Final exam study guide Flashcards

(120 cards)

1
Q

Which of the following accurately describes the five-component framework of information systems?

A

computer hardware, software, data, procedures, and people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

A

Systems thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following types of skills is most likely be outsourced to the lowest bidder?

A

Accounting skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following best defines Management Information Systems (MIS)?

A

The management and use of information systems to help organizations achieve their goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Automation moves work from people to machines. However, it can also _________________ the complexity of the system and require more time for change.

A

Increase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data by itself is information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Characteristics of good information include: It must be accurate, timely, relevant, sufficient, and?

A

Worth the cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The most important component in the five-component model is?

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ability to make and manipulate models is called?

A

Abstract reasoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A new computer class forms roughly each decade is a statement of?

A

Bell’s Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The 5 forces model to determine industry structure includes: bargaining power of customers, bargaining power of suppliers, threats of new entrants, rivalry among existing firms and?

A

Threat of substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The amount of money a customer is willing to pay for a product or service is called?

A

value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The difference between the value of a product or service and its associated cost is called?

A

margin or profit margin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The primary activity associated with labeling and shipping products is called?

A

outbound Logistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you view a “swim lane” chart to understand the flow of information across a company, you are looking at what type of model?

A

bpm-business process model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three main ways to improve a product or service position in the marketplace include: Create a new product or service, enhance the existing product or service, and?

A

differentiate the product or service in the marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Another name for improving the position of a product or service in the marketplace is to?

A

gain competitive advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the strategy called when organizations “lock” customers in by making it difficult or expensive to switch to other products?

A

establishing High switching cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you make it harder or more expensive for a competitor to operate in your marketplace, it is called raising?

A

barriers to entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do you need to accomplish to differentiate your product or service from the competition?

A

make some type of improvement in the product or service, decrease costs, improve transportation, Etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

A

Supervised data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In ________, statistical techniques can identify groups of entities that have similar characteristics.

A

cluster analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization’s BI data.

A

data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, “If they’re buying X, sell them Y” or “If they’re buying Y, sell them X.”

A

cross-selling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Push publishing delivers business intelligence ________.
according to a schedule or as a result of an event or particular data condition
26
RFM analysis is used to analyze and rank customers according to their ________.
purchasing patterns
27
________ is defined as information containing patterns, relationships, and trends of various forms of data.
business intelligence
28
Which of the following statements is true about data marts?
data Marts address the needs of a particular department or functional area of a business
29
Which of the following statements is true about unsupervised data mining?
analysis do not create a model or hypothesis before running the analysis
30
Which of the following selections is not completed during data acquisition of the BI process?
data mining
31
Every computer contains a component that is considered the "Brain" of the machine. It is within this component that instructions are processed. The name of this component is?
CPU-central processing unit
32
All computers include storage hardware which is used to to save data and programs. 21st century computers use a storage media that is faster than previous media because it stores information using nonvolatile electronic circuits. What is the name of the storage media commonly found in computers today?
SSD - solid state disks
33
What is the name of the binary digit which can either be "on" or "off" that is the building block for all computer information?
BIT
34
The name of a disruptive force (technology) that has the power to change both our personal and professional lives is? It involves the idea that objects are becoming connected to the Internet and to each other around the globe.
IoT - Internet of Things
35
Computer components are said to be "volatile" if they loose their contents when the power is shut off.
true
36
What is AR - Augmented Reality?
AR is the altering of Reality by overlaying digital information on real-World objects
37
Cryptocurrencies are considered a potential disruptive force in today's economy.
true
38
The computer program that controls all of the computers resources is called?
OS - operating system
39
Software that performs a service or function is called?
Application software
40
When you commonly purchase software, you are not actually buying it. Instead, you are buying a license to use that program. If a company elects to provide specific software for all of their employees, they may elect to purchase a?
site license
41
______ is the standard language for inserting, updating, and deleting data in a database.
SQL
42
Phone number, email address, first and last name, are all examples of ___________ because they describe the characteristics of an entity.
attributes
43
In the following image, the VEND_CODE in the PRODUCT table represents a(n) __________ because it creates the logical connection between the two tables.
Foreign key
44
Every table in a normalized database has ________.
A single theme
45
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________.
Primary key
46
A data integrity problem will occur only if ________.
Data are duplicated in a database
47
A(n) ________ is a program used to create, process, and administer a database.
Database management system
48
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on a daily basis, and employee name. These aspects that Brad wants to track are called ________.
entities
49
________ refers to data collections that are characterized by huge volume, rapid velocity, and great variety.
BigData
50
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
Users
51
Smaller than a mainframe computer but larger than a PC, the _________________ was developed in the 1970s to give corporate departments and small companies direct access to computers.
Minicomputer
52
A(n) ________ uses the Internet to create the appearance of private, secure connections.
VPN
53
Cloud resources are ________ because many different organizations use the same physical hardware.
pooled
54
Compared to in-house hosting, cloud-based hosting ________.
Minimizes the risk of investing in technology that will soon become obsolete
55
Identify a characteristic that is a disadvantage of cloud-based hosting?
Loss of control over data location
56
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.
elastic
57
In this century, computing technology is now connected to virtually everything. This connectivity will continue to grow for many years. We commonly refer to this as the _______________________.
Internet of Things
58
Which of the following characteristics is a disadvantage of cloud-based hosting?
It involves high dependency on vendor
59
Which of the following is a function of an ISP?
It serves as a user’s gateway to the Internet
60
Which of the following protocols guarantees secure data transmission?
https
61
A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following terms best describes this activity?
cooperation
62
Which of the following choices would be used to facilitate synchronous communication between team members?
Virtual meetings like Zoom
63
The two key characteristics of collaboration are _______ and __________.
Constructive criticism and feedback
64
Which of the following selections is not one of the four primary purposes of collaboration?
Developing friendships
65
The first and arguably the most important task for a problem-solving collaborative group is ___________.
Defining the problem
66
When working on your MIS 2100 class project, my expectations are that you and your group members work _________ with the goal of producing a high-quality deliverable.
collaboratively
67
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
planning
68
The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
strategic
69
The fundamental purpose of the starting phase of a project is ________.
Setting the ground rules for the project and team
70
One of the most important things to consider regarding people when implementing a change to an IMS system or when deploying a new IMS system is?
Change management
71
In our textbook and in this course, we divide processes into two broad categories: Structured Process and ___________?
Dynamic processes
72
Recruiting, Compensation, Assessment, HR Planning are all examples of processes found in the Human Resources department. Collectively, when these processes are bundled up for HR, the grouping is know as a _____________ process.
Work group
73
The name given to a large-scale information system that spans an entire organization and supports multiple departments and activities is called?
Enterprise information system
74
Processes are the fabic of an organization. Good information systems can improve an organization's quality. The two dimensions of process quality mentioned in the textbook are?
Process efficiency and process effectiveness
75
If an organization has data isolated in different information systems which do not share information then that organization is said to have?
Information silos
76
The activity of altering existing and designing new business processes to take advantage of new information systems is called?
Business process reengineering
77
An information system that contains a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer is called?
CRM - Customer Relationship Management System
77
SAP and ORACLE are two large-scale ERP systems that run many Fortune 100 companies. What does the acronym ERP stand for?
Enterprise resource planning
78
Which ERP vendor is the world leader in ERP market share?
SAP
79
As you can imagine, there is considerable amount of work to configure and customize an ERP system for a specific company. To reduce that workload, ERP vendors provide starter kits for specific industries called?
Industry-specific solutions
80
The 5 components of a Social Media Information System include: Hardware, Software, Data, People and?
procedures
81
The text mentions three types of dynamic social media systems that are used in Manufacturing and Operations. They include Crowdsourcing, B2C-Business to Consumer, and?
B2B - Business to Business
82
Karl Marx defined "Capital" as the investment of resources for future profit. What is the definition of "Social Capital"?
The investment in social relations with the expectation of returns in the marketplace
83
The likelihood that another entity (person or company) in the relationship will do something that benefits our organization is called?
The Strength of the Relationship
84
When it comes to generating revenue using SMIS, name the the model that offers users basic service for free and then charges a premium for upgrades or advanced features.
Freemium
85
Metrics that are used to help you identify when you've achieved your business goals are called?
KPI - Key Performance Indicators
86
A software platform that uses social media to facilitate cooperative work of people "within" an organization is called? Remember it uses the company INTRANET.
ESN - Enterprise Social Network
87
The very first step an organization needs to take when creating a new SMIS - Social Media Information System is to develop and publicize a social media policy.
True
88
Intel's 3 Rules of Engagement concerning Social Media Information Systems include: Disclose, Protect, and?
Use common sense
89
The textbook mentions the use of ____________ which are methods that have been shown to produce successful results in prior implementations. These elements exist in every discipline found in the modern marketplace and are included in many purchased software application systems.
Best Practices
90
A ________ examines each part of a message and determines whether to let that part pass.
firewall
91
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
threat
92
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
phisher
93
In information security, which of the following is true about managing risk?
Organizations should implement safeguards that balance the trade-odd between risk and cost
94
In the context of malware protection, the program code that causes the unwanted actions is called the ________.
payload
95
When an employee is terminated, IS administrators should receive advance notice so that they can ________.
Remove the user account and password
96
Which of the following is a critical security function that should be addressed by the senior management of an organization?
Establishing the security policy
97
________ are false targets for computer criminals to attack.
honeypots
98
________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection, in the case of wireless networks.
sniffing
99
The three main components of IT Security include: Principle of Accountability, Principle of Least Privilege, and
Principle of defense in depth
100
The process of creating a new application begins when the IS department aligns its priorities with the ________.
Organization’s strategy
101
Which of the following is NOT a responsibility of a systems analyst?
Writing Programs
102
Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________.
Learn basic computer skills
103
The ________ must ensure that priorities consistent with the overall organizational strategy are developed, communicate them to the IS department and enforce them.
CIO
104
The process of hiring another organization to perform a service to save costs, gain expertise, or free management time is called?
outsourcing
105
Outsourcing can be applied to any element of the MIS model (Hardware, Software, Data, Procedures, People)?
True
106
Some of the risks associated with outsourcing include: loss of control, loss of intellectual capital, and management change
true
107
As a primary business user of information systems, you have user rights that include things like access to reliable IT technology, stable network, and a secure computing environment. You also have user ______________ that specify things that you as a user of the systems need to do protect yourself and the company.
responsibilities
108
There is group of senior managers from major business functions that work with the CIOs to set information system priorities and decide among major IS projects. This group of managers is called a?
Steering team
109
The group within the Information Technology Division that is responsible for the computing infrastructure, including computers, in-house server farms, networks, and communications media is called?
Operations group
110
A ________ involves balancing three critical factors: requirements, cost, and time.
trade-off
111
A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
Business process
112
A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.
Business analyst
113
According to Brooks' Law, adding more people to a late project will ________.
Create diseconomies of scale
114
If a defined project is determined to be feasible in the systems development life cycle (SDLC), the next step is to ________.
Form the project team
115
In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.
activities
116
In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________.
deliverables
117
In the system definition phase of the systems development life cycle (SDLC), the first major task for an assembled project team is to ________.
Define system goals and scope
118
In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business.
pilot
119
The ________ is a sequence of activities that determine the earliest date by which a project can be completed.
Critical path