K201 Lecture Exam

The manager of travel agency examines a spreadsheet with airfares to different cities from Chicago in order to determine the difference in peak season and off-season airfares. The airfares on the spreadsheet, in this case, represent ________.

data

Automating a business task involves taking work performed by ________ and moving it so that ________ do the work instead.

people, computer

Information systems exist to ________.

help organizations achieve their strategies

Which of the following is an example of a weak force for threat of rivalry?

An electrical company in a small town

Which of the following is not an example of a support activity?

Customer Service

Business processes for a cost leadership strategy consist of activities focused on ________.

minimizing costs

Businesses using a differentiation strategy structure their value chain around low-cost activities.

False

Which of the following is NOT a data acquisition process?

updating

Which of the following reporting methods deliver business intelligence to users without any request from the users?

push publishing

________ is an unsupervised statistical technique that helps to identify groups of entities that have similar characteristics.

Cluster analysis

Which of these is NOT a true statement about how Artificial Intelligence (AI) will affect organizations?

AI systems will brainstorm, design, and create new products.

Programs that are written to work with a particular operating system are known as ________ applications.

native

Organizations are interested in new technologies because they ________.

offer threats or opportunities to their existing value chains

Select the option that makes the following statement FALSE. Cryptocurrency transactions are (have) ________.

easily monitored by governments

Businesses are using ________, or the decentralized public ledgering system used to record and manage transactions in traditional sectors like shipping, real estate, voting, and stock trading.

blockchain

Entities in a data model have ________ that describe the features of the entity.

attributes

Which of the following database elements is the smallest?

Byte

The forked lines on an E-R diagram that represent the relationship between two entities are referred to as ________.

crow's feet

Metadata is/are ________.

data that describes data

Microsoft offers subscriptions of Office 365, Exchange, Skype for Business, and SharePoint applications as a ________ "in the cloud.

SaaS

The Internet works a lot like ________

the US Postal System

Organizations that are required by law to maintain physical control of its data can use a virtual private cloud for storing its most sensitive (and regulated) data and a public cloud for its less sensitive data

True

NewWay Technologies offers customers an operating system, runtime environment, and middleware services. This is an example of the ________ as a service model.

platform

A company's top managers meet to decide on a potential merger with one of its competitors. They discuss things like business valuations and due diligence. This is an example of ________ decision making.

unstructured

The application Microsoft Teams would be a _________component of a collaboration information system.

software

A student group that is working on a project is considered to be a collaboration if the ________.

members provide feedback on each other's work

Which of the following is essential to collaboration?

a process of critical feedback and iteration

_____________ is the first and most fundamental purpose of collaboration.

Becoming informed

Process ________ is a measure of how well a process achieves organizational strategy.

effectiveness

The Accounting Department's process in place to manage the budget is categorized under which level of an organization's scope of processes?

Workgroup process

In which phase of the customer life cycle do lead-tracking processes occur?

Customer aquisition

Which of the following is a characteristic of information silos?

Data duplication

Dynamic processes are standardized processes that involve day-to-day operations.

False

What is is the best safeguard from threats from public users?

Hardening a web site

Michael and his friend, Jacob, work for competing companies in the tech industry. While having drinks one night, Michael tells Jacob about a new product that his company is very close to releasing. This is an example of which type of security loss?

Unauthorized data disclosure

FireEye is a security company that protects its clients against ________ that are sophisticated, possibly long-running computer hacks often perpetrated by large, well-funded organizations.

advanced persistent threats

When visiting the ALDI headquarters, the case competition winners have to register at the hospitality desk near the front doors before going inside. This is a ________ safeguard.

human

Which of the following should NOT be included in the incident-response plan?

The value of the assets of the organization

A scrum process will end for all of the following reasons except when____________.

the critical path is complete

A(n) ________ is a 15 minute scrum meeting that makes product development teams more productive and efficient.

stand-up

What are BPM activities?

model, design, implement, and assess

In a BPMN process diagram, dotted arrows depict the flow of ________ in the process.

Data

The ________ phase is the easiest and cheapest time to alter an information system in the systems development life cycle (SDLC).

requirements