Term
1. Which of the following is not a way to gain competitive advantage? A. Establish Alliances B. Reduce Quality C. Reduce Costs D. Create New Products or Services E. Enhance Products or Services |
|
Definition
|
|
Term
3. ERD is an abbreviation for: A. Enterprise Resource Development B. Electronic Record Database C. Entity Relationship Diagram D. Enterprise Relationship Diagram E. Entity Relationship Database |
|
Definition
C. Entity Relationship Diagram |
|
|
Term
The main goal of utilizing a strategic advantage in an organization is: A. To gain a competitive advantage on the competition B. To streamline processes C. To manage inventory D. To motivate employees E. To avoid ethical dilemmas |
|
Definition
A. To gain a competitive advantage on the competition
|
|
|
Term
The following are all affects of Internet Enabled Globalization except: A. Instantaneous data flow B. 24/7 services C. Decreased online fraud D. Instantaneous Global Access E. Daily economic decisions can be made by individuals and smaller businesses |
|
Definition
C. Decreased online fraud |
|
|
Term
Which of the following is an example of the “invisible” or “deep” web? A. Search engines not using visualization B. Text only websites C. Sites that require a membership or login to access their content D. HTML web-pages without any hyperlinks E. Search engines that cannot use boolean operators |
|
Definition
C. Sites that require a membership or login to access their content
|
|
|
Term
Which of the following is a step in building a data warehouse? A. Create files from transactional database B. Search for new data C. Update data software D. Send files back to customer E. Backup current data |
|
Definition
A. Create files from transactional database |
|
|
Term
What does the term "The Bleeding Edge" refer to? A. The disadvantage associated with using a new product B. The threat of electrocution associated with maintaining large computer networks C. The use of new software that has never been installed for use in large networks D. Cutting one's finger on a piece of paper E. High employee turnover rates |
|
Definition
A. The disadvantage associated with using a new product |
|
|
Term
Placing quotation marks around a phrase in a search engine query makes the results: A. Larger B. Smaller C. Harder to understand D. Easier to understand E. You cannot use the word "or" in search engines |
|
Definition
|
|
Term
What do people do who work in the field of ‘Database and Network Administration’? A. Communicate with Customers B. Manage technology and systems C. Define system requirements D. Perform Financial Forecasts E. None of the above |
|
Definition
B. Manage technology and systems |
|
|
Term
What database model uses flat text files to store its information? A. Traditional model B. Matrix model C. Relational model D. Distributed model E. Object-oriented model |
|
Definition
|
|
Term
Which phase of the ETL process ensures that information being loaded into the data warehouse will be consistent? A. Loading phase B. Transaction phase C. Transformation phase D. Extraction phase E. Creation phase |
|
Definition
|
|
Term
Which of the following is NOT a way IT supports business functions? A. Maintaining a customer database B. Communication with customers C. Maintaining service history D. Transporting products E. Inventory Management |
|
Definition
|
|
Term
SQL is an abbreviation for what? A. Synergy Query Language B. Structured Query Language C. Systems Query Language D. Standard Query Language E. Search Query Language |
|
Definition
B. Structured Query Language |
|
|
Term
What is required in a table and uniquely identifies records? A. Unique Key B. Primary Key C. Prime Index D. Principal Key E. UniqueIndex |
|
Definition
|
|
Term
Which of the following is NOT a way the Internet is able to contribute to globalization? A. Around the clock service B. Instantaneous Global Access C. People are not restrained to a certain area D. Removes the middleman E. Censorship on certain searches |
|
Definition
E. Censorship on certain searches |
|
|
Term
If Southwest Airlines and Hertz Rent-A-Car formed special value packages for their customers, what type of competitive advantage is this? A. Reduce costs B. Create new products or services C. Establish alliances D. Mergers and acquisitions E. Lock in buyers or suppliers |
|
Definition
|
|
Term
A plan to enable a company to outperform competitors is: A. A Schedule B. Competitive Priorities C. An Information System D. A Strategy E. An Agenda |
|
Definition
|
|
Term
A database model based on linked tables is a: A. Relational Model B. Traditional Model C. Current Model D. Object-oriented Model E. None of the above |
|
Definition
|
|
Term
Which of the following is NOT an application of computers in Marketing and Sales? A. Track sales and analyze trends B. Manage customer data C. Increase manufacturing efficiency D. Provide customers with pre and post sales support E. Mine data for additional information that could impact profitability |
|
Definition
C. Increase manufacturing efficiency |
|
|
Term
Which of the following is ordered from least data to most data: A. Record, field, character, file, database B. Field, file, record, character, database C. Character, record, field, file, database D. File, character, database, record, character E. Character, field, record, file, database |
|
Definition
E. Character, field, record, file, database |
|
|
Term
Globalization has impacted which of the following? A. Customs B. Language C. Political philosophies D. Only (A) and (C) of the above E. (A), (B), and (C) of the above |
|
Definition
E. (A), (B), and (C) of the above |
|
|
Term
Which of the following is NOT a dimension of competitive priorities? A. CEO salaries B. Cost C. Time D. Quality E. Flexibility |
|
Definition
|
|
Term
The Bike Guys video mentions sending promotions on customer birthdays. What IT tool would help them identify the information needed to execute this promotion? A. A online banking application B. A spreadsheet of purchases C. A financial management system D. A customer database E. An inventory management system |
|
Definition
|
|
Term
Establishing high switching costs is a common way to achieve: A. Globalization B. Competitive Advantage C. Decreased Sales D. An impressive business portfolio E. Entrance into the stock market |
|
Definition
|
|
Term
Limiting a search engine to a specific domain or site is know as: A. Closed searches B. Boolean searches C. Crawler-based searches D. Field Searches E. Open source searches |
|
Definition
|
|
Term
What does information refer to in data processing? A. Contextual data B. Raw facts C. Actionable D. Decision Support E. None of the Above |
|
Definition
|
|
Term
Which of the following is NOT a business value of a database? A. Organization B. Analysis C. Decision Making D. Communication E. Complexity |
|
Definition
|
|
Term
In an entity relationship diagram, which symbol indicates that an entity is optional? A. Box B. Circle C. Crows Feet D. Crossbar E. Line |
|
Definition
|
|
Term
What way can you NOT analyze Globalization? A. Socially B. Economically C. Culturally D. Legally E. None of the Above |
|
Definition
|
|
Term
Words such as "AND", "OR", or "NOT" that are used with search engines are known as: A. Spiders B. Crawlers C. Boolean Operators D. Helpers E. Googlers |
|
Definition
|
|
Term
When designing an information system, a business analyst must consider which of the following factors? A. Stakeholders B. Business processes C. Data D. Interfaces E. (A), (B), (C), and (D) of the above |
|
Definition
E. (A), (B), (C), and (D) of the above |
|
|
Term
When using Google, using logical Boolean operators in a search string: A. Limits the results to English language web sites B. Eliminates sites that are not on the Web C. Creates a relationship between two search terms D. Accesses commercial databases that charge a fee E. Only accesses sites that have been approved by Google |
|
Definition
C. Creates a relationship between two search terms |
|
|
Term
Keeping your personal health information private was the focus of what law? A. Electronic Medical Records Act B. Computer-patient Privacy Act C. Health Insurance Portability and Accountability Act D. Clinical Medical Records and Imaging Act E. Hospital, Imaging and Pharmacy Access Act |
|
Definition
C. Health Insurance Portability and Accountability Act |
|
|
Term
Pretexting use what technique to obtain information? A. Honeypots B. Social Engineering C. Keystoke Logging D. Facial Recognition E. WebBugs |
|
Definition
|
|
Term
According to Nyan Chanda, globalization relates to the movement of what? A. Goods B. Ideas C. Institutions D. People E. (A), (B), (C) and (D) of the above |
|
Definition
E. (A), (B), (C) and (D) of the above |
|
|
Term
According to Brin and Page, in the Google search engine, a webpage’s ‘page rank’ is: A. Based on the domain the webpage B. Used as the primary key for searching C. Given to Google by the web designer D. A measure of a webpage’s importance or quality E. Used to balance search requests across network servers |
|
Definition
D. A measure of a webpage’s importance or quality |
|
|
Term
Along with spiders, search engines are now using ‘software ants’ that: A. Work together to collect many parts of a webpage at the same time B. Traverse well-know paths to identify relevant data C. Remove unneeded pages from the search engine’s database D. Allow the search engine to collect the widest possible set of data E. Limit the number of times the search engine checks a webpage |
|
Definition
B. Traverse well-know paths to identify relevant data |
|
|
Term
Search engines such as Grokker use visualization to: A. Collect information about rich media (photographs and video) B. Limit the scope of a search query C. Display patterns of information in a graphical format D. Graphically display data networks, such as the Internet E. Describe the content of an image using text |
|
Definition
C. Display patterns of information in a graphical format |
|
|
Term
In an Entity-Relationship diagram, what does a 3-toed "Crows Foot" indicate? A. Zero B. One C. Many D. One and only one E. An entity defined in two or more tables |
|
Definition
|
|
Term
MIS is involved in the management of an enterprise through which of the following? A. Its stakeholders B. The enterprises’ data, information, and knowledge C. The ways the enterprise is connected (Interfaces, Communication, etc.) D. Only (B) and (C) of the above E. (A), (B), and (C) of the above |
|
Definition
E. (A), (B), and (C) of the above |
|
|
Term
You want information about Cuba in the Cold War but only those articles that have both terms in the results, which would be the best search statement to use? A. Cuba OR “Cold War” B. Cuba AND Cold AND War C. Cuba OR Cold OR War D. Cuba AND “Cold War” E. Cuba INCLUDE Cold War |
|
Definition
|
|
Term
According to Friedman, what does “Lexus” symbolize? A. The globally designed, manufactured, and marketed car B. Distinctive local culture C. Global Integration D. Only (A) and (C) of the above E. (A), (B), and (C) of the above |
|
Definition
D. Only (A) and (C) of the above |
|
|
Term
The Invisble Web is: A. What an invisble spider makes B. What you can't see while you're online C. What parents block their kids from seeing on the internet D. What search engines don't search E. What the government doesn't want you to see |
|
Definition
D. What search engines don't search |
|
|
Term
The information in a key field or a primary key in a database must: A. Be a duplicate of another record B. Be unique C. Composed of alphanumeric characters D. Composed of alphabetical characters E. None of the above |
|
Definition
|
|
Term
In an Entity-Relationship diagram, what does a circle on a relationship line indicate? A. The relationship is obsolete relationship B. The relationship is may not be linked to another entity C. The entity is optional and may not exist for the relationship D. Only one entity can be defined for the relationship E. The entity-relationship has been validated |
|
Definition
C. The entity is optional and may not exist for the relationship |
|
|
Term
In a relational database system, a “Join Table” is: A. Created after performing an ETL process B. Created from a composite of information from multiple tables C. Created when a field is added to a database D. Created from exporting data from a database E. A list of users given permission to access information in the database |
|
Definition
B. Created from a composite of information from multiple tables |
|
|
Term
Which of the following are examples of plagiarism? A. Using a single paragraph off of a website without attribution B. Using a table of information from a webpage without attribution C. Using a copyrighted image without permission on your personal website D. Using ideas from a source and not identifying them E. (A), (B), (C), and (D) of the above |
|
Definition
E. (A), (B), (C), and (D) of the above |
|
|
Term
The internet removes location as a barrier to relationships by: A. Allowing companies to serve customer throughout the world B. Allowing rich (multimedia) exchanges between trading partners C. Allowing workers to travel virtually to any location D. Only (B) and (C) of the above E. (A), (B), and (C) of the above |
|
Definition
E. (A), (B), and (C) of the above |
|
|
Term
In a relational database, what kind of key is used to identify a record in another file by linking or joining two tables? A. Foreign key B. Primary key C. Table key D. Shared key E. None of the above |
|
Definition
|
|
Term
Which of the following correctly characterizes “knowledge”? A. Raw facts or observations B. Collection of data organized into tables C. Data that has been processed and has meaningful context and actionable information D. Enable people to add, sort, group, summarize, and print data E. None of the above |
|
Definition
C. Data that has been processed and has meaningful context and actionable information |
|
|
Term
Which of the following is NOT a characteristic of a quality database? A. Data integrity B. Data independence C. Data security D. Data redundancy E. Data maintenance |
|
Definition
|
|
Term
B2C e-commerce describes a relationship between what trading partners? A. Business-to-Country B. Business-to-Client C. Business-to-Consumer D. Brick-and-Mortar-to-Consumer E. Business-to-Citizen |
|
Definition
|
|
Term
A database schema describes which of the following properties of a database? A. It defines the fields in the database B. It defines the structure of the database C. It defines the sizes of fields D. It identifies primary keys E. A,B,C,andDoftheabove |
|
Definition
|
|
Term
The focus of the “dark web” research by the UA MIS Department AI Lab deals with what? A. Tracking the use of disinformation on corporate or public information sites B. Evaluating the use of color in the understanding graphical images C. Collecting, analyzing and modeling the behaviors and networks of terrorists D. Indexing terms in bold font (or dark letter) to find important information E. Only A and B of the above |
|
Definition
C. Collecting, analyzing and modeling the behaviors and networks of terrorists |
|
|
Term
What type of E-commerce revenue model does Dell Computer employ? A. Direct Model B. Indirect Model C. Affiliate Model D. Community Model E. Subscription Model |
|
Definition
|
|
Term
In the “Bike Guys” video, the team plans to borrow more money to establish their new business. What type of formal business document were they preparing for the bank? A. Business Plan, including financial projections and marketing strategies B. CAD (Computer-aided design) drawing of their building C. A computer model of customer traffic flows D. Only A and B of the above E. A,BandCoftheabove |
|
Definition
A. Business Plan, including financial projections and marketing strategies |
|
|
Term
In an entity-relationship diagram, which symbol indicates the entity? A. Box B. Circle C. Crow’s Foot D. Crossbar E. Line |
|
Definition
|
|
Term
Translating the strategic and operational business goals into database and application program requirement documents is the responsibility of: A. System Owners B. System Users C. System Designers D. System Builders E. Only A and B of the above |
|
Definition
|
|
Term
What type of Boolean operator would return the largest number of results set for a given search? A. Using NOT between the search terms B. Using OR between the search terms C. Using AND between the search terms D. Using Quote Marks (“) around the search terms E. Using a Domain search for the search terms |
|
Definition
B. Using OR between the search terms |
|
|
Term
In a relational database, which of the following are characteristics of a primary key? A. Uniquely identifies a record B. It is a required field in the table C. Links to information in other tables D. Only A and B of the above E. A, B, and C of the above |
|
Definition
D. Only A and B of the above |
|
|
Term
In Whit Andrew’s article "When Ants Beat Spiders..." Andrews is discussing A. Business Modeling B. Customer Data basing C. Information Technology D. Search Engines E. Web design |
|
Definition
|
|
Term
What are the components of an Information System? A. Data, information, and knowledge B. Information and knowledge C. People, Data, Processes, Interfaces D. People and Data E. Only A and C of the above |
|
Definition
C. People, Data, Processes, Interfaces |
|
|
Term
An entity-relationship diagram describes includes what information? A. Actors in the design B. Relationships among actors C. Organization structure D. Only A and B of the above E. A,BandCoftheabove |
|
Definition
|
|
Term
A majority of the revenues of e-commerce is associated with which type of transaction? A. Business-to-Business (B2B) B. Consumer-to-Consumer (C2C) C. Consumer-to-Business (C2B) D. Broker-to-Consumer (B2C) E. Business-to-Consumer (B2C) |
|
Definition
A. Business-to-Business (B2B) |
|
|
Term
What is Referential integrity? A. Illustrates the relationships among a database's tables. B. Used to define a common field to relate one table to another. C. Is a set of rules that database programs use to maintain consistency between related tables when you update records in a database. D. Exists between two tables when one record in the first table matches zero, one, or many records in the second table. E. Only A and B of the above |
|
Definition
C. Is a set of rules that database programs use to maintain consistency between related tables when you update records in a database. |
|
|
Term
Which of the following would be valid for a “one-to-many” relationship between two tables: A. When one record in a table may match only one record in the second table B. When one record in a table may match more than one record in the second table C. When several records in a table may match more than one record in the second table D. Only A and B of the above E. A, B, and C of the above |
|
Definition
D. Only A and B of the above |
|
|
Term
In a relational database, why are numeric ID's (such as your student ID) commonly used to identify an individual and the data associated with them? A. It increases the data redundancy B. It aids in the development of a schema. C. A change in personal information will not require multiple changes throughout the database. D. It is easier to ensure that person is uniquely identified in the database E. Only C and D of the above |
|
Definition
E. Only C and D of the above |
|
|
Term
What is the first step in the business decision process? A. Communication B. Data Distribution C. Decision Support D. Data Collection E. Data Analysis |
|
Definition
|
|
Term
An electronic shopping mall or a product comparison site would be an example of what type of business strategy? A. Click-and-mortar strategy B. Utility strategy C. Disintermediation strategy D. Re-intermediation strategy E. Traditional strategy |
|
Definition
D. Re-intermediation strategy |
|
|
Term
Looking at ways that MIS can be deployed in businesses, what is a good example of this technology in action? A. Human Resource software that helps to track benefits. B. Marketing Software that tracks sales and customer information. C. Economic software that helps to track current market information? D. Marketing software that helps log information into a "data warehouse" for later use. E. A,B,C,andDoftheabove |
|
Definition
|
|
Term
An effective approach for designing a database starts with creating a conceptual blueprint of a database that is also known as a _______________: A. Model of Efficiency B. Entity Relationship Diagram C. Enterprise Resource Design D. Throughput Analysis E. Artificial Database Scheme |
|
Definition
B. Entity Relationship Diagram |
|
|
Term
“Contextual data” is a term used to describe what? A. Raw facts B. Metadata C. Information D. Operational Data E. Transactional Data |
|
Definition
|
|
Term
In a relational database, what term refers to the collection of information that are all related to a single value, which often serves as the primary key? A. A field B. A form C. A record D. A list E. A deposit |
|
Definition
|
|
Term
A database schema describes which of the following properties of a database? A. It defines the fields in the database B. It defines the structure of the database C. It defines the sizes of fields D. It identifies primary keys E. All (A, B, C, and D) of the above |
|
Definition
E. All (A, B, C, and D) of the above |
|
|
Term
Language and Values are aspects related to what type of Globalization? A. Economic B. Cultural C. Historical D. Political E. Environmental |
|
Definition
|
|
Term
What type of E-commerce revenue model does Dell Computer employ? A. Direct Sales (Manufacturing) Model B. Indirect Model C. Affiliate Model D. Community Model E. Subscription Model |
|
Definition
A. Direct Sales (Manufacturing) Model |
|
|
Term
The information returned by an Excel VLOOKUP function could best be described using which database term? VLOOKUP( LookupValue, TableArray, ColumnIndexNumber, RangeLookup) A. A Database Record B. A Database File C. A Database Table D. A Database Field E. A Database Schema |
|
Definition
|
|
Term
As defined by Friedman in “The Lexus and The Olive Tree,” an example of an olive tree issue would be one related to: A. Agriculture B. Local culture C. Labor D. Productivity E. Capital |
|
Definition
|
|
Term
The term used to define the degree to which a goal is achieved is: A. Efficiency B. Productivity C. Effectiveness D. Enhancement E. Expectations |
|
Definition
|
|
Term
Which component of the value chain focuses on the management of all the resources “inside the walls” of the organization? A. ERP (Enterprise Resource Planning) B. CRM (Customer Relationship Management) C. SCM (Supply Chain Management) D. BI (Business Intelligence) E. DSS (Decision Support Systems) |
|
Definition
A. ERP (Enterprise Resource Planning) |
|
|
Term
What is NOT a factor contributing to the Bullwhip Effect? A. Shortage Gaming B. Vertical Integration C. Price Promotions D. Batch Purchasing E. Forecasting/Trend Analysis |
|
Definition
|
|
Term
Which business model is likely to result in the disintermediation of the value chain? A. Business-to-business (B2B) B. Business-to-Consumer (B2C) C. Consumer-to-Consumer (C2C) D. Peer-to-Peer (P2P) E. Government-to-Government (G2G) |
|
Definition
B. Business-to-Consumer (B2C) |
|
|
Term
In the Panasonic case, the delivery of information and inventory automatically to everyone who needs it was described as what type of model? A. Value Model B. Pull Model C. Push Model D. ERP Model E. Knowledge Model |
|
Definition
|
|
Term
In the International Game Technology case, what type of information system was used to integrate its business applications? A. CRM System B. ERP System C. POS System D. SCM System E. VMI System |
|
Definition
|
|
Term
If you define that the relationship between two tables in a database has “referential integrity,” what constraint does that add to the relationship? A. Both tables must use the same field as its primary key B. The primary and foreign key fields must have a one-to-one mapping C. Any value used as a foreign key must exist as a primary key D. Every primary key record must be referenced using a foreign key E. Only one table can contain a foreign key referencing the primary key |
|
Definition
C. Any value used as a foreign key must exist as a primary key |
|
|
Term
What type of threat to an information system occurs when a person impersonates someone else on the telephone in order to trick an employee into providing confidential information? A. Tailgating B. Identity theft C. Social engineering D. Zero-day attack E. Keylogger |
|
Definition
|
|
Term
An ad hoc method of organizing information and determining relationships based on the way people actually use the information is known as: A. Knowledge Management B. Taxonomy C. Folksonomy D. Object Model E. Expert Model |
|
Definition
|
|
Term
Porter’s Forces primarily focuses on which aspect of business? A. Competition B. Information Security C. Inventory costs D. Knowledge Management E. Productivity |
|
Definition
|
|
Term
The P2C (Police-to-Citizen) website developed by the Gainesville Police Department (Gainesville, Florida) increased citizen awareness of what information? A. Police Department budget planning B. Locations of photo radar systems C. Job opportunities with the Police Department D. Location of crime incidents E. Photographs of missing persons |
|
Definition
D. Location of crime incidents |
|
|
Term
What is the term used to describe the many online technologies, such as blogs, wikis, and second life, that allow people to create virtual communities and collaborate? A. E-commerce B. Social Media C. Flatteners D. Globalization E. Disintermediation |
|
Definition
|
|
Term
What term does Friedman use to describe marketplace and workforce specialization on a company’s core competencies? A. Uploading B. Informing C. Outsourcing D. Supply chain management E. Workflow |
|
Definition
|
|
Term
Simple one word descriptions used to create folksonomies are known as: A. Links B. Signals C. Tags D. Metadata E. Relationships |
|
Definition
|
|
Term
In information security, any danger to which an information resource might be exposed is referred to as a: A. Risk B. Exposure C. Threat D. Vulnerability E. Control |
|
Definition
|
|
Term
Of the options shown below, what is the strongest (most definitive) form of authentication? A. Passwords B. Regular ID Card C. Biometrics D. Passphrases E. Cookie |
|
Definition
|
|
Term
What is the term used to describe when a retailer allows a supplier to manage the entire inventory process for a groups of products? A. Just-in-time inventory management B. Vendor managed inventory C. Vertical integration D. Electronic Data Interchange E. Sales Force Automation |
|
Definition
B. Vendor managed inventory |
|
|
Term
What term is used to describe the data types and formatting constraints of a database field? A. Values B. Expressions C. Models D. Metadata E. Relationship |
|
Definition
|
|
Term
Sales force automation, customer service management, and call centers are all examples of: A. Globalization B. Porter’s Forces C. Analytical CRM D. Operational CRM E. Disintermediation |
|
Definition
|
|
Term
In a relational database, what kind of key is used to link or join two tables by identifying a unique record related to this key in another table? A. Foreign key B. Primary key C. Table key D. Shared key E. Encryption key |
|
Definition
|
|
Term
Biometrics is what type of security control? A. Mitigation B. Optimization C. Authentication D. Communication E. Physical |
|
Definition
|
|
Term
If you were looking for a system to focus your sales people on the most profitable customers and analyze customer data, you would be evaluating _____ systems A. CRM B. ERP C. SCM D. SFA E. MRP |
|
Definition
|
|
Term
What term is used to describe what is stored as a database record where items are put in context to one another? A. Information B. Knowledge C. Repository D. Data E. Relationship |
|
Definition
|
|
Term
What is NOT a factor contributing to the Bullwhip Effect? A. Shortage Gaming B. Outsourcing C. Price Promotions D. Batch Purchasing E. Forecasting/Trend Analysis |
|
Definition
|
|
Term
Which of the following is not one of the factors in “Porter’s Competitive Forces Model”: A. Customers B. Disintermediation C. Industry Rivalry D. New Entrants E. Substitution |
|
Definition
|
|
Term
Authentication would be considered in what security control category? A. Physical B. Access C. Communication D. Application E. Deliberate |
|
Definition
|
|
Term
In the International Game Technology (IGT) case, what issue challenging IGT would the implementation of an Enterprise Resource Planning (ERP) system address? A. Pretexting B. Bullwhip effect C. Vendor Managed Inventory D. Data silos E. Authentication of employees |
|
Definition
|
|
Term
By using the Xign system, Memorial Sloan-Kettering Cancer Center improved the efficiency of its accounts payable system by expanding the use of what technology? A. Biometrics B. Electronic Data Interchange C. Employee authentication D. Virtual Private Networks E. Intrusion Detection System |
|
Definition
B. Electronic Data Interchange |
|
|
Term
Sales force automation, customer service management, and call centers are all examples of: A. Globalization B. Porter’s Forces C. Analytical CRM D. Operational CRM E. Disintermediation |
|
Definition
|
|
Term
Why are most photo-journalists opposed to using photos that have been digitally edited? A. Artistic Concerns B. Economic Concerns C. Ethical Concerns D. Legal Concerns E. Technical Concerns |
|
Definition
|
|
Term
A common method to transfer data between computer systems is called “EDI”. What is the meaning of the acronym “EDI”? A. External Data Integration B. Electronic Data Interchange C. Exchange of Digital Information D. Electronic Download Interface E. E-Business Digital Interface |
|
Definition
B. Electronic Data Interchange |
|
|
Term
Which of the following was not discussed as an issue relating the ethical use of data, intellectual property, and information systems? A. Accuracy B. Metadata C. Privacy D. Property Rights E. Right of Access |
|
Definition
|
|
Term
Which of the following “laws” state that the power of power of microprocessors (number of transistors) doubles about every 18 months? A. Amdahl’s Law B. Gilder’s Law C. Metcalf’s Law D. Moore’s Law E. Ohm’s Law |
|
Definition
|
|
Term
A “context aware” interaction offers an augmented reality environment through the use of what type(s) of information? A. Physical characteristics of an object B. User’s Identity and Profile C. Item’s Location or Placement D. Only A and B of the above choices E. A, B, and C of the above choices |
|
Definition
E. A, B, and C of the above choices |
|
|
Term
According to Mark Weiser of Xerox PARC, ubiquitous computing should focus on what? A. Access B. Applications C. Data D. Property E. Visualization |
|
Definition
|
|
Term
In the TJX case, what term best describes the lack of compliance with the PCI (Payment Card Industry) Data Security Standards exploited by hackers? A. Control B. Risk Mitigation C. Risk Optimization D. Intrusion Detection System E. Vulnerability |
|
Definition
|
|
Term
Which of the following would be an example of the security threat to information systems known as “social engineering”? A. Biometrics B. Controls C. Phishing D. Tailgating E. Intrusion Detection System |
|
Definition
|
|
Term
In the LexisNexis case, why was the issue faced by LexisNexis an especially hard security problem to address? A. The size of the database of information B. The security breach was due to the actions of a customer C. No state or federal law has been broken D. No personally-identifiable information was stolen E. LexisNexis were unable to identify how the hackers accessed the system |
|
Definition
B. The security breach was due to the actions of a customer |
|
|
Term
In the Norfolk Southern Railway case, the business goals of the new information focused on what issues related to what issue? A. Network and system security B. Scheduling rail traffic efficiently and effectively C. Globalization D. Electronic data interchange E. Risk transference |
|
Definition
B. Scheduling rail traffic efficiently and effectively |
|
|
Term
The process of risk optimization focuses on the economics of information security, which states that the amount invested in securing information assets should be based on the: A. Net income of the company B. Two months of the IT Budget C. Value of the potential loss D. Number of employees E. Recommendations of IT Consultants |
|
Definition
C. Value of the potential loss |
|
|
Term
Business process design describes steps necessary to complete a task or action using what type of charts |
|
Definition
structure and flow charts |
|
|
Term
structure charts describe: |
|
Definition
organizational relationships |
|
|
Term
|
Definition
temporal relationships of activities
business decisions |
|
|
Term
the three swimlanes in a flowchart are what |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
the method of doing business by which a company can sustain itself... spells out where the firm is in the value chain |
|
Definition
|
|
Term
how a product or service fulfills the needs of a customer (e.g., personalization, customization, reduction of search costs, discount) |
|
Definition
|
|
Term
how the firm will earn revenue and make a profit (e.g., sales, transaction fees, subscriptions) |
|
Definition
|
|
Term
fishbone process analysis |
|
Definition
|
|
Term
vilfredo pareto was an economist who is credited with establishing what is now widely known as the pareto principle or 80/20 rule. when he discovered the principle, it established that 80% of the land in italy was owned by 20% of the population.
Later he discovered that the pareto principle was valid in other parts of his life, such as gardening: 80% of his garden peas were produced by 20% of the peapods. |
|
Definition
|
|
Term
management of a team's knowledge, skills, tools and techniques in order to meet the requirements of the particular project |
|
Definition
|
|
Term
|
Definition
proposal-baseline plan-execution/control-conclusion-completion |
|
|
Term
time(when do we ahve to be done?) resources (how much money do we have?) scope(what do we need to accomplish?) |
|
Definition
triple constraint
any changes to one of the factors will effect the outcome of the project
(triangle diagram) |
|
|
Term
used extensively as communication tools such as search engines and digital dashboards |
|
Definition
|
|
Term
grantt charts pert charts timelines hierarchical diagrams |
|
Definition
tools used by project management |
|
|
Term
strengths: readily comprehended by lay personnel with minimal project management experience incorporate all three of the triple constraints (time, resources and scope) on the diagram |
|
Definition
visual diagrams
GANTT CHARTS |
|
|
Term
weaknesses: difficult to get a "big picture" for large projects due to what can be displayed in a single image other constraints and relationships are often hidden |
|
Definition
visual diagrams
GANTT CHARTS |
|
|
Term
program evaluation review technique |
|
Definition
PERT chart
visual diagrams |
|
|
Term
the use of electronic information and communication technologies to provide and support health care when distance separates the participants. a pediatric cardiology clinic in belfast(ireland) supervises babies at home using videoconferenceing |
|
Definition
|
|