ISYS 363 Ch. 1 Flashcards
“My Starbucks Idea,” which provides customers a location to post suggestions, is a type of ____________ innovation.
open
simulation
closed
socializing
focused
open
Today, computing has changed from an activity primarily focused on _______ to one that encompasses many social and casual activities.
estimating market growth
playing games
automating work
posting status updates
simulating products
automating work
Using a Fitbit to log activities is potentially the beginning of ___________, which is the notion of logging all aspects of life.
the life-o-meter
a mashup
e-business
the quantified self
total mobility
the quantified self
Which of the following IT megatrends is concerned with the networked connection of a wide array of devices using the Internet?
Mobile computing
Cloud computing
Social media
Big Data
The Internet of Things
The Internet of Things
Which of the following IT megatrends is concerned with the generation, collection, and analysis of vast quantities of unstructured data?
Cloud computing
Access Database
Big Data
Mobile computing
Social media
Big Data
The fact that the value of a company such as eBay increases as more people join and use eBay is characterized as the _________.
network effect
strategic effect
social effect
scarcity effect
competitive advantage effect
network effect
Using sensors to improve supply chains to increase operational efficiency is part of the __________________.
Supply Chain Internet of Things (SCIoT)
Industrial Internet of Things (IIoT)
Sensor Internet of Things (SIoT)
Efficiency Internet of Things (EIoT)
Operational Internet of Things (OIoT)
Industrial Internet of Things (IIoT)
Having to deal with taxes, tariffs, and import and export regulations is a(n) ________ challenge associated with operating in the digital world.
cultural
infrastructure
time zone difference
regulatory
demographic
regulatory
Information technology (IT) includes:
telecommunications networks and software.
hardware, software, and data.
hardware, data, and telecommunications networks.
hardware, software, and telecommunications networks.
hardware, software, data, and telecommunications networks.
hardware, software, and telecommunications networks.
Which of the following statements correctly describes the relationship between data and information?
Information is raw facts with no meaning in and of themselves, whereas data is information that has been transformed to be useful.
Data and information are completely unrelated concepts.
Data and information are exactly the same thing.
None of these statements correctly describes the relationship between data and information.
Data are raw facts with no meaning in and of themselves, whereas information is data that has been transformed to be useful.
Data are raw facts with no meaning in and of themselves, whereas information is data that has been transformed to be useful.
________ is a body of governing procedures, such as guidelines or rules, which are used to organize or manipulate data to make it suitable for a given task.
Experience
Critical thinking
Information
Perspective
Knowledge
Knowledge
A list of potential donors who live in Seattle and enjoy sports would be considered ___________.
data overload
data
information overload
SQL
information
information
The job description for a _________ is “responsible for analyzing business requirements and selecting information systems that meet those needs.”
Systems analyst
Webmaster
Software developer
IS auditor
Systems programmer
Systems analyst
The job description for the _______ is “responsible for strategic planning and IS use throughout the firm.”
Chief Information Officer (CIO)
Database administrator
IS security manager
IS manager
Chief Digital Officer (CDO)
Chief Information Officer (CIO)
Which of the following competency areas sets an IS professional apart from others and may help protect a person’s job from the threat of outsourcing.
Business competency
Networking
Problem solving
Systems integration
Development methodologies
Business competency
According to your textbook, a degree in information systems serves as a precursor to becoming a ___________, which is a position experiencing the highest demand in business today.
data scientist
DOS programmer
video rental manager
historian
COBEL administrator
data scientist
The category of information system that is used to process transactions and generate data is ________.
executive information systems
management information systems
business intelligence systems
decision support systems
transaction processing systems
transaction processing systems
The type of information system that includes methods and systems for analyzing data warehouses to better understand various aspects of a business is a(n) _______.
intelligent system
business intelligence system
customer relationship management system
office automation system
knowledge management system
business intelligence system
Information systems such as those created by Federal Express are created with the intent of gaining a(n) _______.
foothold
innovative edge
competitive advantage
disruptive wedge
temporary edge
competitive advantage
Issues associated with computer ethics include all of the following except:
information property rights
information privacy
information redundancy
information accuracy
information accessibility
information redundancy
The computer ethics issue of ________ is concerned about who owns the information that is stored about people.
information property rights
information privacy
information redundancy
information accessibility
information accuracy
information property rights
Which U.S. Federal Trade Commission document is intended to encourage businesses to make their privacy policies readily available to consumers?
Final Privacy Statements
Fair Information Practice Principles
Forecasts of Privacy Principles
Free Information Policies
Posted Protective Practices
Fair Information Practice Principles
Data privacy statements on an organization’s Web site satisfy the ________ fair information practice principle.
notice/awareness
access/participation
integrity/security
enforcement/redress
choice/consent
notice/awareness
When a company allows a customer to opt-in and/or opt-out with respect to the data it collects, it is implementing the _________ fair information practice principle.
notice/awareness
access/participation
enforcement/redress
integrity/security
choice/consent
choice/consent
Which of the following is NOT a recommended guideline by the Computer Ethics Institute for the ethical use of computers?
Do not snoop in other people’s files.
Do not copy or use proprietary software without paying for it.
Do not use other people’s computer resources without authorization or compensation.
Do not think about the social consequences of programs you write or systems you design.
Do not use a computer to harm others.
Do not think about the social consequences of programs you write or systems you design.