Final Flashcards

1
Q

Which of the following input techs has been historically used for entering text and numbers on computers?

A

QWERTY keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following encoding formats is the standard coding for e-mail over the internet?

A

MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ is a type of program that translates a program’s source cose into machine language and executes one statement at a time

A

interpreter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which of the following scanning techs is used by the banking industry to read data, account numbers, bank codes, and check numbers on preprinted checks?

A

magnetic ink character recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A(n) ______ occurs if a read/write head for some reason touches one of the disks in a hard drive, leading to a loss of data.

A

head crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a group of inexperienced computer operators cause the loss of valuable info. this info loss can be classified as one caused due to _____

A

accidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

wikileaks is a famous not-for-profit whistle-blowing website. mastercard and visa stopped payments to wikileaks after a series of leaks by the site. an anon group attacked the websites of both mastercard and visa reacting to this. these attackers, who tried to protect wikileaks, can be called ______

A

hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the official website of the iranian govt was made unreachable by foreign activists seeking to help the opposition parties during the 2009 iranian election protests. web sites belonging to many iranian news agencies were also made unreachable by the activists. this cyber protest is an example of a(n) ______ attack

A

denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

identify the term that represents the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.

A

cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a break even analysis

A

identifies at what point tangible benefits equal tangible costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which of the following is true for tangible costs?

A

they are relatively easy to quantify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

processing logic is often expressed in ______, which is independent of the actual programming language being used

A

pseudocode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the total cost of ownership of a system refers to _______

A

the total cost of acquisition and all costs associated with use and maintenance of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

system efficiency is the extent to which a system _____

A

enables people to do things faster or at lower cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the gap between those individuals in our society who are computer literate and have access to info resources like the internet and those who do not is referred to as the _____

A

digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

info accessibility focuses on ___

A

defining what info a person or org has the right to obtain about others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

doing things faster is associated with info systems for _____

A

automating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______ decisions can be programmed directly into operational info systems so sthat they can be made with little or no human intervention

A

structured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ is the process of analyzing an org’s activities to determine where value is added to products and/or services and what costs are incurred for doing so

A

value chain analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

which of the following statements is true about firms pursuing a home replication strategy?

A

the focus their domestic customers’ needs and wants and merely export their products to generate additional sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____ are techs, products, or services that eventually surpass the existing dominant tech or product in a market

A

disruptive innovations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the prediction that the number of transisters on a chip would double about every 2 years is known as _____

A

moores law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

companies following a ____ business strategy choose to operate solely in the traditional physical markets

A

brick and mortar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
the ability to independently learn new techs as they emerge and assess their impact on your work and life is called _______
computer fluency
26
which of the following refers to having certain functions performed by the same company but in a different country?
offshoring
27
____ are activities orgs perform in order to reach their business goals, including core activities that transform inputs and produce outputs, and supporting activities that enable the core activities to take place
business processes
28
the managerial level of the org is also known as the ______ level
executive
29
with reference to assessing value for the IS infrastructure, architectural value is derived from ______
an investment's ability to extend the infrastructure's capabilities to meet business needs today and in the future
30
________: the hardware, software, communication and collaboration networks, data, facilities, and human resources used by orgs to support their decision making, business processes, and competitive strategy
info system infrastructure
31
any input your computer receives is digitized and then is processed by the CPU. which of the following explains the meaning of the word "digitized" in the preceding sentence?
translated into binary code
32
using _____, multiple virtual machines, each with its own applications, can be configured to run on one single computer, enabling the IT service providers to better utilize their resources
virtualization
33
procedures that different computers follow when they transmit and receive data are called:
protocols
34
there are two forms of transmission media used in networks: cable and _____ media
wireless
35
electronic commerce is used to conduct business with business partners such as suppliers and intermediaries. this form of EC is commonly referred to as ____ electronic commerce
business to business
36
which of the following actions explains mass customization?
firms tailor their products and services to meet a customer's particular needs on a large scale
37
_______ refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers
reintermediation
38
prior to the introduction of the internet and web, the secure communication of proprietary info in business to business electronic commerce was facilitated using _____
electronic data interchange
39
which of the following explains web analytics?
analyzing web surfers' behavior in order to improve website performance
40
which of the following is an example of business-to-consumer electronic commerce?
reuben buys a shoe on yebhi.com
41
which of the following statements is true about open source software?
these programs' source code is freely available for use and/or modification
42
______ are collections of related data organized in a way that facilitates data searches
databases
43
a _____ strategy can also be referred to as a middle of the road strategy
best-cost provider
44
which of the following is a weakness of the global business strategy?
inability to react to local market conditions
45
primary storage is also known as
volatile memory
46
______ : the utility that the product/service has to offer to customers (component of a business model)
value proposition
47
the process of connecting separate info systems and data to improve business processes and decision making is known as _____
systems integration
48
_____ are referred to as virtual companies because they have no physical stores
click only
49
a ______ is a professional who is relatively well educated and creates, modifies, and/or synthesizes knowledge as a fundamental part of his/her job
knowledge worker
50
a long unformatted number might be a phone number, social security number, or bank account number. when dashes, commas, or some other formatting features are added, the number becomes useful and meaningful. thus, data has been transformed into
information
51
which type of info system is used to support day to day business event data at the operational level of the org
transaction processing system
52
outsourcing is:
when jobs are performed by employees of another firm, usually at less cost
53
info systems are combinations of _____ that people build and use to collect, create, and distribute useful data, typically in organizational settings
(all of the above) hardware, software, and telecommunications networks
54
_______ is the collection of programs that control the basic operations of computer hardward
systems software
55
the phenomenon of cutting out the middleman and reaching customers more directly and efficiently is known as _______
disintermediation
56
1. A combination of hardware, software, and telecommunication networks that people build and use to collect, create, and distribute data. 2. Term coined by Peter Drucker to refer to a society in which education is the cornerstone of society and there is an increase in importance of knowledge workers. 3. The integration of economies throughout the world, enabled by innovation and technological progress. 4. Set of strategies employed by organizations operating in different global markets. 5. Individuals' use of powerful search engines on the Internet to build their own personal supply chain of information, knowledge, and entertainment. 6. The ability of an organization to learn from past behavior and information, improving as a result. 7. The leveraging of digital technologies to provide free goods and services to customers as a business strategy for gaining a competitive advantage. 8. The set of primary and support activities in an organization where value is added to a product or service. 9. The location of relatively small servers close to the end users to save resources in terms of network bandwidth and provide improved access time. 10. The hardware, software, networks, data, facilities, human resources, and services used organizations to support their decision making, business processes, and competitive strategy.
``` __7__ Freeconomics __9__ Edge Computing __8__ Value Chain __5__ In-forming __4__ International Business Strategy __3__ Globalization __1__ Computer-based Information Systems __6__ Organizational Learning __10__ Information Systems Infrastructure __2__ Knowledge Society ```
57
in todays business environment, project teams comprise highly specialized members, many of whom are not collocated. _______ are comprised of members from different geographic areas
virtual teams
58
the network effect refers to the notion that the value of a network is dependent on ______
the number of other users
59
business intelligence is
it is the use of info systems to gather and analyze info from internal and external sources in order to make better business decisions
60
taking entities as tables, each column is a(n) _________
attribute
61
in DBMS, data are kept separate from the applications' programming code. this means that ______
database does not need to be changed if a change is made to an application
62
1. Allows users to publish, edit, version track, and retrieve digital information. 2. Tools enabling people to voice thoughts through relatively short "status updates". 3. The distribution of digital media, such as audio or video files via syndication feeds for playback on digital media players. 4. Augments business intelligence by using predictive analysis to help identify trends or predict business outcomes. 5. Refers to the display of complex data relationships using a variety of graphical methods, enabling managers to quickly grasp the results of the analysis. 6. A software architecture in which business process are broken down into individual components (or services) that are designed to achieve the desired results for the service consumer. 7. An information system that integrates business activities across departmental boundaries, including planning, manufacturing, sales, marketing and so on. 8. Large fluctuations in suppliers' forecasts caused by small fluctuations in demand for the end product and the need to create safety buffers. 9. The use of electromagnetic energy to transmit information between a reader (transceiver) and a processing device, used to replace bar codes and bar code readers. 10. A business model in which suppliers to a manufacture (or retailer) manage the manufacture's (or retailer's) inventory levels based on pre established service levels.
``` __2__ Social Presence Tools __10__ Vendor-Managed Inventory (VMI) __5__ Visualization __9__ Radio-Frequency Identification (RFID) __8__ Bullwhip Effect __7__ Enterprise Resource Planning (ERP) __1__ Content Management System __3__ Podcasting __6__ Service-Oriented Architecture (SOA) __4__ Business Analytics ```
63
in the ____ process, goods are produces based on forecasts and are stores in a warehouse and sales orders are then fulfilled from the inventory
make to stock
64
_____ is the extent to which a company's supply chain is focusing on minimizing procurement, production, and transportation costs, sometimes by sacrificing excellent customer service
supply chain efficiency
65
organizations that effectively utilize _____ can more easily customize marketing campaigns from the segment level to even the individual customer
analytical CRM
66
a(n) ______ is an integrated suite of business applications for virtually every dept, process, and industry, allowing companies to integrate info across ops on a company-wide basis using one large database.
enterprise system
67
which of the following statements about an RFID passive tag is true?
the are small and inexpensive
68
a common way to represent a data model is in a(n) _________
entity-relationship diagram
69
in service-oriented architecture, _____
business processes are broken down into individual components or services
70
a major benefit of social software is the ability to harness the "wisdom of crowds," which is also referred to as _____
collective intelligence
71
which of the following web 2.0 applications has been classified as the "amateurization" or journalism?
blogs
72
______ is the distribution of digital media, such as audio or video filed via syndication feeds for playback on digital media players
netcasting
73
which of the following statements is true about the online analytic processing cube
it is a data structure allowing for multiple dimensions to be added to a traditional two-dimension table
74
the processes associated with the acquiring of goods from external vendors are together referred to as the ____ process
procure to pay
75
in the ____ process, goods are produced based on forecasts and are stored in a awarehouse and sales orders are then fulfilled from the inventory
make-to-stock
76
human resource activities _____
is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them
77
a(n) ____ info flow related to the information that is produced by the company and sent along to another org
downstream
78
____ is a systemative, structured improvement approach by all or part of an org whereby people critically examine, rethink, and redesign business processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle time, or cost
business process management
79
the term _____ is commonly used to refer to a collection of companies and processes involved in moving a product from the suppliers of raw materials to the customer
supply chain
80
which of the following statement about just-in-time strategies is true?
companies using this strategy are trying to optimize their ordering quantities such that parts or raw material arrive just when they are needed from production
81
___ is a business model in which the suppliers to a manufacturer manager the manufacturer's inventory levels based on the preestablished service levels
vendor-managed inventory
82
which of the following is one of the two main objectives of info systems that focus on improving supply chains (SCM)?
accelerating product development and innovation
83
___ tools help a company in the execution of the CRM strategy by improving the management of promotional campaigns
enterprise marketing management
84
_____ integrates data from various operational systems
data warehouse
85
package software is ____
used for standardized, repetitive tasks
86
____ involves the development of various resource plans to support the efficient and effective production of goods and services
supply chain planning
87
____ focuses on delivering products or services to consumers as well as warehousing, delivering, invoicing, and payment collection
distribution planning
88
which of the following factors differentiates asynchronous communication from synchronous communication?
coordination in time
89
which of the following facilitates real-time written conversations?
instant messaging
90
which of the following statements is true about exception reports?
they highlight situations that are out of the normal range
91
___ is the ability of a web site to attract and keep visitors
stickiness
92
_____ support the important internal activities of the organization for producing their products and services
ERP core components
93
to finalize the data model in order to actually build the database, a process called _____ is used to make sure the database will operate efficiently
normalization
94
_____ take the concept of real-time communication a step further by allowing people to communicate using avatars
virtual worlds
95
____ is the creation of goods or services by self-organizing communities
peer production
96
______ is a phenomenon where companies use everyday people as a cheap labor force
crowdsourcing