Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

practice text quest

DAC1 clobal information systems

QuestionAnswer
MIS can be an important enabler of business success and innovation. Which of the below statements is accurate when referring to MIS? MIS is a valuable tool that can leverage the talents of people who know how to use and manager it effectively.
Your boss, Ty Jacob has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents supplier power in the music industry? Established record labels like EMI, Sony, and Universal
Paula Logston is the owner and operator of a high-end online custom clothing company. If you were tasked with explaining Porter's Five Forces Model what would be the primary reason to use this type of analysis? To help choose a clothing business focus evaluate the attractiveness of the clothing industry evaluate and execute business goals.
Which of the following represents the different information levels? Individual, department, enterprise (company)
Which of the following is an organizational result from an effective and efficient supply chain management system? Decrease the power of buyers create entry barriers, reduce new entrants
What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time ) as a partnership? limited liability corporation
What part of the CPU performs all arithmetic operations and all logic operations? arithmetic/logic
What is roughly 1 million bytes megabyte
What is equipment used to capture information and commands? input device
Which computer offers both a horizontal and vertical system box and is usually placed on a desk or floor? desktop computer
What type of website is best to build for a general information website with static information? static website
Which of the following is incorrect in reference to a database? information is accessed by physical structure
Which of the following is not a topic associated with the information age? college statistics for data
Which of the following decisions does a firm need to make as soon as it has identified the activities from the value chain that are bring the highest added value to their cusotmers? Target high value-adding activities Target low value-adding activities to increase their value perform some combination of the two
Amazon.com uses a customer-profiling system whenever a customer visits its site. What is amazon using to achieve this competitive advantage? Product differentiation *from 2nd test
What is immediate, up-to-date information? Real-time information
Which of the following is a business-facing process? budget forecasting
What is an asset anything owned that has value or earning power
Which type of software supports the application software and manages how the hardware devices work together ? Operating system * from 2nd test
What types of BI decisions include forecasting levels of bad loan and fraudulent credit card use, credit card use, cc spending by new customers and which kind of customers will best respond to new loan offers? Banking BI decisions
Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information? Identify trends make projections decide key business issues.
What is designed to connect a group of computers in close proximity to each other such as in an office building, a schoold, or a home? LAN
An ____________ is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. Network
At a local marketing firm, Steve is the lead web developer and is responsible for working with customers on their web designs, development and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job? Understanding that he must create a unique domain name for each client Being able to work with HTML understanding the World Wide Web and how hyperlinks work.
When evaluating the business value of disintermediation the more _________ that are cut from the distribution chain, the lower the product. intermediaries ( cutting out the middleman)
What is Mozilla Firefox? a competitor of Internet Explorer.
What company monitors the operation of its vending machines via wireless technology? Dr Pepper/Seven Up INC
Which of the following is a potential business impact from the world's population doubling in the next 40 years? Developed nations will begin to increase immigrations limits Developed nations - retirees will have to remain on the job to remain competitive Global agriculture will be required to supply as much food as has been produced during all of human history
Which of the following terms could you use synonymously when referring to the web? URL, domain name
What caused Polaroid to go bankrupt? One-hour fill processing and digital cameras stole market share
Ben decides to purchase an iPad on ebay. After the transaction completes and the money is withdrawn from his pay pal account the ipad never shows up and the email address of the seller is bounces. What issue has Ben encountered? physical separation of buyer and seller
Perry decides to move beyond just marketing and create an actual ebusiness that acts like a search engine for real estate industry. He will charge $50 a month for the property that is listed on the website. What is primary revenue model for Perry's bus. Subscription fee
Web 3.0 refers to static text-based information websites? false 3.0 is newest version on web
What can a model accomplish? Calculate risks Understand uncertainty manipulate time
What is a category of AI that attempts to emulate the way the human brain works neural network
What is consolidation? Involves the aggregation of information and features simple roll ups to complex groupings of interrelated information.
Which system differentiates an executive information system from a decision support system and a transaction processing system? Stock market information system
What finds the inputs necessary to achieve a goal, such as a desired level of output? goal-seeking anyalysis
The following is a business-related consequences of software failure. Decreased productivity Damage to brand reputation incurred liabilities
What is the systems development life cycle? The overall process for developing information systems from planing to analysis through implementation and maintenance
What is a project? a temporary endeavor undertaken to create a unique product, service or result
Which of the following is a business related consequence of successful software? increased revenues
Which of the following is not one of the tenets of the Agile Alliance's manifesto? Do not allow changing requirements especially late in development.
What breaks a project into tiny phases and developers cannot continue on to the next phase until the first phase is completed? Extreme programing methodology
What is a project milestone a key date by which a certain group of activities must be preformed.
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a flood? Disaster recovery plan
What is virtualization The creation of multiple virtual machines on a single computing device.
Which of the following is not a typical CRM network? inventory metrics
Which of the following is a type of SCM metric? customer order promised cycle time customer order actual cycle time inventory replenishment cycle time
What is an arrangement by which one organization provides a service or services for another organization in-house? outsourcing
What is a method or system of government for management and control? Governance
Insiders Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
Social engineering hackers use their social skill to trick people into revealing access credentials or other valuable information.
dumpster diving looking through people's trash is another way hackers obtain information
information security policies identify rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone and changing passwords every 30 days
information security plan details on how an organization will implement the information security policies.
What is a method for confirming user's identities authentication
What floods website with so many request for service that it slows down or crashes site denial of service attack
encryption scrambles information into an alternative form that requires a key or password to decrypt.
decryption information that decoded and is the opposite of encrypt
time bombs computer viruses that wait for a specific date before executing their instructions.
cryptography science that studies encryption, which is the hiding of messages so that only the sender and receiver can see them.
Public key encryption Uses two keys a public key that everyone has and a private key that only the recipient receives
certificate authority a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
digital certificate a data file that identifies individuals or organizations online and is comparable to a digital signature.
Which act protects inverstors by improving the accuracy and reliability of corporate disclosures sarbanes-oxley act
Nonrepudiation a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions.
Internet use policy Contains general principles to guide the proper use of the internet.
Cybervandalism electronic defacing of an existing website.
typosquatting problem that occurs when someone registers purposely misspelled variations of well know domain names.
Website name stealing theft of a website's name that occurs when someone, posing as a site's administrator, changes ownership of the domain name assigned to the website to another website owner.
internet censorship Government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens.
email privacy policy details the extent to which emails messages may be read by others.
opt out choosing to deny permission to incoming emails.
anti spam policy Simply states that email users will not send unsolicited emails (or spam)
spam unsolicited email
treegrubing anit spamming approach where the receiving computer launches a return attack against spammer, sending emails messages back to the computer that originated the suspected spam
Which of the following is an example of acting unethically copy, use and distribute software employees search organizational databases for sensitive or corporate and personal information. individuals hack into computer systems to steal proprietary information
what is unauthorized use,duplication, distribution or sale of copyrighted software Pirated software
Cookie small file deposited on a hard drive by a website containing information about customers and their web activities
clickstream records information about a customer during a web surfing session such as what websites were visted, how long the visit was what ads were viewed, and what was purchased.
hardware key logger hardware device that captures keystrokes on their journey from the keyboard to the motherboard
Spyware (sneakware or stealthware) Software that comes hidden in free downloadable software and tracks online movements ,mines the information on a computer or uses a computers, CPU and storage for some task unknown to users
web log consists of one line of information for every visitor to a website and is usually stored on a web server.
Key logger or key trapper software program that records every keystroke and mouse click
adware software generates ads that install themselves on a computer when a person downloads some other program from the internet.
Which policy contains general principles regarding information privacy information privacy policy
Created by: smcdo11
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards