MISY 3310 Exam 1
What is big data?
A collection of large complex data sets, including structured and unstructured, which cannot be analyzed using traditional database methods and tools.
What is a telepresence robot?
A remote-controlled, wheeled device with a display to enable video chat and videoconferencing
What is information collected from multiple sources such was suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?
Business intelligence
What is the graphical notation that depicts the steps in a business process?
Business process model notation
The accounting and finance department performs processes such as creating financial statements, paying accounts payables, and collecting accounts receivables. What form of processes do these represent?
Business-facing process
How are the majority of companies today typically organized?
By departments or functional areas
The sales and marketing departments primarily use monetary data.
False
Assume you are in the business of producing and selling cars. If you could produce more cars with the same input what would happen to your productivity and profits assuming the price of your cars remains the same?
Increase in productivity, increase in profits
What do usability effectiveness MIS metrics measure?
The ease with which people perform transactions and find information
Domain name hosting (web hosting) is a service that allows the owner of a domain name to maintain a simple website and provide email capacity.
True
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
True
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
True
Firm infrastructure and human resource management are part of the support value activities.
True
Managerial business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.
True
Mutation is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome.
True
Phishing expedition is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The emails contain a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter his or her username, password, and sometimes credit card information.
True
What is information security?
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
What is cyborg anthropology?
A discipline originated at the 1993 annual meeting of the American Anthropological Association.
Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?
A social media policy
Which department records, measures, and reports monetary transactions?
Accounting
Which of the following represents the primary business revenue models?
Advertising fees, license fees, subscription fees, transaction fees, value-added service fees
What allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website?
Affiliate program
Which of the below represents the definition of information property?
An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanges.
What is Porter's Five Forces Model?
Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry
Which of the following represents the three areas where technology can aid in the defense against information security attacks?
Authentication and authorization, prevention and resistance, detection and response
What is represented by a diamond shape in a business process model?
BPMN Gateway
Who is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives?
Chief Information Officer (CIO)
Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?
Collaboration system
Which of the following is not a common approach to closing an MIS skills gap?
Competitive salary
What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?
Cryptography
What is the difference between customer-facing processes and business-facing processes?
Customer-facing processes are front-office processes, business-facing processes are back-office processes
Which of the following is considered a service?
Cutting hair
Which of the following represents the core drivers of the information age?
Data, Information, Business Intelligence, Knowledge
The Victory Wireless store in Denver is currently offering a fabulous marketing strategy for potential new iPhone customers. Victory Wireless offers customers who purchase an iPhone with a 2-year subscription a free Otter phone case, car charger, ear phones, and speakers. In terms of Porter's Five Forces what is Victory Wireless attempting to achieve with this marketing strategy?
Decrease buyer power
What uses techniques that describe past performance and history?
Descriptive analytics
What occurs when a business sells directly to a customer online and cuts out the middle man?
Disintermediation
What type of report can include updating daily stock market prices or the calculation of available inventory?
Dynamic report
What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?
Elevation of privilege
Which data types are typically found in the human resources department?
Employee data, promotion data, vacation data
Susan teaches many individuals and business professionals how, why, and the benefits and challenges to using social media. Of the four ebusiness challenges which of the following is the most crucial challenge to consider before engaging in social media?
Ensuring consumer protection
Which of the below represents the definition of information management?
Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
There are many different stakeholders found in an organization. Stakeholders drive business strategies, and depending on the stakeholder's perspective, the business strategy can change. Which of the following is a main concern for customers?
Exceptional customer service
A Business Process Model and Notation (BPMN) event is a task in a business process.
False
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
False
A social bookmark is a locally stored URL or the address of a file or Internet page saved as a shortcut.
False
A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.
False
A worm is a form of malicious software that infects your computer and asks for money.
False
Mark Peterson identified the Porter's Five Forces Model which analyzes the competitive forces within a business environment.
False
Multi-factor authentication is the traditional security process, which requires a user name and password.
False
Porter's Five Forces Model outlines the process for a sales strategy.
False
Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.
False
Strategic planning is a customer-facing business process.
False
The Internet of Things (IoT) refers to devices that connect directly to other devices.
False
The business decisions made by the Human Resources department include investment data, monetary data, and reporting data.
False
The business decisions made by the marketing department include transactional data, purchasing data, payroll data, and tax data.
False
The chief data officer is responsible for (1) overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives.
False
The chief knowledge officer is responsible for (1) overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives.
False
Using only data and information to make decisions and solve problems is the key to finding success in business. These are also the only core drivers of the Information Age and the building blocks of business systems.
False
Web 3.0 refers to static text-based information websites.
False
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
Hardware key logger
Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?
Information security policies
Which of the following is a type of Web browser?
Internet Explorer and Mozilla Firefox
MIS can be an important enabler of business success and innovation. Which of the below statements is accurate when referring to MIS?
MIS is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.
What type of structured data includes sensor data, point-of-sale data, and web log data?
Machine-generated
In a SWOT analysis, which of the following could you discover as potential external opportunities (helpful)?
New markets
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
Open system
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's five forces model. Which of the following represents supplier power in the soft drink industry?
Pepsi requires stores that can carry Pepsi products to commit to minimum orders of 1,000 cases.
Which of the following represents the types of data commonly found in the marketing department?
Promotional data
What is the primary business advantage of using email?
Providing the ability to inform and communicate with many people simultaneously, immediately, and with ease
What are managerial business processes?
Semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements
Which of the following is not a topic or feature that is included in Web 3.0?
Social networking
Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?
Some online companies have to charge sales tax
Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique websites. Many of his daily tasks are heavily technical in nature and require a high level of computer programming and Internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?
Source code
Your boss, Penny Dirks, has asked you to analyze the airline industry using Porter's three generic strategies. Which of the following companies are using a cost leadership strategy?
Southwest, Horizon, Frontier, JetBlue
What is a small embedded line graph that illustrates as single trend?
Sparkline
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
Spoofing
Business process modeling or mapping, is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a _________ sequence.
Structured
What is the basic business system that serves the operational level and assists in making structured decisions?
TPS
When evaluating the six-step decision making process, what occurs during the solution implementation step?
The process will begin again if the decisions made were incorrect
What is pirated software?
The unauthorized use, duplication, distribution, or sale of copyrighted software
What is the primary goal of using As-Is and To-Be process models?
To determine what the problem is and then how to solve the problem
What are the three primary types of management information systems available to support decision making across the company levels?
Transaction Processing Systems, Decision Support Systems, Executive Information Systems
An ezine is a magazine published only in electronic form on a computer network. Flipboard is a social-network aggregation, magazine-format application software for multiple devices that collects content from social media and other websites, presents it in magazine format, and allows users to flip through the content.
True
Business-to-consumer applies to any business that sells its products or services directly to consumers online.
True
Predictive analytics extracts information from data and uses it to predict future trends and identify behavioral patterns.
True
Technology provides countless business opportunities, but can also lead to pitfalls and traps for a business.
True
Visualization produces graphical displays of patterns and complex relationships in large amounts of data.
True
Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
True
Which of the following terms could use synonymously when referring to the Web?
URL, Domain Name
Which of the below does not represent an example of analytical information?
Unstructured long-term decisions
Bob Silver loves playing a game called World of Warcraft where he has the capability to create his own character and even his own life-like environment. Which AI system would you categorize World of Warcraft?
Virtual reality
What is a computer-simulated environment that can be a simulation of the real world or an imaginary world?
Virtual reality
What allows user to access the WWW?
Web browser
The goal of value chain is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a ________ or ________.
cost advantage, product differentiation
In a SWOT analysis, opportunities and threats originate _________ an organization.
outside (externally)