MIS Chapter 4 vocab – Flashcards

Unlock all answers in this set

Unlock answers
question
Digital Certificate
answer
a data file that identifies individuals or organizations online and is comparable to a digital signature
question
Typosquatting
answer
a problem that occurs when someone registers purposely misspelled variations of well-known domain names. These variants sometimes lure consumers who make typographical errors when entering a URL.
question
Dumpster Diving
answer
Is a form of social engineering when a hacker looks through people's trash to find personal information.
question
Cyberterrorists
answer
Seeks to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
question
Managers should consider including virus protection in the information security policy, which includes how often the system should be scanned and how frequently the software should be
answer
Updated
question
Social media monitoring
answer
is the process of monitoring and responding to what is being said about a company, individual, product, or brand.
question
Intellectual property is ______________creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
answer
Intangible
question
What is the type of authentication that requires a user name and password?
answer
single-factor authentication
question
Black-hat hacker
answer
is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information
question
information privacy policy
answer
A policy that contains general principles regarding information privacy.
question
Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.
answer
return
question
Digital rights management
answer
is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
question
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of _________ identity theft.
answer
pharming
question
The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
answer
Child
question
The policy that ensures users know how to behave at work and the published standard an organization has regarding computer user behavior is called the __________ computer use policy.
answer
ethical
question
drive-by hacking
answer
is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
question
What is unsolicited email that plagues employees at all levels and clogs email systems?
answer
spam
question
What is a destructive agent?
answer
malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
question
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between what is ________ and ________.
answer
legal and ethical
question
Internet ____________ is a government attempt to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
answer
censorship
question
What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, or what ads were viewed and what was purchased?
answer
clickstream
question
Spyware
answer
is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
question
What is the electronic defacing of an existing website?
answer
cybervandalism
question
A(n) __________ clause is typically contained in an acceptable use policy.
answer
nonrepudiation
question
What are the first two lines of defense a company should take when addressing security risks?
answer
people first, technology second
question
To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ____________ policy.
answer
social media
question
Digital Darwinism
answer
implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
question
Disruptive technology
answer
is a new way of doing things that initially does not meet the needs of existing customers.
question
How do sustaining technologies lead to future growth from existing investments?
answer
They produce improved products in an established market.
question
What is the current version of HTML that delivers everything from animation to graphics and music to movies?
answer
HTML 5
question
What allows users to access the WWW?
answer
web browser
question
What is the Internet protocol web browsers use to request and display web pages using universal resource locators?
answer
hypertext transport protocol
question
Information reach
answer
measures the number of people a firm can communicate with all over the world.
question
Cybermediation
answer
is a type of mediation that refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness.
question
What is the difference between a business model and an ebusiness model?
answer
A business model details how a company creates, delivers, and generates revenue; an ebusiness model does all of the same except on the Internet.
question
Adwords
answer
are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages.
question
Podcasting
answer
converts an audio broadcast to a digital music player
question
Taxonomy
answer
is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website.
question
Open system
answer
is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
question
Closed source
answer
is any proprietary software licensed under exclusive legal right of the copyright holder.
question
Crowdfunding
answer
sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet.
question
What is the primary way that social networks work?
answer
connecting people by matching profile information
question
Many social media websites use _________, or specific keywords or phrases incorporated into website content, for means of classification or taxonomy.
answer
tags
question
What is a locally stored URL, or the address of a file or Internet page saved as a shortcut?
answer
website bookmark
question
Twitter is an example of a __________ website.
answer
microblogging
question
Network effect
answer
describes how products in a network increase in value to users as the number of users increases.
question
What does API stand for?
answer
Application Programming Interface
question
Which of the following best describes Web 1.0?
answer
static text-based information websites
question
Which of the following best describes Web 2.0?
answer
user-contributed content
question
Semantic web
answer
is a component of Web 3.0 that describes things in a way that computers can understand.
question
Which of the following represents the three different levels of a company pyramid from the top to the bottom?
answer
strategic - managerial - operational
question
Todd Haitz works at a retail store selling sports equipment. His daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Todd?
answer
managerial
question
Metrics
answer
are measurements that evaluate results to determine whether a project is meeting its goals.
question
What types of metrics measure customer satisfaction?
answer
effectiveness MIS metrics
question
Customer satisfaction
answer
is measured by such benchmarks as satisfaction surveys, percentage of existing customers
question
Analytical information
answer
encompasses all organizational information and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
question
What-if analysis
answer
is the DSS analysis that checks the impact of a change in a variable or assumption on the model.
question
Which of the following is considered the output in the systems thinking example of a DSS? Selected Answer: Correct forecast
answer
forecast
question
What is consolidation?
answer
involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information
question
Neural network
answer
is a category of AI that attempts to emulate the way the human brain works.
question
Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?
answer
fuzzy logic
question
What is the process of learning from ecosystems and adapting their characteristics to human and organizational situations?
answer
biomimicry
question
Haptic interface
answer
uses technology allowing humans to interact with a computer through bodily sensations and movements-for example, a cell phone vibrating in your pocket.
question
Static process
answer
uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously.
question
Which of the following are examples of static processes?
answer
creating financial statements
question
BPMN event
answer
displays the path in which the process flows.
question
BPMN activity
answer
is a task in a business process.
question
What is the primary goal of the As-Is process model?
answer
to simplify, eliminate, and improve the To-Be process to analyze the To-Be process elements
question
Workflow
answer
includes the tasks, activities, and responsibilities required to execute each step in a business process.
question
Automation
answer
is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs.
question
What are managerial business processes?
answer
semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements
question
Streamlining
answer
improves managerial level business processes.
question
Business process reengineering (BPR)
answer
is/are the analysis and redesign of workflow within and between enterprises.
question
Review the following list of key terms and determine which one typically occurs during strategic business process improvement.
answer
reengineering
question
What is the first phase in the business process reengineering model?
answer
set project scope
question
Internet of Things
answer
is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention.
question
Fact
answer
is the confirmation or validation of an event or object.
question
Netflix
answer
is not a technology company but used technology to revamp the business process of renting videos.
question
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?
answer
business intelligence
question
To be successful in the information age, the text recommends that a company operate in a specific way. What way does the text recommend a company operate?
answer
interdependently between departments
question
Which department manages the process of converting or transforming resources into goods or services?
answer
Operations management sales
question
Which data types are typically found in the marketing department?
answer
promotion data, sales data, advertising data.
question
Which data types are typically found in the human resources department?
answer
employee data, promotion data, vacation data
question
Goods
answer
are material items or products that customer's will buy to satisfy a want or need.
question
Productivity
answer
is the rate at which goods and services are produced based upon total output given total inputs.
question
Chief Security Office (CSO)
answer
is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
question
If you were thinking about a washing machine as a system, which of the following represents the outputs?
answer
the clean clothes
question
Identifying competitive advantages can be difficult and explains why they are typically
answer
temporary
question
Which group of stakeholders' primary interests include adhering to regulations/laws, increasing employment, and ethical taxation reporting?
answer
government
question
___________ advantage features a product or service on which customers place a greater value than they do on similar offerings from competitors.
answer
Competitive
question
_______________ strategy evaluates a project's position.
answer
SWOT analysis
question
___________ executes the business strategy.
answer
Value chain analysis
question
Which of the following statements is correct when considering a SWOT analysis?
answer
Opportunities and threats originate outside an organization.
question
Strengths would be categorized as ___________ in a typical SWOT analysis.
answer
internal, helpful
question
___________ are costs that make customers reluctant to switch to another product or service.
answer
Switching costs
question
Which of the following describes how a company can reduce the threat of substitute products or services?
answer
offer additional value through wider product distribution
question
___________ consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
answer
Supply chain
question
___________ is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).
answer
Supplier power
question
___________ is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.
answer
Threat of substitute products or services
question
___________ is a standardized set of activities that accomplishes a specific task.
answer
Business process
question
___________ analyzes a company's business processes and is useful for determining how to create the greatest possible value for customers.
answer
Value chain analysis
question
When evaluating the value chain, all of the following are included in the primary value activities except___________.
answer
MIS development
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New