Final exam study guide Flashcards
Which of the following accurately describes the five-component framework of information systems?
computer hardware, software, data, procedures, and people
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
Systems thinking
Which of the following types of skills is most likely be outsourced to the lowest bidder?
Accounting skills
Which of the following best defines Management Information Systems (MIS)?
The management and use of information systems to help organizations achieve their goals and objectives
Automation moves work from people to machines. However, it can also _________________ the complexity of the system and require more time for change.
Increase
Data by itself is information.
False
Characteristics of good information include: It must be accurate, timely, relevant, sufficient, and?
Worth the cost
The most important component in the five-component model is?
People
The ability to make and manipulate models is called?
Abstract reasoning
A new computer class forms roughly each decade is a statement of?
Bell’s Law
The 5 forces model to determine industry structure includes: bargaining power of customers, bargaining power of suppliers, threats of new entrants, rivalry among existing firms and?
Threat of substitution
The amount of money a customer is willing to pay for a product or service is called?
value
The difference between the value of a product or service and its associated cost is called?
margin or profit margin
The primary activity associated with labeling and shipping products is called?
outbound Logistics
When you view a “swim lane” chart to understand the flow of information across a company, you are looking at what type of model?
bpm-business process model
Three main ways to improve a product or service position in the marketplace include: Create a new product or service, enhance the existing product or service, and?
differentiate the product or service in the marketplace
Another name for improving the position of a product or service in the marketplace is to?
gain competitive advantage
What is the strategy called when organizations “lock” customers in by making it difficult or expensive to switch to other products?
establishing High switching cost
If you make it harder or more expensive for a competitor to operate in your marketplace, it is called raising?
barriers to entry
What do you need to accomplish to differentiate your product or service from the competition?
make some type of improvement in the product or service, decrease costs, improve transportation, Etc
In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.
Supervised data mining
In ________, statistical techniques can identify groups of entities that have similar characteristics.
cluster analysis
In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization’s BI data.
data warehouse
In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, “If they’re buying X, sell them Y” or “If they’re buying Y, sell them X.”
cross-selling
Push publishing delivers business intelligence ________.
according to a schedule or as a result of an event or particular data condition
RFM analysis is used to analyze and rank customers according to their ________.
purchasing patterns
________ is defined as information containing patterns, relationships, and trends of various forms of data.
business intelligence
Which of the following statements is true about data marts?
data Marts address the needs of a particular department or functional area of a business
Which of the following statements is true about unsupervised data mining?
analysis do not create a model or hypothesis before running the analysis
Which of the following selections is not completed during data acquisition of the BI process?
data mining
Every computer contains a component that is considered the “Brain” of the machine. It is within this component that instructions are processed. The name of this component is?
CPU-central processing unit
All computers include storage hardware which is used to to save data and programs. 21st century computers use a storage media that is faster than previous media because it stores information using nonvolatile electronic circuits. What is the name of the storage media commonly found in computers today?
SSD - solid state disks
What is the name of the binary digit which can either be “on” or “off” that is the building block for all computer information?
BIT
The name of a disruptive force (technology) that has the power to change both our personal and professional lives is? It involves the idea that objects are becoming connected to the Internet and to each other around the globe.
IoT - Internet of Things
Computer components are said to be “volatile” if they loose their contents when the power is shut off.
true
What is AR - Augmented Reality?
AR is the altering of Reality by overlaying digital information on real-World objects
Cryptocurrencies are considered a potential disruptive force in today’s economy.
true
The computer program that controls all of the computers resources is called?
OS - operating system
Software that performs a service or function is called?
Application software
When you commonly purchase software, you are not actually buying it. Instead, you are buying a license to use that program. If a company elects to provide specific software for all of their employees, they may elect to purchase a?
site license
______ is the standard language for inserting, updating, and deleting data in a database.
SQL
Phone number, email address, first and last name, are all examples of ___________ because they describe the characteristics of an entity.
attributes
In the following image, the VEND_CODE in the PRODUCT table represents a(n) __________ because it creates the logical connection between the two tables.
Foreign key
Every table in a normalized database has ________.
A single theme
Albert creates a relational database to store employee performance statistics. He stores each employee’s data in independent rows and creates a column named “Employee Number” to assign unique numbers to each employee. This column is referred to as a(n) ________.
Primary key
A data integrity problem will occur only if ________.
Data are duplicated in a database
A(n) ________ is a program used to create, process, and administer a database.
Database management system
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on a daily basis, and employee name. These aspects that Brad wants to track are called ________.
entities
________ refers to data collections that are characterized by huge volume, rapid velocity, and great variety.
BigData
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
Users
Smaller than a mainframe computer but larger than a PC, the _________________ was developed in the 1970s to give corporate departments and small companies direct access to computers.
Minicomputer
A(n) ________ uses the Internet to create the appearance of private, secure connections.
VPN
Cloud resources are ________ because many different organizations use the same physical hardware.
pooled
Compared to in-house hosting, cloud-based hosting ________.
Minimizes the risk of investing in technology that will soon become obsolete
Identify a characteristic that is a disadvantage of cloud-based hosting?
Loss of control over data location
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.
elastic
In this century, computing technology is now connected to virtually everything. This connectivity will continue to grow for many years. We commonly refer to this as the _______________________.
Internet of Things
Which of the following characteristics is a disadvantage of cloud-based hosting?
It involves high dependency on vendor
Which of the following is a function of an ISP?
It serves as a user’s gateway to the Internet
Which of the following protocols guarantees secure data transmission?
https
A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following terms best describes this activity?
cooperation
Which of the following choices would be used to facilitate synchronous communication between team members?
Virtual meetings like Zoom
The two key characteristics of collaboration are _______ and __________.
Constructive criticism and feedback
Which of the following selections is not one of the four primary purposes of collaboration?
Developing friendships
The first and arguably the most important task for a problem-solving collaborative group is ___________.
Defining the problem
When working on your MIS 2100 class project, my expectations are that you and your group members work _________ with the goal of producing a high-quality deliverable.
collaboratively
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
planning
The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
strategic
The fundamental purpose of the starting phase of a project is ________.
Setting the ground rules for the project and team
One of the most important things to consider regarding people when implementing a change to an IMS system or when deploying a new IMS system is?
Change management
In our textbook and in this course, we divide processes into two broad categories: Structured Process and ___________?
Dynamic processes
Recruiting, Compensation, Assessment, HR Planning are all examples of processes found in the Human Resources department. Collectively, when these processes are bundled up for HR, the grouping is know as a _____________ process.
Work group
The name given to a large-scale information system that spans an entire organization and supports multiple departments and activities is called?
Enterprise information system
Processes are the fabic of an organization. Good information systems can improve an organization’s quality. The two dimensions of process quality mentioned in the textbook are?
Process efficiency and process effectiveness
If an organization has data isolated in different information systems which do not share information then that organization is said to have?
Information silos
The activity of altering existing and designing new business processes to take advantage of new information systems is called?
Business process reengineering
An information system that contains a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer is called?
CRM - Customer Relationship Management System
SAP and ORACLE are two large-scale ERP systems that run many Fortune 100 companies. What does the acronym ERP stand for?
Enterprise resource planning
Which ERP vendor is the world leader in ERP market share?
SAP
As you can imagine, there is considerable amount of work to configure and customize an ERP system for a specific company. To reduce that workload, ERP vendors provide starter kits for specific industries called?
Industry-specific solutions
The 5 components of a Social Media Information System include: Hardware, Software, Data, People and?
procedures
The text mentions three types of dynamic social media systems that are used in Manufacturing and Operations. They include Crowdsourcing, B2C-Business to Consumer, and?
B2B - Business to Business
Karl Marx defined “Capital” as the investment of resources for future profit. What is the definition of “Social Capital”?
The investment in social relations with the expectation of returns in the marketplace
The likelihood that another entity (person or company) in the relationship will do something that benefits our organization is called?
The Strength of the Relationship
When it comes to generating revenue using SMIS, name the the model that offers users basic service for free and then charges a premium for upgrades or advanced features.
Freemium
Metrics that are used to help you identify when you’ve achieved your business goals are called?
KPI - Key Performance Indicators
A software platform that uses social media to facilitate cooperative work of people “within” an organization is called? Remember it uses the company INTRANET.
ESN - Enterprise Social Network
The very first step an organization needs to take when creating a new SMIS - Social Media Information System is to develop and publicize a social media policy.
True
Intel’s 3 Rules of Engagement concerning Social Media Information Systems include: Disclose, Protect, and?
Use common sense
The textbook mentions the use of ____________ which are methods that have been shown to produce successful results in prior implementations. These elements exist in every discipline found in the modern marketplace and are included in many purchased software application systems.
Best Practices
A ________ examines each part of a message and determines whether to let that part pass.
firewall
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.
threat
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
phisher
In information security, which of the following is true about managing risk?
Organizations should implement safeguards that balance the trade-odd between risk and cost
In the context of malware protection, the program code that causes the unwanted actions is called the ________.
payload
When an employee is terminated, IS administrators should receive advance notice so that they can ________.
Remove the user account and password
Which of the following is a critical security function that should be addressed by the senior management of an organization?
Establishing the security policy
________ are false targets for computer criminals to attack.
honeypots
________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection, in the case of wireless networks.
sniffing
The three main components of IT Security include: Principle of Accountability, Principle of Least Privilege, and
Principle of defense in depth
The process of creating a new application begins when the IS department aligns its priorities with the ________.
Organization’s strategy
Which of the following is NOT a responsibility of a systems analyst?
Writing Programs
Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________.
Learn basic computer skills
The ________ must ensure that priorities consistent with the overall organizational strategy are developed, communicate them to the IS department and enforce them.
CIO
The process of hiring another organization to perform a service to save costs, gain expertise, or free management time is called?
outsourcing
Outsourcing can be applied to any element of the MIS model (Hardware, Software, Data, Procedures, People)?
True
Some of the risks associated with outsourcing include: loss of control, loss of intellectual capital, and management change
true
As a primary business user of information systems, you have user rights that include things like access to reliable IT technology, stable network, and a secure computing environment. You also have user ______________ that specify things that you as a user of the systems need to do protect yourself and the company.
responsibilities
There is group of senior managers from major business functions that work with the CIOs to set information system priorities and decide among major IS projects. This group of managers is called a?
Steering team
The group within the Information Technology Division that is responsible for the computing infrastructure, including computers, in-house server farms, networks, and communications media is called?
Operations group
A ________ involves balancing three critical factors: requirements, cost, and time.
trade-off
A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
Business process
A ________ is a person who is well versed in an organization’s strategy and focuses on ensuring that business processes and information systems meet the organization’s competitive strategies.
Business analyst
According to Brooks’ Law, adding more people to a late project will ________.
Create diseconomies of scale
If a defined project is determined to be feasible in the systems development life cycle (SDLC), the next step is to ________.
Form the project team
In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.
activities
In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________.
deliverables
In the system definition phase of the systems development life cycle (SDLC), the first major task for an assembled project team is to ________.
Define system goals and scope
In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business.
pilot
The ________ is a sequence of activities that determine the earliest date by which a project can be completed.
Critical path