MISY Ch. 5, 9, 14
Which of the following is a primary benefit of implementing an ERP system?
(all answers that follow are correct) Elimination of costly, inefficient legacy systems. Easing adoption of improved work processes. Improving access to quality data for operational decision making
Many multinational companies roll out standard IS applications for all to use. However, standard applications often don't account for all the differences among business partners and employees operating in other parts of the world. Which of the following is a frequent modification that is needed for standard software?
(all answers that follow are correct) Software might need to be designed with local language interfaces to ensure the successful implementation of a new IS. Customization might be needed to handle date fields correctly. Users might also have to implement manual processes and overrides to enable systems to function correctly.
Just over ____________ crime reports were made to the Internet Crime Computer Center in 2010.
300,000
A byte is typically __ bits.
8
Which of the following is not one of the basic components of a TPS?
Analytical models
Because firms must ensure the reliable operation of their TPSs, they must also engage in disaster recovery planning and TPS ________
Audits
With ______________ processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit.
Batch
With ____________ systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch.
Batch Processing
Employees' demand for videos and music to be delivered to company personal computers can exceed a firm's Internet capacity and create a major ____________.
Bottleneck
The process of gathering information in a timely manner and in a usable form so that it positively affects business strategy, tactics, and operations is called ____.
Business Intelligence
____________ is the process of gathering enough of the right information in a timely manner and usable form and analyzing it to have a positive impact on business strategy, tactics, or operations.
Business Intelligence (BI)
A ________ is a radical redesign of organizational structure, IS, and values of an organization to achieve a breakthrough in business results.
Business Process Re-engineering
A(n) ___ interprets and carries out basic instructions that operate a computer
CPU
A _______ is a type of high speed memory that a processor can access more rapidly than mass memory
Cache
The _______ is that part of the computer that consists of three associated elements the arithmetic/logic unit, the control unit, and the register areas.
Central Processing Unit
Third Step of SAP
Change Customer
The _________ is typically in charge of the IS dept. in an organization.
Chief Information Officer
A(n) _______ involves using a giant cluster of computers that service as a host to run applications that requite high-performance computing.
Cloud Computing
___________ is one aspect of business intelligence and is limited to information about competitors and the ways that knowledge affects strategy, tactics, and operations.
Competitive Intelligence
___________ is the inappropriate use of computer technology and resources.
Computer Waste
A(n) ____ directs and coordinates operations in a computer.
Control Unit
Second Step to SAP
Create Contact Person for Customer
Fourth Step of SAP
Create Customer Inquiry
Fifth Step of SAP
Create Customer Quotation
First step to SAP
Create New Customer
Sixth Step of SAP
Create Sales Order Referencing a Quotation
_________________ is any premeditated, politically motivated attack against information, computer systems. computer programs , and data which results in violence against noncombatant targets by subnational groups or clandestine agents.
Cyberterrorism
Capturing and gathering all the data necessary to complete the processing of transaction is called _________________.
Data Collection
_____________ involves reentering data that was not typed or scanned properly.
Data Correction
_________ is the process of checking data for validity and completeness.
Data Editing.
A _____________ is a subset of a data warehouse.
Data Mart
An information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse is called ____
Data Mining
A ____________ is a database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.
Data Warehouse
A(n) ____ holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.
Data Warehouse
The ____ approach provides a pool of related data shared by multiple information systems.
Database
A group of programs that manipulate the database and provide an interface between the database and the user of the database and other application programs.
Database Management System (DBMS)
The gap between the groups having access to, or knowledge of information and communication technology is known as
Digital Divide
_________________ refers to going through trash cans to find secret of confidential information.
Dumpster diving
A ___________ is the measure of the extent to which a system attains its goals.
Effectiveness
Which of the following is not an object of an organization's transaction processing system?
Ensure that data is processed immediately upon occurrence of a business transaction
A(n) ____ system is central to a system and ensures that information can be shared across all business functions and all levels of management to support running and managing of a business.
Enterprise
An ________ is a generalized class of people, places, or things for which data is collected, stores, and maintained.
Entity
Deleting files and emptying the Recycle Bin ensures that others cannot view the personal data on your recycled computer. True or False?
False
Online processing methods are most appropriate and cost effective for all forms of transaction processing systems. True or False?
False
Unfortunately, there are few choices for software packages that provide integrated transaction processing system solutions for small and medium sized enterprises. True or False?
False
A _________is a simple database program whose records have no relationship to one another.
Flat File
The ______ utilities can check the status of all parts of the PC, including hard disks, memory, and other peripheral devices.
Hardware
A(n) ____________ is a set of interrelated components that collect, manipulate and disseminate data and information and provide feedback mechanism to meet an object.
Information System
____ involves combining two or database tables.
Joining
A field or set of fields in a record that is used to identify the record.
Key
A ______ is an organized collection of people, procedures, software, databases, and devices used to create, store, share, and use the organization's experience and knowledge.
Knowledge Management System
The result of processing business transactions is that the organization's records are updated to reflect the status of the operation at the time of the ________.
Last processed transaction
The ______ Online Web-based service system is used by law enforcement to recover stolen property.
Leads
The software that allows different systems to communicate and exchange data is ______.
Middleware
___________ allows users to explore data from a number of perspectives.
Online Analytical Processing (OLAP)
With ____________ systems. each transaction is processed immediately.
Online Transaction Processing
A(n) ________ is a formal collection of people and other resources established to accomplish a set of goals.
Organization
A _________ refers to simultaneous execution of the same task on multiple processors to obtain results faster.
Parallel Computing
________________ is a small program hidden in a network or computer system that records identification numbers and passwords.
Password Sniffer
_______________ refers to the use of any of several technologies to enforce policies for controlling access to digital media.
Patent
Access is a popular DBMS for ____.
Personal Computers
Which represents a large amount of data?
Petabyte
____ allows users to predict the future based on database information from the past and present.
Predictive Analysis
A(n) ____ is a field or set of fields that uniquely identifies a database record.
Primary Key
In a value chain analysis _______ refers to business processes that make, deliver, market/sell, and service the organizations' products and services.
Primary business activities
_________________ software provides a means for managing all the data associated with the product development, engineering design, production, support , and disposal of manufactured products.
Product life cycle management
Which organizational structure is centered on the major product or services?
Project
_______ provides permanent storage for data and instructions do not change; such as programs and data from the computer manufacturer.
ROM
A collection of related data fields is a __________.
Record
_________ are high-speed storage areas used to temporarily hold small units of program instructions and data immediately before during, and after execution by the CPU.
Register
What data base model places data in two-dimensional tables?
Relational
Preventing waste and mistakes involves establishing, implementing, and ____________ policies and procedures.
Reviewing
The ability of the computer to handle an increasing number of concurrent users smoothly is known as ___________
Scalability
Because the DBMS is responsible for providing access to a database, one of the firs steps in installing and using a database involves telling the DBMS the logical and physical structure of the data and relationships among the data in the database. This description of an entire database is called a(n) ______
Schema
______________ is a derogatory term for inexperienced hackers who download programs called scripts that automate the job of breaking into computers.
Script Bunny
The term ________ is used to describe devices that store larger amounts of data, instructions, and information more permanently than allowed with main memory.
Secondary Storage
______ involves the manipulation of data to eliminate rows according to certain criteria.
Selecting
The ________________ is a fundamental concept of good internal controls that ensures that the responsibility for the key steps in a process is spread among more than one person.
Separation of Duties
Talking a critical computer password out of an individual is an example of ___________.
Social Engineering
The term _________ refers to data that is captured and edited where it is initially created and in a form that can be directly entered into a computer, thus ensuring accuracy and timeliness.
Source Data Automation
In the value chain of an organization, human resource management is an example of
Support
A ___________ is a set of elements or components that interact to accomplish a goal
System
In a systems development process _________ defines the problems and opportunities of the existing system.
System Analysis
In a systems development process the goal of ________________ is to gain a clear understanding of the problem to be solved or opportunity to be addressed.
Systems Investigations
Business data goes through a ____________________ that includes data collection, data editing, data correction, data manipulation, data storage, and documentation production.
Transaction Processing Cycle
A ______ is an organized collection of people, procedures, software, databases, and devices used to record completed business transactions
Transaction Processing System
A ___________ is a malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
Trojan Horse
A record is made up of multiple fields. True or False?
True
A trend in database management, known as Database as a Service, places the responsibility of storing and managing a database on a service provider. True or False?
True
Child identity theft is a rapidly growing area of computer crime. True or False?
True
Heavy computer use can negatively affect ones physical health. True or False?
True
The Association of Computing Machinery has a code of ethics and professional conduct that includes eight general moral imperatives that can be used to help guide the actions of IS professionals. True or False?
True
The CompStat program uses Geographic Information System software to map crime and identify problem precincts. True or False?
True
The hosted software model for enterprise software helps customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start up costs. True or False?
True
The use of nonintegrated information systems that make it difficult for decision makers to collaborate and share information is an example of computer waste. True or False?
True
The term _________ is used to describe a series of activities that includes inbound logistics warehouse and storage, production, finished product storage, outbound logistics, marketing and sales, and customer service.
Value Chain
A(n) ____ database acts independently of the physical servers, disk drives, and other database components that can be located around the world.
Virtual
The individual application modules of an ERP system are designed to support __________, the most efficient ways to complete a business process.
best practices
A(n) ____ is a skilled and trained IS professional who directs all activities related to an organization's database.
database administrator (DBA)
According to the Internet Crime Computer Center, the two most common online crimes reported include the nondelivery of payments or merchandise amounting to millions of dollars and ______________.
scams involving people posing as FBI agents