Mis test, Business inteligence test, plugin 6 and 5- security and privacy, CIS 3380 Angelow Final Review, CIS 3380 David Angelow TXState Final Exam

Match the SOA concept on the left with the correct definition on the right.

Service
matches
Choice, A business task.
A business task.
Loose coupling
matches
Choice, The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.
The capabilit

What are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services?

web services

What groups data and corresponding processes into objects?

Object-oriented languages

What illustrates the movement of information between external entities and the processes and data stores within the system?

data flow diagram

Software engineers use ___________ (use acronym) tools, which provide automated support for the development of the system.

CASE

Software __________ is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.

engineering

Which phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase?

Testing phase

Match the testing type on the left with its correct definition on the right.

Alpha Testing
matches
Choice, Assess if the entire system meets the design requirements of the users
Assess if the entire system meets the design requirements of the users
Development Testing
matches
Choice, Test the system to ensure it is bug-free
Test t

What activity can run over the Internet (or on a CD or DVD), allowing employees to complete their training on their own time at their own pace?

Online training

What is held in a classroom environment and led by an instructor?

Workshop training

Which phase does the organization perform changes, corrections, additions, and upgrades to ensure the system continues to meet business goals?

Maintenance phase

________ prototyping builds a small-scale representation or working model of the system to ensure it meets the user and business requirements.

Discovery

What consists of a series of tiny projects. It has become the foundation of multiple agile methodologies?

Iterative development

Which methodology, owned by IBM, provides a framework for breaking down the development of software into four "gates?

RUP methodology

Extensible ________ Language (XML), a markup language for documents, containing structured information.

markup

What is the capability of services to be joined on demand to create composite services or disassembled just as easily into their functional components?

loose coupling

What is the process of transferring information from a legacy system to a new system?

Conversion

What supports general business processes and does not require any specific software customization to meet the organization's needs?

Off-the-shelf application software

Place the phases in the systems development life cycle in the correct order, with the first phase at the top.

P
A
DES
DEV
TEST
IMP/MAINT

The __________ phase establishes a high-level plan of the intended project and determines project goals.

planning

A(n) ___________ agent is a person or event that is the catalyst for implementing major changes for a system to meet business changes.

change

___________ is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.

Brainstorming

What is a temporary activity a company undertakes to create a unique product, service, or result.

Project

Who is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget?

Project manager

The project __________ is a formal, approved document that manages and controls the entire project.

plan

In the __________ phase the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.

analysis

Business __________ are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.

requirements

What is the process of managing changes to the business requirements throughout the project?

Requirements management

Sign-_________ is the users' actual signatures indicating they approve all of the business requirements.

off

Which phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation?

Design phase

What is a programming method that provides for interactive modules to a website?

Scripting language

What are programming languages that look similar to human languages?

Fourth-generation languages

Identify the programing language on the left with the correct definition on the right.

First generation
matches
Choice, Machine language difficult for people to understand
Machine language difficult for people to understand
Second generation
matches
Choice, Assembly language difficult for people to understand
Assembly language difficult for

What are defects in the code of an information system?

Bugs

What details the steps the system must perform along with the expected result of each step?

Test conditions

In which phase does the organization place the system into production so users can begin to perform actual business operations with it?

Implementation phase

What is the best way to support users and respond to users' questions?

Help desk

Match the system implementation method on the left with its correct definition on the right.

Parallel Implementation
matches
Choice, Uses both the legacy system and new system until all users verify that the new system functions correctly
Uses both the legacy system and new system until all users verify that the new system functions correctly
Plu

What makes system changes to reduce the chance of future system failure?

Preventive maintenance

A(n) ____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.

methodology

The __________ methodology is a sequence of phases in which the output of each phase becomes the input for the next.

waterfall

What is a phone scam that attempts to defraud people by asking them to call a bogus phone number to "confirm" their account information?

Vishing (Voice Phishing)

What uses a zombie pharm, often by an organized crime association, to launch a massive phishing attack?

Pharming attack

What is the identification of a user based on a physical characteristic? such as fingerprint, iris, face, voice, or handwriting.

Biometrics

What is it that occurs when attackers grant themselves the same access levels they already have but assume the identity of another user?

Horizontal Privilege Escalation

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?

Pretexting

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?

Zombie

What is it that details how an organization will implement the information securities policies?

Information Security Plan

What are small electronic devices that change user passwords automatically?

Tokens

Organizations address security risks through two lines of defense, what are they?

1. People
2. Technology

What do we call malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines?

Destructive Agents

What is it that the National Institute of Standards and Technology (NIST) introduced? Designed to keep government information secure.

Advanced Encryption Standard (AES)

What is a group of computers on which a hacker has planted zombie programs?

Zombie Farm

What are 7 trends that the book highlights that have the potential to change our world, our future, and our lives?

1. The world's population will double in the next 40 years.
2. People in developed countries are living longer.
3. The growth in information industries is creating a knowledge-dependent global society.
4. The global economy is becoming more integrated.
5.

What occurs when numerical data is available and a trend can be plotted to display changes through time and into the future?

Trend Projection

Internal rate of return

The rate at which the net present value of an investment equals zero

Return on investment

ndicates the earning power of a project and is measured by dividing the benefits of a project by the investment.

Cash flow analysis

A means to conduct a periodic check on the company's financial health.

Break-even analysis

A way to determine the volume of business required to begin to make a profit at the current prices charged for the products or services.

sales

is the function of selling a good or service and focuses on increasing customer sales, which increases company revenues.

What is the process associated with promoting the sale of goods or services?

Marketing

What includes the variables that marketing managers can control in order to best satisfy customers in the target market?

Marketing mix

Select the three things a supplier can do to influence an industry if it has high supplier power.

charging higher prices
limiting quality or services
shifting costs to industry participants

What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?

Threat of substitute products or services

Select the three generic business strategies Porter identified for entering a new market.

Focused strategy
Broad cost leadership
Broad differentiation

human resources

includes the policies, plans, and procedures for the effective management of employees.

Buyer power

High because customers have many airlines to choose from

Supplier power

High because there are limited plane and engine manufacturers to choose from

Threat of substitute products or services
and

High because of alternatives, such as videoconferencing and virtual meetings

Threat of new entrants

High because new airlines are continuously entering the market

Rivalry among existing competitors

High because of the existence of websites such as Travelocity.com that force competition based solely on price

Which company is using a broad market and high cost strategy?

Neiman Marcus

Select the three things a supplier can do to influence an industry if it has high supplier power.

limiting quality or services
charging higher prices
shifting costs to industry participants

What are the strategies for entering a new market including broad cost leadership, broad differentiation, and focused strategy?

Three generic business strategies

What includes the policies, plans, and procedures for the effective management of employees?

Human resources

What acquires raw materials to manufacture, deliver, market, sell, and provide after-sales services?

Primary value activities

What are similar to sole proprietorships, except that this legal structure allows for more than one owner.

Partnership

Partnership agreement

A legal agreement between two or more business partners that outlines core business issues.

Capital

Represents money whose purpose is to make more money, for example, the money used to buy a rental property or a business.

What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership?

liability corporation

Rivalry among existing competitors is _____ when competition is fierce in a market and ______ when competitors are more complacent.

high; low

What is an artificially created legal entity that exists separate and apart from those individuals who created it and carry on its operations?

Corporation

What includes firm infrastructure, human resource management, technology development, and procurement?

Support value activities

Finance

...

Competitive advantages are typically ___________.

temporary

What are the strategies for entering a new market including broad cost leadership, broad differentiation, and focused strategy?

Three generic business strategies

Market

segmentation is the division of a market into similar groups of customers.

What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?

Threat of substitute products or services

Human _______ includes the policies, plans, and procedures for the effective management of employees.

resources or resource

Select the three things a supplier can do to influence an industry if it has high supplier power.

charging higher prices
shifting costs to industry participants
limiting quality or services

What analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry?

Porter's Five Forces Model

What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?

Threat of substitute products or services

________ costs are costs that make customers reluctant to switch to another product or service.

Switching

What are generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service?

Porter's three generic strategies

Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in a(n) _________.

industry

What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?

Threat of substitute products or services

A value _____ analysis views a firm as a series of business processes that each add value to the product or service.

chain

Inbound logistics
matches

Acquires raw materials and resources and distributes to manufacturing as required.

Operations

Choice, Transforms raw materials or inputs into goods and services.
Transforms raw materials or inputs into goods and services.

Outbound logistics
matches

, Distributes goods and services to customers.
Distributes goods and services to customers.
Marketing

Marketing and sales
matches
Choice

Choice, Promotes, prices, and sells products to customers.
Promotes, prices, and sells products to customers.

Service

Choice, Provides customer support after the sale of goods and services
Provides customer support after the sale of goods and services

What analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry?

Porter's Five Forces Model

What includes the four phases a product progresses through during its life cycle including introduction, growth, maturity, and decline?

The product life cycle

Select 3 goals or objectives that a leadership plan might include to achieve a solid business strategy.

Attracting new customers
Increasing sales
Decreasing costs

What is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed?

Competitive intelligence

What evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies?

SWOT analysis

Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.

Increase its supplier power
Create entry barriers to reduce the threat of new entrants.

Lead

Choice, A person or company that is unknown to your business.
A person or company that is unknown to your business.

Account
matches

An existing business relationship exists and can include customers, prospects, partners, and competitors.

Contact
matches

Specific individual representing the account.

Sales opportunity
matches

An opportunity exists for a potential sale of goods or services related to an account or contact.

analytics involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.

Customer

What helps an organization segment their customers into categories such as best and worst customers?

CRM analysis technologies

What helps an organization predict customer behavior, such as which customers are at risk of leaving?

CRM predicting technologies

Which of the following questions can be answered using CRM predicting technologies?

Which products will customers buy?

attempts to understand and measure the current process and make performance improvements accordingly.

Business process improvement

Select the four primary strategic initiatives for competitive advantages.

Enterprise resource planning
Supply chain management
Business process reengineering
Customer relationship management

________ analytics involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.

Sales

Identify the key strategies and goals involved in business processes. (Check all that apply.)

Product realization
Customer acquisition
Order to delivery

Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.

Increase its supplier power

What provides an end-to-end view of how operations work together to create a product or service?

Systems thinking

What is typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.

structured data

Select the four primary reasons low-quality information occurs in a system.

Data-entry personnel enter abbreviated information to save time.
Online customers intentionally enter inaccurate information to protect their privacy.
Third-party and external information contains inconsistencies and errors.
Different systems have differe

Select a term that is a synonym for data element, the smallest or basic unit of information in a database.

data field or element

Select the term that refer to storing information about a person, place, thing, transaction, or event.

Entity

Select the statement that accurately defines the relationship between entities and attributes in a relational database.

Each attribute of an entity occupies a separate column of a table.

Information _________ is a measure of the quality of information.

integrity

A(n) _________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.

business

Select the four primary traits of the value of information.

Information type
Information quality
Information timeliness
Information governance

What is data that humans, in interaction with computers, generate?

human-generated data

Transactional information

Encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks.

Analytical information

Encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks.

Select the four functions that a database management system can perform on data in a database.

Delete data
Update data
Read data
Create data

Which tool helps users graphically design the answer to a question against a database?

Query-by-example

What compiles all of the metadata about the data elements in the data model?

Data dictionary

What stores information in the form of logically related two-dimensional tables?

Relational database model

Why does a database offer increased information security?

Various security features of databases ensure that individuals have only certain types of access to certain types of information.

Which of the following are examples of information as opposed to data? (Check all that apply.)

Best customer
Best-selling product
Worst-selling product

Which of the following are types of unstructured data?

text messages
Twitter tweets
emails

A variable is a data characteristic that stands for a value that changes or varies over __________.

time

What extracts information from data and uses it to predict future trends and identify behavioral patterns?

predictive analytics

What uses techniques that create models indicating the best decision to make or course of action to take?

Prescriptive analytics

What are the three categories of analytics?

Predictive analytics
Descriptive analytics
Prescriptive analytics

Data
Information
Business Intelligence
Knowledge

Data
matches
Choice, I have one item.
I have one item.
Information
matches
Choice, The item I have is a product that has the most sales during the month of December.
The item I have is a product that has the most sales during the month of December.
Busine

Match the departments on the left with their primary data types on the right.

Accounting
matches
Choice, Transactional data
Sales
matches
Choice, Potential customer data
Operations management
matches
Choice, Manufacturing data
Marketing
matches
Choice, Promotion data
Human resources
matches
Choice, Employee data
Finance
matches
Cho

True or false: Information in an organization exists only a few departments, such as sales and marketing.

False

What creates, reads, updates, and deletes data in a database while controlling access and security?

Database management system

Select all the activities for which transactional information is created.

Making airline reservations
Withdrawing cash from an ATM
Purchasing stocks

__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.

Analytical

Data ___________ refers to the overall management of the availability, usability, integrity, and security of company data.

governance

What are logical data structures that detail the relationships among data elements using graphics or pictures?

Data models

What are the data elements associated with an entity?

Attributes

What is a collection of related data elements?

Records

What is a field that uniquely identifies a given record in a table?

Primary key

One primary goal of a database is to eliminate information redundancy by recording each piece of information in _______ place(s) in the database.

only one

What are rules that help ensure the quality of information?

Integrity constraints

__________ integrity constraints are rules that enforce basic and fundamental information-based constraints.

Relational

What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?

Business-critical integrity constraints

A(n) ____________ integration takes information entered into a given system and sends it automatically to all downstream systems and processes.

forward

A(n) __________ integration takes information entered into a given system and sends it automatically to all upstream systems and processes.

backward

The Internet of Things (IoT) is a world where interconnected Internet-enabled devices or "things" have the ability to collect and share data __________ human intervention.

without

In analyzing a business, the characteristics of an individual sale, such as the order date, are best referred to as ______.

data

Select the question that can be answered using only raw data.

What is the date, amount sold, and customer number for a sale transaction?

Which of the following are types of machine-generated structured data?

sensor data
point-of-sale data
web log data

A _____ report changes automatically during creation. It includes an update of daily stock market prices or the calculation of available inventory.

dynamic

True or false: The value of information is only as good as the people who make use of the information.

True

How will a business estimate the impact on profits from increases or decreases in costs?

By manipulating variables

What type of analytics is best described with a report that includes charts and graphs explaining the data?

Descriptive analytics

What includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources?

Knowledge

What are the two primary resources knowledge workers use to make decisions?

Information and intuition

What occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally?

information silo

Select the two benefits a business that sold hamburgers would experience if it could produce a hamburger with less expensive inputs or produce more hamburgers with the same inputs.

Rise in productivity
A likely increase in profits

Which of the following is a good example of a system, since removing one part will cause the entire system to stop working?

A car engine

Which type of data is created by a machine without human intervention?

machine-generated data

What refers to the extent of detail within the information?

Information granularity

Select three examples of analytical information.

Future growth projections
Market projections
Sales trends

Which of the following are examples of analytical information?

Sales projections
Product statistics

Information ___________ occurs when the same data element has different values.

inconsistency

What occurs when a system produces incorrect, inconsistent, or duplicate data?

Data integrity issues

Match the characteristic of high-quality information on the left with its corresponding question on the right.
Instructions

Accurate
matches
Choice, Is there an incorrect value in the information?
Is there an incorrect value in the information?
Complete
matches
Choice, Is a value missing from the information?
Is a value missing from the information?
Consistent
matches
Choice,

What is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?

data stewardship

Data _______ is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business.

steward

A(n) ________ maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

database

What is the tool that consists of lines of code (in contrast to a graphical design) for answering questions against a database?

Structured query language

What provides details about data?

Metadata

Which system allows users to create, read, update, and delete data in a relational database?

Relational database management system

A(n) __________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

foreign

True or false: Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.

True

________ allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.

Integrations

What includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data?

data validation

A(n) _____ is the confirmation or validation of an event or object.

fact

Information __________ is the duplication of data, or the storage of the same data in multiple places.

redundancy

__________ management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restricti

Identity

What type of analytics takes past purchasing data as inputs into a model that recommends the best pricing strategy across all flights allowing an airline company to maximize revenue?

Prescriptive analytics

group data and corresponding processes into objects. (Enter one word in each blank.)

Blank 1: Object
Blank 2: oriented
Blank 3: languages

What describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project?

Project scope

What is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors?

COBIT

What is a modern design approach where the designers and system users use an iterative approach to building the system?

Prototyping

What is created that highlights how to use the system and how to troubleshoot issues or problems?

User documentation

What modifies software to meet specific user or business requirements?

Software customization

What is an old system that is fast approaching or beyond the end of its useful life within an organization?

Legacy system

Project ___________ is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

management

A requirements ___________ document prioritizes all of the business requirements by order of importance to the company.

definition

What aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements?

Agile methodology

Select the four primary forms of agile methodologies.

RAD methodology
RUP methodology
Scrum methodology
XP methodology

What breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete?

XP methodology

Select the four gates of the RUP methodology.

Gate one: Inception
Gate four: Transition
Gate two: Elaboration
Gate three: Construction

What uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal?

Scrum methodology

_______-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services.

Service

A(n) ________ being simply a business task, such as checking a potential customer's credit rating when opening a new account.

service

Web ________ are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services.

services

The _________ development life cycle is the overall process for developing information systems, from planning and analysis through implementation and maintenance.

system

True or false: The graphical user interface (GUI) is commonly way of interacting with an an information system.

True

The ____________ phase takes all the detailed design documents from the design phase and transforms them into the actual system.

development

____________ maintenance makes system changes to repair design flaws, coding errors, or implementation issues.

Corrective

What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process?

RAD methodology

Which of the following concerns how an organization should achieve the goals and objectives set by its strategy and are usually the responsibility of mid-level management?

Managerial decisions

Strategic decisions are highly ____________ decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice.

unstructured

What enables users to view details, and details of details, of information?

Drill-down

__________ is the ability to look at information from different perspectives.

Slice-and-Dice

_____ decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future. (Enter one word in the blank.)

Strategic

Information _________ is the act of conforming, acquiescing, or yielding information.

compliance

What is a method or system of government for information management or control?

Information governance

Which is a semistructured decision?

Changing employee benefits

________-if analysis checks the impact of a change in a variable or assumption on the model.

What

At what level do managers develop overall business strategies, goals, and objectives as part of the company's strategic plan?

Strategic level

Match the step in the decision-making process on the left with the correct definition on the right.

Problem identification
matches
Choice, Define the problem as clearly and precisely as possible.
Define the problem as clearly and precisely as possible.
Data collection
matches
Choice, Gather problem-related data, including who, what, where, when, why, an

Select the three structured decisions that almost repetitive in nature and affect short-term business strategies.

Creating weekly production schedules
Creating employee staffing schedules
Reordering inventory

What is the manipulation of information to create business intelligence in support of strategic decision making?

Online analytical processing (OLAP)

What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight?

Executive information system

A(n) ______ agent is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.

intelligent

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

Information

Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Ediscovery
Electronic discovery

The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

Child

What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

Information secrecy

The structure of a typical organization is similar to a __________, and the different levels require different types of information to assist in decision making, problem solving, and opportunity capturing.

pyramid

At the ___________ level, employees develop, control, and maintain core business activities required to run the day-to-day operations.

operational

___________-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.

Semi

A(n) ______ is a simplified representation or abstraction of reality.

model

Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action?

Decision support system

What finds the inputs necessary to achieve a goal such as a desired level of output?

Goal-seeking analysis

What refers to the level of detail in the model or the decision-making process?

Granularity

What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?

Digital dashboard

___ reality is a computer-simulated environment that can be a simulation of the real world or an imaginary world.

Virtual

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?

Cyberbullying

__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

Competitive

A(n) __________ privacy policy details the extent to which email messages may be read by others.

email

What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?

Mail bomb

What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?

Physical security

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?

Workplace MIS monitoring

____ decisions cover short- and medium-range plans, schedules, and budgets along with policies, procedures, and business objectives for a firm and also allocate resources and monitor the performance of organizational subunits.

Managerial

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

Copyright

What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?

patent

What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

Privacy

True or false: Decisions range from routine choices, such as how many items to order or how many people to hire, to unexpected ones such as what to do if a key employee suddenly quits or needed materials do not arrive. Today, with massive volumes of infor

True

Operational decisions are considered __________ decisions, which arise in situations where established processes offer potential solutions.

structured

At the _________ level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.

managerial

Select two unstructured decisions.

Entering a new market
Entering a new industry

Select the three characteristics of online transactional processing.

Stores the information
Processes the information according to defined business rules
Updates existing information to reflect the new information

What produces graphical displays of patterns and complex relationships in large amounts of data?

Visualization

Match the key term on the left with its correct definition on the right.

Pie chart
matches
Choice, A type of graph in which a circle is divided into sectors that each represent a proportion of the whole.
A type of graph in which a circle is divided into sectors that each represent a proportion of the whole.
Bar chart
matches
C

What simulates human thinking and behavior, such as the ability to reason and learn?

Artificial intelligence

What are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems?

Expert systems

What is a category of AI that attempts to emulate the way the human brain works?

Neural network

_________ logic is a mathematical method of handling imprecise or subjective information.

Fuzzy

________ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

Epolicies

A(n) ________ is an act or object that poses a danger to assets.

threat

__________-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

Click

Which epolicy contains general principles regarding information privacy?

Information privacy policy

A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

acceptable

Which policy contains general principles to guide the proper use of the Internet?

Internet use policy

What is the electronic defacing of an existing website?

Cybervandalism

_____ is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Typosquatting

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?

Website name stealing

Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

censorship

Which policy outlines the corporate guidelines or principles governing employee online communications?

Social media policy

What are decisions that occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice?

Unstructured

A(n) ____________ process is often referred to as the technical core, especially in manufacturing organizations, and is the actual conversion of inputs to outputs.

transformation

________ planning focuses on producing goods and services as efficiently as possible within the strategic plan.

Tactical

What is the creation of goods and services using the factors of production: land, labor, capital, entrepreneurship, and knowledge?

Production

Production _________ describes all the activities managers do to help companies create goods.

management

Match the items on the right with their correct categories on the left.
Instructions

Input
matches
Choice, Land, Labor, Capital, Information
Land, Labor, Capital, Information
Transformation
matches
Choice, Conversion process
Conversion process
Output
matches
Choice, Goods, Services
Goods, Services

________ requirement planning systems use sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company.

Materials

What is the term used to describe the difference between the cost of inputs and the value of price of outputs?

Value-added

What deals with the day-to-day procedures for performing work, including scheduling, inventory, and process management?

Operational planning and control

Which system provides the ability to locate, track, and predict the movement of every component or material anywhere upstream or downstream in the production process?

Global inventory management systems

___________ planning systems track and analyze the movement of materials and products to ensure the delivery of materials and finished goods at the right time, the right place, and the lowest cost.

Transportation

Select the organization on the left with its definition on the right.

Six sigma quality
matches
Choice, The goal is to detect potential problems to prevent their occurrence and achieve no more than 3.4 defects per million opportunities. That is important to companies like Bank of America, which makes 4 million transactions

_________ management and control systems provide control and visibility to the status of individual items maintained in inventory.

Inventory

Which system coordinates the process of transporting materials from a manufacturer to distribution centers to the final customers?

Distribution management systems

Select the five key competitive priorities associated with operations management.

Quality
Delivery
Flexibility
Cost
Service

What focuses on long-range planning such as plant size, location, and type of process to be used?

Strategic planning

Select the three correct criteria for SMART objective creation.

Specific
Realistic
Time Frame
measurable
agreed upon

Which of the following is an example of an intangible benefit?

Improved community service

Select the five primary reasons project fail.

Changing technology
Skipped SDLC phases
The cost of finding errors
Unclear or missing business requirements
Balance of the triple constraints

Match the PMBOK term on the left with its definition on the right.

Communication plan
matches
Choice, Defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations
Defines the how, what, when, and who regarding the flow of project information to stakeh

What is the series of activities that determine the earliest time by which the project can be completed?

Critical path

Select the three variables included in the triple constraint.

Scope
Resources
Time

True or false: Managers need to continuously monitor projects to measure their success. If a project is failing, the manager must cancel the project and save the company any further project costs. Canceling a project is not necessarily a failure as much a

True

A(n) ___________ is a logical relationship that exists between the project tasks, or between a project task and a milestone.

dependency

What is a graphical network model that depicts a project's tasks and the relationships between them?

PERT chart

What is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally?

Gantt chart

Which two terms describe the use of professional expertise within an organization to develop and maintain its information technology systems?

In-sourcing
In-house development

_________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

Outsourcing

Which of the following is an example of a tangible benefit?

Decreased processing error

Which of the following is a challenge to outsourcing?

Length of contract

Match the PMBOK term on the left with its definition on the right.

Project management office
matches
Choice, An internal department that oversees all organizational projects.
An internal department that oversees all organizational projects.
Project milestone
matches
Choice, Represents key dates when a certain group of ac

What is the series of activities that determine the earliest time by which the project can be completed?

Critical path

What are easy to quantify and typically measured to determine the success or failure of a project?

Tangible benefits

_________ benefits are difficult to quantify or measure.

Intangible

___________ is the measure of the tangible and intangible benefits of an information system.

Feasibility

Match the feasibility study on the left with its correct definition on the right.

Economic feasibility
matches
Choice, Measures the cost-effectiveness of a project
Measures the cost-effectiveness of a project
Operational feasibility
matches
Choice, Measures how well a solution meets the identified system requirements to solve the probl

True or false: The relationship among the triple constraint variables is such that if any one changes, at least one other is likely to be affected.

True

_________ switch is a trigger that enables a project manager to close the project before completion.

Kill

Select the four common reasons companies outsource.

Improve financial savings
Expansion and rapid growth
Gain core competencies
The Internet and globalizatio

Match the outsourcing form on the left with its correct definition on the right.

Onshore outsourcing
matches
Choice, Engaging another company within the same country for services.
Engaging another company within the same country for services.
Nearshore outsourcing
matches
Choice, Contracting an outsourcing arrangement with a company i

Which of the following is a benefit to outsourcing?

Increased quality and efficiency of business processes.

What refers to a period of time when a system is unavailable?

Downtime

Identify the costs of downtime on the right with the appropriate categories on the left.
Instructions

Financial performance
matches
Choice, Revenue recognition, cash flow, credit rating, stock price
Revenue recognition, cash flow, credit rating, stock price
Damaged reputation
matches
Choice, Customers, suppliers, banks, business partners
Customers, suppli

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

Drive-by hacking

Drag and drop the common types of hackers on the left against the corresponding definitions on the right.

White-hat hackers
matches
Choice, Work at the request of the system owners to find system vulnerabilities and plug the holes.
Work at the request of the system owners to find system vulnerabilities and plug the holes.
Script kiddies
matches
Choice, Find h

An _______ hacker is a person who hacks into a computer system to find vulnerabilities to help a company test its security.

ethical

What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?

White-hat hackers

_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Drive

A(n) ________ is software written with malicious intent to cause annoyance or damage.

virus

Match the hacker weapon on the left with its correct definition on the right.

Elevation of privilege
matches
Choice, A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.
A process by which a user misleads a system into granting unauthorized

Which of the following are the three areas of information security?

authentication and authorization
prevention and resistance
detection and response

Match the focus areas on the right with the type on the left.

People
matches
Choice, Authentication and authorization
Authentication and authorization
Data
matches
Choice, Prevention and resistance
Prevention and resistance
Attacks
matches
Choice, Detection and response
Detection and response

An organization's IT platform consists of the IT components and IT Services.

False

An organization with multiple business written (SBU's) each having different business models would most likely utilize a centralized organization structure?

False

Examples of Functional Area Information Systems (FAIS) are CBIS, ERP, TPS, and SCM.

False

Digital dashboards are information systems that support all managers of the organization.

True

Information technology refers to computer-based tools used to support the needs of an organization?

True

Data from FAIS systems is used to create business intelligence systems and dashboards to help a management make decisions.

True

The IT function is an organization is a support function and the primary goal is cost minimization.

True

Cross-functional business processes are horizontal, spanning multiple departments with each function (department) needing to complete an activity to complete the process.

True

A university register who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be applying her knowledge in your application proce

True

What does a business analyst do?

Evaluates the company's business needs and select systems to improve performance

Enterprise resource planning systems _____.

are utilized to enable cross-functional business processes

The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the

CIO

Competitive advantage for an organization manifests itself as all of the following except:

Increased time to market

Which of the following is the correct hierarchy from the lowest level to the highest level?

Data, information, knowledge

A business process has inputs and outputs.

True

A business process always includes information systems.

False

BPR is a strategy for improving the efficiency of an organization's data collection.

False

The internet increases traditional barriers to entry into a market.

False

Reconciling bank accounts is an example of a(n):

Accounting Business Process

Which of the following is not a role that information systems play in business processes?

Establish standards

A company can create a competitive advantage by executing well designed business processes. An organization seeking significant improvement requiring complete redesign of their business processes would likely use which of the following methods?

Business Process Reengineering

For most companies, the Web ____ the threat that new competitors will enter the market by _____ traditional barriers to entry.

Increases, decreasing

Porter's 5 forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____.

Business strategies, activities

Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?

Cost leadership

An organization that has good Business and IT alignment is best described as which of the following?

Tight integration of the IT function with the organization's strategy, mission, and goals

Functional or information systems can be used to support the needs of the entire enterprise major portions of it.

True

Historically, the functional area information systems were often internally developed independently of one another.

True

Functional area information silos were particularly efficient when business processes crossed functional boundaries in an organization.

False

Enterprise resource management is an enterprise-wide effort to acquire and retain customers.

False

Enterprise resource planning systems take a(n) _____ view of the overall organization.

Business process

Which of the following is false?

Functional area information systems easily communicate with each other.

ERP systems cannot manage cross departmental processes.

False

Business processes may be located within one functional area or may span multiple functional areas.

True

Which of the following is the greatest challenges implementing ERP systems?

Gaining employee support to change and adopt ERP system capabilities

Two alternatives for ERP system computing environments are:

On Premise or SeaS

Comparing FAIS to ERP systems which of the following is true?

FAIS are developed internally while ERP are purchased

Which of the ERP implementation approaches is used when a company decides to adopt the best-practices include in ERP systems?

Vanilla approach

The IT Strategic Plan must be aligned with the organization's strategic plan.

True

The IT Steering committee is a critical component in developing and implementing the IT Strategic Plan.

True

The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets.

True

The buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs.

True

Companies commonly apply the 80/20 rule when evaluating vendor applications software options. When using the 80/20 rule, companies should seriously consider _______.

Modifying their business processes if vendor applications meet 80% of their needs

The ASP and SeaS alternative for acquiring IT applications both rely on vendors to provide the hardware needed for applications to operate.

True

Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except:

Benefits tend to be more tangible than costs

Which of the following is not an advantage of the buy option for acquiring IS applications?

Few types of off-the-shelf software are available, thus limiting confusion

Which of the following is a challenge for organizations following the traditional SDLC method?

Compressing time to build a system.

When a company evaluates options for acquiring information systems, which of the following is fundamental factor in the decision-making process?

The amount of code the company wants to write.

The __________ that changes are made in the systems development life cycle, the _______ expensive these changes become.

Sooner, less.

Which of the following systems acquisition methods is time consuming, costly, and may produce excessive documentation?

Systems development life cycle.

__________ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet.

Software-as-a-Service

With the exception of the Business Architecture area, Enterprise architecture addressees the same elements as Computer Based Information Systems (CBIS)

True

If a CEO wanted to know which systems were used to automate the business processes of the company, he would use the _____ area of enterprise architecture.

Application

The _____ area of Enterprise Architecture can be used to understand the computer hardware, networking and other physical devices.

Infrastructure/Technical

The two major categories of software are systems software and applications software.

True

Applications software cannot be run on computer hardware without operating systems software.

True

Users of software typically interact with which of the following:

Applications Software

The four deployment methods for cloud computing are public clouds, private clouds, hybrid clouds, and horizontal clouds.

False

One advantage of cloud computing is that it shifts IT from a capital expenses to an operating expense.

True

Customers that are using software-as-a-service are not using cloud computing.

False

______ handles all aspects of an application - the application software, the computing resources to run it, and data storage.

Software-as-a-service model

Cloud computing provides a financial advantage over on premise computing because:

Cloud computing is an operating expense while on premise computing is a capital expense

The alternatives for utilizing clod computing include which of the following:

Private Cloud, Public cloud and Hybrid Cloud

Analytic CRM systems help a company by interacting with its customers.

False

Operational CRM systems help a company ______ with customers while Analytical CRM systems help a company _______.

Interact with customers; business intelligence on customer behaviors and perceptions

Measuring customer churn helps a company know the magnitude of the number of customers it loses?

True

CRM is a customer-focused and customer-driven organizational strategy.

True

You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-size care of the same brand for you to drive. The salesperson is engaged in:

Up-selling

Supply chain management is comprised of core components; the components are:

Plan, source, make, deliver, return

A(n) ______ refers to the flow of materials, information, money, and services from raw materials suppliers, through factories and warehouses tot eh end customers.

Supply chain

_____ are the physical products, raw materials, and supplies that flow along a supply chain.

Material flows

IOS technologies assist with a number of SCM tasks, which of the following is NOT a benefit of IOS?

Removing uncertainty in demand forecasts

Which of the following is NOT a goal of supply chain management?

To increase cycle time

A major challenge in supply chain management is reducing uncertainty in demands and supply.

True

Supply chains structured with various links, the concept of managing a company's suppliers and suppliers', is the:

Upstream portion of the supply chain

The _____ is erratic shifts in orders up and down the supply chain.

Bullwhip effect

CRM systems are primarily concerned with _____ and SCM systems are mainly concerned with ______?

Marketing; operations

Aligning Business and IT strategies is important for organizations successful use of IT and has been a consistent theme throughout the semester?

True

Understanding how IT systems improve efficiency and reduce cost of cross-functional business processes has been a consistent theme throughout the semester?

True

Two major options for IT capabilities organizations can choose from are?

Cloud or On-Premise

Based on the ERP demo, companies utilizing SaaS cloud computing have lower IT costs than firms not using SaaS computing

True

Forward auctions are auctions that sellers use as a channel to many potential buyers.

True

Channel conflict occurs when click-and-monitor companies have problems with their regular distributors when they sell directly to customers online.

True

The name of the company who delivered the in-class meeting on SaaS ERP software was

Plex

Internet advertising is impersonal, one-way mass communication.

False

Business-to-consumer applications comprise the majority of electronic commerce dollar volume.

False

Which of the following is not an affect that E-commerce has had on organizations?

E-commerce is a costly medium for increasing market share

______ which is a broader concept than ______, is the buying and selling of goods and services as well as servicing customers, collaborating with business partners, and performing transactions within an organization.

Electronic business; electronic commerce

In _____ e-commerce, the sellers and buyers are organizations.

Business-to-business

If you are a worker managing your fringe benefits over your company's intranet, you are engaging in _______ e-commerce.

Business-to-employee

In ______ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins.

Reverse

eBay uses an ______ auction.

Forward

Which type of electronic commerce is the largest by dollar volume?

Business-to-business

_______ e-commerce is also known as e-tailing.

Business-to-consumer

The advantages of electronic commerce for consumers include all of the following except:

You typically cannot access additional information, so you do not have information overload

E-commerce and E-business are enabled by using the internet to enable access to ERP or FAIS systems?

True

A primary concern in using E-business capabilities is ______.

Security risks from exposing systems to internet threats

Which of the following is not an electronic commerce application?

Evaluating an employee

______ offer(s) consumers incentives to accept advertising and e-mail voluntary.

Permission marketing

Which of the following E-commerce activities would be utilized when interacting with suppliers?

eAuctions

Direct payment of Social Security benefits is an example of ______ e-commerce.

Government-to-citizen

The major components of the "digital economy" as discussed in class are?

Mobil, Social, and Cloud/big data

The major problem with RFID has been ______.

Expense

According to the article from CIO, businesses are moving ERP systems from on-premise to cloud-based architectures

True

Based on the information in the assigned McKinsey article, which of the following practices and systems have an outsized impsact on performance?

CRM/salesforce systems to enable and empower the salesforce

Organizations that use e-commerce and eBusiness utilize data gathered from interactions fir the purpose of analyzing the data with the objective of gaining insights into trends, patterns, and improve business outcomes.

True

Ebusiness/Ecommerce has evolved into the digital economy which is comprised of mobile, social media, and big data.

True

Businesses do not use social commerce for new products.

False

Human Resources departments only use social computing for external tasks.

False

The comments of consumers in the blogosphere concerning a company's products are called ______.

User-generated content

All of the following are used to provide online market research except:

Emails

The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as _______.

Social intelligence

Which of the following is true about the impact of social computing on customer service?

Customers themselves can be used to reduce problems

The function of ______ is to convert digital signals to analog signals and vise-versa.

Modems

It is important for applications and data to be dependent on each other

False

Data not refers to the quality of the data itself

False

There is no difference between master data and transaction data

false

Big Data is easy to define

False

_____________ occurs when the same data are stored in many places.

Data redundancy

An artiste is any characteristic or quality that describes a particular entity

Ture

In the data Hierarchy, the smallest element is the _______.

Bit

You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management

Data inconsistency

What are the three distinct characteristics that distinguish big data from traditional data?

Volume, velocity and variety

In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n)

attribute

A standardized language used to manipulate data is ________.

Structured query language

The process of moving data from various sources into the data warehouse is called

extracting, transforming, and loading

An entity is a person, place, thing, or event about which information is maintained

True

An attribute is any characteristic or quality that describes a particular entity

True

Traditional data formats change __________ while big data formats change ___________

Slowly, rapidly

__________ describe the activities of the business, whereas __________ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities

Transacton data, master data

_________ is a process that helps organization identity, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.

Knowledge management

___________ occurs when various copies of the data agree

Data consistency

Historically, the percentage of IT projects that fully meet their goals is approximately ______%.

33%

Project management is comprised of the following major phases:

Define, Plan, Execute, Close-out

Scope, Communications, Budget and Risk Management are all elements of project management.

True

Risk management is used to manage projects and the techniques used are unique, risk management cannot be used to assist other business function?

False

Over the course of a project, there is an inverse relationship between the cost to correct a risk and likelihood a risk will occur.

True

Based on the CIO article on Business intelligence, they project the future capabilities will

Utilize advance technologies that calculate trends and future possibilities, predicting potential outcomes and making recommendations

The number of alternatives to be considered in decisions today is increasing.

True

Structured decisions address routine, repetitive problems for which standard solutions exist.

True

Unstructured decisions require a combination of standard solution procedures and individual judgment.

False

Targeted marketing is a good example of the discovery of previously unknown or hidden patterns.

False/ but possibly
true

An executive dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors.

True

In the video on artificial intelligence from DARPA they discuss past project involving self-driving cars. The duration from no one successfully completing the project to having several teams successfully complete the project was

12 months

Decisions today are becoming _____ complex, due to ______ uncertainty in the decision environment.

More; Increased

Which of the following is not a characteristic of a structured decision?

The first three phases of the decision-making process need not occur in any particular sequence

_______ decisions are more common at lower organizational levels.

Structured

In the video artificial intelligence from DARPA they discuss utilizing which of the following intelligent

Neural Networks

When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be:

Unstructured

A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision?

semistructured - how ever it may be unstructured

In you were to use Excel and build a model to help test the impact of changes to input variables on output variables is an example of a decision-support system performing which type of analysis?

Sensitivity Analysis

Computer support is greatest for which of the following problems?

Structured and operational control

Searching for valuable business information in a database, data warehouse, or data mart is referred to as _______.

Data mining

Managers and executives need information on business activities and may utilize dashboards to understand how the performance of specific elements. The essential elements to measure success of a business are called

Critical Success Factors

The management cockpit best exemplifies which type of system?

Digital dashboard

For a company to have business intelligence capabilities which of the following are required?

Operational systems data

The name of the company that delivered the demo in class showing data visualization and dashboards was

Tableau

As discussed in class, completing the Foodmart exercise was an example of conducting business intelligence

true

What are the 3 characteristics of online transaction processing?

1. Process the information according to defined business rules.
2. Stores the information.
3. Updates existing information to reflect the new information.

What type of processing system is the basic business system that serves the operational level (analysts) and assists in making structured decisions?

Transaction Processing System (TPS)

What is the difference between transactional information and analytical information?
(transactional is listed first and analytical is second)

1- Encompasses all of the information contained within a single business process or unit of work, supports the performance of daily operational or structured decisions.
Ex: Purchasing stocks, making airline reservations, and withdrawing cash from an ATM.

What type of systems model information using Online Analytical Processing (OLAP), which provides assistance in evaluating and choosing among different courses of action?

Decision Support Systems

Which type of analysis checks the impact of a change in a variable or assumption on the model?

What-If Analysis

Which type of analysis studies the impact on other variables when one variable is changed repeatedly?

Sensitivity Analysis

What produces graphical displays of patterns and complex relationships in large amounts of data?

Visualization

What is a tool that supports visualization. As well as tracks Key Performance Indicators (KPIs) and Critical Success Factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs?

Digital Dashboard

What are the 3 levels to a common company structure? and what are the objectives of each level?
(Starting with the bottom and working upwards)

1. Operational Level: (Structured decisions) Employees develop, control, and maintain core business activities required to run the day-to-day operations.
2. Managerial Level: (Semistructured decisions) Employees are continuously evaluating company operati

What is an example of a semi-structured decision?

Changing Employee Benefits

What is the manipulation of information to create business intelligence in support of strategic decision making?

Online Analytical Processing (OLAP)

Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints?

Optimization Analysis

What are the 4 components of the digital dashboard analytical capabilities?

1. Consolidation: The aggregation of data from simple roll-ups to complex groupings of interrelated information.
Ex: data for different sales reps can be rolled up to an office level, then a state level, then a regional sales level.
2. Drill-Down: Enables

What are 5 potential features included in a dashboard designed for a manufacturing team?

1. A hot list of key performance indicators, refreshed every 15 minutes
2. A running line graph of planned versus actual production for the past 24 hours
3. A table showing actual versus forecasted product prices and inventories
4. A list of outstanding a

What are the 5 areas where we are seeing artificial intelligence? and give examples of AI from each one.

1. Expert Systems: Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.
Ex: Computers Playing Chess
2. Neural Networks: Category of AI that attempts to emulate the way the human brain works.
Ex: Cre

What are intelligent systems?

various commercial applications of artificial intelligence. They include sensors, software, and devices that emulate and enhance human capabilities, learn or understand from experience, make sense of ambiguous or contradictory information, and even use re

What is a mathematical method of handling imprecise or subjective information?

Fuzzy Logic

What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome?

Mutation

What is the name of the software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability?

Shopping Bot

What is Augmented Reality?

The viewing of the physical world with computer-generated layers of information added to it?

What are the 3 challenges when it comes to managerial decision making?

1. Managers need to analyze large amounts of information.
2. Managers must make decisions quickly.
3. Managers must apply sophisticated analysis techniques, such as porter's strategies or forecasting, to make strategic decisions.

What are the 6 steps in the decision making process?

1. Problem Identification: Define the problem as clearly and precisely as possible.
2. Data Collection: Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem.
3. Solu

What is software written with malicious intent to cause annoyance or damage?

A virus

What spreads itself from file to file but also from computer to computer causing annoyances as well as damage in a computer?

A worm

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows internet advertisers to display advertisements without the consent of the computer user?

Adware

What is a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission?

Spyware

What is a form of malicious software that infects your computer and asks for money?

Ransomware

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

Information Security

What are the 6 common types of hackers?

1. Black-Hat hackers: break into other people's computer systems and may just look around or may steal and destroy information.
2. Crackers: Have criminal intent when hacking.
3. Cyberterrorists: Seek to cause harm to people or to destroy critical systems

What is it that refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

Ediscovery (Electronic Discovery)

What are some examples of hacker weapons? (8 listed)

1. Elevation of Privilege: User misleads system into granting unauthorized rights, usually to destroy the system.
2. Hoaxes: Attack computer systems by transmitting a virus hoax with a real virus attached.
3. Malicious Code: A variety of threats such as v

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

Digital Rights Management

What is the legal protection afforded to an expression of an idea, such as a song, book, or video game?

Copyright

What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, distribution, and processing of information itself?

Information Ethics

What are the 5 ethical guidelines for Information Management?

1. Information Secrecy
2. Information Governance
3. Information Management
4. Information Compliance
5. Information Property

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

Information Secrecy

What is the method or system of government for information management or control?

Information Governance

What is it that examines the organizational resource of information and regulates its definitions, uses, value, and distribution. Ensuring that it has the types of data/information required to function and grow effectively?

Information Management

What is the act of conforming, acquiescing, or yielding information?

Information Compliance

What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?

Information Property

What are the four common forms of viruses?

1. Backdoor Programs: Opens a way into the network for future attacks
2. Denial-of-service attack (DoS): Floods a website with so many requests for service that it slows down or crashes the site. (if done with multiple computers it is called Distributed D

What are the two fundamental blocks on which organizations base their businesses?

Ethics and Security

What are the 4 costs of downtime?

1. Financial Performance: Revenue recognition, cash flow, payment guarantees, credit rating, stock price.
2. Revenue: Direct loss, compensatory payments, lost future revenue, Billing losses, Investment losses, Lost Productivity.
3. Damaged Reputation: Cus

What is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part?

Systems Thinking

What is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions?

Feedback

What is a business function that moves information about people, products, and processes across the company to facilitate decision making and problem solving?

Management Information Systems (MIS)

What occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally?

Information Silo

What is Big Data?

A collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.

What type of data has a defined length, type, and format and includes numbers, dates, or strings such as customer address? Also stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that

Structured Data

What type of data does not follow a specific format and is typically free-form text such as emails, twitter tweets, and text messages? Also accounts for about 80 percent of the data that surrounds us.

Unstructured Data

What are the two sources of Unstructured Data?

1. Machine-Generated: includes satellite images, scientific atmosphere data, and radar data.
2. Human-Generated: Includes text messages, social media data, and emails.

What is a report that is created once based on data that does not change?

Static Report

What is a report that changes automatically during creation?

Dynamic Report

What extracts information from data and uses it to predict future trends and identify behavioral patterns?

Predictive Analytics

What includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources?

Knowledge

Who are the individuals valued for their ability to interpret and analyze information?

Knowledge workers

What is the science of fact-based decision making?

Analytics

What is it that reroutes requests for legitimate websites to false websites?

Pharming

What occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data?

Vertical Privilege Escalation

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

Digital Certificate

What is the science that studies encryption? which is the hiding of messages so that only the sender and receiver can read them.

Cryptography

What is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications?

Privilege Escalation

What are the 3 areas of Information Security?

1. People: Authentication and Authorization
2. Data: Prevention and Resistance
3. Attacks: Detection and Response

What is a technique used to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?

Phishing

What is a masquerading attack that combines spam with spoofing?

Phishing Expedition

What examines a trend to identify its nature, causes, speed of development, and potential impacts?

Trend Analysis

What are trends that are viewed as particularly important in a specific community, industry, or sector that are carefully monitored, watched, and reported to key decision makers?

Trend Monitoring

What is the name of software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy, and employ some knowledge or representation of the user's goals or desires?

Autonomous Agent

What is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system?

Autonomic Computing

What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises?

Real-Time Adaptive Security

What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another?

The Ambient Digital Experience

What are the 5 scientific methods that organizations use to anticipate, forecast, and assess future events?

1. Trend Analysis
2. Trend Monitoring
3. Trend Projection
4. Computer Simulation
5. Historical Analysis

What occurs when a complex system, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis?

Computer Simulation