umis final

Ace your homework & exams now with Quizwiz!

A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.

N:M

The sales manager of a firm wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keywords (criteria) into a ________ to obtain the information that she wants.

Query

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more products?

Relationship managment

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

Social capital

Organizations that play the role of providing platforms that enable the creation of social networks, or social relationships among people with common interests are know as:

Social media providers

Which of the following is true for the relationship between business processes and information systems?

Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction

What are the four phases of collaboration?

Starting, Planning, Doing, Finalizing

What type of decision requires the most collaboration?

Strategic

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

Systems Thinking

Malware protection can best be described as which of the following...

Technical safeguard

Which of these is one of Porter's 5 forces that determine industry structure?

Threat of new entrants

A ________ is a balancing of three critical factors: requirements, cost, and time.

Trade-off

Which type of relationship would be necessary to have between the Employee and Sales entities in a grocery store database?

1:N

Which of the following protocols guarantees secure data transmission?

https

________ are collections of related tasks that receive inputs and produce outputs.

Activities

What are the four primary purposes of collaborative teams?

Become informed, make decisions, solve problems, manage projects

What is the most important quality to have as a collaborator?

Being able to give and receive critical feedback

________ is defined as information containing patterns, relationships, and trends.

Business intelligence

A ________ is an application program that runs on a server-tier computer and manages processes such as items in a shopping cart.

Commerce server

In the Five-Component Model, which component is considered the "bridge" that connects the computer side of the model to the human side?

Data

A _____________ is a logical representation of a database that describes the data and relationships that will be stored in the database.

Data model

Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.

Data warehouse

The centerpiece of an ERP application is the:

Database

A ___________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business.

Datamart

When a company tries to offer the same products at a lower cost they are trying to __________ a customer's buyer power.

Decrease

In which phase of the Systems Development Life Cycle (SDLC) should you determine project cost feasibility?

Define system

The process a company goes through to determine whether or not to invest in a new location is a ____________ process.

Dynamic

In a data model, a(n) ________ represents something that a user wants to track.

Entity

The overall goal of IS Security is to:

Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards

________ is a major task when implementing enterprise systems.

Gap indentification

The term for taking in-depth measures to reduce a system's vulnerability to harm caused by the public is...

Hardening

In the Five-Component Model, which component is the easiest to change?

Hardware

The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________.

High levels of rivalry

Which of the following can be described as a security threat?

Human error, cyber terrorists, and natural disasters

How does knowledge management (KM) benefit organizations? Briefly explain your chosen answer.

Improve process quality and Increase team strength

Which of the following is a function of an Internet service provider?

It serves as a user's gateway to the Internet

The two key characteristics of collaboration are:

Iteration and feedback

Which of the following is a common description of information?

Knowledge derived from facts or figures

The primary risk of peer-to-peer support in the context of social media and customer service is ________.

Loss of control

Identify a characteristic that is a disadvantage of cloud-based hosting.

Loss of control over data location

________ are large-scale high-speed centralized computers, used for internal corporate data processing needs.

Mainframes

Which of the following is an accurate representation of the steps in the business process management cycle?

Model processes; create components; implement processes; assess results

Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?

Pay-per-click

A low inventory report that is automatically generated when the number of items reaches a certain number is an example of___________.

Push publishing

To effectively manage risk, organizations must proactively balance the trade-off between risk and ___.

Cost

________ is the dynamic social media process of employing users to participate in product design or product redesign.

Crowdsourcing

Transforming inputs into the final products describes which primary activity?

Operations/Manufacturing

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?

Outbound logistics

You follow certain steps to access the supplementary readings for a course when using your organization's library management system. The steps that you follow are examples of the ________ component of an information system.

Procedure

Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?

Training employees on the successful use of the new system


Related study sets

Corporate Finance Connect Questions

View Set

hof ch 71 - mass casualty and disaster preparedness

View Set

Real Estate Principles, Real Estate Practice, Legal Aspects of Real Estate

View Set

Unit 7 Economic Factors Study questions

View Set

Ch. 8: Team Building and Working with Effective Groups

View Set

Spanish Listening : Conversations

View Set