Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
202 Cards in this Set
- Front
- Back
Software refers to....
|
Programs
|
|
Paragraphs in your report are examples of...
|
Data
|
|
A storage disk is an example of which component?
|
Hardware
|
|
MIS includes...
|
(1) The development of Information Systems.
(2) The use of Information Systems. (3) Assisting businesses to achieve goals. |
|
All information systems have...
|
All five components
|
|
Nonroutine cognitive skills include...
|
(1) Abstract reasoning
(2) Collaborative skills (3) Problem solving (4) Communication technique |
|
An example of a set of instructions is...
|
Software
|
|
An example of an actor in the five component framework is the...
|
Hardware
|
|
An example of a low tech system would be...
|
An email program and a file of email addresses.
|
|
Changing which component is most disruptive to the organization?
|
Procedures
|
|
... systems are designed to keep track of customers' maintenance schedules
|
Customer Support
|
|
Data is...
|
recorded facts
|
|
Information is...
|
(1) the difference that makes a difference
(2) processed data (3) data presented in a meaningful way (4) grouped data |
|
... occur(s) in information systems when the output of one system feeds another.
|
Context Changes
|
|
Systems that develop information in near real time are usually more...
|
Expensive
|
|
As an information user, you should be skeptical of...
|
Web Pages
|
|
Which of the following is NOT a characteristic of good information:
accurate relevant timely valuable |
Valuable
|
|
Management needs just barely sufficient information because of...
|
Time Limitations
|
|
Information Relevance refers to...
|
Both context and subject
|
|
There needs to be a correlation between the cost of information and its...
|
Value
|
|
Unique products tailored to customer demands are produced by...
|
high-value organizations
|
|
Which of the following is NOT a symbolic-analytic worker?
In-Person Service providers Problem-Identifiers Problem-Solvers Solution brokers |
In-Person Service providers
|
|
Symbolic-analytic services are required by...
|
high-value organizations
|
|
... are an assembly of the five component framework.
|
Information Systems
|
|
Moore's Law implies that the .......... of a computer chip doubles every 18 months.
|
speed
|
|
Effective .......... means that the work produced by the group is greater than the sum of the individual output.
|
Collaboration
|
|
Which of the following items is NOT considered to be a critical factor for collaboration?
Communication Content Management Permissions Workflow Controls |
Permissions
|
|
The process by which content is created, edited, used, and disposed is termed ...
|
Workflow Management
|
|
Face-to-face meetings are an example of ..........communication.
|
Synchronous
|
|
Employees who work different shifts at the same factory will meet ...
|
Asynchronously
|
|
Which of the following is an example of a synchronous meeting?
Multiparty text chat Discussion forums Team surveys |
Multiparty Text Chat
|
|
A ......... is an example of a virtual meeting.
|
Conference Call
|
|
.......... systems track shared content and usually eliminate the problems seen with concurrent document access.
|
Version-Management
|
|
Shared documents are often stored in shared directories called...
|
Libraries
|
|
Monty sent both Chris and Linda a copy of the report on Monday to review before their Tuesday meeting. This is an example of ...
|
Parallel Workflow
|
|
Activity A must occur before activity B, which, in turn, must be completed before activity C can commence. This is an example of a .......... workflow.
|
Sequential
|
|
If someone pretends to be someone else on the Internet, it is called ...
|
Spoofing
|
|
Electronic networks that only appear to be private, but actually function across a public network are called...
|
Virtual Private Networks
|
|
Decisions occur at what level of the organization?
|
Managerial
Operational Strategic |
|
How much raw material to order from a vendor is an example of .......... decisions.
|
Operational
|
|
Information systems that support operational decision making are called ...
|
TPS
|
|
A(n) .......... has no agreed-upon decision making process.
|
Unstructured Decision Process
|
|
.......... are the most important collaboration systems for unstructured decision making processes.
|
Communication Systems
|
|
Identifying solution alternatives and choosing an alternative involve...
|
Iteration Feedback
|
|
A problem is a ...
|
View of a situation
|
|
The requirements that are to be achieved by a project are called the ...
|
Scope
|
|
Projects are .......... applications for the achievement of some goal.
|
Dynamic
|
|
.......... are vital to decision making, problem solving, and project management.
|
Communications Systems
|
|
Mark realized that his was the correct version, and that Janet and Jill were obviously wrong. This is an example of .......... thinking.
|
egocentric
|
|
Sally realized that Jack and Harry viewed the situation very differently from her, and tried to understand what each thought. This is an example of .......... thinking.
|
empathetic
|
|
An analysis of which of the following will lead to competitive strategy?
Value Chains Business Processes Information Systems |
Value Chains
|
|
Porter's five forces model includes all of the following, EXCEPT:
threat of substitution. competition among existing firms. threat of new entrants. information systems. |
Information Systems
|
|
The intensity of the five forces determines...
|
how sustainable the profitability will be
|
|
`McDonalds, Burger King, and Wendy's are examples of which of the five forces?
|
Rivalry among existing firms.
|
|
Alice is considering getting either a used car or a scooter to get back and forth to work. The car and the scooter would be an example of...
|
threat of substitutions
|
|
There is only a single drug to treat Henry's disease. This is an example of...
|
threat of subsitutions, strong force
|
|
Mary, a teenager, gets $8 per hour for babysitting. Steven lives two doors down and turns 15 next month. Mary is worried that Steven may want to start earning extra money by babysitting, too, and may charge less money. This is a problem of...
|
threat of new entrants
|
|
Rent-a-wreck operates in twenty cities, renting older cars inexpensively. This is an example of...
|
low-cost focus
|
|
Batteries Only carries every type of battery you can imagine, from autos to watches. This is an example of...
|
differentiation, industry-wide
|
|
The difference between the amount of money someone is willing to spend on a product and the cost of producing that product is called the...
|
margin
|
|
The amount of money that someone is willing to pay for a product is the...
|
Value
|
|
Value chains consist of...
|
five primary and four support activities
|
|
Which of the following is NOT a primary activity?
Procurement. Service. Operations. Sales. |
Procurement
|
|
The total margin for a value chain comes from...
|
the values plus the costs of all activities.
|
|
Transforming raw materials into finished products occurs where along the value chain?
|
Operations
|
|
Training is part of which activity?
|
Human Resources
|
|
Negotiating prices with vendors is part of which activity?
|
Procurement
|
|
The idea that businesses should create new business processes that integrate all of the value chain activities is...
|
business process design
|
|
The cost of business processes is...
|
the costs of inputs plus the costs of activities.
|
|
The margin of a business process is...
|
the value of outputs minus the cost.
|
|
Business processes are networks of activities where value is generated by...
|
inputs being transformed into outputs
|
|
Which of the following is not a means of streamlining business processes to increase margin?
|
Increasing effectiveness
|
|
One way to keep suppliers is to make it easy for them to connect and work with the firm. This is called...
|
locking in.
|
|
Good information systems like those of the delivery company in the book help create a competitive advantage by...
|
(1) enhancing existing services.
(2) differentiating the users from competitors. (3) creating systems that will lock in customers. (4) raising barriers to market entry. |
|
An example of a strong password is...
|
a combination of capital & lowercase letters, numbers AND characters.
|
|
An example of a processing device would be...
|
special function cards
|
|
Which of the following is NOT an example of input hardware?
Tablet PCs. Scantron test scanners. Microphones. Plotters. |
Plotters
|
|
What are some examples of storage devices?
|
(1) Magnetic disks.
(2) Tapes. (3) DVDs. |
|
Main memory works in conjunction with:
|
CPU
|
|
Cache and main memory will lose their contents when the power is off. They are...
|
Volatile
|
|
Which of the following is an example of an optical disk?
Digital versatile disks. Magnetic disks. Memory disks. Data bus disks |
Digital versatile disks
|
|
Video processors consist of .......... and ........... which store and process images.
|
CPU & Memory
|
|
Which of the following functions are NOT performed by servers?
Email processing. Database sharing. Processing Web sites. Word processing. |
Word Processing
|
|
The .......... controls a client computer's resources.
|
Operating system.
|
|
Every computer has a(n) ..........; many also have ..........
|
Operating System & Application Programs
|
|
Unix was developed by...
|
Bell Labs.
|
|
Quickbooks is an example of...
|
general application software.
|
|
Which of the following is NOT a type of computer software which can be bought?
Off-the-shelf. Tailor-made. Custom-developed. Off-the-shelf with alterations. |
All can be purchased.
|
|
.......... require(s) programs other than a browser on the user's computer.
|
Thick Clients
|
|
.......... is/are software installed into print servers.
|
Client-server applications
|
|
Microsoft offers a(n) .......... license to move from Windows XP to Vista.
|
Upgrade
|
|
Microsoft Office is an example of a...
|
horizontal-market software
|
|
An example of a vertical-market software is...
|
AutoCad
|
|
Which of the following is NOT an example of a virus?
payload. Trojan horse. worm. Macro. |
Payload
|
|
Slammer was an example of a(n)...
|
worm
|
|
Vendor-created program modifications are called...
|
patches
|
|
Which of the following is generally true about small to medium organizations?
Policies are usually fairly formal. Because of their size, managers need not take an active role in setting specifications. Usually these are standardized on a single client operating system. |
Usually these are standardized on a single client operating system.
|
|
An example of a task involved in assessing the results of the proposed budget is...
|
Considering the budget in the context of the firm's competitive strategy.
|
|
Reasons why additional budgetary items may be added in the future include...
|
(1) new hires.
(2) additional functions. (3) upgrades of system. |
|
Department budgets for computers may need to include...
|
overhead fees
|
|
Dr. Fried wants to keep track of patient visits and patient phone calls. She can set up two separate spreadsheets for these, or she can create a ...
|
Database
|
|
Records are also called ...
|
Rows
|
|
A group of similar rows is called a...
|
File
|
|
A key is a .......... that serves as a unique identifier.
|
Column
|
|
Relational databases represent relationships using...
|
Foreign Keys
|
|
A ........... is a self-describing collection of integrated records.
|
Database
|
|
Monty couldn't remember what was in the database, but he knew that he could check the .......... inside the database and find out.
|
Metadata
|
|
The program used to create and administer a database is called a(n) ...
|
Database Management System
|
|
An open source DBMS product is...
|
MySQL
|
|
An international standard language for processing a database is...
|
SQL
|
|
Reports are used to...
|
show data in a structured content
|
|
Three of the problems that arises in a multi-user environment is:
|
(1) lost-update.
(2) data conflicts. (3) locking. |
|
.......... products process workgroup databases.
|
Enterprise DBMS
|
|
Larry created a logical representation of the database data called a(n) ...
|
Data Model
|
|
Groups of attributes, whose value is associated with a single entity instance is called a(n) ...
|
Identifier
|
|
.......... refers to the number of entities that can be involved in a relationship.
|
Cardinality
|
|
Bruce looked at the tables and declared that they were not normalized. He meant that...
|
they were poorly formatted
|
|
Part of the DBA backup and recovery responsibilities is...
|
Training
|
|
Four examples of database development responsibilities are...
|
(1) creating the DBA function.
(2) forming the steering committee. (3) validating the data model. (4) evaluating designs. |
|
An example of database operations responsibilities is...
|
Managing processing rights
|
|
Three major causes of the need for adaptation are...
|
(1) database
(2) changes that benefit one group of users (3) new features |
|
When an earthquake occurs, it is usually the responsibility of the .......... to manage the recovery process.
|
DBA
|
|
Kant referred to the essence of things in themselves as the...
|
Noumenal World
|
|
LAN
|
The hospital's computers are connected using a:
|
|
WAN
|
To connect DOC Industries' twelve locations, the firm employs a:
|
|
-unethical
-a problem -an email nuisance -a waste of company resources |
Sending an email with pictures of your last holiday to your friend at work while you are working could be:
(4) |
|
NIC
|
The unique identifier of every network interface card is called the:
|
|
layered protocols
|
Seamless data communications across an internet is the result of:
|
|
it reduces signal interference
|
Wires are twisted in the connection cables because:
|
|
(1) Always start with the numbers 802
(2) IEEE 802.3 is most popular (3) The protocol standard for IEEE 802.3 is also called Ethernet |
What are three attributes of IEEE LAN protocols?
|
|
transmission speed in Mbps
|
10/100/100 Ethernet refers to:
|
|
WNIC
|
Linda's new PDA has a ..................... to allow it to connect to the Internet.
|
|
access points
|
WNICs operate according to 802.11 protocols and connect through...........................
|
|
cable TV lines to optical fiber
|
Cable modems connect through a combination of ......................., and offer a shared capacity.
|
|
point to point lines
|
The fastest transmission speed is available through which of the following?
-Point to point lines -PSDN -DSL -Cable |
|
DSL
|
Which of the following would offer the fastest upstream transmission?
-Point to point lines -PSDN -DSL -Cable |
|
point to point
|
Which of the following spans geographically distributed sites using lines provided by licensed vendors?
-Point to point -DSL -VPN -PSDN |
|
PSDN
|
Which of the following leases time on a public switched data network that is operated by an independent party?
-PSDN -VPN -DSL -ADSL |
|
wavy signals
|
Modems convert digital signals to:
|
|
digital subscriber lines
|
DSL stands for:
|
|
ASDL
|
DSL lines that operate with different receiving and transmitting speeds are called:
|
|
communication speeds
|
Narrowband and broadband refers to ........................
|
|
coaxial cable
|
Cable modems use ...................... and have different upstream and downstream speeds.
|
|
access device
|
A router is a(n):
|
|
PSDN network
|
The POP is the access point into the:
|
|
client software
|
The ...................... encrypts messages so that it can be sent safely through VPN communications.
|
|
URL
|
A document's address on the web is called the:
|
|
NAT
|
The process of changing a public IP address to a private IP address is called:
|
|
table
|
Switches know where to send traffic that they receive because of a ....................
|
|
MAC
|
The physical address assigned to each NIC at the factory is called the:
|
|
HTTP
|
An application layer protocol that is used for processing Web pages is:
|
|
hire a translator
|
In order to localize a Web page, a firm will need to:
|
|
the metadata is not translated
|
Which of the following is a problem with localizing and distributing databases?
|
|
-cross-functional systems
-cross-departmental systems -process-based systems |
Systems that handle activities across departmental boundaries are called:
(3) |
|
recording leads
|
Which of the following is NOT a part of the lead generation function?
-mailings -emailings -website -recording leads |
|
-inventory information management
-shipping scheduling -customer service |
Name three functions included in operations systems?
|
|
JIT
|
Dell views its inventory as a liability, and specializes in a ..................... inventory policy.
|
|
BOM
|
The list of materials needed to construct a product is called the ..................
|
|
Kanban
|
...................... refers to a signal to build something.
|
|
MRP
|
Information systems that plan only the need for materials and their inventories for manufacturing are:
|
|
dividend payments
|
The human resources system does NOT include:
|
|
assessments
|
Which of the following is NOT part of an accounting system?
-financial reporting -budgeting -assessments -management of dividends |
|
the Sarbanes-Oxley Act
|
................... was enacted to prevent future frauds like those perpetuated by Enron and WorldCom.
|
|
functional systems
|
Business processes are disjointed in:
|
|
there is an unlimited amount of information
|
Which of the following is NOT a consequence of isolated systems?
-they cannot provide integrated enterprise info -they are inefficient -they result in increased expense -there is an unlimited amt of info |
|
inherent
|
Built-in processes for using software are called:
|
|
service
|
Which of the following is not a phase of the customer life cycle?
-relationship management -loss/churn -marketing -service |
|
Order-management
|
................... applications help customers determine the status of their orders.
|
|
MRP II
|
ERP is an outgrowth of which system?
|
|
They are expensive, but easily implemented
|
Which of the following is NOT true about ERP systems?
-They provide a cross-functional view of the organization. -They provide a process view of the organization. -Data is centrally maintained. -They are expensive, but easily implemented. |
|
inventory reduction
|
One of the potential benefits of an ERP system is:
|
|
converting data
|
Implementing an ERP systems includes:
|
|
-enables a gradual move to ERP
-connects islands of isolation -provides integration of information -leverages existing systems |
EAI:
(4) |
|
identifying sources of problems
|
The first step in implementing an EAI project is:
|
|
-fear of the unknown -fear of job loss -comfort with old methods/systems -threats to self-efficacy
|
The reason that employees resist change is:
(4) |
|
change management
|
................... is a blend of engineering, business, psychology, and sociology that tries to understand the dynamics of organizational alterations and develops methods and procedures for it.
|
|
customer-focused
|
Harvey announced that he was integrating the CRM and SRM systems into an ERP system at a kick-off meeting, so that the entire company would become ....................
|
|
clearinghouses
|
_____________ provide and deliver goods and services at a stated price.
|
|
application tier
|
Which of the following is not part of the three tiers:
-application tier -server tier -database tier -user tier |
|
attributes
|
Variables that provide properties about a tag are called:
|
|
viral marketing
|
Word of mouth advertising is called _____________.
|
|
social networks
|
People with similar interests can connect through:
|
|
mash
|
If you are watching television and decide that you want to purchase the car that you see, Web 2.0 can allow the television producer and auto manufacturer to ________ their products by allowing you to click on the item and be taken to the auto manufacturer's Web site.
|
|
disintermediation
|
Because of ___________, not every supply chain includes manufacturers, retailers, and distributors.
|
|
managers
|
Supply chain performance is NOT affected by:
|
|
the bullwhip effect
|
The variability in the size of orders will increase at each stage along the supply chain is known as:
|
|
the difference between the sum of the generated revenues and the sum of the costs incurred.
|
Supply chain profitability is calculated by:
|
|
multistage nature of the supply chain
|
The bullwhip effect occurs because of the ________________.
|
|
SRM
|
What is the business process that manages contacts between an organization and its suppliers?
|
|
settle
|
Receiving goods is part of which major SRM process?
|
|
security
|
Which of the following is not a major SRM activity?
-source -purchase -settle -security |
|
unethical
|
Writing and installing programs that exploit holes in security systems is:
|
|
formatted documents
|
Alternatives for interorganizational message exchange do NOT include:
-telephone -EDI -formatted documents |
|
-tags have no consistent meanings
-there are a fixed number of tags -HTML mixes formatting -HTML mixes structure |
List four problems of HTML:
|
|
XML
|
A key part of the standards for Web services is ____________.
|
|
web standards
|
The W3C sponsors the development of ____________.
|
|
proprietary
|
One-of-a-kind solutions are considered ____________.
|
|
remote computing
|
____________ is the process of programs on one computer accessing those on another computer.
|
|
SOA
|
____________ is a Web processing philosophy that is implemented by Web services.
|
|
time and cost
|
Web services provide ___________ savings.
|
|
XML documents
|
Web service data are transmitted in _______________.
|
|
interorganizational
|
__________ information systems require collaborative agreements among independent organizations.
|