Old Quizzes

Ace your homework & exams now with Quizwiz!

In general, which is the most difficult item to "change" within the Five-Component Framework? a. Hardware b. Data c. People d. Software

C (people)

Of the five component frame-work, which is the most important? a. software b. data c. you d. hardware

C (you)

How many basic tasks must a computer perform? a. 4 b. 12 c. 10 d. 8

a (4)

Customers use processing, storage, networking, and other computing resources from cloud service providers to run and manage their own information system: a. IaaS b. SaaS c. PaaS d. DaaS

a (IaaS)

Each computer on the Internet has an assigned address, called the ___________, that distinguishes it from all other computers. a. Internet Protocol (IP) address b. CPU address c. BIOS address d. RAM address

a (Internet Protocol address)

Which of the following is NOT a type of input device? a. LCD display screen b. Keyboard c. Trackball d. Digital scanner

a (LCD display screen)

___________ systems facilitate the management of a firm's relationships with direct and indirect suppliers, purchasing firms, distributors, and logistics companies. a. SCM b. CRP c. ERD d. IRP

a (SCM)

The Internet is a(n) _________________. a. WAN b. LAN c. MAN d. CAN

a (WAN)

_________ is a sequence of unambiguous rules and/or instructions for solving a problem. a. Algorithm b. Problem c. Solution d. Process

a (algorithm)

A characteristic of interest that describes an entity. a. Attribute b. ERD's c. Cardinality d. Data design

a (attribute)

Describes how the data elements in the database are to be grouped. Abstract model from business perspective. a. Conceptual Design b. Intrinsic Design c. Physical Design d. DBMS

a (conceptual design)

Business firms invest heavily in information systems to achieve six strategic business objectives, which is NOT one of those objectives? a. Customer loyalty b. Competitive advantage c. Customer and supplier intimacy d. Operational Excellence

a (customer loyalty)

The software program (or group of programs) that provides access to a database. a. Database Management System b. Referential Integrity c. MIS d. Microsoft Word

a (database management system)

E-Commerce digital markets reduce all of the following except: a. Information Symmetry b. Search Costs c. Menu Costs d. Information Asymmetry

a (information symmetry)

Global Supply Chain Management Issues contains which of the following? a. Outsourcing b. Standard legal requirements, tax codes, import/export limits c. No trade wars d. Less complex pricing

a (outsourcing)

Method of slicing digital messages into parcels (packets) and sending those packets along various communication paths as they become available, and then reassembling packets at destination. a. Packet Switching b. Packet Manipulation c. Packet Dicing d. Packet Facilitation

a (packet switching)

A column or group of columns that identifies a unique row in a table. a. Primary Key b. Entity c. Foreign Key d. Attribute

a (primary key)

Primary activities include all of the following within the value chain except? a. procurement b. inbound logistics c. outbound logistics d. customer service

a (procurement)

The _______ believes in the system, wants to see it succeed and provides resources. a. Project sponsor b. Systems analyst c. Director d. Business analyst

a (project sponsor)

Business Value of CRM contains one of the following: a. Reduce churn rate b. Decrease customer satisfaction c. Increase costs for customer acquisition/retention d. Increase direct-marketing costs

a (reduce churn rate)

Identifying potential customers for the businesses' products or services is an activity associated with the ________ function. a. sales and marketing b. technology c. outbound logistics d. procurement

a (sales and marketing)

Enterprise Application Challenges include all of the following except: a. Simple to install b. Technology changes c. Expensive to purchase and implement d. Business process changes

a (simple to install)

Challenges of Big Data include all of the following except: a. Simplicity b. Availability c. Price d. Data Security

a (simplicity)

Which of the following is NOT one of Porter's Five Forces: a. Technology b. New Vendors c. Suppliers d. Customers

a (technology)

__________ is the process of transforming large unstructured text data into meaningful and actionable information. a. Text Analysis b. Web Mining c. Data Mining d. Knowledge Management

a (text analysis)

Senior level management focuses on what type of strategy for the organization? a. Transformative b. Transactional c. None of the above d. Tactical

a (transformative)

Information technology and systems can improve business processes in ________ main ways? a. Two b. Three c. One d. Four

a (two)

Which of the following is not one of the six Vs of big data: a. Vision b. Value c. Veracity d. Variability

a (vision)

__________ systems integrate data from key business processes and different firm functions into a single system. a. CRP b. ERP c. SCN d. ERD

b (ERP)

______________ provides the platform for supporting all information systems. a. Database b. IT Infrastructure c. Machine Learning d. Security

b (IT infrastructure)

Secondary storage includes all of the following except: a. Hard drive b. RAM c. Tape drives d. Optical disk

b (RAM)

The dimensions of project risk include all of the following except? a. Experience with technology b. SDLC c. Project size d. Project structure

b (SDLC)

Customers use software hosted by the vendor on the vendor's cloud infrastructure and delivered as a service of a network. a. Ubiquitous Network Access b. Saas c. Rapid Elasticity d. Measured Service

b (Saas)

The modern business environment has become intensely competitive. As such, you must compete in the job market with talent from around the _______? a. Globe b. All of these c. State d. United States

b (all of these)

________ is tracking online behavior of individuals on thousands of sites to better understand their interests and intentions. a. Social Media b. Behavioral Targeting c. Crowdsourcing d. Long Tail Marketing

b (behavioral targeting)

The presence of duplicate data in multiple files/tables. a. Program-Data Dependence b. Data Redundancy c. Metadata d. Data Inconsistency

b (data redundancy)

________ is the use of the Internet and Web to conduct business and digitally enable transactions. a. Global reach b. E-Commerce c. Ubiquity d. Social technology

b (e-commerce)

_______ is the property that enables a system to continue operating properly in the event of the failure (or one or more faults within) some of its components. a. Client/Server b. Fault-tolerance c. Redundancy d. Packet Switching

b (fault-tolerance)

The internet has created a _______ world. a. Triangle b. Flattened c. Oval d. Round

b (flattened)

E-Commerce digital markets enable all of the following except: a. Price discrimination b. Instant gratification c. Disintermediation d. Dynamic pricing

b (instant gratification)

Software that is developed to harm and disrupt computers. As such, ___________ is undesirable. a. VMware b. Malware c. Device drivers d. Virtualization

b (malware)

Every IS has at least _______ application because every IS has a software component. a. Many b. One c. Two d. Zero

b (one)

During which phase of the system development life-cycle are new software updates/patches installed? a. Conversion b. Production and Maintenance c. System design d. Programming

b (production and maintenance)

A(n) _________________ is a set of rules and procedures governing transmission of information between two points in a network. a. layer b. protocol c. url d. RSS

b (protocol)

In a client/server network, the _______ sets the rules of communication for the network. a. Router b. Server c. Client d. Proxy

b (server)

Three main reasons why investments in information systems/technology do not always produce positive results include all of the following except: a. Organizational Inertia and Politics b. Speed of Information c. Information Quality d. Management Filters

b (speed of information)

A decision maker must provide judgement, evaluation, and insight to solve problem. a. Semi-Structured b. Unstructured c. None-Structured d. Structured

b (unstructured)

The ENIAC - Electronic Numerical Integrator and Computer was built in roughly which year(s)? a. 1985 - 1987 b. 1970 - 1973 c. 1943 - 1945 d. 1900 - 1905

c (1943-1945)

Business Value of ERP includes which of the following? a. Decreases operational efficiency b. Only provides static information to managers c. Enables rapid responses to customer requests for information d. Creates information silos

c (Enables rapid responses to customer requests for information)

________ focuses on rapid delivery of working software by breaking large projects into several small subprojects (referred to as development sprints) a. End-User development b. Waterfall c. Agile d. Outsourcing

c (agile)

Which of the following provides an online meeting place where people with similar interests can communicate and find useful information? a. Portal b. Content Provider c. Community Provider d. Market Creator

c (community provider)

Which of the following are marketplaces that provide consumers with platforms to interact with one another and conduct commerce? a. Business-to-Consumer (B2C) b. Consumer-to-Business (C2B) c. Consumer-to-Consumer (C2C) d. Business-to-Business (B2B)

c (consumer to consumer)

Make it difficult and expensive for new competition.... a. Reduce costs b. Lock in customers c. Create Barriers to Entry d. Lock in suppliers

c (create barriers to entry)

Automated or manual file storing definitions of data elements and their characteristics. a. Data Definition Capability b. Query & Reporting c. Data Dictionary d. Database Normalization

c (data dictionary)

Structured survey of the accuracy and completeness of data. a. Data Cleansing b. Data Quality Problems c. Data Quality Audit d. Poor Data Quality

c (data quality audit)

In its most basic meaning, metadata is data describing ______? a. Knowledge b. Text c. Data d. Information

c (data)

Any person, place, thing, or event of interest to a user. a. SQL b. Attribute c. Entity d. Metadata

c (entity)

Future business professionals need to be able to assess, _______, and apply emerging technologies. a. Extract b. Initiate c. Evaluate d. Comprehend

c (evaluate)

First appeared in the mid-1960's, pre-dates the PC, the original "computer" in a centralized mainframe computing model. a. Workstations b. Personal computer c. Mainframe d. Mini computer

c (mainframe)

The relationship between business processes and information systems is/are? a. Zero to One b. One to One c. Many to Many d. One to Many

c (many to many)

_________ is a financial transaction involving a relatively small sum (typically $0.01 to ~$5.00) of money typically occurring through an online platform/site. a. ATM b. Mini-payments c. Micropayments d. Triangular payment

c (micropayments)

An example of an output device would be? a. Microphone b. RAM c. Monitor d. CPU

c (monitor)

Which of the following is NOT one of the four basic tasks a computer must perform? a. Processing b. Input c. Monitor d. Output

c (monitor)

The following software enables the computer to multi-task, run multiple applications, and store data: a. Device drivers b. application software c. Operating system d. utilities

c (operating systems)

Which is the riskiest conversion style? a. Pilot b. Parallel c. Plunge d. Phased

c (plunge)

A business is a formal organization created to sell services or products at a ______. a. None of these b. Loss c. Profit d. Non-profit

c (profit)

A(n) ____________ is a communication device used to direct packets of data through different networks, ensuring that data sent arrives at the correct address. a. NIC b. CPU c. Router d. NAS

c (router)

During which phase of the system development life-cycle is the feasibility study conducted? a. Conversion b. Programming c. Systems analysis d. Design

c (systems analysis)

_______ benefits can be quantified and assigned monetary value a. Structured b. Value c. Tangible d. Intangible

c (tangible)

Operational managers make all of the following types of decisions except: a. Focus on pre-defined procedures, processes and protocols b. Routine c. Common d. Make more structured decisions but these may include unstructured components

d (Make more structured decisions but these may include unstructured components)

Advantages of prototyping include all of the following except? a. Useful if there is any uncertainty regarding system requirements and/or designs b. Often used for end-user interface design c. More likely to fulfill end-user requirements d. May not undergo full testing or documentation

d (May not undergo full testing or documentation)

Business Value of SCM Systems include the following except: a. Speed product time to market b. Improve delivery service c. Use assets more effectively d. Suite of integrated software modules and a common central database

d (Suite of integrated software modules and a common central database)

_____________ is a combination of massive quantities of structured, semi-structured, and unstructured data collected by organizations (internally and externally) that can be mined (data mining) for information and used in machine learning projects, predictive analytic modeling, and other advanced analytics applications. a. Business Analytics b. Business Intelligence c. Business Intelligence Vendors d. Big Data

d (big data)

________ set of logically related tasks and behaviors that organizations develop overtime to produce specific business results. a. Enterprise Application b. Supply Chain Management c. Business Goals d. Business Processes

d (business processes)

Order Fulfillment would be considered a ____________ business process. a. Tri-Functional b. Dual-Functional c. Single-functional d. Cross-functional

d (cross functional)

__________ is a subset of business analytics and refers to exploring an existing large dataset to unearth previously unknown patterns, relationships and anomalies that are present in the data. a. Machine Learning b. Cluster Analysis c. OLAP d. Data Mining

d (data mining)

A group of logically related tables/files that stores data and the associations among them. a. Record b. Entity c. SQL d. Database

d (database)

In the________ any piece of information required to support key business decisions are available at anytime and anywhere in the firm. a. Vibrant firm b. Analog firm c. Legacy firm d. Digital firm

d (digital firm)

Process implementation includes all of the following except? a. Raise barriers to market entry b. Establish alliances c. Lock in suppliers d. Enhance a product or service

d (enhance a product or service)

Document that shows data entities and attributes and relationships among them. a. Virtual Diagram b. Physical Design c. Logical Design d. Entity-Relationship Diagram

d (entity-relationship diagram)

______ is the technology works through interaction with the user. a. Universal standards b. Richness c. Personalization / Customization d. Interactivity

d (interactivity)

Information Systems and technology applications enable organizations to achieve greater efficiency and productivity in operations resulting in higher profits... a. Competitive advantage b. Survival c. Customer and supplier intimacy d. Operational excellence

d (operational excellence)

Which is not a conversion style? a. Pilot b. Phased c. Parallel d. Pivot e. Plunge

d (pivot)

The ___________ generation of the internet, post-dotcom bubble burst, which emphasizes user content generation tools and technologies such as social networking sites, blogs, wiki's and cloud computing SaaS. a. Third b. Fourth c. Frist d. Second

d (second)

Which of the following is NOT a necessary Data Characteristic? a. Relevant b. Worth Its Cost c. Accurate d. Security

d (security)

_____________ is data that adheres to a pre-defined data model and is therefore more straightforward to analyze. a. Semi-Structured Data b. Metadata c. Unstructured Data d. Structured Data

d (structured data)

The Value Chain Analysis has how many sequential steps? a. Two b. Five c. Four d. Three

d (three)

A telecommunications network that extends over a large geographic area for the primary purpose of computer networking. WANs are often established with leased telecommunication circuits owned by third-parties. a. Intranet b. Extranet c. Local Area Network (LAN) d. Wide Area Network (WAN)

d (wide area network)

Large numbers of people can make better decisions about topics and products than a single person is considered? a. Crowdfunding b. Social Media c. Socialization d. Wisdom of Crowds

d (wisdom of crowds)

Types of system failures include? a. Fail to provide organizational benefits b. Inaccurate or inconsistent data c. Complicated, poorly organized user interface d. Fail to capture essential business requirements e. All could be considered system failures

e (All could be considered system failures)


Related study sets

Microsoft PowerPoint Assessment / LinkedIn Skills Assessments

View Set

Computing Devices IoT, Operating Systems, Peripherals and Connectors, Core Hardware Components

View Set

Vocabulary Workshop Level F Unit 1 - 7

View Set

初一英语 unit 2 (2-family)

View Set

PSYCH UGA 1101E Final Study Guide

View Set