Final exam study guide Flashcards

1
Q

Which of the following accurately describes the five-component framework of information systems?

A

computer hardware, software, data, procedures, and people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

A

Systems thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following types of skills is most likely be outsourced to the lowest bidder?

A

Accounting skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following best defines Management Information Systems (MIS)?

A

The management and use of information systems to help organizations achieve their goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Automation moves work from people to machines. However, it can also _________________ the complexity of the system and require more time for change.

A

Increase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data by itself is information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Characteristics of good information include: It must be accurate, timely, relevant, sufficient, and?

A

Worth the cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The most important component in the five-component model is?

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ability to make and manipulate models is called?

A

Abstract reasoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A new computer class forms roughly each decade is a statement of?

A

Bell’s Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The 5 forces model to determine industry structure includes: bargaining power of customers, bargaining power of suppliers, threats of new entrants, rivalry among existing firms and?

A

Threat of substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The amount of money a customer is willing to pay for a product or service is called?

A

value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The difference between the value of a product or service and its associated cost is called?

A

margin or profit margin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The primary activity associated with labeling and shipping products is called?

A

outbound Logistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you view a “swim lane” chart to understand the flow of information across a company, you are looking at what type of model?

A

bpm-business process model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three main ways to improve a product or service position in the marketplace include: Create a new product or service, enhance the existing product or service, and?

A

differentiate the product or service in the marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Another name for improving the position of a product or service in the marketplace is to?

A

gain competitive advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the strategy called when organizations “lock” customers in by making it difficult or expensive to switch to other products?

A

establishing High switching cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you make it harder or more expensive for a competitor to operate in your marketplace, it is called raising?

A

barriers to entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do you need to accomplish to differentiate your product or service from the competition?

A

make some type of improvement in the product or service, decrease costs, improve transportation, Etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

A

Supervised data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In ________, statistical techniques can identify groups of entities that have similar characteristics.

A

cluster analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization’s BI data.

A

data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, “If they’re buying X, sell them Y” or “If they’re buying Y, sell them X.”

A

cross-selling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Push publishing delivers business intelligence ________.

A

according to a schedule or as a result of an event or particular data condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

RFM analysis is used to analyze and rank customers according to their ________.

A

purchasing patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

________ is defined as information containing patterns, relationships, and trends of various forms of data.

A

business intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following statements is true about data marts?

A

data Marts address the needs of a particular department or functional area of a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following statements is true about unsupervised data mining?

A

analysis do not create a model or hypothesis before running the analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following selections is not completed during data acquisition of the BI process?

A

data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Every computer contains a component that is considered the “Brain” of the machine. It is within this component that instructions are processed. The name of this component is?

A

CPU-central processing unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

All computers include storage hardware which is used to to save data and programs. 21st century computers use a storage media that is faster than previous media because it stores information using nonvolatile electronic circuits. What is the name of the storage media commonly found in computers today?

A

SSD - solid state disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the name of the binary digit which can either be “on” or “off” that is the building block for all computer information?

A

BIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The name of a disruptive force (technology) that has the power to change both our personal and professional lives is? It involves the idea that objects are becoming connected to the Internet and to each other around the globe.

A

IoT - Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Computer components are said to be “volatile” if they loose their contents when the power is shut off.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is AR - Augmented Reality?

A

AR is the altering of Reality by overlaying digital information on real-World objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Cryptocurrencies are considered a potential disruptive force in today’s economy.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The computer program that controls all of the computers resources is called?

A

OS - operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Software that performs a service or function is called?

A

Application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

When you commonly purchase software, you are not actually buying it. Instead, you are buying a license to use that program. If a company elects to provide specific software for all of their employees, they may elect to purchase a?

A

site license

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

______ is the standard language for inserting, updating, and deleting data in a database.

A

SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Phone number, email address, first and last name, are all examples of ___________ because they describe the characteristics of an entity.

A

attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In the following image, the VEND_CODE in the PRODUCT table represents a(n) __________ because it creates the logical connection between the two tables.

A

Foreign key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Every table in a normalized database has ________.

A

A single theme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Albert creates a relational database to store employee performance statistics. He stores each employee’s data in independent rows and creates a column named “Employee Number” to assign unique numbers to each employee. This column is referred to as a(n) ________.

A

Primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A data integrity problem will occur only if ________.

A

Data are duplicated in a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A(n) ________ is a program used to create, process, and administer a database.

A

Database management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on a daily basis, and employee name. These aspects that Brad wants to track are called ________.

A

entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

________ refers to data collections that are characterized by huge volume, rapid velocity, and great variety.

A

BigData

50
Q

________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.

A

Users

51
Q

Smaller than a mainframe computer but larger than a PC, the _________________ was developed in the 1970s to give corporate departments and small companies direct access to computers.

A

Minicomputer

52
Q

A(n) ________ uses the Internet to create the appearance of private, secure connections.

A

VPN

53
Q

Cloud resources are ________ because many different organizations use the same physical hardware.

A

pooled

54
Q

Compared to in-house hosting, cloud-based hosting ________.

A

Minimizes the risk of investing in technology that will soon become obsolete

55
Q

Identify a characteristic that is a disadvantage of cloud-based hosting?

A

Loss of control over data location

56
Q

The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.

A

elastic

57
Q

In this century, computing technology is now connected to virtually everything. This connectivity will continue to grow for many years. We commonly refer to this as the _______________________.

A

Internet of Things

58
Q

Which of the following characteristics is a disadvantage of cloud-based hosting?

A

It involves high dependency on vendor

59
Q

Which of the following is a function of an ISP?

A

It serves as a user’s gateway to the Internet

60
Q

Which of the following protocols guarantees secure data transmission?

A

https

61
Q

A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following terms best describes this activity?

A

cooperation

62
Q

Which of the following choices would be used to facilitate synchronous communication between team members?

A

Virtual meetings like Zoom

63
Q

The two key characteristics of collaboration are _______ and __________.

A

Constructive criticism and feedback

64
Q

Which of the following selections is not one of the four primary purposes of collaboration?

A

Developing friendships

65
Q

The first and arguably the most important task for a problem-solving collaborative group is ___________.

A

Defining the problem

66
Q

When working on your MIS 2100 class project, my expectations are that you and your group members work _________ with the goal of producing a high-quality deliverable.

A

collaboratively

67
Q

A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.

A

planning

68
Q

The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.

A

strategic

69
Q

The fundamental purpose of the starting phase of a project is ________.

A

Setting the ground rules for the project and team

70
Q

One of the most important things to consider regarding people when implementing a change to an IMS system or when deploying a new IMS system is?

A

Change management

71
Q

In our textbook and in this course, we divide processes into two broad categories: Structured Process and ___________?

A

Dynamic processes

72
Q

Recruiting, Compensation, Assessment, HR Planning are all examples of processes found in the Human Resources department. Collectively, when these processes are bundled up for HR, the grouping is know as a _____________ process.

A

Work group

73
Q

The name given to a large-scale information system that spans an entire organization and supports multiple departments and activities is called?

A

Enterprise information system

74
Q

Processes are the fabic of an organization. Good information systems can improve an organization’s quality. The two dimensions of process quality mentioned in the textbook are?

A

Process efficiency and process effectiveness

75
Q

If an organization has data isolated in different information systems which do not share information then that organization is said to have?

A

Information silos

76
Q

The activity of altering existing and designing new business processes to take advantage of new information systems is called?

A

Business process reengineering

77
Q

An information system that contains a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer is called?

A

CRM - Customer Relationship Management System

77
Q

SAP and ORACLE are two large-scale ERP systems that run many Fortune 100 companies. What does the acronym ERP stand for?

A

Enterprise resource planning

78
Q

Which ERP vendor is the world leader in ERP market share?

A

SAP

79
Q

As you can imagine, there is considerable amount of work to configure and customize an ERP system for a specific company. To reduce that workload, ERP vendors provide starter kits for specific industries called?

A

Industry-specific solutions

80
Q

The 5 components of a Social Media Information System include: Hardware, Software, Data, People and?

A

procedures

81
Q

The text mentions three types of dynamic social media systems that are used in Manufacturing and Operations. They include Crowdsourcing, B2C-Business to Consumer, and?

A

B2B - Business to Business

82
Q

Karl Marx defined “Capital” as the investment of resources for future profit. What is the definition of “Social Capital”?

A

The investment in social relations with the expectation of returns in the marketplace

83
Q

The likelihood that another entity (person or company) in the relationship will do something that benefits our organization is called?

A

The Strength of the Relationship

84
Q

When it comes to generating revenue using SMIS, name the the model that offers users basic service for free and then charges a premium for upgrades or advanced features.

A

Freemium

85
Q

Metrics that are used to help you identify when you’ve achieved your business goals are called?

A

KPI - Key Performance Indicators

86
Q

A software platform that uses social media to facilitate cooperative work of people “within” an organization is called? Remember it uses the company INTRANET.

A

ESN - Enterprise Social Network

87
Q

The very first step an organization needs to take when creating a new SMIS - Social Media Information System is to develop and publicize a social media policy.

A

True

88
Q

Intel’s 3 Rules of Engagement concerning Social Media Information Systems include: Disclose, Protect, and?

A

Use common sense

89
Q

The textbook mentions the use of ____________ which are methods that have been shown to produce successful results in prior implementations. These elements exist in every discipline found in the modern marketplace and are included in many purchased software application systems.

A

Best Practices

90
Q

A ________ examines each part of a message and determines whether to let that part pass.

A

firewall

91
Q

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.

A

threat

92
Q

A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

A

phisher

93
Q

In information security, which of the following is true about managing risk?

A

Organizations should implement safeguards that balance the trade-odd between risk and cost

94
Q

In the context of malware protection, the program code that causes the unwanted actions is called the ________.

A

payload

95
Q

When an employee is terminated, IS administrators should receive advance notice so that they can ________.

A

Remove the user account and password

96
Q

Which of the following is a critical security function that should be addressed by the senior management of an organization?

A

Establishing the security policy

97
Q

________ are false targets for computer criminals to attack.

A

honeypots

98
Q

________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection, in the case of wireless networks.

A

sniffing

99
Q

The three main components of IT Security include: Principle of Accountability, Principle of Least Privilege, and

A

Principle of defense in depth

100
Q

The process of creating a new application begins when the IS department aligns its priorities with the ________.

A

Organization’s strategy

101
Q

Which of the following is NOT a responsibility of a systems analyst?

A

Writing Programs

102
Q

Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________.

A

Learn basic computer skills

103
Q

The ________ must ensure that priorities consistent with the overall organizational strategy are developed, communicate them to the IS department and enforce them.

A

CIO

104
Q

The process of hiring another organization to perform a service to save costs, gain expertise, or free management time is called?

A

outsourcing

105
Q

Outsourcing can be applied to any element of the MIS model (Hardware, Software, Data, Procedures, People)?

A

True

106
Q

Some of the risks associated with outsourcing include: loss of control, loss of intellectual capital, and management change

A

true

107
Q

As a primary business user of information systems, you have user rights that include things like access to reliable IT technology, stable network, and a secure computing environment. You also have user ______________ that specify things that you as a user of the systems need to do protect yourself and the company.

A

responsibilities

108
Q

There is group of senior managers from major business functions that work with the CIOs to set information system priorities and decide among major IS projects. This group of managers is called a?

A

Steering team

109
Q

The group within the Information Technology Division that is responsible for the computing infrastructure, including computers, in-house server farms, networks, and communications media is called?

A

Operations group

110
Q

A ________ involves balancing three critical factors: requirements, cost, and time.

A

trade-off

111
Q

A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.

A

Business process

112
Q

A ________ is a person who is well versed in an organization’s strategy and focuses on ensuring that business processes and information systems meet the organization’s competitive strategies.

A

Business analyst

113
Q

According to Brooks’ Law, adding more people to a late project will ________.

A

Create diseconomies of scale

114
Q

If a defined project is determined to be feasible in the systems development life cycle (SDLC), the next step is to ________.

A

Form the project team

115
Q

In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.

A

activities

116
Q

In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________.

A

deliverables

117
Q

In the system definition phase of the systems development life cycle (SDLC), the first major task for an assembled project team is to ________.

A

Define system goals and scope

118
Q

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business.

A

pilot

119
Q

The ________ is a sequence of activities that determine the earliest date by which a project can be completed.

A

Critical path