• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/99

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

99 Cards in this Set

  • Front
  • Back



Information technology and information systems are synonymous terms.




(True of False)

False

Identify how information technology differs from information systems.

One can buy information technology, but not information systems

Which of the following statements is true about the quality of information?


A. Information should be just barely sufficient for its purpose.



B. Freely available data is always accurate and timely.



C. Data that arrives after a prolonged period of time is of the highest quality.



D. Information needs to be relevant to the subject, not necessarily to the context.

A. Information should be just barely sufficient for its purpose

________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.

Moore's Law

Which of the following is considered information rather than mere data?


A. a list of property prices in a neighborhood



B. the price of a company's shares on a given day


C. the return on investment of an advertising campaign


D.the total number of students in a school

C. the return on investment of an advertising campaign

Which of the following types of skills is most likely to be outsourced to the lowest bidder?


A. ability to collaborate


B. abstract reasoning skills


C. accounting skills


D. ability to experiment

C. accounting skills

Meredith constantly analyzes her work in terms of her individual contribution that she makes to the overall output of the organization. This shows her ________ skills.


A. experimentation


B. collaboration


C. problem-solving


D.systems thinking

D. systems thinking

Which of the following components of an information system is the easiest to change and results in the least amount of organizational disruption?


A. Software


B. Procedures


C. Database


D. Hardware

D. Hardware

Which of the following statements is true of business users who administer the development of information systems?


A. They should refrain from specifying the system's requirements.


B. They should take an active role in the system's development.


C. It is mandatory that they hold a degree in database management.


D. When the system fails, they must refrain from performing tasks related to system recovery.

B. They should take an active role in the system's development.

Mark follows certain steps to access the supplementary readings for a course when using his organization's library management system. These steps that he follows are examples of the ________ component of an information system.


A. hardware


B. data


C. procedure


D. software

C. procedure

A group of programmers work separately to create modules and merge the modules later to build an application. This is an example of collaboration.




(True or False)

False

The main purpose of the planning phase in a project is to ________.

determine who will do what and by when

A decision is called an operational decision if it ________.

concerns day-to-day activities

Which of the following questions is best answered through unstructured decision making?


A. Should we continue to outsource our bookkeeping processes?


B. When should the next batch be scheduled to reduce idle time?


C. How many overtime hours should be used to fill this order?


D. What is the acceptable defect ratio for this product?

A. Should we continue to outsource our bookkeeping processes?

A project manager has to manage tasks and budgets and solve problems during the ________ phase of project management.


A.planning


B. finalizing


C. doing


D. starting

C. doing

________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.

Version control

________ communication occurs within a team when all team members meet at the same time.

Synchronous

Identify the least important characteristic for an effective collaborator.


A. willingness to enter difficult conversations


B. being an experienced businessperson


C. being skillful at giving negative feedback


D. showing ability to receive negative feedback



B. being an experienced businessperson

Project metadata is data that is ________.

utilized to manage the project

Which of the following is a key difference between collaboration and cooperation?


A.Cooperation requires people to have a common goal, whereas collaboration occurs even without a common goal.


B.Unlike cooperation, collaboration emphasizes iteration and feedback.


C.Unlike cooperation, collaboration occurs when a job has to be accomplished.


D.People should work together to cooperate, whereas they need not work together to collaborate.

B. Unlike cooperation, collaboration emphasizes iteration and feedback.

A furniture dealer offering a wide variety of designs to premium customers exclusively is following an industry-wide cost leadership strategy.




(True or False)

False

Porter's five forces model is used to assess ________.

industry structure

Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.


A.outbound logistics


B.operations


C.inbound logistics


D.procurement

C. inbound logistics

A ________ is a collection of something, such as data and raw materials.

repository

Which of the following is a primary activity in the value chain?


A. negotiating prices with vendors


B.receiving and distributing inputs to the product


C.finding suitable vendors to supply raw materials


D.setting up contractual arrangements with various suppliers

B. receiving and distributing inputs to the product

A new drug that has shown promise in curing skin cancer has been discovered by a famous chemical laboratory. This is the only known drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.


A.high threat of new entrants


B. low threat of substitutions


C.low bargaining power of the laboratory


D.high bargaining power of customers



B. low threat of substitutions

Which of the following value chain activities involves transforming raw materials into a finished product or service?


A.marketing


B.operations


C.inbound logistics


D.maintenance



B. operations

The difference between the value that an activity generates and the cost of the activity is called the ________.

margin

I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." The competitor made significant in-roads into this market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 implementing?

product differentiation

________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.

Business process design

The CPU stores results of computations on the hard drive.




(True or False)

False

Which of the following statements is true of closed source projects?


A.Anyone can obtain the source code for a closed source project.


B.Programmers can alter the closed source code based on their interests and goals.


C.Only trusted programmers are allowed to make changes to a closed source project.


D.Only users and developers are allowed to alter the source code in closed source projects.



C. Only trusted programmers are allowed to make changes to a closed source project.

Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage?


A.Employees will buy the hardware.


B.The policy appears to be permissive without actually being so.


C.Employees can gain public access from any device, not just mobile devices.


D.The organization can sniff employees' mobile traffic.



B. The policy appears to be permissive without actually being so.

10 TB is equivalent to ________ gigabytes.

10,240

________ is used to install and update software, back up and restore mobile devices, wipe employer software and data from devices, report usage, and provide other mobile device management data.

MDM software

Which of the following is an example of vertical-market application software?


A. tax preparation software that individuals use in their personal computers


B. Adobe suite used by graphic designers


C. Microsoft PowerPoint used to create presentations


D.inventory tracking software for an automobile manufacturer



D. inventory tracking software for an automobile manufacturer

Which of the following statements is true of native applications?


A.The cost of native applications is low.


B.The limits on these applications are usually technological, not budget.


C.They only run on the operating system for which they are programmed.


D.They can be developed by less skilled, lesser-paid employees.



C. They only run on the operating system for which they are programmed.

Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.

PC virtualization

Which of the following statements is true of firmware?


A.Firmware is the same as cache memory.


B.The software is coded differently from other software.


C.Firmware cannot be changed or upgraded.


D.Users do not need to load firmware into the device's memory.

D. Users do not need to load firmware into the device's memory.

Which of the following is a characteristic of volatile memory?


A.The files are stored permanently.


B.The processor heats up during the operation.


C.The contents are lost when power is off.


D.The processing of data is very slow.

C. The contents are lost when power is off.

In data models, physical objects are represented as entities, whereas logical constructs and transactions are represented as attributes.




(True or False)

False

Relational databases represent relationships using ________.

foreign keys

The rows in a database are called ________.

records

Which of the following is an international standard language for processing a database?


A.Cassandra


B.MS Access


C.DB2


D.SQL

D. SQL

Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________.

primary key

In an E-R diagram, a line between two entities represents a(n) ________.

relationship

Every table in a normalized database has a ________.

single theme

Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________.

entities

In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required.

vertical bar

A student management system allows students to have multiple majors, and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.

N:M

________ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.

Customer relationship management

Which of the following statements is true of enterprise application integration?


A.It leverages existing systems and enhances the capabilities of functional applications.


B.It leads to data duplication because each application has its own database.


C.It connects system "islands" via a new layer of software.


D.It prevents existing applications from communicating and sharing data.

C. It connects system "islands" via a new layer of software.

________ is a measure of the ratio of process outputs to inputs.

Process efficiency

A stored procedure is a ________

computer program stored in a database that is used to enforce business rules

Which of the following information systems minimizes data duplication among departments?


A.enterprise information systems


B. work group information systems


C. departmental information systems


D.personal information systems

A. enterprise information systems

The primary purpose of an ERP system is ________.

integration

Which of the following statements about a structured inter-enterprise information system is true?


A.It is flexible and easily adaptable to organizational changes.


B. It does not require users to have any formal training.


C.It increases data duplication among departments.


D.Its problem solutions affect multiple organizations.

D. Its problem solutions affect multiple organizations.

Tony requests for a credit approval of $25,000 and instead gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it?


A.disjointed processes


B.limited information


C.isolated decisions


D.data duplication

A. disjointed processes

Which of the following workgroup processes is related to manufacturing?


A.The procedures are not documented but are understood within the group.


B.They support 10 to 100 users.


C.They are very difficult to change.


D.They do not require users to have any formal training.



C. They are very difficult to change.

The hyper-social organization model developed by Gossieaux and Moran advocates ________.

the creation of relationships in which both parties gain value

Which of the following statements is true of social CRM?


A.All the customer relationship processes in social CRM are structured and controlled.


B.Though relationships emerge from joint activity, companies control the customers.


C.Customers likely to generate the most business get the most attention from the organization.


D.Each customer crafts his or her own relationship with the company.

D. Each customer crafts his or her own relationship with the company.

The storage of ________ differentiates SMIS from Web site applications.

connection data

Most SM applications earn their revenue through ________.

advertisements

________ is the dynamic social media process of employing users to participate in product design or product redesign.

Crowdsourcing

Which of the following components of McAfee's Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, etc.?


A.extensions


B.signals


C.authoring


D.search

C. authoring

According to Gossieaux and Moran, a common desire to learn something, solve a problem, or make something happen is shared by ________.

seekers of the truth

When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her ________.

social capital

________ are the companies that operate SM sites.

SM application providers

Which of the following is an SM application provider?


A.McAfee


B.LinkedIn


C.Oracle


D.SAP

B. LinkedIn

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

Data mining

Push publishing delivers business intelligence ________.

according to a schedule or as a result of an event or particular data condition

________ records the source, format, assumptions and constraints, and other facts about the data.

Metadata

Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.

511

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

Data acquisition

With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

supervised data mining

________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.

Content Management Systems (CMS)

Which of the following statements is true about data marts?


A.A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store.


B.Data marts address the needs of a particular department or functional area of a business.


C.Data mart users possess the data management expertise that data warehouse employees have.


D.Data marts are larger than data warehouses.

B. Data marts address the needs of a particular department or functional area of a business.

________ is a technique for harnessing the power of thousands of computers working in parallel.

MapReduce

Which of the following accurately defines a dimension in an OLAP report?


A.It is the data item of interest.


B.It is referred to as a decision tree.


C.It is a characteristic of a measure.


D.It is the item that is processed in the OLAP report.

C. It is a characteristic of a measure.

In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing.

business function

Users should not bother IS personnel for trivial issues, instead they should fulfill their responsibilities by ________.

learning basic computer skills

One of the reasons outsourcing is undertaken is to ________.

cap an organization's financial exposure

Which of the following statements is true of the operations group in an organization's IS department?


A.It will include technical writers if the programs are developed in-house.


B.It manages all computing infrastructure except in-house server farms and communications media.


C.It monitors the user experience and responds to their problems.


D.It establishes data standards and data management practices and policies.

C. It monitors the user experience and responds to their problems.

If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software.

business and systems analysts

Which of the following statements is true of an IS department?


A.Programs used in all information systems are developed in-house by the development group.


B.Data administration is performed exclusively by the outsourcing relations group.


C.The operations group monitors user experience and responds to user problems.


D.If the IS primarily supports accounting and finance activities, the CFO is appointed as the CIO.

C. The operations group monitors user experience and responds to user problems.

Which of the following is a form of outsourcing hardware infrastructure exclusively?


A.acquiring licensed products


B.SaaS


C.PaaS


D.IaaS cloud hosting

D. IaaS cloud hosting

The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives.

chief information officer

Which of the following is a function of the technology office in an organization's IS department?


A.creating new information systems


B.maintaining existing information systems


C.managing computing infrastructure


D.investigating new information systems

D. investigating new information systems

Which of the following is a function of the steering committee for an IS department?


A.adapting software


B.writing program code


C.setting IS priorities


D.imparting training

C. setting IS priorities

In asymmetric encryption, each site has a ________ for encoding messages.

public key

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.

provide physical security

Which of the following statements is true about losses due to computer security threats?


A.Losses due to human error are insignificant.


B.Surveys on computer crimes provide accurate results since they use standard parameters to measure and tally computer crime costs.


C.Losses due to natural disasters can be measured accurately.


D.Some organizations don't report all their computer crime losses, and some won't report such losses at all.

D. Some organizations don't report all their computer crime losses, and some won't report such losses at all.

A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

phisher

Which of the following is considered a threat caused by human error?


A.an employee inadvertently installs an old database on top of the current one


B.an employee intentionally destroys data and system components


C.a hacker breaks into a system to steal for financial gain


D.a virus and worm writer infects computer systems

A. an employee inadvertently installs an old database on top of the current one

Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.

brute force

In information security, which of the following is true of managing risk?


A.Passwords are classified under the technical safeguards category.


B.Organizations should implement safeguards that balance the trade-off between risk and cost


C.Physical security is classified under the human safeguards category.


D.All organizations except financial institutions should invest heavily in security safeguards.



B. Organizations should implement safeguards that balance the trade-off between risk and cost

________ a Web site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system.

Hardening

Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?


A.www


B. https


C. .com


D. ftp



https

Which of the following usually happens in a malicious denial-of-service attack?


A.Which of the following usually happens in a malicious denial-of-service attack?


B. a hacker floods a Web server with millions of bogus service requests


C.an intruder uses another site's IP address to masquerade as that other site


D.a hacker monitors and intercepts wireless traffic at will

B. a hacker floods a Web server with millions of bogus service requests