Final Flashcards

1
Q

Which of the following input techs has been historically used for entering text and numbers on computers?

A

QWERTY keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following encoding formats is the standard coding for e-mail over the internet?

A

MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ is a type of program that translates a program’s source cose into machine language and executes one statement at a time

A

interpreter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which of the following scanning techs is used by the banking industry to read data, account numbers, bank codes, and check numbers on preprinted checks?

A

magnetic ink character recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A(n) ______ occurs if a read/write head for some reason touches one of the disks in a hard drive, leading to a loss of data.

A

head crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a group of inexperienced computer operators cause the loss of valuable info. this info loss can be classified as one caused due to _____

A

accidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

wikileaks is a famous not-for-profit whistle-blowing website. mastercard and visa stopped payments to wikileaks after a series of leaks by the site. an anon group attacked the websites of both mastercard and visa reacting to this. these attackers, who tried to protect wikileaks, can be called ______

A

hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the official website of the iranian govt was made unreachable by foreign activists seeking to help the opposition parties during the 2009 iranian election protests. web sites belonging to many iranian news agencies were also made unreachable by the activists. this cyber protest is an example of a(n) ______ attack

A

denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

identify the term that represents the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.

A

cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a break even analysis

A

identifies at what point tangible benefits equal tangible costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which of the following is true for tangible costs?

A

they are relatively easy to quantify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

processing logic is often expressed in ______, which is independent of the actual programming language being used

A

pseudocode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the total cost of ownership of a system refers to _______

A

the total cost of acquisition and all costs associated with use and maintenance of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

system efficiency is the extent to which a system _____

A

enables people to do things faster or at lower cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the gap between those individuals in our society who are computer literate and have access to info resources like the internet and those who do not is referred to as the _____

A

digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

info accessibility focuses on ___

A

defining what info a person or org has the right to obtain about others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

doing things faster is associated with info systems for _____

A

automating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______ decisions can be programmed directly into operational info systems so sthat they can be made with little or no human intervention

A

structured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ is the process of analyzing an org’s activities to determine where value is added to products and/or services and what costs are incurred for doing so

A

value chain analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

which of the following statements is true about firms pursuing a home replication strategy?

A

the focus their domestic customers’ needs and wants and merely export their products to generate additional sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____ are techs, products, or services that eventually surpass the existing dominant tech or product in a market

A

disruptive innovations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the prediction that the number of transisters on a chip would double about every 2 years is known as _____

A

moores law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

companies following a ____ business strategy choose to operate solely in the traditional physical markets

A

brick and mortar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the ability to independently learn new techs as they emerge and assess their impact on your work and life is called _______

A

computer fluency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

which of the following refers to having certain functions performed by the same company but in a different country?

A

offshoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

____ are activities orgs perform in order to reach their business goals, including core activities that transform inputs and produce outputs, and supporting activities that enable the core activities to take place

A

business processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

the managerial level of the org is also known as the ______ level

A

executive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

with reference to assessing value for the IS infrastructure, architectural value is derived from ______

A

an investment’s ability to extend the infrastructure’s capabilities to meet business needs today and in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

________: the hardware, software, communication and collaboration networks, data, facilities, and human resources used by orgs to support their decision making, business processes, and competitive strategy

A

info system infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

any input your computer receives is digitized and then is processed by the CPU. which of the following explains the meaning of the word “digitized” in the preceding sentence?

A

translated into binary code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

using _____, multiple virtual machines, each with its own applications, can be configured to run on one single computer, enabling the IT service providers to better utilize their resources

A

virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

procedures that different computers follow when they transmit and receive data are called:

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

there are two forms of transmission media used in networks: cable and _____ media

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

electronic commerce is used to conduct business with business partners such as suppliers and intermediaries. this form of EC is commonly referred to as ____ electronic commerce

A

business to business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

which of the following actions explains mass customization?

A

firms tailor their products and services to meet a customer’s particular needs on a large scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

_______ refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers

A

reintermediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

prior to the introduction of the internet and web, the secure communication of proprietary info in business to business electronic commerce was facilitated using _____

A

electronic data interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

which of the following explains web analytics?

A

analyzing web surfers’ behavior in order to improve website performance

40
Q

which of the following is an example of business-to-consumer electronic commerce?

A

reuben buys a shoe on yebhi.com

41
Q

which of the following statements is true about open source software?

A

these programs’ source code is freely available for use and/or modification

42
Q

______ are collections of related data organized in a way that facilitates data searches

A

databases

43
Q

a _____ strategy can also be referred to as a middle of the road strategy

A

best-cost provider

44
Q

which of the following is a weakness of the global business strategy?

A

inability to react to local market conditions

45
Q

primary storage is also known as

A

volatile memory

46
Q

______ : the utility that the product/service has to offer to customers (component of a business model)

A

value proposition

47
Q

the process of connecting separate info systems and data to improve business processes and decision making is known as _____

A

systems integration

48
Q

_____ are referred to as virtual companies because they have no physical stores

A

click only

49
Q

a ______ is a professional who is relatively well educated and creates, modifies, and/or synthesizes knowledge as a fundamental part of his/her job

A

knowledge worker

50
Q

a long unformatted number might be a phone number, social security number, or bank account number. when dashes, commas, or some other formatting features are added, the number becomes useful and meaningful. thus, data has been transformed into

A

information

51
Q

which type of info system is used to support day to day business event data at the operational level of the org

A

transaction processing system

52
Q

outsourcing is:

A

when jobs are performed by employees of another firm, usually at less cost

53
Q

info systems are combinations of _____ that people build and use to collect, create, and distribute useful data, typically in organizational settings

A

(all of the above) hardware, software, and telecommunications networks

54
Q

_______ is the collection of programs that control the basic operations of computer hardward

A

systems software

55
Q

the phenomenon of cutting out the middleman and reaching customers more directly and efficiently is known as _______

A

disintermediation

56
Q
  1. A combination of hardware, software, and telecommunication networks that people build and use to collect, create, and distribute data.
  2. Term coined by Peter Drucker to refer to a society in which education is the cornerstone of society and there is an increase in importance of knowledge workers.
  3. The integration of economies throughout the world, enabled by innovation and technological progress.
  4. Set of strategies employed by organizations operating in different global markets.
  5. Individuals’ use of powerful search engines on the Internet to build their own personal supply chain of information, knowledge, and entertainment.
  6. The ability of an organization to learn from past behavior and information, improving as a result.
  7. The leveraging of digital technologies to provide free goods and services to customers as a business strategy for gaining a competitive advantage.
  8. The set of primary and support activities in an organization where value is added to a product or service.
  9. The location of relatively small servers close to the end users to save resources in terms of network bandwidth and provide improved access time.
  10. The hardware, software, networks, data, facilities, human resources, and services used organizations to support their decision making, business processes, and competitive strategy.
A
\_\_7\_\_	Freeconomics
\_\_9\_\_	Edge Computing
\_\_8\_\_	Value Chain
\_\_5\_\_	In-forming
\_\_4\_\_	International Business Strategy
\_\_3\_\_	Globalization
\_\_1\_\_	Computer-based Information Systems
\_\_6\_\_	Organizational Learning
\_\_10\_\_	Information Systems Infrastructure
\_\_2\_\_	Knowledge Society
57
Q

in todays business environment, project teams comprise highly specialized members, many of whom are not collocated. _______ are comprised of members from different geographic areas

A

virtual teams

58
Q

the network effect refers to the notion that the value of a network is dependent on ______

A

the number of other users

59
Q

business intelligence is

A

it is the use of info systems to gather and analyze info from internal and external sources in order to make better business decisions

60
Q

taking entities as tables, each column is a(n) _________

A

attribute

61
Q

in DBMS, data are kept separate from the applications’ programming code. this means that ______

A

database does not need to be changed if a change is made to an application

62
Q
  1. Allows users to publish, edit, version track, and retrieve digital information.
  2. Tools enabling people to voice thoughts through relatively short “status updates”.
  3. The distribution of digital media, such as audio or video files via syndication feeds for playback on digital media players.
  4. Augments business intelligence by using predictive analysis to help identify trends or predict business outcomes.
  5. Refers to the display of complex data relationships using a variety of graphical methods, enabling managers to quickly grasp the results of the analysis.
  6. A software architecture in which business process are broken down into individual components (or services) that are designed to achieve the desired results for the service consumer.
  7. An information system that integrates business activities across departmental boundaries, including planning, manufacturing, sales, marketing and so on.
  8. Large fluctuations in suppliers’ forecasts caused by small fluctuations in demand for the end product and the need to create safety buffers.
  9. The use of electromagnetic energy to transmit information between a reader (transceiver) and a processing device, used to replace bar codes and bar code readers.
  10. A business model in which suppliers to a manufacture (or retailer) manage the manufacture’s (or retailer’s) inventory levels based on pre established service levels.
A
\_\_2\_\_	Social Presence Tools
\_\_10\_\_	Vendor-Managed Inventory (VMI)
\_\_5\_\_	Visualization
\_\_9\_\_	Radio-Frequency Identification (RFID)
\_\_8\_\_	Bullwhip Effect
\_\_7\_\_	Enterprise Resource Planning (ERP)
\_\_1\_\_	Content Management System
\_\_3\_\_	Podcasting
\_\_6\_\_	Service-Oriented Architecture (SOA)
\_\_4\_\_	Business Analytics
63
Q

in the ____ process, goods are produces based on forecasts and are stores in a warehouse and sales orders are then fulfilled from the inventory

A

make to stock

64
Q

_____ is the extent to which a company’s supply chain is focusing on minimizing procurement, production, and transportation costs, sometimes by sacrificing excellent customer service

A

supply chain efficiency

65
Q

organizations that effectively utilize _____ can more easily customize marketing campaigns from the segment level to even the individual customer

A

analytical CRM

66
Q

a(n) ______ is an integrated suite of business applications for virtually every dept, process, and industry, allowing companies to integrate info across ops on a company-wide basis using one large database.

A

enterprise system

67
Q

which of the following statements about an RFID passive tag is true?

A

the are small and inexpensive

68
Q

a common way to represent a data model is in a(n) _________

A

entity-relationship diagram

69
Q

in service-oriented architecture, _____

A

business processes are broken down into individual components or services

70
Q

a major benefit of social software is the ability to harness the “wisdom of crowds,” which is also referred to as _____

A

collective intelligence

71
Q

which of the following web 2.0 applications has been classified as the “amateurization” or journalism?

A

blogs

72
Q

______ is the distribution of digital media, such as audio or video filed via syndication feeds for playback on digital media players

A

netcasting

73
Q

which of the following statements is true about the online analytic processing cube

A

it is a data structure allowing for multiple dimensions to be added to a traditional two-dimension table

74
Q

the processes associated with the acquiring of goods from external vendors are together referred to as the ____ process

A

procure to pay

75
Q

in the ____ process, goods are produced based on forecasts and are stored in a awarehouse and sales orders are then fulfilled from the inventory

A

make-to-stock

76
Q

human resource activities _____

A

is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them

77
Q

a(n) ____ info flow related to the information that is produced by the company and sent along to another org

A

downstream

78
Q

____ is a systemative, structured improvement approach by all or part of an org whereby people critically examine, rethink, and redesign business processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle time, or cost

A

business process management

79
Q

the term _____ is commonly used to refer to a collection of companies and processes involved in moving a product from the suppliers of raw materials to the customer

A

supply chain

80
Q

which of the following statement about just-in-time strategies is true?

A

companies using this strategy are trying to optimize their ordering quantities such that parts or raw material arrive just when they are needed from production

81
Q

___ is a business model in which the suppliers to a manufacturer manager the manufacturer’s inventory levels based on the preestablished service levels

A

vendor-managed inventory

82
Q

which of the following is one of the two main objectives of info systems that focus on improving supply chains (SCM)?

A

accelerating product development and innovation

83
Q

___ tools help a company in the execution of the CRM strategy by improving the management of promotional campaigns

A

enterprise marketing management

84
Q

_____ integrates data from various operational systems

A

data warehouse

85
Q

package software is ____

A

used for standardized, repetitive tasks

86
Q

____ involves the development of various resource plans to support the efficient and effective production of goods and services

A

supply chain planning

87
Q

____ focuses on delivering products or services to consumers as well as warehousing, delivering, invoicing, and payment collection

A

distribution planning

88
Q

which of the following factors differentiates asynchronous communication from synchronous communication?

A

coordination in time

89
Q

which of the following facilitates real-time written conversations?

A

instant messaging

90
Q

which of the following statements is true about exception reports?

A

they highlight situations that are out of the normal range

91
Q

___ is the ability of a web site to attract and keep visitors

A

stickiness

92
Q

_____ support the important internal activities of the organization for producing their products and services

A

ERP core components

93
Q

to finalize the data model in order to actually build the database, a process called _____ is used to make sure the database will operate efficiently

A

normalization

94
Q

_____ take the concept of real-time communication a step further by allowing people to communicate using avatars

A

virtual worlds

95
Q

____ is the creation of goods or services by self-organizing communities

A

peer production

96
Q

______ is a phenomenon where companies use everyday people as a cheap labor force

A

crowdsourcing