MIS 290 Final Flashcards
Unlock all answers in this set
Unlock answersquestion
true
answer
A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
question
true
answer
Fiber-optic cables have a higher capacity, smaller size, lighter weight, lower attenuation, and higher security than other cable types.
question
true
answer
Data communication technologies make, Web and video conferencing easier, which can reduce the costs of business travel.
question
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system
answer
denial-of-service
question
A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.
answer
wiki
question
n the context of the technologies developed to improve the efficiency and quality of digital communications, ____ divide(s) each channel into six time slots.
answer
false
question
A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.
answer
pod cast
question
____ is a hardware device that allows several nodes to share one communication channel.
answer
multiplexer
question
In data communication, ____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
answer
convergence
question
A routing table lists ____.
answer
nodes on a network
question
A network ____ represents a network's physical layout.
answer
topology
question
A ____ router can build tables that identify addresses on each network.
answer
mobile
question
Data encryption transforms data into a scrambled form called ____.
answer
ciphertext
question
A uniform resource locator is the address of a document or site on the Internet.
answer
true
question
A proxy server acts as an intermediary between network users and the Internet
answer
true
question
(n) ____ is the address of a document or site on the Internet.
answer
URL
question
____ are hackers who specialize in unauthorized penetration of information systems.
answer
black hats
question
The Transmission Control Protocol (TCP) operates at the OSI model's ____ layer.
answer
transport
question
Which of the following is considered an intentional threat?
answer
social engineering
question
Which of the following protocols is used to send e-mails?
answer
SMTP
question
What is the first step in client/server communication?
answer
The user creates a query.
question
The Internet2 (I2) project started in ____
answer
ntegrate services, such as e-mail and file sharing
question
The Federal Express Tracking System allows customers to enter a package's tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.
answer
extranet
question
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
answer
false
question
___ are Web sites that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.
answer
Social networking sites
question
Intranets are typically set up behind a firewall.
answer
true
question
Which of the following protocols is used for Internet telephony?
answer
VoIP
question
The amount of data that can be transferred from one point to another in one second is called ____.
answer
bandwith
question
The embedded references in hypermedia documents are called hypertext.
answer
true
question
Protocols help ensure compatibility between different manufacturers' devices.
answer
true
question
The ____ layer of the OSI model specifies the electrical connections between computers and the transmission medium, and is primarily concerned with transmitting binary data, or bits over a communication network
answer
Physical
question
Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.
answer
Web browsers
question
Within the ____ technique for wireless security, a user's computer and the AP use a master key to negotiate for a key that will be used for a session.
answer
Wi-Fi Protected Access 2
question
____ is a commonly used encryption protocol that manages transmission security on the Internet.
answer
Secure Sockets Layer
question
____ cables are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.
answer
Fiber-optic
question
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
answer
Business continuity planning
question
____ media operate on line-of-sight.
answer
Terrestrial microwave
question
____ take advantage of the human element of security systems.
answer
Social engineering attacks
question
____ means that computers and networks are operating and authorized users can access the information they need
answer
Availability
question
____ means that a system must prevent disclosing information to anyone who is not authorized to access it
answer
Confidentiality
question
____ encryption uses a public key known to everyone and a private key known only to the recipient
answer
Asymmetric
question
____ is the process of capturing and recording network traffic.
answer
Sniffing
question
____ scaling refers to adding more workstations (clients).
answer
Horizontal
question
____ ensures data security and integrity over public networks, such as the Internet.
answer
Transport Layer Security
question
____ refers to the accuracy of information resources within an organization.
answer
integrity
question
____ is understanding the role of information in generating and using business intelligence.
answer
Information literacy
question
Management information system's (MIS) _____ include programs developed in-house
answer
software components
question
in designing a management information system, the first task is to define the system's _____ clearly.
answer
objectives
question
_____ are an example of internal source of data for an information system.
answer
Personnel records
question
_____ are an external data source of an information system.
answer
Labor statistics
question
The output of an information system is _____.
answer
information
question
The purpose of an information system's _____ component is generating the most useful type of information for making decisions.
answer
process
question
A successful _____ program helps improve client service and create a long-term relationship between an organization and its clients.
answer
customer relationship management
question
In accordance with Porter's Five Forces model, _____ power is high when customers have fewer options and low when customers have more options.
answer
supplier
question
Online brokerage firms operate in a highly combative and ambitious environment, so they use information technologies to make their services more unique in order to combat _____.
answer
rivalry among existing competitors
question
The most common personal digital assistant is a smartphone.
answer
true
question
Twitter is an example of a management information system (MIS)
answer
false
question
The terms "information systems" and "information technologies" are used interchangeably.
answer
second
question
____ is 1/1,000,000,000,000 of a second.
answer
Picosecond
question
____ means saving data in computer memory and retrieval is accessing data from memory.
answer
storage
question
How many bytes is a data of 48 bits?
answer
24
question
A ____ is the size of a character.
answer
byte
question
ASCII (7 bit) defines up to ____ characters.
answer
128
question
Which of the following is an input device
answer
Optical character reader
question
_____ is the most common output device for soft copy.
answer
Liquid crystal display
question
The Clipboard's contents are stored on ____.
answer
RAM
question
____ memory, which is nonvolatile, holds data when the computer is off or during the course of a program's operation.
answer
secondary
question
The term RAID stands for ____.
answer
redundant array of independent disks
question
The supervisor program of an OS is called the ____.
answer
kernel
question
ENIAC is an example of a first-generation computer.
answer
true
question
A byte is a single value of 0 or 1.
answer
false
question
Light pen is an output device
answer
false
question
Which of the following is true of a database?
answer
More information can be generated from the same data.
question
The ____ view involves how data is stored on and retrieved from storage media.
answer
physical
question
The ____ view involves how information appears to users and how it can be organized and retrieved.
answer
logical
question
The ____ in a database model defines the boundaries of a database, such as maximum and minimum values allowed for a field.
answer
set of integrity rules file structure
question
A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
answer
dictionary
question
A ____ key uniquely identifies every record in a relational database.
answer
primary
question
In a relational model, when a primary key for one table appears in another table it is called a ____ key.
answer
foreign
question
____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.
answer
normalization
question
A ____ operation searches data in a table and retrieves records based on certain criteria.
answer
select
question
A data ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
answer
warehouse
question
____ is information in its original form.
answer
raw data
question
____ gives users subtotals of various categories
answer
Summary data
question
____ uses multiple sources of information and provides multidimensional analysis.
answer
OLAP
question
A data ____ is usually a smaller version of a data warehouse, used by a single department or function.
answer
mart
question
Business analytics uses ____ to support decision-making activities.
answer
data mining tools
question
Amazon.com uses ____ to provide customized book recommendations based on past purchases.
answer
cookies
question
____ generated by Web server software, record a user's actions on a Web site.
answer
Log files
question
A banker uses the information a client enters in a loan application to sell other financial products to this client. This action is _____.
answer
legal but unethical
question
Generally, ____ laws protect tangible material, such as books and drawings.
answer
copyright
question
The ____ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
answer
Fair Use Doctrine
question
____ is registering, selling, or using a domain name to profit from someone else's trademark.
answer
Cybersquatting
question
information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____.
answer
digital divide
question
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
answer
Green computing
question
_____ prevents new adware from being installed on your computer.
answer
Antispyware
question
____ is collecting data from Web sites, usually for competitive intelligence.
answer
Web harvesting
question
Mobile commerce (m-commerce) is based on the ____ protocol.
answer
wireless application
question
CASE tools are mainly used during the ____ phase of the SDLC.
answer
design
question
Which term describes one user viewing one ad?
answer
ad impression
question
Using the ____ model brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
answer
Brokerage
question
During the ____ phase, analysts choose the solution that is the most realistic and offers the highest payoff for the organization.
answer
design
question
During the ____ phase, the systems designer must define the problem the organization faces, taking care not to define symptoms rather than the underlying problem.
answer
planning
question
In ____ conversion, the old and new systems run simultaneously for a short time to ensure the new system works correctly.
answer
parallel
question
E-training for government officials is an example of a ____ application.
answer
government-to-employee
question
In ____ conversion, the old system is stopped and the new system is implemented.
answer
plunge
question
E-procurement is an example of the ____ B2B e-commerce model.
answer
seller-side marketplace
question
Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support the _____ structure.
answer
transnational
question
The _____ support of a global information system involves broad and long-term goals.
answer
strategic
question
The GIS control dimension requires a(n) ____ architecture for data.
answer
centralized
question
During the ____ phase, the information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced.
answer
maintenance
question
One of the issues with GIS is that too much ____ can prevent flexibility in responding to local preferences and even time differences.
answer
Standardization
question
E-commerce fulfills the product information activity using ____.
answer
Web sites
question
With ____ outsourcing, the organization chooses an outsourcing company in the same country.
answer
onshore
question
Companies creating separate Web sites for each country in which they do business is called _____ of a Web site.
answer
localization
question
With reference to the global information system, _____ consists of using managerial power to ensure adherence to the organization's goals.
answer
control
question
The systems development life cycle (SDLC) is also known as the ____.
answer
waterfall model
question
____ centers on a structured workshop in which users and system professionals come together to develop an application.
answer
JAD
question
With ____ technology, information is sent to users based on their previous inquiries, interests, or specifications.
answer
Push
question
A ____ prototype shows users how a particular task that was not technically feasible can be done.
answer
proof of concept
question
____ present(s) a challenge when designing and implementing global databases.
answer
Different character sets
question
____ is a site that facilitates C2C e-commerce.
answer
eBay
question
____ is a popular on-line payment system used on many on-line auction sites.
answer
paypal
question
____ is a method for improving the volume or quality of traffic to a Web site.
answer
Search engine optimization
question
____ uses an iterative process that repeats the design, development, and testing steps as needed, based on feedback from users.
answer
RAD
question
____ is a method for developing software applications and information system projects in which the project is divided into smaller functions and developers can not go on to the next phase until the current phase is finished.
answer
XP
question
_____ are considered the first large-scale interactive global system.
answer
Airline reservation systems
question
_____ display ads appear on top of a browser window, blocking the user's view.
answer
Pop-up
question
____ refers to money or scrip that is exchanged only electronically.
answer
Electronic payment
question
____ introduced the value chain concept.
answer
Michael Porter
question
____ is a supporting activity in the value chain.
answer
Technological development
question
____ feasibility is the measure of how well the proposed solution will work in the organization and how internal and external customers will react to it.
answer
Operational
question
____ costs measure what you would miss by not having a system or feature.
answer
Opportunity
question
____ feasibility assesses a system's costs and benefits.
answer
Economic
question
____ is an application of artificial intelligence that can be used for Web marketing.
answer
Intelligent agents
question
____ is a pure-play company.
answer
Amazon.com
question
____ includes national laws and international agreements on privacy protection and data security.
answer
Transborder data flow
question
Stores use "____" to get a customer to buy additional products that they might already be purchasing from a different store.
answer
cross-selling or up-selling
question
____ enables business partners to send and receive information on business transactions.
answer
Electronic data interchange
question
With reference to the Internet-enabled SCM activities, coordinating just-in-time (JIT) inventory programs with vendors and suppliers is a part of _____.
answer
production scheduling
question
With reference to the Internet-enabled SCM activities, providing real time stock information and replenishing stock quickly is a part of _____.
answer
inventory management
question
The main goal of a(n) ____ system is to improve services offered to consumers and use consumer contact information for targeted marketing.
answer
customer relationship management
question
____ is a search for specific information or patterns, using input from multiple business partners and data sources.
answer
Collaborative filtering
question
Organizations with an established IT infrastructure often choose a(n) ____ CRM, which is implemented much like any other IT system.
answer
on-premise
question
Amazon.com, suggests products you might enjoy, based on your past browsing and purchasing habits; this is an example of ____.
answer
personalization
question
Transaction data for a CRM system might be gathered using ____.
answer
grocery store loyalty cards
question
____ invite sellers to submit bids for products and services.
answer
Reverse auctions
question
In service organizations, the link in the supply chain includes ____.
answer
distribution centers
question
A(n) ____ system is used to coordinate operations, resources, and decision making between manufacturing, production, marketing, and human resources.
answer
enterprise resource planning
question
Information technologies and ____ play a major role in implementing an SCM system.
answer
the Internet
question
____ decisions, or programmable tasks, can be automated because a well-defined standard operating procedure exists for these types of decisions.
answer
Structured
question
Resolving conflicts between two divisions is a type of ____ decision at the tactical management level.
answer
unstructured
question
The ____ component of a DSS manages and coordinates the other major components.
answer
DSS engine
question
During the ____ phase of the decision-making process, a decision maker examines the organization's environment for conditions that need decisions.
answer
intelligence
question
Plant location is a type of ____ decision at the strategic management level.
answer
structured
question
In the ____ phase of the decision-making process, the organization devises a plan for carrying out the alternative selected in the previous phase and obtains the resources to execute the plan.
answer
implementation
question
During the ____ phase of the decision-making process, the decision maker defines associations between alternatives and criteria.
answer
design
question
____ decisions are typically one-time decisions, with no standard operating procedure pertaining to them.
answer
Unstructured
question
The ____ phase of the decision-making process starts with analyzing each alternative and its relationship to the criteria to determine whether it is feasible.
answer
choice
question
Which of the following tasks is performed by managers for which an EIS is useful?
answer
Spotting trends
question
____ decisions include a structured aspect that benefits from information retrieval, analytical models, and information systems technology.
answer
Semistructured
question
The ____ component includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.
answer
model base
question
Intelligent agents are also called ____.
answer
bots
question
____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.
answer
Robots
question
____ systems have been one of the most successful artificial intelligence related technologies.
answer
Expert
question
____ enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution.
answer
Meta-knowledge
question
The _____ characteristic of an intelligent agent demonstrates the agent's ability to migrate from one platform to another with a minimum of human intervention.
answer
mobility
question
____ was developed so that users could communicate with computers in their own language.
answer
Natural-language processing
question
Some banks use a(n) ____ system to qualify customers for loans, using parameters from past customers stored in a database.
answer
case-based reasoning
question
In the context of expert systems,____ consists of common sense, rules of thumb, educated guesses, and instinctive judgments.
answer
heuristics
question
Data mining agents work with a _____ , detecting trends and discovering new information and relationships among data items that were not readily apparent.
answer
data warehouse
question
Within the context of the components an expert system, a(n) _____ is similar to the model base component of a decision support system.
answer
inference engine
question
In the AI field, ____ engineers try to discover "rules of thumb" that enable computers to perform tasks usually handled by humans.
answer
knowledge
question
In the context of the decision making analyses that use information technology,____ analysis is available in spreadsheet programs such as Microsoft Excel.
answer
what-if
question
____ RFID tags have no internal power supply.
answer
Passive
question
A(n) _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.
answer
quick response code
question
Nanotechnology incorporates techniques that involve the structure and composition of materials on a ____.
answer
NANOSCALE
question
____ is a small electronic device consisting of a small chip and an antenna, and performs the same task as bar codes.
answer
Radio frequency identification tag
question
When using a(n) ____, IS personnel time is freed up to focus on applications, such as customer relationship management and financial information systems, that are more strategically important to the organization.
answer
application service provider model
question
____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.
answer
Virtual reality technology
question
The ____ component of a virtual reality system is an input device that captures and records movements of the user's feet as the user turns in different directions.
answer
walker
question
Within the context of virtual reality technology, ____ refers to giving users the feeling of being part of an environment by using special hardware and software.
answer
immersion
question
A cave automatic virtual environment (CAVE) is a virtual environment consisting of a ____ room in which the walls are rear projection screens
answer
cube-shaped
question
One advantage of grid computing is _____, meaning more nodes can be added for additional computing power without affecting the network's operation.
answer
scalability
question
____ component of a virtual reality system enable users to see and hear the virtual world.
answer
Visual and aural system
question
____ could be used to make sure people don't vote more than once.
answer
Biometrics
question
Within the context of virtual reality technology, ____ refers to giving objects in a virtual reality environment texture and shading for a 3D appearance.
answer
simulation