Match the SOA concept on the left with the correct definition on the right.
Service
matches
Choice, A business task.
A business task.
Loose coupling
matches
Choice, The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.
The capabilit
What are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services?
web services
What groups data and corresponding processes into objects?
Object-oriented languages
What illustrates the movement of information between external entities and the processes and data stores within the system?
data flow diagram
Software engineers use ___________ (use acronym) tools, which provide automated support for the development of the system.
CASE
Software __________ is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.
engineering
Which phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase?
Testing phase
Match the testing type on the left with its correct definition on the right.
Alpha Testing
matches
Choice, Assess if the entire system meets the design requirements of the users
Assess if the entire system meets the design requirements of the users
Development Testing
matches
Choice, Test the system to ensure it is bug-free
Test t
What activity can run over the Internet (or on a CD or DVD), allowing employees to complete their training on their own time at their own pace?
Online training
What is held in a classroom environment and led by an instructor?
Workshop training
Which phase does the organization perform changes, corrections, additions, and upgrades to ensure the system continues to meet business goals?
Maintenance phase
________ prototyping builds a small-scale representation or working model of the system to ensure it meets the user and business requirements.
Discovery
What consists of a series of tiny projects. It has become the foundation of multiple agile methodologies?
Iterative development
Which methodology, owned by IBM, provides a framework for breaking down the development of software into four "gates?
RUP methodology
Extensible ________ Language (XML), a markup language for documents, containing structured information.
markup
What is the capability of services to be joined on demand to create composite services or disassembled just as easily into their functional components?
loose coupling
What is the process of transferring information from a legacy system to a new system?
Conversion
What supports general business processes and does not require any specific software customization to meet the organization's needs?
Off-the-shelf application software
Place the phases in the systems development life cycle in the correct order, with the first phase at the top.
P
A
DES
DEV
TEST
IMP/MAINT
The __________ phase establishes a high-level plan of the intended project and determines project goals.
planning
A(n) ___________ agent is a person or event that is the catalyst for implementing major changes for a system to meet business changes.
change
___________ is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.
Brainstorming
What is a temporary activity a company undertakes to create a unique product, service, or result.
Project
Who is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget?
Project manager
The project __________ is a formal, approved document that manages and controls the entire project.
plan
In the __________ phase the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.
analysis
Business __________ are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.
requirements
What is the process of managing changes to the business requirements throughout the project?
Requirements management
Sign-_________ is the users' actual signatures indicating they approve all of the business requirements.
off
Which phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation?
Design phase
What is a programming method that provides for interactive modules to a website?
Scripting language
What are programming languages that look similar to human languages?
Fourth-generation languages
Identify the programing language on the left with the correct definition on the right.
First generation
matches
Choice, Machine language difficult for people to understand
Machine language difficult for people to understand
Second generation
matches
Choice, Assembly language difficult for people to understand
Assembly language difficult for
What are defects in the code of an information system?
Bugs
What details the steps the system must perform along with the expected result of each step?
Test conditions
In which phase does the organization place the system into production so users can begin to perform actual business operations with it?
Implementation phase
What is the best way to support users and respond to users' questions?
Help desk
Match the system implementation method on the left with its correct definition on the right.
Parallel Implementation
matches
Choice, Uses both the legacy system and new system until all users verify that the new system functions correctly
Uses both the legacy system and new system until all users verify that the new system functions correctly
Plu
What makes system changes to reduce the chance of future system failure?
Preventive maintenance
A(n) ____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
methodology
The __________ methodology is a sequence of phases in which the output of each phase becomes the input for the next.
waterfall
What is a phone scam that attempts to defraud people by asking them to call a bogus phone number to "confirm" their account information?
Vishing (Voice Phishing)
What uses a zombie pharm, often by an organized crime association, to launch a massive phishing attack?
Pharming attack
What is the identification of a user based on a physical characteristic? such as fingerprint, iris, face, voice, or handwriting.
Biometrics
What is it that occurs when attackers grant themselves the same access levels they already have but assume the identity of another user?
Horizontal Privilege Escalation
What is a form of social engineering in which one individual lies to obtain confidential data about another individual?
Pretexting
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?
Zombie
What is it that details how an organization will implement the information securities policies?
Information Security Plan
What are small electronic devices that change user passwords automatically?
Tokens
Organizations address security risks through two lines of defense, what are they?
1. People
2. Technology
What do we call malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines?
Destructive Agents
What is it that the National Institute of Standards and Technology (NIST) introduced? Designed to keep government information secure.
Advanced Encryption Standard (AES)
What is a group of computers on which a hacker has planted zombie programs?
Zombie Farm
What are 7 trends that the book highlights that have the potential to change our world, our future, and our lives?
1. The world's population will double in the next 40 years.
2. People in developed countries are living longer.
3. The growth in information industries is creating a knowledge-dependent global society.
4. The global economy is becoming more integrated.
5.
What occurs when numerical data is available and a trend can be plotted to display changes through time and into the future?
Trend Projection
Internal rate of return
The rate at which the net present value of an investment equals zero
Return on investment
ndicates the earning power of a project and is measured by dividing the benefits of a project by the investment.
Cash flow analysis
A means to conduct a periodic check on the company's financial health.
Break-even analysis
A way to determine the volume of business required to begin to make a profit at the current prices charged for the products or services.
sales
is the function of selling a good or service and focuses on increasing customer sales, which increases company revenues.
What is the process associated with promoting the sale of goods or services?
Marketing
What includes the variables that marketing managers can control in order to best satisfy customers in the target market?
Marketing mix
Select the three things a supplier can do to influence an industry if it has high supplier power.
charging higher prices
limiting quality or services
shifting costs to industry participants
What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?
Threat of substitute products or services
Select the three generic business strategies Porter identified for entering a new market.
Focused strategy
Broad cost leadership
Broad differentiation
human resources
includes the policies, plans, and procedures for the effective management of employees.
Buyer power
High because customers have many airlines to choose from
Supplier power
High because there are limited plane and engine manufacturers to choose from
Threat of substitute products or services
and
High because of alternatives, such as videoconferencing and virtual meetings
Threat of new entrants
High because new airlines are continuously entering the market
Rivalry among existing competitors
High because of the existence of websites such as Travelocity.com that force competition based solely on price
Which company is using a broad market and high cost strategy?
Neiman Marcus
Select the three things a supplier can do to influence an industry if it has high supplier power.
limiting quality or services
charging higher prices
shifting costs to industry participants
What are the strategies for entering a new market including broad cost leadership, broad differentiation, and focused strategy?
Three generic business strategies
What includes the policies, plans, and procedures for the effective management of employees?
Human resources
What acquires raw materials to manufacture, deliver, market, sell, and provide after-sales services?
Primary value activities
What are similar to sole proprietorships, except that this legal structure allows for more than one owner.
Partnership
Partnership agreement
A legal agreement between two or more business partners that outlines core business issues.
Capital
Represents money whose purpose is to make more money, for example, the money used to buy a rental property or a business.
What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership?
liability corporation
Rivalry among existing competitors is _____ when competition is fierce in a market and ______ when competitors are more complacent.
high; low
What is an artificially created legal entity that exists separate and apart from those individuals who created it and carry on its operations?
Corporation
What includes firm infrastructure, human resource management, technology development, and procurement?
Support value activities
Finance
...
Competitive advantages are typically ___________.
temporary
What are the strategies for entering a new market including broad cost leadership, broad differentiation, and focused strategy?
Three generic business strategies
Market
segmentation is the division of a market into similar groups of customers.
What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?
Threat of substitute products or services
Human _______ includes the policies, plans, and procedures for the effective management of employees.
resources or resource
Select the three things a supplier can do to influence an industry if it has high supplier power.
charging higher prices
shifting costs to industry participants
limiting quality or services
What analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry?
Porter's Five Forces Model
What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?
Threat of substitute products or services
________ costs are costs that make customers reluctant to switch to another product or service.
Switching
What are generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service?
Porter's three generic strategies
Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in a(n) _________.
industry
What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?
Threat of substitute products or services
A value _____ analysis views a firm as a series of business processes that each add value to the product or service.
chain
Inbound logistics
matches
Acquires raw materials and resources and distributes to manufacturing as required.
Operations
Choice, Transforms raw materials or inputs into goods and services.
Transforms raw materials or inputs into goods and services.
Outbound logistics
matches
, Distributes goods and services to customers.
Distributes goods and services to customers.
Marketing
Marketing and sales
matches
Choice
Choice, Promotes, prices, and sells products to customers.
Promotes, prices, and sells products to customers.
Service
Choice, Provides customer support after the sale of goods and services
Provides customer support after the sale of goods and services
What analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry?
Porter's Five Forces Model
What includes the four phases a product progresses through during its life cycle including introduction, growth, maturity, and decline?
The product life cycle
Select 3 goals or objectives that a leadership plan might include to achieve a solid business strategy.
Attracting new customers
Increasing sales
Decreasing costs
What is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed?
Competitive intelligence
What evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies?
SWOT analysis
Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.
Increase its supplier power
Create entry barriers to reduce the threat of new entrants.
Lead
Choice, A person or company that is unknown to your business.
A person or company that is unknown to your business.
Account
matches
An existing business relationship exists and can include customers, prospects, partners, and competitors.
Contact
matches
Specific individual representing the account.
Sales opportunity
matches
An opportunity exists for a potential sale of goods or services related to an account or contact.
analytics involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.
Customer
What helps an organization segment their customers into categories such as best and worst customers?
CRM analysis technologies
What helps an organization predict customer behavior, such as which customers are at risk of leaving?
CRM predicting technologies
Which of the following questions can be answered using CRM predicting technologies?
Which products will customers buy?
attempts to understand and measure the current process and make performance improvements accordingly.
Business process improvement
Select the four primary strategic initiatives for competitive advantages.
Enterprise resource planning
Supply chain management
Business process reengineering
Customer relationship management
________ analytics involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.
Sales
Identify the key strategies and goals involved in business processes. (Check all that apply.)
Product realization
Customer acquisition
Order to delivery
Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.
Increase its supplier power
What provides an end-to-end view of how operations work together to create a product or service?
Systems thinking
What is typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.
structured data
Select the four primary reasons low-quality information occurs in a system.
Data-entry personnel enter abbreviated information to save time.
Online customers intentionally enter inaccurate information to protect their privacy.
Third-party and external information contains inconsistencies and errors.
Different systems have differe
Select a term that is a synonym for data element, the smallest or basic unit of information in a database.
data field or element
Select the term that refer to storing information about a person, place, thing, transaction, or event.
Entity
Select the statement that accurately defines the relationship between entities and attributes in a relational database.
Each attribute of an entity occupies a separate column of a table.
Information _________ is a measure of the quality of information.
integrity
A(n) _________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.
business
Select the four primary traits of the value of information.
Information type
Information quality
Information timeliness
Information governance
What is data that humans, in interaction with computers, generate?
human-generated data
Transactional information
Encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks.
Analytical information
Encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks.
Select the four functions that a database management system can perform on data in a database.
Delete data
Update data
Read data
Create data
Which tool helps users graphically design the answer to a question against a database?
Query-by-example
What compiles all of the metadata about the data elements in the data model?
Data dictionary
What stores information in the form of logically related two-dimensional tables?
Relational database model
Why does a database offer increased information security?
Various security features of databases ensure that individuals have only certain types of access to certain types of information.
Which of the following are examples of information as opposed to data? (Check all that apply.)
Best customer
Best-selling product
Worst-selling product
Which of the following are types of unstructured data?
text messages
Twitter tweets
emails
A variable is a data characteristic that stands for a value that changes or varies over __________.
time
What extracts information from data and uses it to predict future trends and identify behavioral patterns?
predictive analytics
What uses techniques that create models indicating the best decision to make or course of action to take?
Prescriptive analytics
What are the three categories of analytics?
Predictive analytics
Descriptive analytics
Prescriptive analytics
Data
Information
Business Intelligence
Knowledge
Data
matches
Choice, I have one item.
I have one item.
Information
matches
Choice, The item I have is a product that has the most sales during the month of December.
The item I have is a product that has the most sales during the month of December.
Busine
Match the departments on the left with their primary data types on the right.
Accounting
matches
Choice, Transactional data
Sales
matches
Choice, Potential customer data
Operations management
matches
Choice, Manufacturing data
Marketing
matches
Choice, Promotion data
Human resources
matches
Choice, Employee data
Finance
matches
Cho
True or false: Information in an organization exists only a few departments, such as sales and marketing.
False
What creates, reads, updates, and deletes data in a database while controlling access and security?
Database management system
Select all the activities for which transactional information is created.
Making airline reservations
Withdrawing cash from an ATM
Purchasing stocks
__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
Analytical
Data ___________ refers to the overall management of the availability, usability, integrity, and security of company data.
governance
What are logical data structures that detail the relationships among data elements using graphics or pictures?
Data models
What are the data elements associated with an entity?
Attributes
What is a collection of related data elements?
Records
What is a field that uniquely identifies a given record in a table?
Primary key
One primary goal of a database is to eliminate information redundancy by recording each piece of information in _______ place(s) in the database.
only one
What are rules that help ensure the quality of information?
Integrity constraints
__________ integrity constraints are rules that enforce basic and fundamental information-based constraints.
Relational
What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?
Business-critical integrity constraints
A(n) ____________ integration takes information entered into a given system and sends it automatically to all downstream systems and processes.
forward
A(n) __________ integration takes information entered into a given system and sends it automatically to all upstream systems and processes.
backward
The Internet of Things (IoT) is a world where interconnected Internet-enabled devices or "things" have the ability to collect and share data __________ human intervention.
without
In analyzing a business, the characteristics of an individual sale, such as the order date, are best referred to as ______.
data
Select the question that can be answered using only raw data.
What is the date, amount sold, and customer number for a sale transaction?
Which of the following are types of machine-generated structured data?
sensor data
point-of-sale data
web log data
A _____ report changes automatically during creation. It includes an update of daily stock market prices or the calculation of available inventory.
dynamic
True or false: The value of information is only as good as the people who make use of the information.
True
How will a business estimate the impact on profits from increases or decreases in costs?
By manipulating variables
What type of analytics is best described with a report that includes charts and graphs explaining the data?
Descriptive analytics
What includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources?
Knowledge
What are the two primary resources knowledge workers use to make decisions?
Information and intuition
What occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally?
information silo
Select the two benefits a business that sold hamburgers would experience if it could produce a hamburger with less expensive inputs or produce more hamburgers with the same inputs.
Rise in productivity
A likely increase in profits
Which of the following is a good example of a system, since removing one part will cause the entire system to stop working?
A car engine
Which type of data is created by a machine without human intervention?
machine-generated data
What refers to the extent of detail within the information?
Information granularity
Select three examples of analytical information.
Future growth projections
Market projections
Sales trends
Which of the following are examples of analytical information?
Sales projections
Product statistics
Information ___________ occurs when the same data element has different values.
inconsistency
What occurs when a system produces incorrect, inconsistent, or duplicate data?
Data integrity issues
Match the characteristic of high-quality information on the left with its corresponding question on the right.
Instructions
Accurate
matches
Choice, Is there an incorrect value in the information?
Is there an incorrect value in the information?
Complete
matches
Choice, Is a value missing from the information?
Is a value missing from the information?
Consistent
matches
Choice,
What is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?
data stewardship
Data _______ is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business.
steward
A(n) ________ maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
database
What is the tool that consists of lines of code (in contrast to a graphical design) for answering questions against a database?
Structured query language
What provides details about data?
Metadata
Which system allows users to create, read, update, and delete data in a relational database?
Relational database management system
A(n) __________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
foreign
True or false: Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.
True
________ allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.
Integrations
What includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data?
data validation
A(n) _____ is the confirmation or validation of an event or object.
fact
Information __________ is the duplication of data, or the storage of the same data in multiple places.
redundancy
__________ management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restricti
Identity
What type of analytics takes past purchasing data as inputs into a model that recommends the best pricing strategy across all flights allowing an airline company to maximize revenue?
Prescriptive analytics
group data and corresponding processes into objects. (Enter one word in each blank.)
Blank 1: Object
Blank 2: oriented
Blank 3: languages
What describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project?
Project scope
What is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors?
COBIT
What is a modern design approach where the designers and system users use an iterative approach to building the system?
Prototyping
What is created that highlights how to use the system and how to troubleshoot issues or problems?
User documentation
What modifies software to meet specific user or business requirements?
Software customization
What is an old system that is fast approaching or beyond the end of its useful life within an organization?
Legacy system
Project ___________ is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.
management
A requirements ___________ document prioritizes all of the business requirements by order of importance to the company.
definition
What aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements?
Agile methodology
Select the four primary forms of agile methodologies.
RAD methodology
RUP methodology
Scrum methodology
XP methodology
What breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete?
XP methodology
Select the four gates of the RUP methodology.
Gate one: Inception
Gate four: Transition
Gate two: Elaboration
Gate three: Construction
What uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal?
Scrum methodology
_______-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services.
Service
A(n) ________ being simply a business task, such as checking a potential customer's credit rating when opening a new account.
service
Web ________ are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services.
services
The _________ development life cycle is the overall process for developing information systems, from planning and analysis through implementation and maintenance.
system
True or false: The graphical user interface (GUI) is commonly way of interacting with an an information system.
True
The ____________ phase takes all the detailed design documents from the design phase and transforms them into the actual system.
development
____________ maintenance makes system changes to repair design flaws, coding errors, or implementation issues.
Corrective
What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process?
RAD methodology
Which of the following concerns how an organization should achieve the goals and objectives set by its strategy and are usually the responsibility of mid-level management?
Managerial decisions
Strategic decisions are highly ____________ decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice.
unstructured
What enables users to view details, and details of details, of information?
Drill-down
__________ is the ability to look at information from different perspectives.
Slice-and-Dice
_____ decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future. (Enter one word in the blank.)
Strategic
Information _________ is the act of conforming, acquiescing, or yielding information.
compliance
What is a method or system of government for information management or control?
Information governance
Which is a semistructured decision?
Changing employee benefits
________-if analysis checks the impact of a change in a variable or assumption on the model.
What
At what level do managers develop overall business strategies, goals, and objectives as part of the company's strategic plan?
Strategic level
Match the step in the decision-making process on the left with the correct definition on the right.
Problem identification
matches
Choice, Define the problem as clearly and precisely as possible.
Define the problem as clearly and precisely as possible.
Data collection
matches
Choice, Gather problem-related data, including who, what, where, when, why, an
Select the three structured decisions that almost repetitive in nature and affect short-term business strategies.
Creating weekly production schedules
Creating employee staffing schedules
Reordering inventory
What is the manipulation of information to create business intelligence in support of strategic decision making?
Online analytical processing (OLAP)
What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight?
Executive information system
A(n) ______ agent is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.
intelligent
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
Information
Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Ediscovery
Electronic discovery
The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
Child
What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
Information secrecy
The structure of a typical organization is similar to a __________, and the different levels require different types of information to assist in decision making, problem solving, and opportunity capturing.
pyramid
At the ___________ level, employees develop, control, and maintain core business activities required to run the day-to-day operations.
operational
___________-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.
Semi
A(n) ______ is a simplified representation or abstraction of reality.
model
Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action?
Decision support system
What finds the inputs necessary to achieve a goal such as a desired level of output?
Goal-seeking analysis
What refers to the level of detail in the model or the decision-making process?
Granularity
What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?
Digital dashboard
___ reality is a computer-simulated environment that can be a simulation of the real world or an imaginary world.
Virtual
What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
Cyberbullying
__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Competitive
A(n) __________ privacy policy details the extent to which email messages may be read by others.
What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?
Mail bomb
What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?
Physical security
What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?
Workplace MIS monitoring
____ decisions cover short- and medium-range plans, schedules, and budgets along with policies, procedures, and business objectives for a firm and also allocate resources and monitor the performance of organizational subunits.
Managerial
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
Copyright
What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?
patent
What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
Privacy
True or false: Decisions range from routine choices, such as how many items to order or how many people to hire, to unexpected ones such as what to do if a key employee suddenly quits or needed materials do not arrive. Today, with massive volumes of infor
True
Operational decisions are considered __________ decisions, which arise in situations where established processes offer potential solutions.
structured
At the _________ level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.
managerial
Select two unstructured decisions.
Entering a new market
Entering a new industry
Select the three characteristics of online transactional processing.
Stores the information
Processes the information according to defined business rules
Updates existing information to reflect the new information
What produces graphical displays of patterns and complex relationships in large amounts of data?
Visualization
Match the key term on the left with its correct definition on the right.
Pie chart
matches
Choice, A type of graph in which a circle is divided into sectors that each represent a proportion of the whole.
A type of graph in which a circle is divided into sectors that each represent a proportion of the whole.
Bar chart
matches
C
What simulates human thinking and behavior, such as the ability to reason and learn?
Artificial intelligence
What are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems?
Expert systems
What is a category of AI that attempts to emulate the way the human brain works?
Neural network
_________ logic is a mathematical method of handling imprecise or subjective information.
Fuzzy
________ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Epolicies
A(n) ________ is an act or object that poses a danger to assets.
threat
__________-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Click
Which epolicy contains general principles regarding information privacy?
Information privacy policy
A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
acceptable
Which policy contains general principles to guide the proper use of the Internet?
Internet use policy
What is the electronic defacing of an existing website?
Cybervandalism
_____ is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Typosquatting
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
Website name stealing
Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
censorship
Which policy outlines the corporate guidelines or principles governing employee online communications?
Social media policy
What are decisions that occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice?
Unstructured
A(n) ____________ process is often referred to as the technical core, especially in manufacturing organizations, and is the actual conversion of inputs to outputs.
transformation
________ planning focuses on producing goods and services as efficiently as possible within the strategic plan.
Tactical
What is the creation of goods and services using the factors of production: land, labor, capital, entrepreneurship, and knowledge?
Production
Production _________ describes all the activities managers do to help companies create goods.
management
Match the items on the right with their correct categories on the left.
Instructions
Input
matches
Choice, Land, Labor, Capital, Information
Land, Labor, Capital, Information
Transformation
matches
Choice, Conversion process
Conversion process
Output
matches
Choice, Goods, Services
Goods, Services
________ requirement planning systems use sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company.
Materials
What is the term used to describe the difference between the cost of inputs and the value of price of outputs?
Value-added
What deals with the day-to-day procedures for performing work, including scheduling, inventory, and process management?
Operational planning and control
Which system provides the ability to locate, track, and predict the movement of every component or material anywhere upstream or downstream in the production process?
Global inventory management systems
___________ planning systems track and analyze the movement of materials and products to ensure the delivery of materials and finished goods at the right time, the right place, and the lowest cost.
Transportation
Select the organization on the left with its definition on the right.
Six sigma quality
matches
Choice, The goal is to detect potential problems to prevent their occurrence and achieve no more than 3.4 defects per million opportunities. That is important to companies like Bank of America, which makes 4 million transactions
_________ management and control systems provide control and visibility to the status of individual items maintained in inventory.
Inventory
Which system coordinates the process of transporting materials from a manufacturer to distribution centers to the final customers?
Distribution management systems
Select the five key competitive priorities associated with operations management.
Quality
Delivery
Flexibility
Cost
Service
What focuses on long-range planning such as plant size, location, and type of process to be used?
Strategic planning
Select the three correct criteria for SMART objective creation.
Specific
Realistic
Time Frame
measurable
agreed upon
Which of the following is an example of an intangible benefit?
Improved community service
Select the five primary reasons project fail.
Changing technology
Skipped SDLC phases
The cost of finding errors
Unclear or missing business requirements
Balance of the triple constraints
Match the PMBOK term on the left with its definition on the right.
Communication plan
matches
Choice, Defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations
Defines the how, what, when, and who regarding the flow of project information to stakeh
What is the series of activities that determine the earliest time by which the project can be completed?
Critical path
Select the three variables included in the triple constraint.
Scope
Resources
Time
True or false: Managers need to continuously monitor projects to measure their success. If a project is failing, the manager must cancel the project and save the company any further project costs. Canceling a project is not necessarily a failure as much a
True
A(n) ___________ is a logical relationship that exists between the project tasks, or between a project task and a milestone.
dependency
What is a graphical network model that depicts a project's tasks and the relationships between them?
PERT chart
What is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally?
Gantt chart
Which two terms describe the use of professional expertise within an organization to develop and maintain its information technology systems?
In-sourcing
In-house development
_________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
Outsourcing
Which of the following is an example of a tangible benefit?
Decreased processing error
Which of the following is a challenge to outsourcing?
Length of contract
Match the PMBOK term on the left with its definition on the right.
Project management office
matches
Choice, An internal department that oversees all organizational projects.
An internal department that oversees all organizational projects.
Project milestone
matches
Choice, Represents key dates when a certain group of ac
What is the series of activities that determine the earliest time by which the project can be completed?
Critical path
What are easy to quantify and typically measured to determine the success or failure of a project?
Tangible benefits
_________ benefits are difficult to quantify or measure.
Intangible
___________ is the measure of the tangible and intangible benefits of an information system.
Feasibility
Match the feasibility study on the left with its correct definition on the right.
Economic feasibility
matches
Choice, Measures the cost-effectiveness of a project
Measures the cost-effectiveness of a project
Operational feasibility
matches
Choice, Measures how well a solution meets the identified system requirements to solve the probl
True or false: The relationship among the triple constraint variables is such that if any one changes, at least one other is likely to be affected.
True
_________ switch is a trigger that enables a project manager to close the project before completion.
Kill
Select the four common reasons companies outsource.
Improve financial savings
Expansion and rapid growth
Gain core competencies
The Internet and globalizatio
Match the outsourcing form on the left with its correct definition on the right.
Onshore outsourcing
matches
Choice, Engaging another company within the same country for services.
Engaging another company within the same country for services.
Nearshore outsourcing
matches
Choice, Contracting an outsourcing arrangement with a company i
Which of the following is a benefit to outsourcing?
Increased quality and efficiency of business processes.
What refers to a period of time when a system is unavailable?
Downtime
Identify the costs of downtime on the right with the appropriate categories on the left.
Instructions
Financial performance
matches
Choice, Revenue recognition, cash flow, credit rating, stock price
Revenue recognition, cash flow, credit rating, stock price
Damaged reputation
matches
Choice, Customers, suppliers, banks, business partners
Customers, suppli
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
Drive-by hacking
Drag and drop the common types of hackers on the left against the corresponding definitions on the right.
White-hat hackers
matches
Choice, Work at the request of the system owners to find system vulnerabilities and plug the holes.
Work at the request of the system owners to find system vulnerabilities and plug the holes.
Script kiddies
matches
Choice, Find h
An _______ hacker is a person who hacks into a computer system to find vulnerabilities to help a company test its security.
ethical
What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?
White-hat hackers
_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
Drive
A(n) ________ is software written with malicious intent to cause annoyance or damage.
virus
Match the hacker weapon on the left with its correct definition on the right.
Elevation of privilege
matches
Choice, A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.
A process by which a user misleads a system into granting unauthorized
Which of the following are the three areas of information security?
authentication and authorization
prevention and resistance
detection and response
Match the focus areas on the right with the type on the left.
People
matches
Choice, Authentication and authorization
Authentication and authorization
Data
matches
Choice, Prevention and resistance
Prevention and resistance
Attacks
matches
Choice, Detection and response
Detection and response
An organization's IT platform consists of the IT components and IT Services.
False
An organization with multiple business written (SBU's) each having different business models would most likely utilize a centralized organization structure?
False
Examples of Functional Area Information Systems (FAIS) are CBIS, ERP, TPS, and SCM.
False
Digital dashboards are information systems that support all managers of the organization.
True
Information technology refers to computer-based tools used to support the needs of an organization?
True
Data from FAIS systems is used to create business intelligence systems and dashboards to help a management make decisions.
True
The IT function is an organization is a support function and the primary goal is cost minimization.
True
Cross-functional business processes are horizontal, spanning multiple departments with each function (department) needing to complete an activity to complete the process.
True
A university register who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be applying her knowledge in your application proce
True
What does a business analyst do?
Evaluates the company's business needs and select systems to improve performance
Enterprise resource planning systems _____.
are utilized to enable cross-functional business processes
The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the
CIO
Competitive advantage for an organization manifests itself as all of the following except:
Increased time to market
Which of the following is the correct hierarchy from the lowest level to the highest level?
Data, information, knowledge
A business process has inputs and outputs.
True
A business process always includes information systems.
False
BPR is a strategy for improving the efficiency of an organization's data collection.
False
The internet increases traditional barriers to entry into a market.
False
Reconciling bank accounts is an example of a(n):
Accounting Business Process
Which of the following is not a role that information systems play in business processes?
Establish standards
A company can create a competitive advantage by executing well designed business processes. An organization seeking significant improvement requiring complete redesign of their business processes would likely use which of the following methods?
Business Process Reengineering
For most companies, the Web ____ the threat that new competitors will enter the market by _____ traditional barriers to entry.
Increases, decreasing
Porter's 5 forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____.
Business strategies, activities
Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?
Cost leadership
An organization that has good Business and IT alignment is best described as which of the following?
Tight integration of the IT function with the organization's strategy, mission, and goals
Functional or information systems can be used to support the needs of the entire enterprise major portions of it.
True
Historically, the functional area information systems were often internally developed independently of one another.
True
Functional area information silos were particularly efficient when business processes crossed functional boundaries in an organization.
False
Enterprise resource management is an enterprise-wide effort to acquire and retain customers.
False
Enterprise resource planning systems take a(n) _____ view of the overall organization.
Business process
Which of the following is false?
Functional area information systems easily communicate with each other.
ERP systems cannot manage cross departmental processes.
False
Business processes may be located within one functional area or may span multiple functional areas.
True
Which of the following is the greatest challenges implementing ERP systems?
Gaining employee support to change and adopt ERP system capabilities
Two alternatives for ERP system computing environments are:
On Premise or SeaS
Comparing FAIS to ERP systems which of the following is true?
FAIS are developed internally while ERP are purchased
Which of the ERP implementation approaches is used when a company decides to adopt the best-practices include in ERP systems?
Vanilla approach
The IT Strategic Plan must be aligned with the organization's strategic plan.
True
The IT Steering committee is a critical component in developing and implementing the IT Strategic Plan.
True
The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets.
True
The buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs.
True
Companies commonly apply the 80/20 rule when evaluating vendor applications software options. When using the 80/20 rule, companies should seriously consider _______.
Modifying their business processes if vendor applications meet 80% of their needs
The ASP and SeaS alternative for acquiring IT applications both rely on vendors to provide the hardware needed for applications to operate.
True
Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except:
Benefits tend to be more tangible than costs
Which of the following is not an advantage of the buy option for acquiring IS applications?
Few types of off-the-shelf software are available, thus limiting confusion
Which of the following is a challenge for organizations following the traditional SDLC method?
Compressing time to build a system.
When a company evaluates options for acquiring information systems, which of the following is fundamental factor in the decision-making process?
The amount of code the company wants to write.
The __________ that changes are made in the systems development life cycle, the _______ expensive these changes become.
Sooner, less.
Which of the following systems acquisition methods is time consuming, costly, and may produce excessive documentation?
Systems development life cycle.
__________ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet.
Software-as-a-Service
With the exception of the Business Architecture area, Enterprise architecture addressees the same elements as Computer Based Information Systems (CBIS)
True
If a CEO wanted to know which systems were used to automate the business processes of the company, he would use the _____ area of enterprise architecture.
Application
The _____ area of Enterprise Architecture can be used to understand the computer hardware, networking and other physical devices.
Infrastructure/Technical
The two major categories of software are systems software and applications software.
True
Applications software cannot be run on computer hardware without operating systems software.
True
Users of software typically interact with which of the following:
Applications Software
The four deployment methods for cloud computing are public clouds, private clouds, hybrid clouds, and horizontal clouds.
False
One advantage of cloud computing is that it shifts IT from a capital expenses to an operating expense.
True
Customers that are using software-as-a-service are not using cloud computing.
False
______ handles all aspects of an application - the application software, the computing resources to run it, and data storage.
Software-as-a-service model
Cloud computing provides a financial advantage over on premise computing because:
Cloud computing is an operating expense while on premise computing is a capital expense
The alternatives for utilizing clod computing include which of the following:
Private Cloud, Public cloud and Hybrid Cloud
Analytic CRM systems help a company by interacting with its customers.
False
Operational CRM systems help a company ______ with customers while Analytical CRM systems help a company _______.
Interact with customers; business intelligence on customer behaviors and perceptions
Measuring customer churn helps a company know the magnitude of the number of customers it loses?
True
CRM is a customer-focused and customer-driven organizational strategy.
True
You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-size care of the same brand for you to drive. The salesperson is engaged in:
Up-selling
Supply chain management is comprised of core components; the components are:
Plan, source, make, deliver, return
A(n) ______ refers to the flow of materials, information, money, and services from raw materials suppliers, through factories and warehouses tot eh end customers.
Supply chain
_____ are the physical products, raw materials, and supplies that flow along a supply chain.
Material flows
IOS technologies assist with a number of SCM tasks, which of the following is NOT a benefit of IOS?
Removing uncertainty in demand forecasts
Which of the following is NOT a goal of supply chain management?
To increase cycle time
A major challenge in supply chain management is reducing uncertainty in demands and supply.
True
Supply chains structured with various links, the concept of managing a company's suppliers and suppliers', is the:
Upstream portion of the supply chain
The _____ is erratic shifts in orders up and down the supply chain.
Bullwhip effect
CRM systems are primarily concerned with _____ and SCM systems are mainly concerned with ______?
Marketing; operations
Aligning Business and IT strategies is important for organizations successful use of IT and has been a consistent theme throughout the semester?
True
Understanding how IT systems improve efficiency and reduce cost of cross-functional business processes has been a consistent theme throughout the semester?
True
Two major options for IT capabilities organizations can choose from are?
Cloud or On-Premise
Based on the ERP demo, companies utilizing SaaS cloud computing have lower IT costs than firms not using SaaS computing
True
Forward auctions are auctions that sellers use as a channel to many potential buyers.
True
Channel conflict occurs when click-and-monitor companies have problems with their regular distributors when they sell directly to customers online.
True
The name of the company who delivered the in-class meeting on SaaS ERP software was
Plex
Internet advertising is impersonal, one-way mass communication.
False
Business-to-consumer applications comprise the majority of electronic commerce dollar volume.
False
Which of the following is not an affect that E-commerce has had on organizations?
E-commerce is a costly medium for increasing market share
______ which is a broader concept than ______, is the buying and selling of goods and services as well as servicing customers, collaborating with business partners, and performing transactions within an organization.
Electronic business; electronic commerce
In _____ e-commerce, the sellers and buyers are organizations.
Business-to-business
If you are a worker managing your fringe benefits over your company's intranet, you are engaging in _______ e-commerce.
Business-to-employee
In ______ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins.
Reverse
eBay uses an ______ auction.
Forward
Which type of electronic commerce is the largest by dollar volume?
Business-to-business
_______ e-commerce is also known as e-tailing.
Business-to-consumer
The advantages of electronic commerce for consumers include all of the following except:
You typically cannot access additional information, so you do not have information overload
E-commerce and E-business are enabled by using the internet to enable access to ERP or FAIS systems?
True
A primary concern in using E-business capabilities is ______.
Security risks from exposing systems to internet threats
Which of the following is not an electronic commerce application?
Evaluating an employee
______ offer(s) consumers incentives to accept advertising and e-mail voluntary.
Permission marketing
Which of the following E-commerce activities would be utilized when interacting with suppliers?
eAuctions
Direct payment of Social Security benefits is an example of ______ e-commerce.
Government-to-citizen
The major components of the "digital economy" as discussed in class are?
Mobil, Social, and Cloud/big data
The major problem with RFID has been ______.
Expense
According to the article from CIO, businesses are moving ERP systems from on-premise to cloud-based architectures
True
Based on the information in the assigned McKinsey article, which of the following practices and systems have an outsized impsact on performance?
CRM/salesforce systems to enable and empower the salesforce
Organizations that use e-commerce and eBusiness utilize data gathered from interactions fir the purpose of analyzing the data with the objective of gaining insights into trends, patterns, and improve business outcomes.
True
Ebusiness/Ecommerce has evolved into the digital economy which is comprised of mobile, social media, and big data.
True
Businesses do not use social commerce for new products.
False
Human Resources departments only use social computing for external tasks.
False
The comments of consumers in the blogosphere concerning a company's products are called ______.
User-generated content
All of the following are used to provide online market research except:
Emails
The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as _______.
Social intelligence
Which of the following is true about the impact of social computing on customer service?
Customers themselves can be used to reduce problems
The function of ______ is to convert digital signals to analog signals and vise-versa.
Modems
It is important for applications and data to be dependent on each other
False
Data not refers to the quality of the data itself
False
There is no difference between master data and transaction data
false
Big Data is easy to define
False
_____________ occurs when the same data are stored in many places.
Data redundancy
An artiste is any characteristic or quality that describes a particular entity
Ture
In the data Hierarchy, the smallest element is the _______.
Bit
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management
Data inconsistency
What are the three distinct characteristics that distinguish big data from traditional data?
Volume, velocity and variety
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n)
attribute
A standardized language used to manipulate data is ________.
Structured query language
The process of moving data from various sources into the data warehouse is called
extracting, transforming, and loading
An entity is a person, place, thing, or event about which information is maintained
True
An attribute is any characteristic or quality that describes a particular entity
True
Traditional data formats change __________ while big data formats change ___________
Slowly, rapidly
__________ describe the activities of the business, whereas __________ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities
Transacton data, master data
_________ is a process that helps organization identity, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.
Knowledge management
___________ occurs when various copies of the data agree
Data consistency
Historically, the percentage of IT projects that fully meet their goals is approximately ______%.
33%
Project management is comprised of the following major phases:
Define, Plan, Execute, Close-out
Scope, Communications, Budget and Risk Management are all elements of project management.
True
Risk management is used to manage projects and the techniques used are unique, risk management cannot be used to assist other business function?
False
Over the course of a project, there is an inverse relationship between the cost to correct a risk and likelihood a risk will occur.
True
Based on the CIO article on Business intelligence, they project the future capabilities will
Utilize advance technologies that calculate trends and future possibilities, predicting potential outcomes and making recommendations
The number of alternatives to be considered in decisions today is increasing.
True
Structured decisions address routine, repetitive problems for which standard solutions exist.
True
Unstructured decisions require a combination of standard solution procedures and individual judgment.
False
Targeted marketing is a good example of the discovery of previously unknown or hidden patterns.
False/ but possibly
true
An executive dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors.
True
In the video on artificial intelligence from DARPA they discuss past project involving self-driving cars. The duration from no one successfully completing the project to having several teams successfully complete the project was
12 months
Decisions today are becoming _____ complex, due to ______ uncertainty in the decision environment.
More; Increased
Which of the following is not a characteristic of a structured decision?
The first three phases of the decision-making process need not occur in any particular sequence
_______ decisions are more common at lower organizational levels.
Structured
In the video artificial intelligence from DARPA they discuss utilizing which of the following intelligent
Neural Networks
When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be:
Unstructured
A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision?
semistructured - how ever it may be unstructured
In you were to use Excel and build a model to help test the impact of changes to input variables on output variables is an example of a decision-support system performing which type of analysis?
Sensitivity Analysis
Computer support is greatest for which of the following problems?
Structured and operational control
Searching for valuable business information in a database, data warehouse, or data mart is referred to as _______.
Data mining
Managers and executives need information on business activities and may utilize dashboards to understand how the performance of specific elements. The essential elements to measure success of a business are called
Critical Success Factors
The management cockpit best exemplifies which type of system?
Digital dashboard
For a company to have business intelligence capabilities which of the following are required?
Operational systems data
The name of the company that delivered the demo in class showing data visualization and dashboards was
Tableau
As discussed in class, completing the Foodmart exercise was an example of conducting business intelligence
true
What are the 3 characteristics of online transaction processing?
1. Process the information according to defined business rules.
2. Stores the information.
3. Updates existing information to reflect the new information.
What type of processing system is the basic business system that serves the operational level (analysts) and assists in making structured decisions?
Transaction Processing System (TPS)
What is the difference between transactional information and analytical information?
(transactional is listed first and analytical is second)
1- Encompasses all of the information contained within a single business process or unit of work, supports the performance of daily operational or structured decisions.
Ex: Purchasing stocks, making airline reservations, and withdrawing cash from an ATM.
What type of systems model information using Online Analytical Processing (OLAP), which provides assistance in evaluating and choosing among different courses of action?
Decision Support Systems
Which type of analysis checks the impact of a change in a variable or assumption on the model?
What-If Analysis
Which type of analysis studies the impact on other variables when one variable is changed repeatedly?
Sensitivity Analysis
What produces graphical displays of patterns and complex relationships in large amounts of data?
Visualization
What is a tool that supports visualization. As well as tracks Key Performance Indicators (KPIs) and Critical Success Factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs?
Digital Dashboard
What are the 3 levels to a common company structure? and what are the objectives of each level?
(Starting with the bottom and working upwards)
1. Operational Level: (Structured decisions) Employees develop, control, and maintain core business activities required to run the day-to-day operations.
2. Managerial Level: (Semistructured decisions) Employees are continuously evaluating company operati
What is an example of a semi-structured decision?
Changing Employee Benefits
What is the manipulation of information to create business intelligence in support of strategic decision making?
Online Analytical Processing (OLAP)
Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints?
Optimization Analysis
What are the 4 components of the digital dashboard analytical capabilities?
1. Consolidation: The aggregation of data from simple roll-ups to complex groupings of interrelated information.
Ex: data for different sales reps can be rolled up to an office level, then a state level, then a regional sales level.
2. Drill-Down: Enables
What are 5 potential features included in a dashboard designed for a manufacturing team?
1. A hot list of key performance indicators, refreshed every 15 minutes
2. A running line graph of planned versus actual production for the past 24 hours
3. A table showing actual versus forecasted product prices and inventories
4. A list of outstanding a
What are the 5 areas where we are seeing artificial intelligence? and give examples of AI from each one.
1. Expert Systems: Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.
Ex: Computers Playing Chess
2. Neural Networks: Category of AI that attempts to emulate the way the human brain works.
Ex: Cre
What are intelligent systems?
various commercial applications of artificial intelligence. They include sensors, software, and devices that emulate and enhance human capabilities, learn or understand from experience, make sense of ambiguous or contradictory information, and even use re
What is a mathematical method of handling imprecise or subjective information?
Fuzzy Logic
What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome?
Mutation
What is the name of the software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability?
Shopping Bot
What is Augmented Reality?
The viewing of the physical world with computer-generated layers of information added to it?
What are the 3 challenges when it comes to managerial decision making?
1. Managers need to analyze large amounts of information.
2. Managers must make decisions quickly.
3. Managers must apply sophisticated analysis techniques, such as porter's strategies or forecasting, to make strategic decisions.
What are the 6 steps in the decision making process?
1. Problem Identification: Define the problem as clearly and precisely as possible.
2. Data Collection: Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem.
3. Solu
What is software written with malicious intent to cause annoyance or damage?
A virus
What spreads itself from file to file but also from computer to computer causing annoyances as well as damage in a computer?
A worm
What is software that, while purporting to serve some useful function and often fulfilling that function, also allows internet advertisers to display advertisements without the consent of the computer user?
Adware
What is a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission?
Spyware
What is a form of malicious software that infects your computer and asks for money?
Ransomware
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
Information Security
What are the 6 common types of hackers?
1. Black-Hat hackers: break into other people's computer systems and may just look around or may steal and destroy information.
2. Crackers: Have criminal intent when hacking.
3. Cyberterrorists: Seek to cause harm to people or to destroy critical systems
What is it that refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
Ediscovery (Electronic Discovery)
What are some examples of hacker weapons? (8 listed)
1. Elevation of Privilege: User misleads system into granting unauthorized rights, usually to destroy the system.
2. Hoaxes: Attack computer systems by transmitting a virus hoax with a real virus attached.
3. Malicious Code: A variety of threats such as v
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
Digital Rights Management
What is the legal protection afforded to an expression of an idea, such as a song, book, or video game?
Copyright
What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, distribution, and processing of information itself?
Information Ethics
What are the 5 ethical guidelines for Information Management?
1. Information Secrecy
2. Information Governance
3. Information Management
4. Information Compliance
5. Information Property
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
Information Secrecy
What is the method or system of government for information management or control?
Information Governance
What is it that examines the organizational resource of information and regulates its definitions, uses, value, and distribution. Ensuring that it has the types of data/information required to function and grow effectively?
Information Management
What is the act of conforming, acquiescing, or yielding information?
Information Compliance
What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?
Information Property
What are the four common forms of viruses?
1. Backdoor Programs: Opens a way into the network for future attacks
2. Denial-of-service attack (DoS): Floods a website with so many requests for service that it slows down or crashes the site. (if done with multiple computers it is called Distributed D
What are the two fundamental blocks on which organizations base their businesses?
Ethics and Security
What are the 4 costs of downtime?
1. Financial Performance: Revenue recognition, cash flow, payment guarantees, credit rating, stock price.
2. Revenue: Direct loss, compensatory payments, lost future revenue, Billing losses, Investment losses, Lost Productivity.
3. Damaged Reputation: Cus
What is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part?
Systems Thinking
What is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions?
Feedback
What is a business function that moves information about people, products, and processes across the company to facilitate decision making and problem solving?
Management Information Systems (MIS)
What occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally?
Information Silo
What is Big Data?
A collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
What type of data has a defined length, type, and format and includes numbers, dates, or strings such as customer address? Also stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that
Structured Data
What type of data does not follow a specific format and is typically free-form text such as emails, twitter tweets, and text messages? Also accounts for about 80 percent of the data that surrounds us.
Unstructured Data
What are the two sources of Unstructured Data?
1. Machine-Generated: includes satellite images, scientific atmosphere data, and radar data.
2. Human-Generated: Includes text messages, social media data, and emails.
What is a report that is created once based on data that does not change?
Static Report
What is a report that changes automatically during creation?
Dynamic Report
What extracts information from data and uses it to predict future trends and identify behavioral patterns?
Predictive Analytics
What includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources?
Knowledge
Who are the individuals valued for their ability to interpret and analyze information?
Knowledge workers
What is the science of fact-based decision making?
Analytics
What is it that reroutes requests for legitimate websites to false websites?
Pharming
What occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data?
Vertical Privilege Escalation
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
Digital Certificate
What is the science that studies encryption? which is the hiding of messages so that only the sender and receiver can read them.
Cryptography
What is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications?
Privilege Escalation
What are the 3 areas of Information Security?
1. People: Authentication and Authorization
2. Data: Prevention and Resistance
3. Attacks: Detection and Response
What is a technique used to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?
Phishing
What is a masquerading attack that combines spam with spoofing?
Phishing Expedition
What examines a trend to identify its nature, causes, speed of development, and potential impacts?
Trend Analysis
What are trends that are viewed as particularly important in a specific community, industry, or sector that are carefully monitored, watched, and reported to key decision makers?
Trend Monitoring
What is the name of software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy, and employ some knowledge or representation of the user's goals or desires?
Autonomous Agent
What is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system?
Autonomic Computing
What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises?
Real-Time Adaptive Security
What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another?
The Ambient Digital Experience
What are the 5 scientific methods that organizations use to anticipate, forecast, and assess future events?
1. Trend Analysis
2. Trend Monitoring
3. Trend Projection
4. Computer Simulation
5. Historical Analysis
What occurs when a complex system, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis?
Computer Simulation