MIS Chapter 4 vocab – Flashcards
Unlock all answers in this set
Unlock answersquestion
            Digital Certificate
answer
        a data file that identifies individuals or organizations online and is comparable to a digital signature
question
            Typosquatting
answer
        a problem that occurs when someone registers purposely misspelled variations of well-known domain names. These variants sometimes lure consumers who make typographical errors when entering a URL.
question
            Dumpster Diving
answer
        Is a form of social engineering when a hacker looks through people's trash to find personal information.
question
            Cyberterrorists
answer
        Seeks to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
question
            Managers should consider including virus protection in the information security policy, which includes how often the system should be scanned and how frequently the software should be
answer
        Updated
question
            Social media monitoring
answer
        is the process of monitoring and responding to what is being said about a company, individual, product, or brand.
question
            Intellectual property is ______________creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
answer
        Intangible
question
            What is the type of authentication that requires a user name and password?
answer
        single-factor authentication
question
            Black-hat hacker
answer
        is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information
question
            information privacy policy
answer
        A policy that contains general principles regarding information privacy.
question
            Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.
answer
        return
question
            Digital rights management
answer
        is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
question
            Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of _________ identity theft.
answer
        pharming
question
            The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
answer
        Child
question
            The policy that ensures users know how to behave at work and the published standard an organization has regarding computer user behavior is called the __________ computer use policy.
answer
        ethical
question
            drive-by hacking
answer
        is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
question
            What is unsolicited email that plagues employees at all levels and clogs email systems?
answer
        spam
question
            What is a destructive agent?
answer
        malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
question
            Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between what is ________ and ________.
answer
        legal and ethical
question
            Internet ____________ is a government attempt to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
answer
        censorship
question
            What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, or what ads were viewed and what was purchased?
answer
        clickstream
question
            Spyware
answer
        is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
question
            What is the electronic defacing of an existing website?
answer
        cybervandalism
question
            A(n) __________ clause is typically contained in an acceptable use policy.
answer
        nonrepudiation
question
            What are the first two lines of defense a company should take when addressing security risks?
answer
        people first, technology second
question
            To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ____________ policy.
answer
        social media
question
            Digital Darwinism
answer
        implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
question
            Disruptive technology
answer
        is a new way of doing things that initially does not meet the needs of existing customers.
question
            How do sustaining technologies lead to future growth from existing investments?
answer
        They produce improved products in an established market.
question
            What is the current version of HTML that delivers everything from animation to graphics and music to movies?
answer
        HTML 5
question
            What allows users to access the WWW?
answer
        web browser
question
            What is the Internet protocol web browsers use to request and display web pages using universal resource locators?
answer
        hypertext transport protocol
question
            Information reach
answer
        measures the number of people a firm can communicate with all over the world.
question
            Cybermediation
answer
        is a type of mediation that refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness.
question
            What is the difference between a business model and an ebusiness model?
answer
        A business model details how a company creates, delivers, and generates revenue; an ebusiness model does all of the same except on the Internet.
question
            Adwords
answer
        are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages.
question
            Podcasting
answer
        converts an audio broadcast to a digital music player
question
            Taxonomy
answer
        is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website.
question
            Open system
answer
        is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
question
            Closed source
answer
        is any proprietary software licensed under exclusive legal right of the copyright holder.
question
            Crowdfunding
answer
        sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet.
question
            What is the primary way that social networks work?
answer
        connecting people by matching profile information
question
            Many social media websites use _________, or specific keywords or phrases incorporated into website content, for means of classification or taxonomy.
answer
        tags
question
            What is a locally stored URL, or the address of a file or Internet page saved as a shortcut?
answer
        website bookmark
question
            Twitter is an example of a __________ website.
answer
        microblogging
question
            Network effect
answer
        describes how products in a network increase in value to users as the number of users increases.
question
            What does API stand for?
answer
        Application Programming Interface
question
            Which of the following best describes Web 1.0?
answer
        static text-based information websites
question
            Which of the following best describes Web 2.0?
answer
        user-contributed content
question
            Semantic web
answer
        is a component of Web 3.0 that describes things in a way that computers can understand.
question
            Which of the following represents the three different levels of a company pyramid from the top to the bottom?
answer
        strategic - managerial - operational
question
            Todd Haitz works at a retail store selling sports equipment. His daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Todd?
answer
        managerial
question
            Metrics
answer
        are measurements that evaluate results to determine whether a project is meeting its goals.
question
            What types of metrics measure customer satisfaction?
answer
        effectiveness MIS metrics
question
            Customer satisfaction
answer
        is measured by such benchmarks as satisfaction surveys, percentage of existing customers
question
            Analytical information
answer
        encompasses all organizational information and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
question
            What-if analysis
answer
        is the DSS analysis that checks the impact of a change in a variable or assumption on the model.
question
            Which of the following is considered the output in the systems thinking example of a DSS? Selected Answer:  Correct forecast
answer
        forecast
question
            What is consolidation?
answer
        involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information
question
            Neural network
answer
        is a category of AI that attempts to emulate the way the human brain works.
question
            Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?
answer
        fuzzy logic
question
            What is the process of learning from ecosystems and adapting their characteristics to human and organizational situations?
answer
        biomimicry
question
            Haptic interface
answer
        uses technology allowing humans to interact with a computer through bodily sensations and movements-for example, a cell phone vibrating in your pocket.
question
            Static process
answer
        uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously.
question
            Which of the following are examples of static processes?
answer
        creating financial statements
question
            BPMN event
answer
        displays the path in which the process flows.
question
            BPMN activity
answer
        is a task in a business process.
question
            What is the primary goal of the As-Is process model?
answer
        to simplify, eliminate, and improve the To-Be process   to analyze the To-Be process elements
question
            Workflow
answer
        includes the tasks, activities, and responsibilities required to execute each step in a business process.
question
            Automation
answer
        is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs.
question
            What are managerial business processes?
answer
        semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements
question
            Streamlining
answer
        improves managerial level business processes.
question
            Business process reengineering (BPR)
answer
        is/are the analysis and redesign of workflow within and between enterprises.
question
            Review the following list of key terms and determine which one typically occurs during strategic business process improvement.
answer
        reengineering
question
            What is the first phase in the business process reengineering model?
answer
        set project scope
question
            Internet of Things
answer
        is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention.
question
            Fact
answer
        is the confirmation or validation of an event or object.
question
            Netflix
answer
        is not a technology company but used technology to revamp the business process of renting videos.
question
            What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?
answer
        business intelligence
question
            To be successful in the information age, the text recommends that a company operate in a specific way. What way does the text recommend a company operate?
answer
        interdependently between departments
question
            Which department manages the process of converting or transforming resources into goods or services?
answer
        Operations management sales
question
            Which data types are typically found in the marketing department?
answer
        promotion data, sales data, advertising data.
question
            Which data types are typically found in the human resources department?
answer
        employee data, promotion data, vacation data
question
            Goods
answer
        are material items or products that customer's will buy to satisfy a want or need.
question
            Productivity
answer
        is the rate at which goods and services are produced based upon total output given total inputs.
question
            Chief Security Office (CSO)
answer
        is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
question
            If you were thinking about a washing machine as a system, which of the following represents the outputs?
answer
        the clean clothes
question
            Identifying competitive advantages can be difficult and explains why they are typically
answer
        temporary
question
            Which group of stakeholders' primary interests include adhering to regulations/laws, increasing employment, and ethical taxation reporting?
answer
        government
question
            ___________ advantage features a product or service on which customers place a greater value than they do on similar offerings from competitors.
answer
        Competitive
question
            _______________ strategy evaluates a project's position.
answer
        SWOT analysis
question
            ___________ executes the business strategy.
answer
        Value chain analysis
question
            Which of the following statements is correct when considering a SWOT analysis?
answer
        Opportunities and threats originate outside an organization.
question
            Strengths would be categorized as ___________ in a typical SWOT analysis.
answer
        internal, helpful
question
            ___________ are costs that make customers reluctant to switch to another product or service.
answer
        Switching costs
question
            Which of the following describes how a company can reduce the threat of substitute products or services?
answer
        offer additional value through wider product distribution
question
            ___________ consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
answer
        Supply chain
question
            ___________ is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).
answer
        Supplier power
question
            ___________ is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.
answer
        Threat of substitute products or services
question
            ___________ is a standardized set of activities that accomplishes a specific task.
answer
        Business process
question
            ___________ analyzes a company's business processes and is useful for determining how to create the greatest possible value for customers.
answer
        Value chain analysis
question
            When evaluating the value chain, all of the following are included in the primary value activities except___________.
answer
        MIS development
