MIS Final Exam

studied byStudied by 1 Person
0.0(0)
Get a hint
hint

_____ is the raw material in the production of information.

1/148

Studying Progress

New cards
148
Still learning
0
Almost done
0
Mastered
0
148 Terms
New cards

_____ is the raw material in the production of information.

Data

New cards
New cards

______ refers to the buying and selling goods and services via a telecommunications network.

E-commerce

New cards
New cards

Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called _____ retailers.

pure play

New cards
New cards

In the _____ phase of transferring data from a transactional database to a data warehouse, specialists “cleanse” the data and modify it into a form that allows insertion into the data warehouse.

transformation

New cards
New cards

The process of _____ enables organizations to plan and carefully design their global sites to cater to local needs and preferences.

glocalization

New cards
New cards

_____ is a methodology of solving a new problem established on the solutions of similar problems.

Case-based reasoning

New cards
New cards

Some companies offer _____ specifically designed to analyze shoppers’ behavior at their sites based on captured data such as pages viewed, options clicked, and the sequence of pages shoppers viewed.

decision support systems (DSSs)

New cards
New cards

Since OLAP applications are designed to process large amounts of records and produce summaries, they are usually significantly faster than relational applications such as those using _____.

SQL queries

New cards
New cards

Several diagramming sets were developed by the 1970s, but in the late-1990s, a de facto standard emerged: _____.

unified modeling language

New cards
New cards

_____ make extensive use of iterative programming, involving users often, and keeping programmers open to modifications while the development is still under way.

Agile methods

New cards
New cards

A(n) _____ is a business event such as a sale, a purchase, the hiring of a new employee, and the like.

transaction

New cards
New cards

Business intelligence applications access large pools of data, usually transactional records stored in large databases called _____.

data warehouses

New cards
New cards

_____ are expenses incurred when a customer stops buying a product or service from one business and starts buying it from another.

Switching costs

New cards
New cards

_____ refers to the competitive advantage that a company can achieve by persuading customers that its product or service is better than its competitors'.

Product differentiation

New cards
New cards

_____ is a tool used to translate MS-Word documents to multiple languages.

Wordfast

New cards
New cards

The recent trend in less rich countries is to adopt _____ to avoid high costs.

free open source software

New cards
New cards

One objective of data mining is _____, the discovering of patterns in data that can lead to reasonable predictions.

forecasting

New cards
New cards

BI software has become so popular in large companies that Microsoft decided to integrate such software into its popular database management system, _____.

SQL Server

New cards
New cards

The concept of extracting business intelligence from large data warehouses often involves _____ of several information systems.

integration

New cards
New cards

In _____, criminals use personal information to attack organizational systems.

spear phishing

New cards
New cards

A _____ is a type of malware that spreads in a network without human intervention.

worm

New cards
New cards

_____ occurs when a website receives an overwhelming number of information requests, such as merely logging on to a site.

Denial of service (DoS)

New cards
New cards

CIOs often find the tasks of earmarking funds for _____ difficult because they cannot show the return on investment (ROI) of such planning.

disaster recovery programs

New cards
New cards

A(n) _____ is an activity that the system executes in response to a user.

use case

New cards
New cards

A(n) _____ is required when it is not possible to exploit expertise by coupling quantitative data from a database with decision models.

expert system

New cards
New cards

Companies such as Razorfish, DoubleClick, and Engage Software use _____ to collect consumer data.

spyware

New cards
New cards

In Japan, many people who order merchandise online prefer to pick it up at _____ called “konbini,” and pay there for what they purchased.

convenience stores

New cards
New cards

A  team that is sharing project data by posting files in Google Drive is using the​ ____________ method of sharing content.

shared content with version management

New cards
New cards

The term _____ refers to the sequence of activities involved in producing a product or service.

supply chain

New cards
New cards

The main goals of _____ systems are to increase the quality of customer service, reduce the amount of labor involved in serving customers, and learn as much as possible about the service preferences of individual customers.

customer relationship management

New cards
New cards

_____ are normally responsible for developing cost analyses, design considerations, implementation timelines, and feasibility studies of a computer system before making recommendations to senior management.

Systems analysts

New cards
New cards

The _____ is responsible for all aspects of an organization’s ISs and is often a corporate vice president.

chief information officer

New cards
New cards

_____ provide customers with cheaper combined service and the convenience of one-stop shopping.

Alliances

New cards
New cards

_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.

Biometrics

New cards
New cards

_____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.

Spyware

New cards
New cards

In the context of B2B trading, online advertising is done mainly in two ways: through _____ and through banners.

search engines

New cards
New cards

_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective.

Search advertising

New cards
New cards

On the Web, _____ includes identifying the sites your audience frequently visits.

targeting

New cards
New cards

_____ has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.

Dedicated hosting

New cards
New cards

_____ is determined by the relationship between resources expended and the benefits gained in achieving a goal.

Efficiency

New cards
New cards

The combination of customer relationship management (CRM) and supply chain management (SCM) systems is referred to as _____.

enterprise resource planning (ERP) systems

New cards
New cards

When a radio frequency identification tag is attached to a product, it contains a(n) _____.

electronic product code

New cards
New cards

A ____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.

database model

New cards
New cards

A(n) _____ is the field by which records in a table are uniquely identified.

primary key

New cards
New cards

Many organizations have found that if they accumulate _____, they can use it for important management decisions, such as researching market trends or tracking down fraud.

transaction data

New cards
New cards

_____ involves high volumes of data compiled from traditional, ordinary business activities, as well as newer, nontraditional sources.

Big Data

New cards
New cards

As computers convert to operating systems that support _____, displaying different character sets should be less of a problem.

Unicode

New cards
New cards

_____ are the main reasons behind the slow adoption of new forms of electronic payments.

Security concerns

New cards
New cards

According to the _____ , all legal matters are confined to the country from which a site operates.

country-of-origin principle

New cards
New cards

The _____ enforces a privacy law called the Directive on Data Privacy.

European Union (EU)

New cards
New cards

The country-of-origin and country-of-destination principles deal with the issue of _____.

e-commerce jurisdiction

New cards
New cards

Businesses use _____ to analyze data.

models

New cards
New cards

Determining which stock will yield the highest return by the end of the year is an example of a(n) _____ problem.​

semi-structured

New cards
New cards

A(n) _____ is a computer-based information system designed to help knowledge workers select one of many alternative solutions to a problem.

decision support system (DSS)

New cards
New cards

A _____ model is one that is automatically adjusted based on changing relationships among variables.

dynamically modified

New cards
New cards

Among the general statistical models, a(n) _____ model is the best-fit straight-line relationship between two variables, such as sales and the money spent on marketing.

linear regression

New cards
New cards

_____ are excellent tools for building both the data and the models that decision support systems need.

Spreadsheets

New cards
New cards

Some companies offer _____ specifically designed to analyze shoppers’ behavior at their sites based on captured data such as pages viewed, options clicked, and the sequence of pages shoppers viewed.

decision support systems (DSSs)

New cards
New cards

In banking, _____ is employed to find profitable customers and patterns of fraud.

data mining

New cards
New cards

The meaningful information gleaned from data warehouses using software tools is referred to as _____.

business intelligence​

New cards
New cards

Large ISs that address structured problems are usually conceived, planned, developed, and maintained within a framework called the _____.

systems development life cycle (SDLC)

New cards
New cards

To find the _____, the net present value of the system is calculated by combining the net present value of the costs of the system with the net present value of the benefits of the system.

return on investment (ROI)

New cards
New cards

_____ is meant to guarantee that the experts have passed tests that ensure their skills.

Certification

New cards
New cards

A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee’s password to fix a problem. This is an example of _____.

social engineering

New cards
New cards

Sometimes a(n) _____ is automatically created using data, such as the date and time of a transaction or the name or password of the user updating the file.

audit trail

New cards
New cards

Coding a message into a form unreadable to an interceptor is called _____.

encryption

New cards
New cards

_____ records sums owed to the organization and by whom.

Accounts receivable

New cards
New cards

A _____ is an array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.

system

New cards
New cards

_____ have been used to provide service via the Web, such as helping residents find locations of different services on a city map or plan travel routes.

Geographic information systems

New cards
New cards

A _____ is responsible for the databases and data warehouses of an organization—a very sensitive and powerful position.

database administrator

New cards
New cards

One way to increase market share is to lower prices, and the best way to lower prices is to _____.

reduce costs

New cards
New cards

Which of the following patents does Priceline.com hold that prevents competitors from entering its business space?

Online reverse auctioning

New cards
New cards

_____ provide customers with cheaper combined service and the convenience of one-stop shopping.

Alliances

New cards
New cards

On the web, an example of alliances is a(n) _____.

affiliate program

New cards
New cards

Which of the following is a result of forming strategic alliances?

The same technology is used.

New cards
New cards

_____ involves adoption of new machinery and elimination of management layers.

Reengineering

New cards
New cards

_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.

Biometrics

New cards
New cards

JetBlue obtained the strategic advantage of the _____ by implementing  the latest available technologies of fast databases, VoIP, and a slick website.

late mover

New cards
New cards

While blogging is publishing text and other visual material, _____ is publishing sound and video.

podcasting

New cards
New cards

_____ might be thought of as “real-time e-mail,” because, unlike e-mail, it is synchronous in exchanging information.

Instant messaging

New cards
New cards

A(n) _____ is a network used only by the employees of an organization.

intranet

New cards
New cards

_____ is the term for any unsolicited commercial email.

Spam

New cards
New cards

Some hosting companies charge extra fees for shared hosting if the site experiences activity above a predetermined amount of data that is transferred, or number of visits from Web surfers, known as _____.

hits

New cards
New cards

_____ defines the degree to which a goal is achieved.

Effectiveness

New cards