Shared Flashcard Set

Details

MIS 111
n/a
139
Management
Undergraduate 1
09/27/2010

Additional Management Flashcards

 


 

Cards

Term
1. Which of the following is not a way to gain competitive advantage?
A. Establish Alliances
B. Reduce Quality C. Reduce Costs
D. Create New Products or Services
E. Enhance Products or Services
Definition

B. Reduce Quality

Term
3. ERD is an abbreviation for:
A. Enterprise Resource Development
B. Electronic Record Database
C. Entity Relationship Diagram
D. Enterprise Relationship Diagram
E. Entity Relationship Database
Definition
C. Entity Relationship Diagram
Term
The main goal of utilizing a strategic advantage in an organization is:
A. To gain a competitive advantage on the competition
B. To streamline processes
C. To manage inventory
D. To motivate employees
E. To avoid ethical dilemmas
Definition

 

A. To gain a competitive advantage on the competition

 

Term
The following are all affects of Internet Enabled Globalization except:
A. Instantaneous data flow
B. 24/7 services
C. Decreased online fraud
D. Instantaneous Global Access
E. Daily economic decisions can be made by individuals and smaller businesses
Definition
C. Decreased online fraud
Term
Which of the following is an example of the “invisible” or “deep” web?
A. Search engines not using visualization
B. Text only websites
C. Sites that require a membership or login to access their content
D. HTML web-pages without any hyperlinks
E. Search engines that cannot use boolean operators
Definition

C. Sites that require a membership or login to access their content

Term
Which of the following is a step in building a data warehouse?
A. Create files from transactional database
B. Search for new data
C. Update data software
D. Send files back to customer
E. Backup current data
Definition
A. Create files from transactional database
Term
What does the term "The Bleeding Edge" refer to?
A. The disadvantage associated with using a new product
B. The threat of electrocution associated with maintaining large computer networks
C. The use of new software that has never been installed for use in large networks
D. Cutting one's finger on a piece of paper
E. High employee turnover rates
Definition
A. The disadvantage associated with using a new product
Term
Placing quotation marks around a phrase in a search engine query makes the results:
A. Larger
B. Smaller
C. Harder to understand
D. Easier to understand
E. You cannot use the word "or" in search engines
Definition
B. Smaller
Term
What do people do who work in the field of ‘Database and Network Administration’?
A. Communicate with Customers
B. Manage technology and systems
C. Define system requirements
D. Perform Financial Forecasts
E. None of the above
Definition
B. Manage technology and systems
Term
What database model uses flat text files to store its information?
A. Traditional model
B. Matrix model
C. Relational model
D. Distributed model
E. Object-oriented model
Definition
A. Traditional model
Term
Which phase of the ETL process ensures that information being loaded into the data warehouse will be consistent?
A. Loading phase
B. Transaction phase
C. Transformation phase
D. Extraction phase
E. Creation phase
Definition
C. Transformation phase
Term
Which of the following is NOT a way IT supports business functions?
A. Maintaining a customer database
B. Communication with customers
C. Maintaining service history
D. Transporting products
E. Inventory Management
Definition
D. Transporting products
Term
SQL is an abbreviation for what?
A. Synergy Query Language
B. Structured Query Language
C. Systems Query Language
D. Standard Query Language
E. Search Query Language
Definition
B. Structured Query Language
Term
What is required in a table and uniquely identifies records?
A. Unique Key
B. Primary Key
C. Prime Index
D. Principal Key
E. UniqueIndex
Definition
B. Primary Key
Term
Which of the following is NOT a way the Internet is able to contribute to globalization?
A. Around the clock service
B. Instantaneous Global Access
C. People are not restrained to a certain area
D. Removes the middleman
E. Censorship on certain searches
Definition
E. Censorship on certain searches
Term
If Southwest Airlines and Hertz Rent-A-Car formed special value packages for their customers, what type of competitive advantage is this?
A. Reduce costs
B. Create new products or services
C. Establish alliances
D. Mergers and acquisitions
E. Lock in buyers or suppliers
Definition
C. Establish alliances
Term
A plan to enable a company to outperform competitors is:
A. A Schedule
B. Competitive Priorities
C. An Information System
D. A Strategy
E. An Agenda
Definition
D. A Strateg
Term
A database model based on linked tables is a:
A. Relational Model
B. Traditional Model
C. Current Model
D. Object-oriented Model
E. None of the above
Definition
A. Relational Model
Term
Which of the following is NOT an application of computers in Marketing and Sales?
A. Track sales and analyze trends
B. Manage customer data
C. Increase manufacturing efficiency
D. Provide customers with pre and post sales support
E. Mine data for additional information that could impact profitability
Definition
C. Increase manufacturing efficiency
Term
Which of the following is ordered from least data to most data:
A. Record, field, character, file, database
B. Field, file, record, character, database
C. Character, record, field, file, database
D. File, character, database, record, character
E. Character, field, record, file, database
Definition
E. Character, field, record, file, database
Term
Globalization has impacted which of the following?
A. Customs B. Language
C. Political philosophies
D. Only (A) and (C) of the above
E. (A), (B), and (C) of the above
Definition
E. (A), (B), and (C) of the above
Term
Which of the following is NOT a dimension of competitive priorities?
A. CEO salaries
B. Cost
C. Time
D. Quality
E. Flexibility
Definition
A. CEO salaries
Term
The Bike Guys video mentions sending promotions on customer birthdays. What IT tool would help them identify the information needed to execute this promotion?
A. A online banking application
B. A spreadsheet of purchases
C. A financial management system
D. A customer database
E. An inventory management system
Definition
D. A customer database
Term
Establishing high switching costs is a common way to achieve:
A. Globalization
B. Competitive Advantage
C. Decreased Sales
D. An impressive business portfolio
E. Entrance into the stock market
Definition
B. Competitive Advantage
Term
Limiting a search engine to a specific domain or site is know as:
A. Closed searches
B. Boolean searches
C. Crawler-based searches
D. Field Searches
E. Open source searches
Definition
D. Field Searches
Term
What does information refer to in data processing?
A. Contextual data
B. Raw facts C. Actionable
D. Decision Support
E. None of the Above
Definition
A. Contextual data
Term
Which of the following is NOT a business value of a database?
A. Organization
B. Analysis
C. Decision Making
D. Communication
E. Complexity
Definition
E. Complexity
Term
In an entity relationship diagram, which symbol indicates that an entity is optional?
A. Box
B. Circle
C. Crows Feet
D. Crossbar
E. Line
Definition
B. Circle
Term
What way can you NOT analyze Globalization?
A. Socially
B. Economically
C. Culturally
D. Legally
E. None of the Above
Definition
D. Legally
Term
Words such as "AND", "OR", or "NOT" that are used with search engines are known as:
A. Spiders
B. Crawlers
C. Boolean Operators
D. Helpers
E. Googlers
Definition
C. Boolean Operators
Term
When designing an information system, a business analyst must consider which of the following factors?
A. Stakeholders
B. Business processes
C. Data
D. Interfaces
E. (A), (B), (C), and (D) of the above
Definition
E. (A), (B), (C), and (D) of the above
Term
When using Google, using logical Boolean operators in a search string:
A. Limits the results to English language web sites
B. Eliminates sites that are not on the Web
C. Creates a relationship between two search terms
D. Accesses commercial databases that charge a fee
E. Only accesses sites that have been approved by Google
Definition
C. Creates a relationship between two search terms
Term
Keeping your personal health information private was the focus of what law?
A. Electronic Medical Records Act
B. Computer-patient Privacy Act
C. Health Insurance Portability and Accountability Act
D. Clinical Medical Records and Imaging Act
E. Hospital, Imaging and Pharmacy Access Act
Definition
C. Health Insurance Portability and Accountability Act
Term
Pretexting use what technique to obtain information?
A. Honeypots
B. Social Engineering
C. Keystoke Logging
D. Facial Recognition
E. WebBugs
Definition
B. Social Engineering
Term
According to Nyan Chanda, globalization relates to the movement of what?
A. Goods
B. Ideas
C. Institutions
D. People
E. (A), (B), (C) and (D) of the above
Definition
E. (A), (B), (C) and (D) of the above
Term
According to Brin and Page, in the Google search engine, a webpage’s ‘page rank’ is:
A. Based on the domain the webpage
B. Used as the primary key for searching
C. Given to Google by the web designer
D. A measure of a webpage’s importance or quality
E. Used to balance search requests across network servers
Definition
D. A measure of a webpage’s importance or quality
Term
Along with spiders, search engines are now using ‘software ants’ that:
A. Work together to collect many parts of a webpage at the same time
B. Traverse well-know paths to identify relevant data C. Remove unneeded pages from the search engine’s database
D. Allow the search engine to collect the widest possible set of data
E. Limit the number of times the search engine checks a webpage
Definition
B. Traverse well-know paths to identify relevant data
Term
Search engines such as Grokker use visualization to:
A. Collect information about rich media (photographs and video)
B. Limit the scope of a search query
C. Display patterns of information in a graphical format
D. Graphically display data networks, such as the Internet
E. Describe the content of an image using text
Definition
C. Display patterns of information in a graphical format
Term
In
an Entity-Relationship diagram, what does a 3-toed "Crows Foot" indicate?
A. Zero
B. One
C. Many
D. One and only one
E. An entity defined in two or more tables
Definition
C. Many
Term
MIS is involved in the management of an enterprise through which of the following?
A. Its stakeholders
B. The enterprises’ data, information, and knowledge
C. The ways the enterprise is connected (Interfaces, Communication, etc.)
D. Only (B) and (C) of the above
E. (A), (B), and (C) of the above
Definition
E. (A), (B), and (C) of the above
Term
You want information about Cuba in the Cold War but only those articles that have both terms in the results, which would be the best search statement to use?
A. Cuba OR “Cold War”
B. Cuba AND Cold AND War
C. Cuba OR Cold OR War
D. Cuba AND “Cold War”
E. Cuba INCLUDE Cold War
Definition
D. Cuba AND “Cold War”
Term
According to Friedman, what does “Lexus” symbolize?
A. The globally designed, manufactured, and marketed car
B. Distinctive local culture
C. Global Integration
D. Only (A) and (C) of the above
E. (A), (B), and (C) of the above
Definition
D. Only (A) and (C) of the above
Term
The Invisble Web is:
A. What an invisble spider makes
B. What you can't see while you're online
C. What parents block their kids from seeing on the internet
D. What search engines don't search
E. What the government doesn't want you to see
Definition
D. What search engines don't search
Term
The information in a key field or a primary key in a database must:
A. Be a duplicate of another record
B. Be unique
C. Composed of alphanumeric characters
D. Composed of alphabetical characters
E. None of the above
Definition
B. Be unique
Term
In
an Entity-Relationship diagram, what does a circle on a relationship line indicate?
A. The relationship is obsolete relationship
B. The relationship is may not be linked to another entity
C. The entity is optional and may not exist for the relationship
D. Only one entity can be defined for the relationship
E. The entity-relationship has been validated
Definition
C. The entity is optional and may not exist for the relationship
Term
In
a relational database system, a “Join Table” is:
A. Created after performing an ETL process
B. Created from a composite of information from multiple tables
C. Created when a field is added to a database
D. Created from exporting data from a database
E. A list of users given permission to access information in the database
Definition
B. Created from a composite of information from multiple tables
Term
Which of the following are examples of plagiarism?
A. Using a single paragraph off of a website without attribution
B. Using a table of information from a webpage without attribution
C. Using a copyrighted image without permission on your personal website
D. Using ideas from a source and not identifying them
E. (A), (B), (C), and (D) of the above
Definition
E. (A), (B), (C), and (D) of the above
Term
The internet removes location as a barrier to relationships by:
A. Allowing companies to serve customer throughout the world
B. Allowing rich (multimedia) exchanges between trading partners
C. Allowing workers to travel virtually to any location
D. Only (B) and (C) of the above
E. (A), (B), and (C) of the above
Definition
E. (A), (B), and (C) of the above
Term
In a relational database, what kind of key is used to identify a record in another file by linking or joining two tables?
A. Foreign key
B. Primary key
C. Table key
D. Shared key
E. None of the above
Definition
A. Foreign key
Term
Which of the following correctly characterizes “knowledge”?
A. Raw facts or observations
B. Collection of data organized into tables
C. Data that has been processed and has meaningful context and actionable information
D. Enable people to add, sort, group, summarize, and print data
E. None of the above
Definition
C. Data that has been processed and has meaningful context and actionable information
Term
Which of the following is NOT a characteristic of a quality database?
A. Data integrity
B. Data independence
C. Data security
D. Data redundancy
E. Data maintenance
Definition
D. Data redundancy
Term
B2C e-commerce describes a relationship between what trading partners?
A. Business-to-Country
B. Business-to-Client
C. Business-to-Consumer
D. Brick-and-Mortar-to-Consumer
E. Business-to-Citizen
Definition
C. Business-to-Consumer
Term
A database schema describes which of the following properties of a database?
A. It defines the fields in the database
B. It defines the structure of the database
C. It defines the sizes of fields
D. It identifies primary keys
E. A,B,C,andDoftheabove
Definition
E. A,B,C,andDoftheabove
Term
The focus of the “dark web” research by the UA MIS Department AI Lab deals with what?
A. Tracking the use of disinformation on corporate or public information sites
B. Evaluating the use of color in the understanding graphical images
C. Collecting, analyzing and modeling the behaviors and networks of terrorists
D. Indexing terms in bold font (or dark letter) to find important information
E. Only A and B of the above
Definition
C. Collecting, analyzing and modeling the behaviors and networks of terrorists
Term
What type of E-commerce revenue model does Dell Computer employ?
A. Direct Model
B. Indirect Model
C. Affiliate Model
D. Community Model
E. Subscription Model
Definition
A. Direct Model
Term
In the “Bike Guys” video, the team plans to borrow more money to establish their new business. What type of formal business document were they preparing for the bank?
A. Business Plan, including financial projections and marketing strategies
B. CAD (Computer-aided design) drawing of their building
C. A computer model of customer traffic flows
D. Only A and B of the above
E. A,BandCoftheabove
Definition
A. Business Plan, including financial projections and marketing strategies
Term
In an entity-relationship diagram, which symbol indicates the entity?
A. Box
B. Circle
C. Crow’s Foot
D. Crossbar
E. Line
Definition
A. Box
Term
Translating the strategic and operational business goals into database and application program requirement documents is the responsibility of:
A. System Owners
B. System Users
C. System Designers
D. System Builders
E. Only A and B of the above
Definition
C. System Designers
Term
What type of Boolean operator would return the largest number of results set for a given search?
A. Using NOT between the search terms
B. Using OR between the search terms
C. Using AND between the search terms
D. Using Quote Marks (“) around the search terms
E. Using a Domain search for the search terms
Definition
B. Using OR between the search terms
Term
In a relational database, which of the following are characteristics of a primary key?
A. Uniquely identifies a record
B. It is a required field in the table
C. Links to information in other tables
D. Only A and B of the above
E. A, B, and C of the above
Definition
D. Only A and B of the above
Term
In Whit Andrew’s article "When Ants Beat Spiders..." Andrews is discussing
A. Business Modeling
B. Customer Data basing
C. Information Technology
D. Search Engines
E. Web design
Definition
D. Search Engines
Term
What are the components of an Information System?
A. Data, information, and knowledge
B. Information and knowledge
C. People, Data, Processes, Interfaces
D. People and Data
E. Only A and C of the above
Definition
C. People, Data, Processes, Interfaces
Term
An entity-relationship diagram describes includes what information?
A. Actors in the design
B. Relationships among actors
C. Organization structure
D. Only A and B of the above
E. A,BandCoftheabove
Definition
E. A,BandCoftheabove
Term
A majority of the revenues of e-commerce is associated with which type of transaction?
A. Business-to-Business (B2B)
B. Consumer-to-Consumer (C2C)
C. Consumer-to-Business (C2B)
D. Broker-to-Consumer (B2C)
E. Business-to-Consumer (B2C)
Definition
A. Business-to-Business (B2B)
Term
What is Referential integrity?
A. Illustrates the relationships among a database's tables.
B. Used to define a common field to relate one table to another.
C. Is a set of rules that database programs use to maintain consistency between related
tables when you update records in a database.
D. Exists between two tables when one record in the first table matches zero, one, or many
records in the second table.
E. Only A and B of the above
Definition
C. Is a set of rules that database programs use to maintain consistency between related
tables when you update records in a database.
Term
Which of the following would be valid for a “one-to-many” relationship between two tables:
A. When one record in a table may match only one record in the second table
B. When one record in a table may match more than one record in the second table
C. When several records in a table may match more than one record in the second table
D. Only A and B of the above
E. A, B, and C of the above
Definition
D. Only A and B of the above
Term
In a relational database, why are numeric ID's (such as your student ID) commonly used to identify an individual and the data associated with them?
A. It increases the data redundancy
B. It aids in the development of a schema.
C. A change in personal information will not require multiple changes throughout the
database.
D. It is easier to ensure that person is uniquely identified in the database
E. Only C and D of the above
Definition
E. Only C and D of the above
Term
What is the first step in the business decision process?
A. Communication
B. Data Distribution
C. Decision Support
D. Data Collection
E. Data Analysis
Definition
D. Data Collection
Term
An electronic shopping mall or a product comparison site would be an example of what type of business strategy?
A. Click-and-mortar strategy
B. Utility strategy
C. Disintermediation strategy
D. Re-intermediation strategy
E. Traditional strategy
Definition
D. Re-intermediation strategy
Term
Looking at ways that MIS can be deployed in businesses, what is a good example of this technology in action?
A. Human Resource software that helps to track benefits.
B. Marketing Software that tracks sales and customer information.
C. Economic software that helps to track current market information?
D. Marketing software that helps log information into a "data warehouse" for later use.
E. A,B,C,andDoftheabove
Definition
E. A,B,C,andDoftheabove
Term
An effective approach for designing a database starts with creating a conceptual blueprint of a database that is also known as a _______________:
A. Model of Efficiency
B. Entity Relationship Diagram
C. Enterprise Resource Design
D. Throughput Analysis
E. Artificial Database Scheme
Definition
B. Entity Relationship Diagram
Term
“Contextual data” is a term used to describe what?
A. Raw facts
B. Metadata
C. Information
D. Operational Data
E. Transactional Data
Definition
C. Information
Term
In a relational database, what term refers to the collection of information that are all related to a single value, which often serves as the primary key?
A. A field
B. A form
C. A record
D. A list
E. A deposit
Definition
C. A record
Term
A database schema describes which of the following properties of a database?
A. It defines the fields in the database
B. It defines the structure of the database
C. It defines the sizes of fields
D. It identifies primary keys
E. All (A, B, C, and D) of the above
Definition
E. All (A, B, C, and D) of the above
Term
Language and Values are aspects related to what type of Globalization?
A. Economic
B. Cultural
C. Historical
D. Political
E. Environmental
Definition
B. Cultura
Term
What type of E-commerce revenue model does Dell Computer employ?
A. Direct Sales (Manufacturing) Model
B. Indirect Model
C. Affiliate Model
D. Community Model
E. Subscription Model
Definition
A. Direct Sales (Manufacturing) Model
Term
The information returned by an Excel VLOOKUP function could best be described using which database term?
VLOOKUP( LookupValue, TableArray, ColumnIndexNumber, RangeLookup)
A. A Database Record
B. A Database File
C. A Database Table
D. A Database Field
E. A Database Schema
Definition
D. A Database Field
Term
As defined by Friedman in “The Lexus and The Olive Tree,” an example of an olive tree issue would be one related to:
A. Agriculture
B. Local culture
C. Labor
D. Productivity
E. Capital
Definition
B. Local culture
Term
The term used to define the degree to which a goal is achieved is:
A. Efficiency
B. Productivity
C. Effectiveness
D. Enhancement
E. Expectations
Definition
C. Effectiveness
Term
Which component of the value chain focuses on the management of all the resources “inside the walls” of the organization?
A. ERP (Enterprise Resource Planning)
B. CRM (Customer Relationship Management)
C. SCM (Supply Chain Management)
D. BI (Business Intelligence)
E. DSS (Decision Support Systems)
Definition
A. ERP (Enterprise Resource Planning)
Term
What is NOT a factor contributing to the Bullwhip Effect?
A. Shortage Gaming
B. Vertical Integration
C. Price Promotions
D. Batch Purchasing
E. Forecasting/Trend Analysis
Definition
B. Vertical Integration
Term
Which business model is likely to result in the disintermediation of the value chain?
A. Business-to-business (B2B)
B. Business-to-Consumer (B2C)
C. Consumer-to-Consumer (C2C)
D. Peer-to-Peer (P2P)
E. Government-to-Government (G2G)
Definition
B. Business-to-Consumer (B2C)
Term
In the Panasonic case, the delivery of information and inventory automatically to everyone who needs it was described as what type of model?
A. Value Model
B. Pull Model
C. Push Model
D. ERP Model
E. Knowledge Model
Definition
C. Push Model
Term
In the International Game Technology case, what type of information system was used to integrate its business applications?
A. CRM System
B. ERP System
C. POS System
D. SCM System
E. VMI System
Definition
B. ERP System
Term
If you define that the relationship between two tables in a database has “referential integrity,” what constraint does that add to the relationship?
A. Both tables must use the same field as its primary key
B. The primary and foreign key fields must have a one-to-one mapping
C. Any value used as a foreign key must exist as a primary key
D. Every primary key record must be referenced using a foreign key
E. Only one table can contain a foreign key referencing the primary key
Definition
C. Any value used as a foreign key must exist as a primary key
Term
What type of threat to an information system occurs when a person impersonates someone else on the telephone in order to trick an employee into providing confidential information?
A. Tailgating
B. Identity theft
C. Social engineering
D. Zero-day attack
E. Keylogger
Definition
C. Social engineering
Term
An ad hoc method of organizing information and determining relationships based on the way people actually use the information is known as:
A. Knowledge Management
B. Taxonomy
C. Folksonomy
D. Object Model
E. Expert Model
Definition
C. Folksonomy
Term
Porter’s Forces primarily focuses on which aspect of business?
A. Competition
B. Information Security
C. Inventory costs
D. Knowledge Management
E. Productivity
Definition
A. Competition
Term
The P2C (Police-to-Citizen) website developed by the Gainesville Police Department (Gainesville, Florida) increased citizen awareness of what information?
A. Police Department budget planning
B. Locations of photo radar systems
C. Job opportunities with the Police Department
D. Location of crime incidents
E. Photographs of missing persons
Definition
D. Location of crime incidents
Term
What is the term used to describe the many online technologies, such as blogs, wikis, and second life, that allow people to create virtual communities and collaborate?
A. E-commerce
B. Social Media
C. Flatteners
D. Globalization
E. Disintermediation
Definition
B. Social Media
Term
What term does Friedman use to describe marketplace and workforce specialization on a company’s core competencies?
A. Uploading
B. Informing
C. Outsourcing
D. Supply chain management
E. Workflow
Definition
C. Outsourcing
Term
Simple one word descriptions used to create folksonomies are known as:
A. Links
B. Signals
C. Tags
D. Metadata
E. Relationships
Definition
C. Tags
Term
In information security, any danger to which an information resource might be exposed is referred to as a:
A. Risk
B. Exposure
C. Threat
D. Vulnerability
E. Control
Definition
C. Threat
Term
Of the options shown below, what is the strongest (most definitive) form of authentication?
A. Passwords
B. Regular ID Card
C. Biometrics
D. Passphrases
E. Cookie
Definition
C. Biometrics
Term
What is the term used to describe when a retailer allows a supplier to manage the entire inventory process for a groups of products?
A. Just-in-time inventory management
B. Vendor managed inventory
C. Vertical integration
D. Electronic Data Interchange
E. Sales Force Automation
Definition
B. Vendor managed inventory
Term
What term is used to describe the data types and formatting constraints of a database field?
A. Values
B. Expressions
C. Models
D. Metadata
E. Relationship
Definition
D. Metadata
Term
Sales force automation, customer service management, and call centers are all examples of:
A. Globalization
B. Porter’s Forces
C. Analytical CRM
D. Operational CRM
E. Disintermediation
Definition
D. Operational CRM
Term
In a relational database, what kind of key is used to link or join two tables by identifying a unique record related to this key in another table?
A. Foreign key
B. Primary key
C. Table key
D. Shared key
E. Encryption key
Definition
A. Foreign key
Term
Biometrics is what type of security control?
A. Mitigation
B. Optimization
C. Authentication
D. Communication
E. Physical
Definition
C. Authentication
Term
If you were looking for a system to focus your sales people on the most profitable customers and analyze customer data, you would be evaluating _____ systems
A. CRM
B. ERP
C. SCM
D. SFA
E. MRP
Definition
A. CRM
Term
What term is used to describe what is stored as a database record where items are put in context to one another?
A. Information
B. Knowledge
C. Repository
D. Data
E. Relationship
Definition
A. Information
Term
What is NOT a factor contributing to the Bullwhip Effect?
A. Shortage Gaming
B. Outsourcing
C. Price Promotions
D. Batch Purchasing
E. Forecasting/Trend Analysis
Definition
B. Outsourcing
Term
Which of the following is not one of the factors in “Porter’s Competitive Forces Model”:
A. Customers
B. Disintermediation
C. Industry Rivalry
D. New Entrants
E. Substitution
Definition
B. Disintermediation
Term
Authentication would be considered in what security control category?
A. Physical
B. Access
C. Communication
D. Application
E. Deliberate
Definition
B. Access
Term
In the International Game Technology (IGT) case, what issue challenging IGT would the implementation of an Enterprise Resource Planning (ERP) system address?
A. Pretexting
B. Bullwhip effect
C. Vendor Managed Inventory
D. Data silos
E. Authentication of employees
Definition
D. Data silos
Term
By using the Xign system, Memorial Sloan-Kettering Cancer Center improved the efficiency of its accounts payable system by expanding the use of what technology?
A. Biometrics
B. Electronic Data Interchange
C. Employee authentication
D. Virtual Private Networks
E. Intrusion Detection System
Definition
B. Electronic Data Interchange
Term
Sales force automation, customer service management, and call centers are all examples of:
A. Globalization
B. Porter’s Forces
C. Analytical CRM
D. Operational CRM
E. Disintermediation
Definition
D. Operational CRM
Term
Why are most photo-journalists opposed to using photos that have been digitally edited?
A. Artistic Concerns
B. Economic Concerns
C. Ethical Concerns
D. Legal Concerns
E. Technical Concerns
Definition
C. Ethical Concerns
Term
A common method to transfer data between computer systems is called “EDI”. What is the meaning of the acronym “EDI”?
A. External Data Integration
B. Electronic Data Interchange
C. Exchange of Digital Information
D. Electronic Download Interface
E. E-Business Digital Interface
Definition
B. Electronic Data Interchange
Term
Which of the following was not discussed as an issue relating the ethical use of data, intellectual property, and information systems?
A. Accuracy
B. Metadata
C. Privacy
D. Property Rights
E. Right of Access
Definition
B. Metadata
Term
Which of the following “laws” state that the power of power of microprocessors (number of transistors) doubles about every 18 months?
A. Amdahl’s Law
B. Gilder’s Law
C. Metcalf’s Law
D. Moore’s Law
E. Ohm’s Law
Definition
D. Moore’s Law
Term
A “context aware” interaction offers an augmented reality environment through the use of what type(s) of information?
A. Physical characteristics of an object
B. User’s Identity and Profile
C. Item’s Location or Placement
D. Only A and B of the above choices
E. A, B, and C of the above choices
Definition
E. A, B, and C of the above choices
Term
According to Mark Weiser of Xerox PARC, ubiquitous computing should focus on what?
A. Access
B. Applications
C. Data
D. Property
E. Visualization
Definition
B. Applications
Term
In the TJX case, what term best describes the lack of compliance with the PCI (Payment Card Industry) Data Security Standards exploited by hackers?
A. Control
B. Risk Mitigation
C. Risk Optimization
D. Intrusion Detection System
E. Vulnerability
Definition
E. Vulnerability
Term
Which of the following would be an example of the security threat to information systems known as “social engineering”?
A. Biometrics
B. Controls
C. Phishing
D. Tailgating
E. Intrusion Detection System
Definition
C. Phishing
Term
In the LexisNexis case, why was the issue faced by LexisNexis an especially hard security problem to address?
A. The size of the database of information
B. The security breach was due to the actions of a customer
C. No state or federal law has been broken
D. No personally-identifiable information was stolen
E. LexisNexis were unable to identify how the hackers accessed the system
Definition
B. The security breach was due to the actions of a customer
Term
In the Norfolk Southern Railway case, the business goals of the new information focused on what issues related to what issue?
A. Network and system security
B. Scheduling rail traffic efficiently and effectively
C. Globalization
D. Electronic data interchange
E. Risk transference
Definition
B. Scheduling rail traffic efficiently and effectively
Term
The process of risk optimization focuses on the economics of information security, which states that the amount invested in securing information assets should be based on the:
A. Net income of the company
B. Two months of the IT Budget
C. Value of the potential loss
D. Number of employees
E. Recommendations of IT Consultants
Definition
C. Value of the potential loss
Term
Business process design describes steps necessary to complete a task or action using what type of charts
Definition
structure and flow charts
Term
structure charts describe:
Definition
organizational relationships
Term
flow charts describe
Definition

temporal relationships of activities

business decisions

Term
the three swimlanes in a flowchart are what
Definition
actors
Term
diamonds are
Definition
decisions
Term
ovals are
Definition
beginning and end
Term
boxes are
Definition
processes
Term
the method of doing business by which a company can sustain itself... spells out where the firm is in the value chain
Definition
business model
Term
how a product or service fulfills the needs of a customer (e.g., personalization, customization, reduction of search costs, discount)
Definition
value proposition
Term
how the firm will earn revenue and make a profit (e.g., sales, transaction fees, subscriptions)
Definition
revenue model
Term
fishbone process analysis
Definition
cause and effect diagram
Term
vilfredo pareto was an economist who is credited with establishing what is now widely known as the pareto principle or 80/20 rule. when he discovered the principle, it established that 80% of the land in italy was owned by 20% of the population.


Later he discovered that the pareto principle was valid in other parts of his life, such as gardening: 80% of his garden peas were produced by 20% of the peapods.
Definition
pareto 80/20 principle
Term
management of a team's knowledge, skills, tools and techniques in order to meet the requirements of the particular project
Definition

project management

 

Term
project management
Definition
proposal-baseline plan-execution/control-conclusion-completion
Term
time(when do we ahve to be done?)
resources (how much money do we have?)
scope(what do we need to accomplish?)
Definition

triple constraint 

any changes to one of the factors will effect the outcome of the project 

(triangle diagram)

Term
used extensively as communication tools such as search engines and digital dashboards
Definition
visual diagrams
Term
grantt charts
pert charts
timelines
hierarchical diagrams
Definition
tools used by project management
Term
strengths:
readily comprehended by lay personnel with minimal project management experience
incorporate all three of the triple constraints (time, resources and scope) on the diagram
Definition

visual diagrams

GANTT CHARTS

Term
weaknesses:
difficult to get a "big picture" for large projects due to what can be displayed in a single image
other constraints and relationships are often hidden
Definition

visual diagrams

GANTT CHARTS

Term
program evaluation review technique
Definition

PERT chart

visual diagrams

Term
the use of electronic information and communication technologies to provide and support health care when distance separates the participants. a pediatric cardiology clinic in belfast(ireland) supervises babies at home using videoconferenceing
Definition
TELEMEDICINE
Supporting users have an ad free experience!