click below
click below
Normal Size Small Size show me how
practice text quest
DAC1 clobal information systems
| Question | Answer |
|---|---|
| MIS can be an important enabler of business success and innovation. Which of the below statements is accurate when referring to MIS? | MIS is a valuable tool that can leverage the talents of people who know how to use and manager it effectively. |
| Your boss, Ty Jacob has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents supplier power in the music industry? | Established record labels like EMI, Sony, and Universal |
| Paula Logston is the owner and operator of a high-end online custom clothing company. If you were tasked with explaining Porter's Five Forces Model what would be the primary reason to use this type of analysis? | To help choose a clothing business focus evaluate the attractiveness of the clothing industry evaluate and execute business goals. |
| Which of the following represents the different information levels? | Individual, department, enterprise (company) |
| Which of the following is an organizational result from an effective and efficient supply chain management system? | Decrease the power of buyers create entry barriers, reduce new entrants |
| What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time ) as a partnership? | limited liability corporation |
| What part of the CPU performs all arithmetic operations and all logic operations? | arithmetic/logic |
| What is roughly 1 million bytes | megabyte |
| What is equipment used to capture information and commands? | input device |
| Which computer offers both a horizontal and vertical system box and is usually placed on a desk or floor? | desktop computer |
| What type of website is best to build for a general information website with static information? | static website |
| Which of the following is incorrect in reference to a database? | information is accessed by physical structure |
| Which of the following is not a topic associated with the information age? | college statistics for data |
| Which of the following decisions does a firm need to make as soon as it has identified the activities from the value chain that are bring the highest added value to their cusotmers? | Target high value-adding activities Target low value-adding activities to increase their value perform some combination of the two |
| Amazon.com uses a customer-profiling system whenever a customer visits its site. What is amazon using to achieve this competitive advantage? | Product differentiation *from 2nd test |
| What is immediate, up-to-date information? | Real-time information |
| Which of the following is a business-facing process? | budget forecasting |
| What is an asset | anything owned that has value or earning power |
| Which type of software supports the application software and manages how the hardware devices work together ? | Operating system * from 2nd test |
| What types of BI decisions include forecasting levels of bad loan and fraudulent credit card use, credit card use, cc spending by new customers and which kind of customers will best respond to new loan offers? | Banking BI decisions |
| Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information? | Identify trends make projections decide key business issues. |
| What is designed to connect a group of computers in close proximity to each other such as in an office building, a schoold, or a home? | LAN |
| An ____________ is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. | Network |
| At a local marketing firm, Steve is the lead web developer and is responsible for working with customers on their web designs, development and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job? | Understanding that he must create a unique domain name for each client Being able to work with HTML understanding the World Wide Web and how hyperlinks work. |
| When evaluating the business value of disintermediation the more _________ that are cut from the distribution chain, the lower the product. | intermediaries ( cutting out the middleman) |
| What is Mozilla Firefox? | a competitor of Internet Explorer. |
| What company monitors the operation of its vending machines via wireless technology? | Dr Pepper/Seven Up INC |
| Which of the following is a potential business impact from the world's population doubling in the next 40 years? | Developed nations will begin to increase immigrations limits Developed nations - retirees will have to remain on the job to remain competitive Global agriculture will be required to supply as much food as has been produced during all of human history |
| Which of the following terms could you use synonymously when referring to the web? | URL, domain name |
| What caused Polaroid to go bankrupt? | One-hour fill processing and digital cameras stole market share |
| Ben decides to purchase an iPad on ebay. After the transaction completes and the money is withdrawn from his pay pal account the ipad never shows up and the email address of the seller is bounces. What issue has Ben encountered? | physical separation of buyer and seller |
| Perry decides to move beyond just marketing and create an actual ebusiness that acts like a search engine for real estate industry. He will charge $50 a month for the property that is listed on the website. What is primary revenue model for Perry's bus. | Subscription fee |
| Web 3.0 refers to static text-based information websites? | false 3.0 is newest version on web |
| What can a model accomplish? | Calculate risks Understand uncertainty manipulate time |
| What is a category of AI that attempts to emulate the way the human brain works | neural network |
| What is consolidation? | Involves the aggregation of information and features simple roll ups to complex groupings of interrelated information. |
| Which system differentiates an executive information system from a decision support system and a transaction processing system? | Stock market information system |
| What finds the inputs necessary to achieve a goal, such as a desired level of output? | goal-seeking anyalysis |
| The following is a business-related consequences of software failure. | Decreased productivity Damage to brand reputation incurred liabilities |
| What is the systems development life cycle? | The overall process for developing information systems from planing to analysis through implementation and maintenance |
| What is a project? | a temporary endeavor undertaken to create a unique product, service or result |
| Which of the following is a business related consequence of successful software? | increased revenues |
| Which of the following is not one of the tenets of the Agile Alliance's manifesto? | Do not allow changing requirements especially late in development. |
| What breaks a project into tiny phases and developers cannot continue on to the next phase until the first phase is completed? | Extreme programing methodology |
| What is a project milestone | a key date by which a certain group of activities must be preformed. |
| What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a flood? | Disaster recovery plan |
| What is virtualization | The creation of multiple virtual machines on a single computing device. |
| Which of the following is not a typical CRM network? | inventory metrics |
| Which of the following is a type of SCM metric? | customer order promised cycle time customer order actual cycle time inventory replenishment cycle time |
| What is an arrangement by which one organization provides a service or services for another organization in-house? | outsourcing |
| What is a method or system of government for management and control? | Governance |
| Insiders | Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident. |
| Social engineering | hackers use their social skill to trick people into revealing access credentials or other valuable information. |
| dumpster diving | looking through people's trash is another way hackers obtain information |
| information security policies | identify rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone and changing passwords every 30 days |
| information security plan | details on how an organization will implement the information security policies. |
| What is a method for confirming user's identities | authentication |
| What floods website with so many request for service that it slows down or crashes site | denial of service attack |
| encryption | scrambles information into an alternative form that requires a key or password to decrypt. |
| decryption | information that decoded and is the opposite of encrypt |
| time bombs | computer viruses that wait for a specific date before executing their instructions. |
| cryptography | science that studies encryption, which is the hiding of messages so that only the sender and receiver can see them. |
| Public key encryption | Uses two keys a public key that everyone has and a private key that only the recipient receives |
| certificate authority | a trusted third party, such as VeriSign, that validates user identities by means of digital certificates. |
| digital certificate | a data file that identifies individuals or organizations online and is comparable to a digital signature. |
| Which act protects inverstors by improving the accuracy and reliability of corporate disclosures | sarbanes-oxley act |
| Nonrepudiation | a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions. |
| Internet use policy | Contains general principles to guide the proper use of the internet. |
| Cybervandalism | electronic defacing of an existing website. |
| typosquatting | problem that occurs when someone registers purposely misspelled variations of well know domain names. |
| Website name stealing | theft of a website's name that occurs when someone, posing as a site's administrator, changes ownership of the domain name assigned to the website to another website owner. |
| internet censorship | Government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens. |
| email privacy policy | details the extent to which emails messages may be read by others. |
| opt out | choosing to deny permission to incoming emails. |
| anti spam policy | Simply states that email users will not send unsolicited emails (or spam) |
| spam | unsolicited email |
| treegrubing | anit spamming approach where the receiving computer launches a return attack against spammer, sending emails messages back to the computer that originated the suspected spam |
| Which of the following is an example of acting unethically | copy, use and distribute software employees search organizational databases for sensitive or corporate and personal information. individuals hack into computer systems to steal proprietary information |
| what is unauthorized use,duplication, distribution or sale of copyrighted software | Pirated software |
| Cookie | small file deposited on a hard drive by a website containing information about customers and their web activities |
| clickstream | records information about a customer during a web surfing session such as what websites were visted, how long the visit was what ads were viewed, and what was purchased. |
| hardware key logger | hardware device that captures keystrokes on their journey from the keyboard to the motherboard |
| Spyware (sneakware or stealthware) | Software that comes hidden in free downloadable software and tracks online movements ,mines the information on a computer or uses a computers, CPU and storage for some task unknown to users |
| web log | consists of one line of information for every visitor to a website and is usually stored on a web server. |
| Key logger or key trapper software | program that records every keystroke and mouse click |
| adware software | generates ads that install themselves on a computer when a person downloads some other program from the internet. |
| Which policy contains general principles regarding information privacy | information privacy policy |