Final Flashcards

1
Q

A challenge with traditional file storage is

A

High data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A computer network within a building, or a campus of adjacent buildings, is called a

A

LAN (local area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A con artist telephones an employee, pretends to be from his own organizations IT unit, and says he must have the employees password to fix a problem. This is an example of

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A decision support systems ______ module is a database or data warehouse that provides the data for the intelligence phase of decision making

A

data management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A disadvantage of ____ software is that they are less likely to be compatible with other organizations systems.

A

Custom-designed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A formula must start with an

A

Equal sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A scenario ______ lists the value for changing cells and results cells under each scenario

A

summary report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A system can only help a company sustain competitive advantage if the company continuously modifies and enhances it, creating a ______ for competitors

A

Moving target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A _____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.

A

Database model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _____ is a body of clients that is large enough to attract many other clients.

A

Critical mass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____ is a type of malware that spreads in a network without human intervention

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____ is a limit that is placed on a solver problems solution.

A

contraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _____ interfaced and interacts with other systems

A

Open system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _____ is a business even such as a sale, a purchase, the hiring of a new employee, and the like.

A

Transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ process is any manipulation of data, usually with the goal of producing information.

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An_____ is one which there is no algorithm to follow to reach an optimal solution.

A

Unstructured problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A _____ is unique if the value(content) in that field appears only in one record

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _____ system is used at all levels of an organization, and often by non-managerial staff

A

Decision support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Among the methods for system development, ____ is clearly the best option for many small companies

A

Software on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Arguments can be

A

All of the above

i. Cell regerences
ii. numbers
iii. Text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Building several technologies into a single piece of hardware is called

A

technology convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Businesses use ____ to save on travel costs and lodging, car fleets, and the time of high salaried employees incurred on bringing together employees working in different organizations or at different sites in the same organization

A

Video conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Changing and manipulating the data in an informations system is called

A

data processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data warehouses could be regarded as a type of ___ where new useful information is precious to find

A

mine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Expert systems use data from a

A

Knowledge base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

FUNCTION(argument1, argument2)

A

The general syntax of all functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

If solver is taking too long to dins a solution , you can halt the program at any time by pressing the ____ key

A

Esc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

If the cost-accounting procedures of a particular company are so specific that no commercially available software can perform them, the company must develop _____ software

A

Custom-designed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

If_____ need to be used as one large data warehouse, special software tools can unify them and make them appear as one large data warehouse.

A

Data marts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In banking, ______ is employed to find profitable customers and patterns of fraud

A

data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

in the context B2B trading, online advertising is done mainly in two ways: through ___ and through banners.

A

search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In the phrase of transferring data from a transactional database warehouse, the builders create the files from transactional databases and save them on the server that will hold the data warehouse.

A

Extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In the _____ phase of transferring data from a transactional database to a data warehouse, specialists “cleans” the data and modify it into a form that allows insertion into the data warehouse.

A

transformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In the ____ phase, specialists ensure that all data is consistant

A

Transformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In ____ manufacturing, suppliers ship parts directly to assembly lines, saving the cost of warehousing raw materials, parts, and subassemblies

A

Just-in-time

36
Q

In___ the hosting company owns the server and the server management software.

A

shared hosting

37
Q

In____ the voltage of the power decreases, or there are very short interruptions in the flow of power.

38
Q

ISs, especially large ones, can often be broken into functional modules and phased into operation one at a time, a process called _____

A

phased conversion

39
Q

One objective of data mining is ______ the discover of patterns in data that can lead to reasonable predictions

A

forecasting

40
Q

””

A

forecasting

41
Q

One way to increase market share is to lower prices, and the best way to lower prices is to ____

A

reduce costs

42
Q

Online databases that are used with web browsers

A

Are no different from other databases

43
Q

Organizations can leverage ____ to communicate with consumers immediately.

A

social media

44
Q

Risks of outsourcing are high for ____ IS services

A

core competence

45
Q

Some companies might want to use entire physical servers all for themselves and therefore can opt for _____

A

dedicated hosting

46
Q

Storage area network (SAN) identifies large quantities of data, called ___, and therefore can transfer and back up large amounts of data at a time

A

Data blocks

47
Q

The concept of extracting business intelligence from large data warehouses often involves ____ of several information systems

A

Integration

48
Q

The concept in which an application service provider offers the use of computer programs through a network is known as

A

Software as a service (SaaS)

49
Q

The emergence of the web as a global medium for information exchange has made it an important vehical for both B2B and ____

A

B2C business to commerce

50
Q

The first step in systems analysis is ____, which determines whether there is a real need for a system and whether the system as conceived is feasible.

A

investigation

51
Q

Greek work

52
Q

The part of the DSS that allows the user to interact with it is called the _____

A

Dialog module

53
Q

The process of ____ enables organizations to plan and carefully design their global sites to cater to local needs and preferences

A

Glocalization

54
Q

The recent trend in less rich countries is to adopt ___ to avoid high costs

A

Free open source software

55
Q

The three major components of a DSS are a data management module, a model management module and a ____ module

56
Q

The time between generating an idea for a product and competing a prototype that can be mass manufactured is known as engineering lead time or

A

Time to market

57
Q

The united states uses farhrenheit temperatures, while other countries use celsius temperatures. This portrays differences in ____

58
Q

The ____ available in some countries is too narrow for high-volume transmission of graphically and animation-rich webpages

59
Q

The____ is the most important part of any computer

A

Central processing unit

60
Q

The _____ mediates applications and the computer, and controls peripheral devices.

A

operating systems

61
Q

The _____ prompts the user to select a model, allowing the user to access the database and select data for the decision process or to set criteria for selecting such data

A

Dialog module

62
Q

There are two basic types of access modes for data storage: _____ and direct access

A

Sequential

63
Q

There are two overall approaches to maintaining data: the traditional file approach-which does have the mechanism

A

database approach

64
Q

thinking of an organization in terms of its sub organizations or subsystems is called

A

systems thinking

65
Q

To perform a what-if-analysis with more than two input cells, you ____

A

create senarios

66
Q

Use _____ references when you want different formulas to refer to the same cell

67
Q

when a client outsources, management knows how much the outsources services will cost, which eliminates _____

A

Miscalculation risks

68
Q

When a radio frequency identification tag is attached to a product, it contains a ___

A

Electronic code

69
Q

When building a new database, users must first build a ___

70
Q

Which of the following is a good practice to consider when designing websites for an international audience

A

Plan the site before developing

71
Q

which of the following is considered strategic advantage of the first-mover?

A

superior brand name

72
Q

Which of the following is true of open source software?

A

Open source software can offer more innovation features by incorporating ideas from a diverse set of experts

73
Q

While blogging is publishing text and other visual material, ___ is publishing sound and video

A

Podcasting

74
Q

While____ might sound benign, many privacy advocates claim that it violates privacy rights.

A

consumer profiling

75
Q

____ is a program that serves for the optimal solution of a problem involving several variables.

A

Scenario manager

76
Q

_____ are excellent tools for building both the data and the models that decision support systems need

A

Spreadsheets

77
Q

____ are expenses incurred when a customer stops buying a product or service form one business and starts buying it from another

A

switching costs

78
Q

_____ are the most powerful computers at any given time, but are built especially for assignments that require arithmetic speed

A

supercomputers

79
Q

____ defines the degree to which a goal is achieved

A

Effectiveness

80
Q

____ is a popular medium for connecting computer and networking devices because it is relatively flexible, reliable, and low cost

A

Twisted Pair cable

81
Q

____ is the raw material in the production of information

82
Q

____ means the code is owned by someone who has the right to sell or license the software to others

A

Proprietary

83
Q

___ occurs when a website receives an overwhelming number of information request, such as merely logging on to a site

A

Denial services (DoS)

84
Q

____ refers to an organizations initiative of adding to a product or service to increase its value to the consumer

A

Enhancement of existing products or services

85
Q

_____ revers to the competitive advantage that a company can achieve by persuading customers that its product or service is better than its competitors

A

product defferentiation

86
Q

____ software is developed for the widest common denominator of potential user organizations

A

ready-made