The manager of travel agency examines a spreadsheet with airfares to different cities from Chicago in order to determine the difference in peak season and off-season airfares. The airfares on the spreadsheet, in this case, represent ________.
data
Automating a business task involves taking work performed by ________ and moving it so that ________ do the work instead.
people, computer
Information systems exist to ________.
help organizations achieve their strategies
Which of the following is an example of a weak force for threat of rivalry?
An electrical company in a small town
Which of the following is not an example of a support activity?
Customer Service
Business processes for a cost leadership strategy consist of activities focused on ________.
minimizing costs
Businesses using a differentiation strategy structure their value chain around low-cost activities.
False
Which of the following is NOT a data acquisition process?
updating
Which of the following reporting methods deliver business intelligence to users without any request from the users?
push publishing
________ is an unsupervised statistical technique that helps to identify groups of entities that have similar characteristics.
Cluster analysis
Which of these is NOT a true statement about how Artificial Intelligence (AI) will affect organizations?
AI systems will brainstorm, design, and create new products.
Programs that are written to work with a particular operating system are known as ________ applications.
native
Organizations are interested in new technologies because they ________.
offer threats or opportunities to their existing value chains
Select the option that makes the following statement FALSE. Cryptocurrency transactions are (have) ________.
easily monitored by governments
Businesses are using ________, or the decentralized public ledgering system used to record and manage transactions in traditional sectors like shipping, real estate, voting, and stock trading.
blockchain
Entities in a data model have ________ that describe the features of the entity.
attributes
Which of the following database elements is the smallest?
Byte
The forked lines on an E-R diagram that represent the relationship between two entities are referred to as ________.
crow's feet
Metadata is/are ________.
data that describes data
Microsoft offers subscriptions of Office 365, Exchange, Skype for Business, and SharePoint applications as a ________ "in the cloud.
SaaS
The Internet works a lot like ________
the US Postal System
Organizations that are required by law to maintain physical control of its data can use a virtual private cloud for storing its most sensitive (and regulated) data and a public cloud for its less sensitive data
True
NewWay Technologies offers customers an operating system, runtime environment, and middleware services. This is an example of the ________ as a service model.
platform
A company's top managers meet to decide on a potential merger with one of its competitors. They discuss things like business valuations and due diligence. This is an example of ________ decision making.
unstructured
The application Microsoft Teams would be a _________component of a collaboration information system.
software
A student group that is working on a project is considered to be a collaboration if the ________.
members provide feedback on each other's work
Which of the following is essential to collaboration?
a process of critical feedback and iteration
_____________ is the first and most fundamental purpose of collaboration.
Becoming informed
Process ________ is a measure of how well a process achieves organizational strategy.
effectiveness
The Accounting Department's process in place to manage the budget is categorized under which level of an organization's scope of processes?
Workgroup process
In which phase of the customer life cycle do lead-tracking processes occur?
Customer aquisition
Which of the following is a characteristic of information silos?
Data duplication
Dynamic processes are standardized processes that involve day-to-day operations.
False
What is is the best safeguard from threats from public users?
Hardening a web site
Michael and his friend, Jacob, work for competing companies in the tech industry. While having drinks one night, Michael tells Jacob about a new product that his company is very close to releasing. This is an example of which type of security loss?
Unauthorized data disclosure
FireEye is a security company that protects its clients against ________ that are sophisticated, possibly long-running computer hacks often perpetrated by large, well-funded organizations.
advanced persistent threats
When visiting the ALDI headquarters, the case competition winners have to register at the hospitality desk near the front doors before going inside. This is a ________ safeguard.
human
Which of the following should NOT be included in the incident-response plan?
The value of the assets of the organization
A scrum process will end for all of the following reasons except when____________.
the critical path is complete
A(n) ________ is a 15 minute scrum meeting that makes product development teams more productive and efficient.
stand-up
What are BPM activities?
model, design, implement, and assess
In a BPMN process diagram, dotted arrows depict the flow of ________ in the process.
Data
The ________ phase is the easiest and cheapest time to alter an information system in the systems development life cycle (SDLC).
requirements