K201 MIS Final Review

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/149

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

150 Terms

1
New cards

_____ is the raw material in the production of information.

Data

2
New cards

A large collection of electronic records is called a(n) _____.

database

3
New cards

The term _____ refers to the sequence of activities involved in producing a product or service.

supply chain

4
New cards

The main goals of _____ systems are to increase the quality of customer service, reduce the amount of labor involved in serving customers, and learn as much as possible about the service preferences of individual customers.

customer relationship management

5
New cards

______ refers to the buying and selling goods and services via a telecommunications network.

E-commerce

6
New cards

_____ are normally responsible for developing cost analyses, design considerations, implementation timelines, and feasibility studies of a computer system before making recommendations to senior management.

7
New cards

The _____ is responsible for all aspects of an organization's ISs and is often a corporate vice president.

chief information officer

8
New cards

_____ provide customers with cheaper combined service and the convenience of one-stop shopping.

alliances

9
New cards

_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.

Biometrics

10
New cards

_____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.

Spyware

11
New cards

In the context of B2B trading, online advertising is done mainly in two ways: through _____ and through banners.

search engines

12
New cards

_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective.

Search advertising

13
New cards

Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called _____ retailers.

pure play

14
New cards

On the Web, _____ includes identifying the sites your audience frequently visits.

targeting

15
New cards

_____ has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.

Dedicated hosting

16
New cards

_____ is determined by the relationship between resources expended and the benefits gained in achieving a goal.

17
New cards

The combination of customer relationship management (CRM) and supply chain management (SCM) systems is referred to as _____.

enterprise resource planning (ERP) systems

18
New cards

When a radio frequency identification tag is attached to a product, it contains a(n) _____.

19
New cards

A ____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.

20
New cards

A(n) _____ is the field by which records in a table are uniquely identified.

primary key

21
New cards

Many organizations have found that if they accumulate _____, they can use it for important management decisions, such as researching market trends or tracking down fraud.

transaction data

22
New cards

_____ involves high volumes of data compiled from traditional, ordinary business activities, as well as newer, nontraditional sources.

Big Data

23
New cards

In the _____ phase of transferring data from a transactional database to a data warehouse, specialists "cleanse" the data and modify it into a form that allows insertion into the data warehouse.

24
New cards

The process of _____ enables organizations to plan and carefully design their global sites to cater to local needs and preferences.

glocalization

25
New cards

As computers convert to operating systems that support _____, displaying different character sets should be less of a problem.

Unicode

26
New cards

_____ are the main reasons behind the slow adoption of new forms of electronic payments.

Security concerns

27
New cards

According to the _____ , all legal matters are confined to the country from which a site operates.

country-of-origin principle

28
New cards

The _____ enforces a privacy law called the Directive on Data Privacy.

European Union (EU)

29
New cards

The country-of-origin and country-of-destination principles deal with the issue of _____

e-commerce jurisdiction

30
New cards

Businesses use _____ to analyze data.

models

31
New cards

Determining which stock will yield the highest return by the end of the year is an example of a(n) _____ problem.​

32
New cards

A(n) _____ is a computer-based information system designed to help knowledge workers select one of many alternative solutions to a problem.

decision support system (DSS)

33
New cards

A _____ model is one that is automatically adjusted based on changing relationships among variables.

dynamically modified

34
New cards

Among the general statistical models, a(n) _____ model is the best-fit straight-line relationship between two variables, such as sales and the money spent on marketing.

linear regression

35
New cards

_____ are excellent tools for building both the data and the models that decision support systems need.

Spreadsheets

36
New cards

_____ is a methodology of solving a new problem established on the solutions of similar problems.

Case-based reasoning

37
New cards

Some companies offer _____ specifically designed to analyze shoppers' behavior at their sites based on captured data such as pages viewed, options clicked, and the sequence of pages shoppers viewed.

decision support systems (DSSs)

38
New cards

In banking, _____ is employed to find profitable customers and patterns of fraud.

data mining

39
New cards

The meaningful information gleaned from data warehouses using software tools is referred to as _____.

business intelligence​

40
New cards

Since OLAP applications are designed to process large amounts of records and produce summaries, they are usually significantly faster than relational applications such as those using _____.

SQL queries

41
New cards

Large ISs that address structured problems are usually conceived, planned, developed, and maintained within a framework called the _____.

systems development life cycle (SDLC)

42
New cards

To find the _____, the net present value of the system is calculated by combining the net present value of the costs of the system with the net present value of the benefits of the system.

return on investment (ROI)

43
New cards

Several diagramming sets were developed by the 1970s, but in the late-1990s, a de facto standard emerged: _____.

unified modeling language

44
New cards

_____ make extensive use of iterative programming, involving users often, and keeping programmers open to modifications while the development is still under way.

Agile methods

45
New cards

_____ is meant to guarantee that the experts have passed tests that ensure their skills.

Certification

46
New cards

A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee's password to fix a problem. This is an example of _____.

social engineering

47
New cards

Sometimes a(n) _____ is automatically created using data, such as the date and time of a transaction or the name or password of the user updating the file.

audit trail

48
New cards

Coding a message into a form unreadable to an interceptor is called _____.

encryption

49
New cards

_____ records sums owed to the organization and by whom.

Accounts receivable

50
New cards

A _____ is an array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.

system

51
New cards

A(n) _____ is a business event such as a sale, a purchase, the hiring of a new employee, and the like.

transaction

52
New cards

Business intelligence applications access large pools of data, usually transactional records stored in large databases called _____.

data warehouses

53
New cards

_____ have been used to provide service via the Web, such as helping residents find locations of different services on a city map or plan travel routes.

Geographic information systems

54
New cards

A _____ is responsible for the databases and data warehouses of an organization—a very sensitive and powerful position.

database administrator

55
New cards

One way to increase market share is to lower prices, and the best way to lower prices is to _____.

reduce costs

56
New cards

Which of the following patents does Priceline.com hold that prevents competitors from entering its business space?

Online reverse auctioning

57
New cards

_____ are expenses incurred when a customer stops buying a product or service from one business and starts buying it from another.

Switching costs

58
New cards

_____ refers to the competitive advantage that a company can achieve by persuading customers that its product or service is better than its competitors'.

Product differentiation

59
New cards

_____ provide customers with cheaper combined service and the convenience of one-stop shopping.

Alliances

60
New cards

On the web, an example of alliances is a(n) _____.

affiliate program

61
New cards

Which of the following is a result of forming strategic alliances?

The same technology is used.

62
New cards

_____ involves adoption of new machinery and elimination of management layers.

Reengineering

63
New cards

_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.

Biometrics

64
New cards

JetBlue obtained the strategic advantage of the _____ by implementing the latest available technologies of fast databases, VoIP, and a slick website.

65
New cards

While blogging is publishing text and other visual material, _____ is publishing sound and video.

podcasting

66
New cards

_____ might be thought of as "real-time e-mail," because, unlike e-mail, it is synchronous in exchanging information.

Instant messaging

67
New cards

A(n) _____ is a network used only by the employees of an organization.

intranet

68
New cards

_____ is the term for any unsolicited commercial email.

Spam

69
New cards

Some hosting companies charge extra fees for shared hosting if the site experiences activity above a predetermined amount of data that is transferred, or number of visits from Web surfers, known as _____.

hits

70
New cards

_____ defines the degree to which a goal is achieved.

Effectiveness

71
New cards

The first phase in the supply chain is _____.

procuring raw materials

72
New cards

When a pattern of defects is discovered in a product, _____ helps pinpoint the plant at which it was produced and the particular lot from which it came.

radio frequency identification (RFID)

73
New cards

The smallest piece of data is called a _____

character

74
New cards

Online databases that are used with web browsers _____.

75
New cards

The emergence of the web as a global medium for information exchange has made it an important vehicle for both business-to-business (B2B) and _____.

business-to-consumer (B2C) commerce

76
New cards

_____ is a tool used to translate MS-Word documents to multiple languages.

Wordfast

77
New cards

The recent trend in less rich countries is to adopt _____ to avoid high costs.

free open source software

78
New cards

Differences in _____ must be considered when integrating information systems internationally, even within the same company.

standards

79
New cards

The three major components of a DSS are a data management module, a model management module, and a(n) _____ module.

80
New cards

Rather than containing a set of IF-THEN rules, more sophisticated ESs use _____, which are designed to mimic the way a human brain learns.

neural networks

81
New cards

The American Stock Exchange (AMEX) has a special department to prevent _____ of the securities under its supervision.

insider trading

82
New cards

_____ are applications that combine features of two or more online applications.

Mashups

83
New cards

One objective of data mining is _____, the discovering of patterns in data that can lead to reasonable predictions.

forecasting

84
New cards

The data-mining application that identifies which prospective clients should be included in a mailing or email list to obtain the highest response rate is known as _____.

85
New cards

The part of the BI software application that parses the questions entered by employees is known as the _____.

semantic layer

86
New cards

BI software has become so popular in large companies that Microsoft decided to integrate such software into its popular database management system, _____.

87
New cards

To make the use of BI tools convenient for executives, companies that develop BI tools create _____ that help the executives to quickly grasp business situations.

interfaces

88
New cards

The popular name of an interface for business intelligence tools is _____.

dashboard

89
New cards

Information that can be gleaned from stored data is _____.

90
New cards

A _____ is a paragraph that communicates the most important overarching goal of the organization for the next few years.

mission statement

91
New cards

After the planning phase, the SDLC includes four major phases: analysis, design, implementation, and _____.

support

92
New cards

A carefully drawn _____ can provide a useful representation of a system, whether existing or planned.

data flow diagram

93
New cards

The implementation of a new IS, also called _____, consists of two steps: conversion and training.

94
New cards

Although _____, part of the support phase of a system's lifecycle, is viewed by IS professionals as lacking in glamour, it should not be taken lightly or left to less-experienced professionals.

maintenance

95
New cards

The concept of extracting business intelligence from large data warehouses often involves _____ of several information systems.

96
New cards

_____ is a set of processes and methods used by project managers to determine which projects will meet the organization's operational and financial goals in relation to its strategic objectives as well as the needs of its customers.

Project portfolio management

97
New cards

In _____, the voltage of the power decreases, or there are very short interruptions in the flow of power.

brownouts

98
New cards

In _____, criminals use personal information to attack organizational systems.

spear phishing

99
New cards

A _____ is a type of malware that spreads in a network without human intervention.

worm

100
New cards

_____ occurs when a website receives an overwhelming number of information requests, such as merely logging on to a site.

Denial of service (DoS)

Explore top flashcards

E1 Ortho- Cervical
Updated 344d ago
flashcards Flashcards (102)
Government - Unit 4
Updated 794d ago
flashcards Flashcards (69)
Level G Unit 11
Updated 1167d ago
flashcards Flashcards (20)
عكس - G3
Updated 873d ago
flashcards Flashcards (24)
chesmisty
Updated 949d ago
flashcards Flashcards (28)
grammar - phrases
Updated 58d ago
flashcards Flashcards (41)
graphic design :(
Updated 1138d ago
flashcards Flashcards (127)
E1 Ortho- Cervical
Updated 344d ago
flashcards Flashcards (102)
Government - Unit 4
Updated 794d ago
flashcards Flashcards (69)
Level G Unit 11
Updated 1167d ago
flashcards Flashcards (20)
عكس - G3
Updated 873d ago
flashcards Flashcards (24)
chesmisty
Updated 949d ago
flashcards Flashcards (28)
grammar - phrases
Updated 58d ago
flashcards Flashcards (41)
graphic design :(
Updated 1138d ago
flashcards Flashcards (127)