Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/202

Click to flip

202 Cards in this Set

  • Front
  • Back
Software refers to....
Programs
Paragraphs in your report are examples of...
Data
A storage disk is an example of which component?
Hardware
MIS includes...
(1) The development of Information Systems.
(2) The use of Information Systems.
(3) Assisting businesses to achieve goals.
All information systems have...
All five components
Nonroutine cognitive skills include...
(1) Abstract reasoning
(2) Collaborative skills
(3) Problem solving
(4) Communication technique
An example of a set of instructions is...
Software
An example of an actor in the five component framework is the...
Hardware
An example of a low tech system would be...
An email program and a file of email addresses.
Changing which component is most disruptive to the organization?
Procedures
... systems are designed to keep track of customers' maintenance schedules
Customer Support
Data is...
recorded facts
Information is...
(1) the difference that makes a difference
(2) processed data
(3) data presented in a meaningful way
(4) grouped data
... occur(s) in information systems when the output of one system feeds another.
Context Changes
Systems that develop information in near real time are usually more...
Expensive
As an information user, you should be skeptical of...
Web Pages
Which of the following is NOT a characteristic of good information:
accurate
relevant
timely
valuable
Valuable
Management needs just barely sufficient information because of...
Time Limitations
Information Relevance refers to...
Both context and subject
There needs to be a correlation between the cost of information and its...
Value
Unique products tailored to customer demands are produced by...
high-value organizations
Which of the following is NOT a symbolic-analytic worker?
In-Person Service providers
Problem-Identifiers
Problem-Solvers
Solution brokers
In-Person Service providers
Symbolic-analytic services are required by...
high-value organizations
... are an assembly of the five component framework.
Information Systems
Moore's Law implies that the .......... of a computer chip doubles every 18 months.
speed
Effective .......... means that the work produced by the group is greater than the sum of the individual output.
Collaboration
Which of the following items is NOT considered to be a critical factor for collaboration?
Communication
Content Management
Permissions
Workflow Controls
Permissions
The process by which content is created, edited, used, and disposed is termed ...
Workflow Management
Face-to-face meetings are an example of ..........communication.
Synchronous
Employees who work different shifts at the same factory will meet ...
Asynchronously
Which of the following is an example of a synchronous meeting?
Multiparty text chat
Email
Discussion forums
Team surveys
Multiparty Text Chat
A ......... is an example of a virtual meeting.
Conference Call
.......... systems track shared content and usually eliminate the problems seen with concurrent document access.
Version-Management
Shared documents are often stored in shared directories called...
Libraries
Monty sent both Chris and Linda a copy of the report on Monday to review before their Tuesday meeting. This is an example of ...
Parallel Workflow
Activity A must occur before activity B, which, in turn, must be completed before activity C can commence. This is an example of a .......... workflow.
Sequential
If someone pretends to be someone else on the Internet, it is called ...
Spoofing
Electronic networks that only appear to be private, but actually function across a public network are called...
Virtual Private Networks
Decisions occur at what level of the organization?
Managerial
Operational
Strategic
How much raw material to order from a vendor is an example of .......... decisions.
Operational
Information systems that support operational decision making are called ...
TPS
A(n) .......... has no agreed-upon decision making process.
Unstructured Decision Process
.......... are the most important collaboration systems for unstructured decision making processes.
Communication Systems
Identifying solution alternatives and choosing an alternative involve...
Iteration Feedback
A problem is a ...
View of a situation
The requirements that are to be achieved by a project are called the ...
Scope
Projects are .......... applications for the achievement of some goal.
Dynamic
.......... are vital to decision making, problem solving, and project management.
Communications Systems
Mark realized that his was the correct version, and that Janet and Jill were obviously wrong. This is an example of .......... thinking.
egocentric
Sally realized that Jack and Harry viewed the situation very differently from her, and tried to understand what each thought. This is an example of .......... thinking.
empathetic
An analysis of which of the following will lead to competitive strategy?
Value Chains
Business Processes
Information Systems
Value Chains
Porter's five forces model includes all of the following, EXCEPT:
threat of substitution.
competition among existing firms.
threat of new entrants.
information systems.
Information Systems
The intensity of the five forces determines...
how sustainable the profitability will be
`McDonalds, Burger King, and Wendy's are examples of which of the five forces?
Rivalry among existing firms.
Alice is considering getting either a used car or a scooter to get back and forth to work. The car and the scooter would be an example of...
threat of substitutions
There is only a single drug to treat Henry's disease. This is an example of...
threat of subsitutions, strong force
Mary, a teenager, gets $8 per hour for babysitting. Steven lives two doors down and turns 15 next month. Mary is worried that Steven may want to start earning extra money by babysitting, too, and may charge less money. This is a problem of...
threat of new entrants
Rent-a-wreck operates in twenty cities, renting older cars inexpensively. This is an example of...
low-cost focus
Batteries Only carries every type of battery you can imagine, from autos to watches. This is an example of...
differentiation, industry-wide
The difference between the amount of money someone is willing to spend on a product and the cost of producing that product is called the...
margin
The amount of money that someone is willing to pay for a product is the...
Value
Value chains consist of...
five primary and four support activities
Which of the following is NOT a primary activity?
Procurement.
Service.
Operations.
Sales.
Procurement
The total margin for a value chain comes from...
the values plus the costs of all activities.
Transforming raw materials into finished products occurs where along the value chain?
Operations
Training is part of which activity?
Human Resources
Negotiating prices with vendors is part of which activity?
Procurement
The idea that businesses should create new business processes that integrate all of the value chain activities is...
business process design
The cost of business processes is...
the costs of inputs plus the costs of activities.
The margin of a business process is...
the value of outputs minus the cost.
Business processes are networks of activities where value is generated by...
inputs being transformed into outputs
Which of the following is not a means of streamlining business processes to increase margin?
Increasing effectiveness
One way to keep suppliers is to make it easy for them to connect and work with the firm. This is called...
locking in.
Good information systems like those of the delivery company in the book help create a competitive advantage by...
(1) enhancing existing services.
(2) differentiating the users from competitors.
(3) creating systems that will lock in customers.
(4) raising barriers to market entry.
An example of a strong password is...
a combination of capital & lowercase letters, numbers AND characters.
An example of a processing device would be...
special function cards
Which of the following is NOT an example of input hardware?
Tablet PCs.
Scantron test scanners.
Microphones.
Plotters.
Plotters
What are some examples of storage devices?
(1) Magnetic disks.
(2) Tapes.
(3) DVDs.
Main memory works in conjunction with:
CPU
Cache and main memory will lose their contents when the power is off. They are...
Volatile
Which of the following is an example of an optical disk?
Digital versatile disks.
Magnetic disks.
Memory disks.
Data bus disks
Digital versatile disks
Video processors consist of .......... and ........... which store and process images.
CPU & Memory
Which of the following functions are NOT performed by servers?
Email processing.
Database sharing.
Processing Web sites.
Word processing.
Word Processing
The .......... controls a client computer's resources.
Operating system.
Every computer has a(n) ..........; many also have ..........
Operating System & Application Programs
Unix was developed by...
Bell Labs.
Quickbooks is an example of...
general application software.
Which of the following is NOT a type of computer software which can be bought?
Off-the-shelf.
Tailor-made.
Custom-developed.
Off-the-shelf with alterations.
All can be purchased.
.......... require(s) programs other than a browser on the user's computer.
Thick Clients
.......... is/are software installed into print servers.
Client-server applications
Microsoft offers a(n) .......... license to move from Windows XP to Vista.
Upgrade
Microsoft Office is an example of a...
horizontal-market software
An example of a vertical-market software is...
AutoCad
Which of the following is NOT an example of a virus?
payload.
Trojan horse.
worm.
Macro.
Payload
Slammer was an example of a(n)...
worm
Vendor-created program modifications are called...
patches
Which of the following is generally true about small to medium organizations?
Policies are usually fairly formal.
Because of their size, managers need not take an active role in setting specifications.
Usually these are standardized on a single client operating system.
Usually these are standardized on a single client operating system.
An example of a task involved in assessing the results of the proposed budget is...
Considering the budget in the context of the firm's competitive strategy.
Reasons why additional budgetary items may be added in the future include...
(1) new hires.
(2) additional functions.
(3) upgrades of system.
Department budgets for computers may need to include...
overhead fees
Dr. Fried wants to keep track of patient visits and patient phone calls. She can set up two separate spreadsheets for these, or she can create a ...
Database
Records are also called ...
Rows
A group of similar rows is called a...
File
A key is a .......... that serves as a unique identifier.
Column
Relational databases represent relationships using...
Foreign Keys
A ........... is a self-describing collection of integrated records.
Database
Monty couldn't remember what was in the database, but he knew that he could check the .......... inside the database and find out.
Metadata
The program used to create and administer a database is called a(n) ...
Database Management System
An open source DBMS product is...
MySQL
An international standard language for processing a database is...
SQL
Reports are used to...
show data in a structured content
Three of the problems that arises in a multi-user environment is:
(1) lost-update.
(2) data conflicts.
(3) locking.
.......... products process workgroup databases.
Enterprise DBMS
Larry created a logical representation of the database data called a(n) ...
Data Model
Groups of attributes, whose value is associated with a single entity instance is called a(n) ...
Identifier
.......... refers to the number of entities that can be involved in a relationship.
Cardinality
Bruce looked at the tables and declared that they were not normalized. He meant that...
they were poorly formatted
Part of the DBA backup and recovery responsibilities is...
Training
Four examples of database development responsibilities are...
(1) creating the DBA function.
(2) forming the steering committee.
(3) validating the data model.
(4) evaluating designs.
An example of database operations responsibilities is...
Managing processing rights
Three major causes of the need for adaptation are...
(1) database
(2) changes that benefit one group of users
(3) new features
When an earthquake occurs, it is usually the responsibility of the .......... to manage the recovery process.
DBA
Kant referred to the essence of things in themselves as the...
Noumenal World
LAN
The hospital's computers are connected using a:
WAN
To connect DOC Industries' twelve locations, the firm employs a:
-unethical
-a problem
-an email nuisance
-a waste of company resources
Sending an email with pictures of your last holiday to your friend at work while you are working could be:

(4)
NIC
The unique identifier of every network interface card is called the:
layered protocols
Seamless data communications across an internet is the result of:
it reduces signal interference
Wires are twisted in the connection cables because:
(1) Always start with the numbers 802
(2) IEEE 802.3 is most popular
(3) The protocol standard for IEEE 802.3 is also called Ethernet
What are three attributes of IEEE LAN protocols?
transmission speed in Mbps
10/100/100 Ethernet refers to:
WNIC
Linda's new PDA has a ..................... to allow it to connect to the Internet.
access points
WNICs operate according to 802.11 protocols and connect through...........................
cable TV lines to optical fiber
Cable modems connect through a combination of ......................., and offer a shared capacity.
point to point lines
The fastest transmission speed is available through which of the following?
-Point to point lines
-PSDN
-DSL
-Cable
DSL
Which of the following would offer the fastest upstream transmission?
-Point to point lines
-PSDN
-DSL
-Cable
point to point
Which of the following spans geographically distributed sites using lines provided by licensed vendors?
-Point to point
-DSL
-VPN
-PSDN
PSDN
Which of the following leases time on a public switched data network that is operated by an independent party?
-PSDN
-VPN
-DSL
-ADSL
wavy signals
Modems convert digital signals to:
digital subscriber lines
DSL stands for:
ASDL
DSL lines that operate with different receiving and transmitting speeds are called:
communication speeds
Narrowband and broadband refers to ........................
coaxial cable
Cable modems use ...................... and have different upstream and downstream speeds.
access device
A router is a(n):
PSDN network
The POP is the access point into the:
client software
The ...................... encrypts messages so that it can be sent safely through VPN communications.
URL
A document's address on the web is called the:
NAT
The process of changing a public IP address to a private IP address is called:
table
Switches know where to send traffic that they receive because of a ....................
MAC
The physical address assigned to each NIC at the factory is called the:
HTTP
An application layer protocol that is used for processing Web pages is:
hire a translator
In order to localize a Web page, a firm will need to:
the metadata is not translated
Which of the following is a problem with localizing and distributing databases?
-cross-functional systems
-cross-departmental systems
-process-based systems
Systems that handle activities across departmental boundaries are called:

(3)
recording leads
Which of the following is NOT a part of the lead generation function?
-mailings
-emailings
-website
-recording leads
-inventory information management
-shipping scheduling
-customer service
Name three functions included in operations systems?
JIT
Dell views its inventory as a liability, and specializes in a ..................... inventory policy.
BOM
The list of materials needed to construct a product is called the ..................
Kanban
...................... refers to a signal to build something.
MRP
Information systems that plan only the need for materials and their inventories for manufacturing are:
dividend payments
The human resources system does NOT include:
assessments
Which of the following is NOT part of an accounting system?
-financial reporting
-budgeting
-assessments
-management of dividends
the Sarbanes-Oxley Act
................... was enacted to prevent future frauds like those perpetuated by Enron and WorldCom.
functional systems
Business processes are disjointed in:
there is an unlimited amount of information
Which of the following is NOT a consequence of isolated systems?
-they cannot provide integrated enterprise info
-they are inefficient
-they result in increased expense
-there is an unlimited amt of info
inherent
Built-in processes for using software are called:
service
Which of the following is not a phase of the customer life cycle?
-relationship management
-loss/churn
-marketing
-service
Order-management
................... applications help customers determine the status of their orders.
MRP II
ERP is an outgrowth of which system?
They are expensive, but easily implemented
Which of the following is NOT true about ERP systems?
-They provide a cross-functional view of the organization.
-They provide a process view of the organization.
-Data is centrally maintained.
-They are expensive, but easily implemented.
inventory reduction
One of the potential benefits of an ERP system is:
converting data
Implementing an ERP systems includes:
-enables a gradual move to ERP
-connects islands of isolation
-provides integration of information
-leverages existing systems
EAI:

(4)
identifying sources of problems
The first step in implementing an EAI project is:
-fear of the unknown -fear of job loss -comfort with old methods/systems -threats to self-efficacy
The reason that employees resist change is:

(4)
change management
................... is a blend of engineering, business, psychology, and sociology that tries to understand the dynamics of organizational alterations and develops methods and procedures for it.
customer-focused
Harvey announced that he was integrating the CRM and SRM systems into an ERP system at a kick-off meeting, so that the entire company would become ....................
clearinghouses
_____________ provide and deliver goods and services at a stated price.
application tier
Which of the following is not part of the three tiers:
-application tier
-server tier
-database tier
-user tier
attributes
Variables that provide properties about a tag are called:
viral marketing
Word of mouth advertising is called _____________.
social networks
People with similar interests can connect through:
mash
If you are watching television and decide that you want to purchase the car that you see, Web 2.0 can allow the television producer and auto manufacturer to ________ their products by allowing you to click on the item and be taken to the auto manufacturer's Web site.
disintermediation
Because of ___________, not every supply chain includes manufacturers, retailers, and distributors.
managers
Supply chain performance is NOT affected by:
the bullwhip effect
The variability in the size of orders will increase at each stage along the supply chain is known as:
the difference between the sum of the generated revenues and the sum of the costs incurred.
Supply chain profitability is calculated by:
multistage nature of the supply chain
The bullwhip effect occurs because of the ________________.
SRM
What is the business process that manages contacts between an organization and its suppliers?
settle
Receiving goods is part of which major SRM process?
security
Which of the following is not a major SRM activity?
-source
-purchase
-settle
-security
unethical
Writing and installing programs that exploit holes in security systems is:
formatted documents
Alternatives for interorganizational message exchange do NOT include:
-telephone
-EDI
-formatted documents
-email
-tags have no consistent meanings
-there are a fixed number of tags
-HTML mixes formatting
-HTML mixes structure
List four problems of HTML:
XML
A key part of the standards for Web services is ____________.
web standards
The W3C sponsors the development of ____________.
proprietary
One-of-a-kind solutions are considered ____________.
remote computing
____________ is the process of programs on one computer accessing those on another computer.
SOA
____________ is a Web processing philosophy that is implemented by Web services.
time and cost
Web services provide ___________ savings.
XML documents
Web service data are transmitted in _______________.
interorganizational
__________ information systems require collaborative agreements among independent organizations.