MIS 290 Final Flashcards
187 test answers
Unlock all answers in this set
Unlock answers 187question
A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.
answer
wiki
Unlock the answer
question
n the context of the technologies developed to improve the efficiency and quality of digital communications, ____ divide(s) each channel into six time slots.
answer
false
Unlock the answer
question
A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.
answer
pod cast
Unlock the answer
question
____ is a hardware device that allows several nodes to share one communication channel.
answer
multiplexer
Unlock the answer
question
In data communication, ____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
answer
convergence
Unlock the answer
question
A routing table lists ____.
answer
nodes on a network
Unlock the answer
question
A network ____ represents a network's physical layout.
answer
topology
Unlock the answer
question
A ____ router can build tables that identify addresses on each network.
answer
mobile
Unlock the answer
question
Data encryption transforms data into a scrambled form called ____.
answer
ciphertext
Unlock the answer
question
A uniform resource locator is the address of a document or site on the Internet.
answer
true
Unlock the answer
question
A proxy server acts as an intermediary between network users and the Internet
answer
true
Unlock the answer
question
(n) ____ is the address of a document or site on the Internet.
answer
URL
Unlock the answer
question
____ are hackers who specialize in unauthorized penetration of information systems.
answer
black hats
Unlock the answer
question
The Transmission Control Protocol (TCP) operates at the OSI model's ____ layer.
answer
transport
Unlock the answer
question
Which of the following is considered an intentional threat?
answer
social engineering
Unlock the answer
question
Which of the following protocols is used to send e-mails?
answer
SMTP
Unlock the answer
question
What is the first step in client/server communication?
answer
The user creates a query.
Unlock the answer
question
The Internet2 (I2) project started in ____
answer
ntegrate services, such as e-mail and file sharing
Unlock the answer
question
The Federal Express Tracking System allows customers to enter a package's tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.
answer
extranet
Unlock the answer
question
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
answer
false
Unlock the answer
question
___ are Web sites that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.
answer
Social networking sites
Unlock the answer
question
Intranets are typically set up behind a firewall.
answer
true
Unlock the answer
question
Which of the following protocols is used for Internet telephony?
answer
VoIP
Unlock the answer
question
The amount of data that can be transferred from one point to another in one second is called ____.
answer
bandwith
Unlock the answer
question
The embedded references in hypermedia documents are called hypertext.
answer
true
Unlock the answer
question
Protocols help ensure compatibility between different manufacturers' devices.
answer
true
Unlock the answer
question
The ____ layer of the OSI model specifies the electrical connections between computers and the transmission medium, and is primarily concerned with transmitting binary data, or bits over a communication network
answer
Physical
Unlock the answer
question
Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.
answer
Web browsers
Unlock the answer
question
Within the ____ technique for wireless security, a user's computer and the AP use a master key to negotiate for a key that will be used for a session.
answer
Wi-Fi Protected Access 2
Unlock the answer
question
____ is a commonly used encryption protocol that manages transmission security on the Internet.
answer
Secure Sockets Layer
Unlock the answer
question
____ cables are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.
answer
Fiber-optic
Unlock the answer
question
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
answer
Business continuity planning
Unlock the answer
question
____ media operate on line-of-sight.
answer
Terrestrial microwave
Unlock the answer
question
____ take advantage of the human element of security systems.
answer
Social engineering attacks
Unlock the answer
question
____ means that computers and networks are operating and authorized users can access the information they need
answer
Availability
Unlock the answer
question
____ means that a system must prevent disclosing information to anyone who is not authorized to access it
answer
Confidentiality
Unlock the answer
question
____ encryption uses a public key known to everyone and a private key known only to the recipient
answer
Asymmetric
Unlock the answer
question
____ is the process of capturing and recording network traffic.
answer
Sniffing
Unlock the answer
question
____ scaling refers to adding more workstations (clients).
answer
Horizontal
Unlock the answer
question
____ ensures data security and integrity over public networks, such as the Internet.
answer
Transport Layer Security
Unlock the answer
question
____ refers to the accuracy of information resources within an organization.
answer
integrity
Unlock the answer
question
____ is understanding the role of information in generating and using business intelligence.
answer
Information literacy
Unlock the answer
question
Management information system's (MIS) _____ include programs developed in-house
answer
software components
Unlock the answer
question
in designing a management information system, the first task is to define the system's _____ clearly.
answer
objectives
Unlock the answer
question
_____ are an example of internal source of data for an information system.
answer
Personnel records
Unlock the answer
question
_____ are an external data source of an information system.
answer
Labor statistics
Unlock the answer
question
The output of an information system is _____.
answer
information
Unlock the answer
question
The purpose of an information system's _____ component is generating the most useful type of information for making decisions.
answer
process
Unlock the answer
question
A successful _____ program helps improve client service and create a long-term relationship between an organization and its clients.
answer
customer relationship management
Unlock the answer
question
In accordance with Porter's Five Forces model, _____ power is high when customers have fewer options and low when customers have more options.
answer
supplier
Unlock the answer
question
Online brokerage firms operate in a highly combative and ambitious environment, so they use information technologies to make their services more unique in order to combat _____.
answer
rivalry among existing competitors
Unlock the answer
question
The most common personal digital assistant is a smartphone.
answer
true
Unlock the answer
question
Twitter is an example of a management information system (MIS)
answer
false
Unlock the answer
question
The terms "information systems" and "information technologies" are used interchangeably.
answer
second
Unlock the answer
question
____ is 1/1,000,000,000,000 of a second.
answer
Picosecond
Unlock the answer
question
____ means saving data in computer memory and retrieval is accessing data from memory.
answer
storage
Unlock the answer
question
How many bytes is a data of 48 bits?
answer
24
Unlock the answer
question
A ____ is the size of a character.
answer
byte
Unlock the answer
question
ASCII (7 bit) defines up to ____ characters.
answer
128
Unlock the answer
question
Which of the following is an input device
answer
Optical character reader
Unlock the answer
question
_____ is the most common output device for soft copy.
answer
Liquid crystal display
Unlock the answer
question
The Clipboard's contents are stored on ____.
answer
RAM
Unlock the answer
question
____ memory, which is nonvolatile, holds data when the computer is off or during the course of a program's operation.
answer
secondary
Unlock the answer
question
The term RAID stands for ____.
answer
redundant array of independent disks
Unlock the answer
question
The supervisor program of an OS is called the ____.
answer
kernel
Unlock the answer
question
ENIAC is an example of a first-generation computer.
answer
true
Unlock the answer
question
A byte is a single value of 0 or 1.
answer
false
Unlock the answer
question
Light pen is an output device
answer
false
Unlock the answer
question
Which of the following is true of a database?
answer
More information can be generated from the same data.
Unlock the answer
question
The ____ view involves how data is stored on and retrieved from storage media.
answer
physical
Unlock the answer
question
The ____ view involves how information appears to users and how it can be organized and retrieved.
answer
logical
Unlock the answer
question
The ____ in a database model defines the boundaries of a database, such as maximum and minimum values allowed for a field.
answer
set of integrity rules file structure
Unlock the answer
question
A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
answer
dictionary
Unlock the answer
question
A ____ key uniquely identifies every record in a relational database.
answer
primary
Unlock the answer
question
In a relational model, when a primary key for one table appears in another table it is called a ____ key.
answer
foreign
Unlock the answer
question
____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.
answer
normalization
Unlock the answer
question
A ____ operation searches data in a table and retrieves records based on certain criteria.
answer
select
Unlock the answer
question
A data ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
answer
warehouse
Unlock the answer
question
____ is information in its original form.
answer
raw data
Unlock the answer
question
____ gives users subtotals of various categories
answer
Summary data
Unlock the answer
question
____ uses multiple sources of information and provides multidimensional analysis.
answer
OLAP
Unlock the answer
question
A data ____ is usually a smaller version of a data warehouse, used by a single department or function.
answer
mart
Unlock the answer
question
Business analytics uses ____ to support decision-making activities.
answer
data mining tools
Unlock the answer
question
Amazon.com uses ____ to provide customized book recommendations based on past purchases.
answer
cookies
Unlock the answer
question
____ generated by Web server software, record a user's actions on a Web site.
answer
Log files
Unlock the answer
question
A banker uses the information a client enters in a loan application to sell other financial products to this client. This action is _____.
answer
legal but unethical
Unlock the answer
question
Generally, ____ laws protect tangible material, such as books and drawings.
answer
copyright
Unlock the answer
question
The ____ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
answer
Fair Use Doctrine
Unlock the answer
question
____ is registering, selling, or using a domain name to profit from someone else's trademark.
answer
Cybersquatting
Unlock the answer
question
information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____.
answer
digital divide
Unlock the answer
question
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
answer
Green computing
Unlock the answer
question
_____ prevents new adware from being installed on your computer.
answer
Antispyware
Unlock the answer
question
____ is collecting data from Web sites, usually for competitive intelligence.
answer
Web harvesting
Unlock the answer
question
Mobile commerce (m-commerce) is based on the ____ protocol.
answer
wireless application
Unlock the answer
question
CASE tools are mainly used during the ____ phase of the SDLC.
answer
design
Unlock the answer
question
Which term describes one user viewing one ad?
answer
ad impression
Unlock the answer
question
Using the ____ model brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
answer
Brokerage
Unlock the answer
question
During the ____ phase, analysts choose the solution that is the most realistic and offers the highest payoff for the organization.
answer
design
Unlock the answer
question
During the ____ phase, the systems designer must define the problem the organization faces, taking care not to define symptoms rather than the underlying problem.
answer
planning
Unlock the answer
question
In ____ conversion, the old and new systems run simultaneously for a short time to ensure the new system works correctly.
answer
parallel
Unlock the answer
question
E-training for government officials is an example of a ____ application.
answer
government-to-employee
Unlock the answer
question
In ____ conversion, the old system is stopped and the new system is implemented.
answer
plunge
Unlock the answer
question
E-procurement is an example of the ____ B2B e-commerce model.
answer
seller-side marketplace
Unlock the answer
question
Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support the _____ structure.
answer
transnational
Unlock the answer
question
The _____ support of a global information system involves broad and long-term goals.
answer
strategic
Unlock the answer
question
The GIS control dimension requires a(n) ____ architecture for data.
answer
centralized
Unlock the answer
question
During the ____ phase, the information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced.
answer
maintenance
Unlock the answer
question
One of the issues with GIS is that too much ____ can prevent flexibility in responding to local preferences and even time differences.
answer
Standardization
Unlock the answer
question
E-commerce fulfills the product information activity using ____.
answer
Web sites
Unlock the answer
question
With ____ outsourcing, the organization chooses an outsourcing company in the same country.
answer
onshore
Unlock the answer
question
Companies creating separate Web sites for each country in which they do business is called _____ of a Web site.
answer
localization
Unlock the answer
question
With reference to the global information system, _____ consists of using managerial power to ensure adherence to the organization's goals.
answer
control
Unlock the answer
question
The systems development life cycle (SDLC) is also known as the ____.
answer
waterfall model
Unlock the answer
question
____ centers on a structured workshop in which users and system professionals come together to develop an application.
answer
JAD
Unlock the answer
question
With ____ technology, information is sent to users based on their previous inquiries, interests, or specifications.
answer
Push
Unlock the answer
question
A ____ prototype shows users how a particular task that was not technically feasible can be done.
answer
proof of concept
Unlock the answer
question
____ present(s) a challenge when designing and implementing global databases.
answer
Different character sets
Unlock the answer
question
____ is a site that facilitates C2C e-commerce.
answer
eBay
Unlock the answer
question
____ is a popular on-line payment system used on many on-line auction sites.
answer
paypal
Unlock the answer
question
____ is a method for improving the volume or quality of traffic to a Web site.
answer
Search engine optimization
Unlock the answer
question
____ uses an iterative process that repeats the design, development, and testing steps as needed, based on feedback from users.
answer
RAD
Unlock the answer
question
____ is a method for developing software applications and information system projects in which the project is divided into smaller functions and developers can not go on to the next phase until the current phase is finished.
answer
XP
Unlock the answer
question
_____ are considered the first large-scale interactive global system.
answer
Airline reservation systems
Unlock the answer
question
_____ display ads appear on top of a browser window, blocking the user's view.
answer
Pop-up
Unlock the answer
question
____ refers to money or scrip that is exchanged only electronically.
answer
Electronic payment
Unlock the answer
question
____ introduced the value chain concept.
answer
Michael Porter
Unlock the answer
question
____ is a supporting activity in the value chain.
answer
Technological development
Unlock the answer
question
____ feasibility is the measure of how well the proposed solution will work in the organization and how internal and external customers will react to it.
answer
Operational
Unlock the answer
question
____ costs measure what you would miss by not having a system or feature.
answer
Opportunity
Unlock the answer
question
____ feasibility assesses a system's costs and benefits.
answer
Economic
Unlock the answer
question
____ is an application of artificial intelligence that can be used for Web marketing.
answer
Intelligent agents
Unlock the answer
question
____ is a pure-play company.
answer
Amazon.com
Unlock the answer
question
____ includes national laws and international agreements on privacy protection and data security.
answer
Transborder data flow
Unlock the answer
question
Stores use "____" to get a customer to buy additional products that they might already be purchasing from a different store.
answer
cross-selling or up-selling
Unlock the answer
question
____ enables business partners to send and receive information on business transactions.
answer
Electronic data interchange
Unlock the answer
question
With reference to the Internet-enabled SCM activities, coordinating just-in-time (JIT) inventory programs with vendors and suppliers is a part of _____.
answer
production scheduling
Unlock the answer
question
With reference to the Internet-enabled SCM activities, providing real time stock information and replenishing stock quickly is a part of _____.
answer
inventory management
Unlock the answer
question
The main goal of a(n) ____ system is to improve services offered to consumers and use consumer contact information for targeted marketing.
answer
customer relationship management
Unlock the answer
question
____ is a search for specific information or patterns, using input from multiple business partners and data sources.
answer
Collaborative filtering
Unlock the answer
question
Organizations with an established IT infrastructure often choose a(n) ____ CRM, which is implemented much like any other IT system.
answer
on-premise
Unlock the answer
question
Amazon.com, suggests products you might enjoy, based on your past browsing and purchasing habits; this is an example of ____.
answer
personalization
Unlock the answer
question
Transaction data for a CRM system might be gathered using ____.
answer
grocery store loyalty cards
Unlock the answer
question
____ invite sellers to submit bids for products and services.
answer
Reverse auctions
Unlock the answer
question
In service organizations, the link in the supply chain includes ____.
answer
distribution centers
Unlock the answer
question
A(n) ____ system is used to coordinate operations, resources, and decision making between manufacturing, production, marketing, and human resources.
answer
enterprise resource planning
Unlock the answer
question
Information technologies and ____ play a major role in implementing an SCM system.
answer
the Internet
Unlock the answer
question
____ decisions, or programmable tasks, can be automated because a well-defined standard operating procedure exists for these types of decisions.
answer
Structured
Unlock the answer
question
Resolving conflicts between two divisions is a type of ____ decision at the tactical management level.
answer
unstructured
Unlock the answer
question
The ____ component of a DSS manages and coordinates the other major components.
answer
DSS engine
Unlock the answer
question
During the ____ phase of the decision-making process, a decision maker examines the organization's environment for conditions that need decisions.
answer
intelligence
Unlock the answer
question
Plant location is a type of ____ decision at the strategic management level.
answer
structured
Unlock the answer
question
In the ____ phase of the decision-making process, the organization devises a plan for carrying out the alternative selected in the previous phase and obtains the resources to execute the plan.
answer
implementation
Unlock the answer
question
During the ____ phase of the decision-making process, the decision maker defines associations between alternatives and criteria.
answer
design
Unlock the answer
question
____ decisions are typically one-time decisions, with no standard operating procedure pertaining to them.
answer
Unstructured
Unlock the answer
question
The ____ phase of the decision-making process starts with analyzing each alternative and its relationship to the criteria to determine whether it is feasible.
answer
choice
Unlock the answer
question
Which of the following tasks is performed by managers for which an EIS is useful?
answer
Spotting trends
Unlock the answer
question
____ decisions include a structured aspect that benefits from information retrieval, analytical models, and information systems technology.
answer
Semistructured
Unlock the answer
question
The ____ component includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.
answer
model base
Unlock the answer
question
Intelligent agents are also called ____.
answer
bots
Unlock the answer
question
____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.
answer
Robots
Unlock the answer
question
____ systems have been one of the most successful artificial intelligence related technologies.
answer
Expert
Unlock the answer
question
____ enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution.
answer
Meta-knowledge
Unlock the answer
question
The _____ characteristic of an intelligent agent demonstrates the agent's ability to migrate from one platform to another with a minimum of human intervention.
answer
mobility
Unlock the answer
question
____ was developed so that users could communicate with computers in their own language.
answer
Natural-language processing
Unlock the answer
question
Some banks use a(n) ____ system to qualify customers for loans, using parameters from past customers stored in a database.
answer
case-based reasoning
Unlock the answer
question
In the context of expert systems,____ consists of common sense, rules of thumb, educated guesses, and instinctive judgments.
answer
heuristics
Unlock the answer
question
Data mining agents work with a _____ , detecting trends and discovering new information and relationships among data items that were not readily apparent.
answer
data warehouse
Unlock the answer
question
Within the context of the components an expert system, a(n) _____ is similar to the model base component of a decision support system.
answer
inference engine
Unlock the answer
question
In the AI field, ____ engineers try to discover "rules of thumb" that enable computers to perform tasks usually handled by humans.
answer
knowledge
Unlock the answer
question
In the context of the decision making analyses that use information technology,____ analysis is available in spreadsheet programs such as Microsoft Excel.
answer
what-if
Unlock the answer
question
____ RFID tags have no internal power supply.
answer
Passive
Unlock the answer
question
A(n) _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.
answer
quick response code
Unlock the answer
question
Nanotechnology incorporates techniques that involve the structure and composition of materials on a ____.
answer
NANOSCALE
Unlock the answer
question
____ is a small electronic device consisting of a small chip and an antenna, and performs the same task as bar codes.
answer
Radio frequency identification tag
Unlock the answer
question
When using a(n) ____, IS personnel time is freed up to focus on applications, such as customer relationship management and financial information systems, that are more strategically important to the organization.
answer
application service provider model
Unlock the answer
question
____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.
answer
Virtual reality technology
Unlock the answer
question
The ____ component of a virtual reality system is an input device that captures and records movements of the user's feet as the user turns in different directions.
answer
walker
Unlock the answer
question
Within the context of virtual reality technology, ____ refers to giving users the feeling of being part of an environment by using special hardware and software.
answer
immersion
Unlock the answer
question
A cave automatic virtual environment (CAVE) is a virtual environment consisting of a ____ room in which the walls are rear projection screens
answer
cube-shaped
Unlock the answer
question
One advantage of grid computing is _____, meaning more nodes can be added for additional computing power without affecting the network's operation.
answer
scalability
Unlock the answer
question
____ component of a virtual reality system enable users to see and hear the virtual world.
answer
Visual and aural system
Unlock the answer
question
____ could be used to make sure people don't vote more than once.
answer
Biometrics
Unlock the answer
question
Within the context of virtual reality technology, ____ refers to giving objects in a virtual reality environment texture and shading for a 3D appearance.
answer
simulation
Unlock the answer