Midterm Flashcards

1
Q
Which of the following is NOT considered a core driver of the information age? 
A. information
B. data
C. competitive facts
D. business intelligence
A

C. competitive facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data?
A. information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making
B. raw facts that describe the characteristics of an event or object
C. data converted into a meaningful and useful context
D. skills, experience, and expertise, coupled with information and intelligence, which create a person’s intellectual resources

A

B. raw facts that describe the characteristics of an event or object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following provides an example of information? 
A. What customer number is Bob Smith? 
B. What is product number 12345XX?
C. What is my worst-selling product? 
D. Who is customer number 12345XX?
A

C. What is my worst-selling product?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
What refers to devices that connect directly to other devices?
A. machine-to-machine
B. descriptive analytics
C. predictive analytics
D. information age
A

A. machine-to-machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are business analytics?
A. use techniques that create models indicating the best decision to make or course of action to take
B. use techniques that extract information from data and use it to predict future trends and identify behavioral patterns
C. use techniques that describe past performance and history
D. the scientific process of transforming data into insight for making better decisions

A

D. the scientific process of transforming data into insight for making better decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What data is generated by humans in interaction with computers? 
A. big data
B. machine-generated
C. machine-to-machine
D. human-generated
A

D. human-generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a report?
A. a view of data at a particular moment in time
B. a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention
C. a collection of large complex datasets, including structured and unstructured, which cannot be analyzed using traditional database methods and tools
D. a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information

A

D. a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the correct definition of algorithms?
A. a data value that is numerically distant from most of the other data points in a set of data
B. extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
C. the process of identifying rare or unexpected items or events in a dataset that do not conform to other items in the dataset
D. mathematical formulas placed in software that perform an analysis on a dataset

A

D. mathematical formulas placed in software that perform an analysis on a dataset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In terms of big data, what is velocity?
A. includes the scale of data
B. includes the uncertainty of data, including biases, noise, and abnormalities
C. includes the analysis of streaming data as it travels around the Internet
D. includes different forms of structured and unstructured data

A

C. includes the analysis of streaming data as it travels around the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the correct definition of exploratory data analysis?
A. determines a statistical relationship between variables, often for the purpose of identifying predictive factors among variables
B. classifies or labels an identified pattern in the machine learning process
C. identifies patterns in data, including outliers, uncovering the underlying structure to understand relationships between the variables
D. uses data about people’s behaviors to understand intent and predict future actions

A

C. identifies patterns in data, including outliers, uncovering the underlying structure to understand relationships between the variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following is not a type of organizational information system? 
A. transactional processing system
B. analysis processing system
C. executive information system
D. decisions support system
A

B. analysis processing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Review the following key terms. Which one defines an operational decision that involves situations where established processes offer potential solutions? 
A. unstructured decision
B. optimization analysis decision
C. artificial intelligence decision
D. structured decision
A

D. structured decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
What occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision? 
A. critical success factors
B. structured decisions
C. key performance indicators
D. semi-structured decisions
A

D. semi-structured decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Senior management, presidents, leaders, and executives are all employees at the \_\_\_\_\_ level. 
A. managerial
B. operational
C. strategic
D. all of the answer choices are correct
A

C. strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Market share measures a firm’s external performance relative to that of its competitors. Which of the following represents how a firm measures market share?
A. subtracting the industry’s total sales from the firm’s total sales
B. subtracting competitor’s sales from the firm’s total sales
C. dividing the firm’s sales by the total market sales for the entire industry
D. multiplying the firm’s sales by the industry’s total sales

A

C. dividing the firm’s sales by the total market sales for the entire industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is a type of efficiency MIS metric? 
A. web traffic
B. financial transactions
C. conversion rates
D. customer satisfaction
A

A. web traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do usability effectiveness MIS metrics measure?
A. the amount of time a system takes to perform a transaction
B. the number of hours a system is available for users
C. the number of customers an organization “touches” for the first time and persuades to purchase its products or services
D. the ease with which people perform transactions and find information

A

D. the ease with which people perform transactions and find information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the quantifiable metrics a company uses to evaluate progress toward critical success factors?
A. none of the answer choices are correct
B. critical success factors
C. key performance indicators
D. return on investment

A

C. key performance indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of decision is the following: What was the turnover rate for employees?
A. all of the answer choices are correct
B. effectiveness decision
C. none of the answer choices are correct
D. efficiency decision

A

B. effectiveness decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
What rotates data to display alternative presentations of the data? 
A. what-if analysis
B. drill-down
C. sensitivity analysis
D. pivot
A

D. pivot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Which of the following is NOT considered a core driver of the information age? 
A. variables
B. knowledge
C. information
D. business intelligence
A

A. variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cheryl Steffan is the operations manager for Nature’s Bread Company, which specializes in providing natural products for health-conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company’s profitability and forecast production for the next day. Which of the following is an example of a piece of data Cheryl would be using to successfully perform her job?
A. best-selling product changes when Tony, the best baker, is working
B. compare the costs of supplies, including energy, over the last five years to determine the best-selling product by month
C. best-selling product by day
D. Craig Newmark is customer number 123456

A

D. Craig Newmark is customer number 123456

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
What extracts information from data and uses it to predict future trends and identify behavioral patterns? 
A. machine-to-machine
B. Internet of Things
C. predictive analytics
D. 4th industrial revolution
A

C. predictive analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
What resides within the minds of members, customers, and colleagues and includes physical structures and recorded media? 
A. business analytics
B. knowledge facilitators
C. predictive analytics
D. knowledge assets
A

D. knowledge assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
What type of report is created based on data that does not change? 
A. variable report
B. static report
C. structured report
D. dynamic report
A

B. static report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
What is a data value that is numerically distant from most of the other data points in a set of data?
A. outlier
B. data scientist
C. anomaly detection
D. algorithms
A

A. outlier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is the correct definition of pattern recognition analysis?
A. determines a statistical relationship between variables, often for the purpose of identifying predictive factors among variables
B. uses data about people’s behaviors to understand intent and predict future actions
C. classifies or labels an identified pattern in the machine learning process
D. Identifies patterns in data, including outliers, uncovering the underlying structure to understand relationships between the variable

A

C. classifies or labels an identified pattern in the machine learning process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Which of the following is an important challenge facing managers today?
A. making business decisions
B. all of the answer choices are correct
C. solving business problems
D. competing to win in today's market
A

B. all of the answer choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Jenny? 
A. managerial level
B. owner level
C. strategic level
D. operational level
A

A. managerial level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the typical timeframe for decisions at the operational level?
A. day-to-day decisions
B. none of the answer choices are correct
C. monthly decisions
D. yearly decisions

A

A. day-to-day decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What types of metrics measure customer satisfaction?
A. both efficiency and effectiveness MIS metrics
B. efficiency MIS metrics
C. effectiveness MIS metrics
D. both ROI and market share

A

C. effectiveness MIS metrics

32
Q
A common mistake that many managers make is focusing on only one type of metrics because they are easier to measure. Which type of metrics do they focus on? 
A. efficiency MIS metrics
B. effectiveness MIS metrics
C. endurance MIS metrics
D. product sales metrics
A

A. efficiency MIS metrics

33
Q
What type of decision is the following: How many temporary employees do we need to hire for the holiday season? 
A. operational decision
B. government decision
C. strategic decision
D. analytics decision
A

A. operational decision

34
Q
What captures transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information? 
A. online analytical processing
B. decision support system
C. online transaction processing
D. transaction processing system
A

C. online transaction processing

35
Q

What is a pie chart?
A. a graphical display of data using bars at different heights; it is similar to a bar chart, but a histogram groups numbers into ranges
B. a small, embedded line graph that illustrates a single trend
C. a type of graph in which a circle is divided into sectors that each represents a proportion of the whole
D. a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent

A

C. a type of graph in which a circle is divided into sectors that each represents a proportion of the whole

36
Q
Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
A. digital Darwinism
B. joint venture
C. sole proprietorship
D. collective intelligence
A

A. digital Darwinism

37
Q
Which term describes the World Wide Web during its first few years of operation between 1991 and 2003?
A. open source
B. web 1.0
C. e-shop
D. all of the above
A

B. web 1.0

38
Q

What caused Polaroid to go bankrupt?
A. it failed to have innovative technology and a captive customer base
B. one-hour film processing and digital cameras stole its market share
C. Internet websites such as Flickr and Facebook stole its market share
D. people who want instant access to their pictures also want a third party involved

A

B. one-hour film processing and digital cameras stole its market share

39
Q

Which of the following is a reason for the growth of the World Wide Web?
A. all of the answer choices are correct
B. the microcomputer revolution
C. advancements in networking hardware
D. web pages being easy to create and flexible

A

A. all of the answer choices are correct

40
Q
What is the process of collecting, analyzing, and reporting aggregate data about which pages a website visitor visits - and in what order? 
A. clickstream analytics
B. heat map
C. website e-business analytics
D. website traffic analytics
A

A. clickstream analytics

41
Q
Which of the below would not be considered a company operating in the long tail of a typical sales curve? 
A. iTunes
B. Amazon
C. Netflix
D. Walmart
A

D. Walmart

42
Q
What is the exact pattern of a consumer's navigation through a site? 
A. hypertext
B. web data
C. clickstream data
D. web browsing
A

C. clickstream data

43
Q

What are the four main types of e-business models?
A. business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer
B. ebusiness-to-ebusiness, ebusiness-to-econsumer, econsumer-to-ebusiness, and econsumer-to-econsumer
C. business-to-borrower, business-to-consumer, consumer-to-business, and consumer-to-consumer
D. business-to-business, business collaboration, collective business, and consumer-to-consumer

A

A. business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer

44
Q
What creates the illusion that a large number of potential customers are clicking the advertiser's links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser? 
A. click fraud
B. botnets
C. affiliate program
D. hitbots
A

D. hitbots

45
Q
Which of the following is not a valid form of an e-business revenue model? 
A. advertising fees
B. value-added services fees
C. subscription fees
D. service provider
A

D. service provider

46
Q
Which of the following represents the two fundamental building blocks that protect organizational information? 
A. security and sales
B. ethics and technology
C. ethics and security
D. human resources and security
A

C. ethics and security

47
Q
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution? 
A. privacy
B. pirated software
C. digital rights management
D. counterfeit software
A

C. digital rights management

48
Q

Which of the following represents the definition of information compliance?
A. the ability to comply with software
B. the verbalization of information governance in a company’s policies and procedures
C. the understanding of technology
D. the act of conforming, acquiescing, or yielding information

A

D. the act of conforming, acquiescing, or yielding information

49
Q
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry? 
A. Child Online Protection Act
B. e-discovery
C. pirated software
D. digital rights management
A

B. e-discovery

50
Q

What is pirated software?
A. the unauthorized use, duplication, distribution, or sale of copyrighted software
B. a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
C. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
D. the measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals

A

A. the unauthorized use, duplication, distribution, or sale of copyrighted software

51
Q
Which policy contains general principles regarding information privacy? 
A. information privacy policy
B. antispam policy
C. Internet use policy
D. acceptable use policy
A

A. information privacy policy

52
Q
Which of the following policies details the extent to which email messages may be read by others? 
A. email confidential policy
B. email privacy policy
C. spam policy
D. right to be forgotten policy
A

B. email privacy policy

53
Q
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard? 
A. web log
B. spyware
C. hardware key logger
D. adware
A

C. hardware key logger

54
Q
What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on a website? 
A. click-fraud
B. cyberbullying
C. cybervandalism
D. competitive click-fraud
A

B. cyberbullying

55
Q
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser? 
A. cyberbullying
B. cybervandalism
C. click-fraud
D. competitive click-fraud
A

C. click-fraud

56
Q
Which of the following produces an improved product customers are eager to buy, such as a faster car or larger hard drive? 
A. reputation system
B. disruptive technology
C. sustaining technology
D. personalization
A

C. sustaining technology

57
Q

What is the World Wide Web Consortium?
A. all of the answer choices are correct
B. the Internet protocol web browsers use to request and display web pates using universal resource locators
C. delivers everything from animation to graphics and music to movies
D. an international community that develops open standards to ensure the long-term growth of the web

A

D. an international community that develops open standards to ensure the long-term growth of the web

58
Q

What is information richness?
A. a global public network of computer networks that pass information from one to another using common computer protocols
B. refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information
C. occurs when those with access to technology have great advantages over those without access to technology
D. refers to the number of people a business can communicate with on a global basis

A

B. refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information

59
Q

What are website e-business analytics?
A. uses clickstream data to determine the effectiveness of the site as a channel-to-market
B. uses clickstream data to determine the efficiency of the site for the users and operates at the server level
C. a two-dimensional representation of data in which values are represented by colors
D. the process of collecting, analyzing, and reporting aggregate data about which pages a website visitor visits - and in what order

A

A. uses clickstream data to determine the effectiveness of the site as a channel-to-market

60
Q
What is the best way to measure a company's e-business success? 
A. clickstream data
B. effective MIS metrics
C. all of the answer choices are correct
D. interactivity
A

C. all of the answer choices are correct

61
Q
What is another name for an e-shop? 
A. C2C
B. e-store or e-tailer
C. e-customer
D. c-consumer
A

B. e-store or e-tailer

62
Q

For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business, Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual e-business that acts like a search engine but only focuses on the real estate industry. The main revenue source for this e-business will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry’s new business?
A. advertising fees
B. license fees
C. subscription fees
D. none of the answer choices are correct

A

C. subscription fees

63
Q
What generates revenue each time a user clicks on a link to a retailer's website? 
A. pay-per-click
B. pay-per-conversion
C. pay-per-call
D. organic search
A

A. pay-per-click

64
Q
What is the legal protection afforded an expression of an idea, such as a song, book, or video game? 
A. intellectual property
B. copyright
C. privacy
D. confidentiality
A

B. copyright

65
Q

Which of the following represents the definition of information governance?
A. a method or system of government for information management or control
B. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D. the act of conforming, acquiescing, or yielding information

A

A. a method or system of government for information management or control

66
Q
What was passed to protect minors from accessing inappropriate material on the Internet? 
A. pirated software
B. Child Online Protection Act
C. digital rights management 
D. e-discover
A

B. Child Online Protection Act

67
Q
Which of the following terms refers to a contractual stipulation that ensures that e-business participants do not deny their online action? 
A. compliance
B. digital trust
C. nonrepudiation
D. noncommittal
A

C. nonrepudiation

68
Q
Employees need to understand that corporate email is solely owned by the...
A. company
B. human resources department
C. individual user
D. individual user's department
A

A. company

69
Q
What program, when installed on a computer, records every keystroke and mouse click? 
A. key logger software
B. cookie
C. spyware
D. adware
A

A. key logger software

70
Q
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link? 
A. cyberbullying
B. click-fraud
C. cybervandalism
D. competitive click-fraud
A

D. competitive click-fraud

71
Q

Which of the following represents the definition of information secrecy?
A. a method or system of government for information management or control
B. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D. the act of conforming, acquiescing, or yielding information

A

C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

72
Q

Which of the following represents the definition of information management?
A. a method or system of government for information management or control
B. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D. the act of conforming, acquiescing, or yielding information

A

B. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

73
Q

What is digital trust?
A. the unauthorized use, duplication, distribution, or sale of copyrighted software
B. a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
C. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
D. the measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals

A

D. the measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals

74
Q

What are website traffic analytics?
A. uses clickstream data to determine the effectiveness of the site as a channel-to-market
B. uses clickstream data to determine the efficiency of the site for the users and operates at the server level
C. a two-dimensional representation of data in which values are represented by colors
D. the process of collecting, analyzing, and reporting aggregate data about which pages a website visitor visits - and in what order

A

B. uses clickstream data to determine the efficiency of the site for the users and operates at the server level

75
Q
Which of the following is NOT a form of e-business?
A. content provider
B. service provider
C. affiliate
D. portal
A

C. affiliate