer-aided design/computer-aided manufacturing (CAD/CAM) systems are used
to create the digital designs and then manufacture the products.`
business intelligence dashboards
track corporate metrics such as critical success factors and key performance indicators, and include advanced capabilities such as interactive controls allowing users ot manipulate data for analysis.
All of the following are organizational elements except:
transportation.
5. (p. 151) A wide area network (WAN) spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet.
true
A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.
true
A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache. Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat. Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.
true
A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
true
A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
true
A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs, and to wide area networks.
true
A metropolitan area network (MAN) is a large computer network usually spanning a city.
true
A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.
true
A repeater receives and repeats a signal extending its attenuation or range
true
An extranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.
true
An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes.
true
Asset tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention.
true
Automatic vehicle location (AVL) uses GPS tracking to track vehicles.
true
Broadband over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems.
true
Cartography is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.
true
Data mining occurs on structured data that are already in a database or a spreadsheet.
true
Dynamic Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network.
true
Enhancing mobility is one of the greatest advantages provided by wireless networks. It allows activities that were formerly tied to physical locations to be performed almost anywhere.
true
Enterprise application integration (EAI) middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors.
true
Geocache is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find. GPS users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find. Caches are often placed in locations that are interesting or challenging for people to discover.
true
Geographic information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.
true
IP address is a unique number that identifies where computers are located on the network.
true
Instant access to customer profiles, account history, and current order status significantly improves the quality of interactions with customers, suppliers, and business partners.
true
National service providers (NSPs), private companies that own and maintain the worldwide backbone that supports the Internet. These include Sprint, Verizon, MCI (previously UUNet/WorldCom), AT&T, NTT, Level3, Century Link, and Cable & Wireless Worldwide.
true
One of the main challenges of business mobility is protecting against theft.
true
Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.
true
Passive RFID tags do not have a power source.
true
RFID accelerometer is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.
true
RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranchers.
true
RFID reader (RFID interrogator) is a transmitter/receiver that reads the contents of RFID tags in the area. A RFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas.
true
RFID tag is an electronic identification device that is made up of a chip and antenna.
true
Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances.
true
Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages. Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.
true
Spatial data (geospatial data or geographic information) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data.
true
Telecommuting (virtual workforce) allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data.
true
The Institute of Electrical and Electronics Engineers (IEEE) is an organization that researches and institutes electrical standards for communication and other technologies. Known officially as IEEE 802.11n (or wireless-N) is the newest standard for wireless networking. Compared with earlier standards like 802.11b, wireless-N offers faster speeds, more flexibility and greater range.
true
The main challenges facing networks include security, social, ethical and political issues.
true
The packet header lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data.
true
The three main benefits of networks or a connected world include sharing resources, providing opportunities, and reducing travel.
true
Transactional information is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry.
true
Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol.
true
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi Protected Access (WPA), a wireless security protocol to protect Wi-Fi networks. It is an improvement on the original Wi-Fi security standard, Wired Equivalent Privacy (WEP), and provides more sophisticated data encryption and user authentication.
true
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi protected access (WPA), a wireless security protocol to protect Wi-Fi networks.
true
When a user enters or updates information in one ERP module, it is immediately and automatically updated throughout the entire system.
true
Wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless transmission data.
true
Wireless networking includes personal area networks (PAN) that provide communication over a short distance that is intended for use with devices that are owned and operated by a single user.
true
With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices.
true
Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
true
Semi-passive RFID tags
use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.
data mining tools
use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making
Voice over IP (VoIP)
uses IP technology to transmit telephone calls.
Website personalization
when a website has stored enough data about a person's likes and dislikes to fashion offers more likely to appeal to that person.
The optimal disaster recovery plan in terms of cost and time is where on the disaster recovery cost curve?
where the two cost curves intersect
Internet Protocol TV (IPTV)...
which distributes digital video content using IP across the Internet and private IP networks