UMIS Exam
Chapter 9
Social Media Information Systems
Organizations that play the role of providing platforms that enable the creation of social networks, or social relationships among people with common interests are know as...
Social media providers
What are the four phases of collaboration?
Starting, Planning, Doing, Finalizing
What type of decision requires the most collaboration?
Strategic
Chapter 2
Strategy and Information Systems
A manager will essentially require which of the following skills to clearly understand how the resources that his or her company uses are converted to desired outputs. A. B. C. D.
Systems Thinking
What are the 5 components of the "Five Component Model"? and what sides are they of?
Technical Safeguards: Hardware and Software Data Safeguard: Data Human Safeguards: Procedures and People
Business Process Management (BPM)
- is a cyclical process - includes viewing models of processes as they currently are (as-is) - includes continually evaluating processes - creates components and design of processes and implements them - can feed into the systems development process
What is an example of unauthorized data disclosure?
an employee sharing their login credentials with a scammer who is pretending to perform a company security audit
The scrum method of system development is superior because...
- the scrum work period is shorter and cyclical - it involves smaller, more interactive teams - it allows the development team to constantly reflect on work - it accommodates changing and fuzzy requirements better - it prioritizes requirements and considers the time it will take to complete each one
To effectively manage risk, organizations must proactively balance the trade-off between risk and ___.
cost
What are the 5 forces of Porter's that determine industry structure?
1. Threat of New Entrants 2. Bargaining Power of Suppliers 3. Bargaining Power of Buyers 4. Threat of Substitute Products/Services 5. Rivalry among Existing Competitors
Examples of metadata are...
1. a data type 2. a field property 3. a field description in design view
A database is a _______________, the DBMS_______________________, and a DB application __________.
1. collection of integrated rows of data 2. is the software that allows processing and management of the data 3. is a system of objects designed to help a user complete a job or requirement easily
The process of normalization...
1. ensures data integrity 2. organizes data into entities 3. eliminates almost all redundancy 4. ensures good table structure that adheres to forming rules
________ are collections of related tasks that receive inputs and produce outputs. A. Activities B. Repositories C. Resources D. Models
A. Activities
In which phase of the Systems Development Life Cycle (SDLC) should you determine project cost feasibility? A. Define System B. Determine Requirements C. Design System Components D. Implement System E. Maintain System
A. Define System
Which of the following is a function of an Internet service provider? A. It serves as a user's gateway to the Internet. B. It describes how messages must be processed for wired transmission. C. It connects computers within a LAN. D. It transmits data over short distances, replacing cables.
A. It serves as a user's gateway to the Internet.
The most important phase of the SDLC is...
determining requirements
Information systems can only improve the efficiency of business process activities.
false
Social capital is simply defined by the sum of the connections, the strength of the relationships, and the number of resources controlled.
false
Working together on the K204 Team Forming Contract to make decisions about rules and consequences requires:
feedback and iteration
_________________ is when teammates only give postive feedback and always agree with each other.
groupthink
The term for taking in-depth measures to reduce a system's vulnerability to harm caused by the public is...
hardening
Examples of technical safeguards include:
identification and authentication, encryption, firewalls, malware protection, and application design
A(n) ___________________________ is when two or more functional areas (departments) have independent and detached databases.
information silo
The primary risk of peer-to-peer support in the context of social media and customer service is ________.
loss of control
In the context of a collaboration information system, data about the way the team has decided to work on the project is called:
metadata
In the context of security, which of the following is true about managing risk?
organizations should implement safeguards that balance the trade-off between risk and cost
The gap that exists between the current state of things (as-is) and what it oughts to be (goal) is the:
problem
_____________________ are companies that provide platforms that enable the creation of social networks.
social media providers
The (business) process of checking out purchased items from a grocery store should be:
structured
The SDLC's critical problem is...
that it can't easily accommodate changing requirements
The three primary drivers of system development that can affect each other if changed are...
time, cost, and scope
A ________ is a balancing of three critical factors: requirements, cost, and time.
trade-off
Companies creating a social media strategy must gather the right amount of data to make informed decisions.
true
Enterprise Application Integration can be used to help manage information silos.
true
Organizations should practice implementing their incident response plans to ensure that the procedures are effective and that employees understand them.
true
A feature that allows saving documents multiple times with the same name and still recover previous work is:
version control
Which of the following is true for the relationship between business processes and information systems? A. Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction. B. Information systems incorporate all business process activities, and hence should be developed before business processes. C. Starting from processes and working toward information systems is the best option to anticipate future demands and new business processes. D. Developing information systems before business processes ensures that all activities are considered in the development process.
A. Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.
Malware protection can best be described as which of the following... A. Technical Safeguard B. Data Safeguard C. Human Safeguard D. Virus Safeguard
A. Technical Safeguard
A _____________ is a logical representation of a database that describes the data and relationships that will be stored in the database. A. data model B. crow's feet diagram C. database design schema D. requirements document
A. data model
A ___________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business. A. datamart B. datamine C. datacube D. data model
A. datamart
Identify a characteristic that is a disadvantage of cloud-based hosting. A. loss of control over data location B. ongoing support costs C. increased management requirements D. significant development effort
A. loss of control over data location
A low inventory report that is automatically generated when the number of items reaches a certain number is an example of which of the following? A. push publishing B. pull publishing C. automated publishing D. BI publishing
A. push publishing
What is an example of incorrect data modification?
Accidentally deleting customer data while attempting to perform a backup
Which type of relationship would be necessary to have between the Employee and Sales entities in a grocery store database? A. N:M B. 1:N C. 1:1 D. M:M
B. 1:N
The process a company goes through to determine whether or not to invest in a new location is a ____________ process. A. structured B. dynamic C. difficult D. strategic
B. dynamic
Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services? A. traditional marketing B. pay-per-click C. user participation D. venture capital
B. pay-per-click
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement? A. structural capital B. social capital C. process capital D. human capital
B. social capital
What are the four primary purposes of collaborative teams?
Become informed, make decisions, solve problems, manage projects
What is the most important quality to have as a collaborator?
Being able to give and receive critical feedback
Chapter 3
Business Intelligence Systems
Which of the following is defined as information containing patterns, relationships, and trends? A. Process mining B. Business process management C. Business intelligence D. Spatial intelligence
C. Business intelligence
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship. A. 1:N B. 1:01 C. N:M D. M:1
C. N:M
Which of these is one of Porter's 5 forces that determine industry structure? A. Inbound logistics B. Customer service C. Threat of new entrants D. Differentiation
C. Threat of new entrants
Which of the following does knowledge management (KM) benefit organizations? A. improve process quality B. increase team strength C. both a and b D. it doesn't benefit organizations
C. both a and b
Because of the various problems with operational data, large organizations choose to extract operational data into which of the following?. A. OLAP cube B. neural network C. data warehouse D. Web server
C. data warehouse
In a data model, a(n) ________ represents something that a user wants to track. A. record B. byte C. entity D. primary key
C. entity
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more products? A. marketing B. customer acquisition C. relationship management D. loss/churn
C. relationship management
Chapter 6
Cloud Computing
Chapter 7
Collaboration Information Systems
Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems? A. giving employees ultimatums and deadlines B. paying employees outright for transitioning to the new system C. coercing employees to learn the new system D. training employees on the successful use of the new system
D. training employees on the successful use of the new system
In the Five-Component Model, which component is considered the "bridge" that connects the computer side of the model to the human side?
Data
The centerpiece of an ERP application is the:
Database
Chapter 5
Database Processing
When a company tries to offer the same products at a lower cost they are trying to __________ a customer's buyer power.
Decrease
Using enterprise social networks in an organization is known as:
Enterprise 2.0
_______________________ are able to collect, include, and provide data from several departments or functional areas.
Enterprise Information systems
The overall goal of IS Security is to...
Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards
________ is a major task when implementing enterprise systems.
Gap identification
In the Five-Component Model, which component is the easiest to change?
Hardware
The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________.
High levels of Rivalry
Chapter 1
Importance of MIS
Chapter 12
Information Systems Development
Chapter 10
Information Systems Security
The two key characteristics of collaboration are...
Iteration and feedback
________ are large-scale high-speed centralized computers, used for internal corporate data processing needs.
Mainframes
________ is the dynamic social media process of employing users to participate in product design or product redesign.
Crowdsourcing
Which of the following can be described as a security threat? A. Human Error B. Cyber Terrorists C. Natural Disasters D. All of the Above
D. All of the Above
A ________ is an application program that runs on a server-tier computer and manages processes such as items in a shopping cart. A. database tier B. web server C. database D. commerce server
D. commerce server
Which of the following protocols guarantees secure data transmission? A. http B. ftp C. smtp D. https
D. https
Which of the following is a common description of information? A. information presented in a meaningful context B. unbiased information C. recorded facts or figures D. knowledge derived from facts or figures
D. knowledge derived from facts or figures
Which of the following is an accurate representation of the steps in the business process management cycle? A. model processes; implement processes; assess results; create components B. create components; model processes; implement processes; assess results C. implement processes; create components; model processes; asses results D. model processes; create components; implement processes; assess results
D. model processes; create components; implement processes; assess results
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? A. inbound logistics B. operations C. customer service D. outbound logistics
D. outbound logistics
The sales manager of a firm wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keywords (criteria) into a ________ to obtain the information that she wants. A. report B. reference C. data entry D. query
D. query
Transforming inputs into the final products describes which primary activity?
Operations/Manufacturing
You follow certain steps to access the supplementary readings for a course when using your organization's library management system. The steps that you follow are examples of the ________ component of an information system.
Procedure
Chapter 8
Processes, Organizations, and IS