Which of the following is a right of users of information systems?
Receiving effective training according to their requirements
Which of the following is the most important trait that an effective collaborator should have?
Willingness to enter into difficult conversations
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.
The major benefit of enterprise application integration is that it ________.
Enables organizations to use existing applications
A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.
The situation that occurs when adding more resources creates inefficiencies is known as ________.
diseconomies of scale
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
________ processes span an organization and support activities in multiple departments.
With a(n) ________ , users can subscribe to content sources and be notified when they have been changed.
Which of the following conditions exists when data are isolated in separated information systems?
The first step that any hyper-organization should take is to develop and publicize a(n) ________ policy.
A(n) ________ is a person who is well versed in organizational strategy and systems alignment theory, and who also understands the proper role for technology.
Compared to in-house hosting, cloud-based hosting ________.
minimizes the risk of investing in technology than will soon become obsolete
Focused cost leadership is observed when a product has the lowest cost ________.
within an industry segment
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n) ________ is used.
________ is the use of information technology to support the sharing of content among networks of
Which of the following is considered information rather than mere data?
the return on investment of an advertising campaign
Which of the following is a design philosophy in which activities are organized into modules of functionality that are requested and delivered over the Internet using standards?
With ________, Google searches an organization's Web site and inserts ads that match content on that site. When users click those ads, Google pays the organization a fee.
Which of the following observations is true?
Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships.
An organization purchases server and client computers to build an information system. This is an example of a(n) ________ cost.
When using the relational model to represent data, one must ________.
add a foreign key to one of the tables
A ________ shows the tasks, start and finish dates, and dependencies for the tasks of a project.
Which of the following is an outsourcing alternative that provides hosted applications and data storage?
Software as a Service (SaaS)
________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function?
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________.
learn basic computer skills
Which of the following alternatives for sharing content provides version control?
The responsibilities of a ________ include advising the CIO, executive group, and project managers on emerging technologies.
Which of the following principles of competitive advantage is related to process implementations?
Locking in suppliers
Which of the following value chain activities involves transforming raw materials into a finished product or service?
________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.
Which of the following is a significant risk of using social media for inbound and outbound logistics?
Loss of privacy
When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.
RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________.
supporting business processes
________ a site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system, and eliminating operating systems features and functions that are not required by the application.
Which of the following types of DBMS products is designed for smaller and simpler database applications?
To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.
According to Hackman, which of the following is a primary criterion for judging team success?
Growth in team capability
Which of the following information system requirements falls into the content sharing category?
Tracking versions of many documents
In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category?
Steps for using the ERP applications to accomplish the activities in processes
Which of the following is a major implication of Moore's law?
Costs of data communications and storage have become very low.
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
Which of the following is covered by the Gramm-Leach-Bliley Act of 1999?
Consumer financial data stored by financial institutions
Identify the least important characteristic for an effective collaborator.
Being an experienced businessperson
In most cases, a business manager has no role in the specification of a ________.
server computer's hardware
Which of the following observations concerning expert systems is true?
They are difficult and expensive to develop.
Many companies create ________, which are false targets for computer criminals to attack. To an intruder, it would look like a particularly valuable resource, such as an unprotected Web site, but in actuality the only site content is a program that determines the attacker's IP address.
Which of the following is considered a support activity in the value chain of a business?
A service provider creates a service description, which documents how to use a service, and publishes that description using a standardized language called ________.
Virtualization is the process by which ________.
one computer hosts the appearance of many computers
Which of the following statements is true about data marts?
Data marts address only a particular component or functional area of a business.
You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill.
In BPMN notation, ________ represent decisions and usually contain a question that is answered with yes or no.
________ is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.
If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by ________.
business and systems analysts
Which of the following observations is true of a cold site?
It requires customers to install and manage systems themselves.
The fundamental purpose of the starting phase of a project is ________.
setting the ground rules for the collaboration
In a business process, resources are ________.
people or computer applications that are assigned to roles
Which of the following is a function of the steering committee for an IS department?
Setting IS priorities
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.
Project teams create a ________, which is a hierarchy of the tasks required to complete a project.
________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.
SM communities differ from communities in the past because they are ________.
formed based on mutual interests
Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.
Which factor of risk assessment refers to the probability that a given asset will be compromised by a given threat, despite the safeguards?
The five-component framework considers individuals who maintain the data and who support the networks of computers as ________ components.
Deleting problematic content on social networking sites is best reserved for when ________.
the content is obscene and inappropriate
Which of the following principles of competitive advantage is associated with product implementations?
Differentiating service offerings
With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.
Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system.
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
Which of the following statements is true about the IEEE 802.11 protocol?
It allows speeds of up to 600 Mbps.
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page.
Which of the following is a function of the technology office in an organization's IS department?
Investigating new IS technologies
A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
In organizations that operate significant non-accounting information systems, the chief information officer is most likely to report to the ________.
chief executive officer
________ is the activity of altering and designing business processes to take advantage of new information systems.
Business process reengineering
You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is ________.
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
It is generally more difficult to make changes to the ________ of an information system than to the databases itself.
As an IS user, you have a right to a secure computing environment. This means that ________.
the organization should protect your computer and its files
Identify the first step in transforming a data model into a relational database design.
Creating a table for each entity
You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.
The information that your secretary gave will be considered as good information.
Employees resent physical searches when arriving at and departing from work. Which aspect of computer security described in the NIST Handbook is reflected here?
Computer security is constrained by societal factors.
The ________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes.
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
Which of the following is true of source data for a BI system?
It refers to data that the organization purchases from data vendors.
Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so?
sales and marketing
________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.
Ajax is one of the customers of a well known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.
Which of the following is an accurate representation of the steps in the business process management
Model processes; create components; implement processes; assess results
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.
Which of the following statements about enterprise information systems is true?
They are very difficult to change.
In BPMN diagrams, a square with a plus sign means that ________.
an activity is independent of the process and is defined in detail in another diagram
Which of the following is an example of a system-specific security policy?
Deciding what customer data from the order-entry system will be shared with other organizations
Being ________ is one of the most important characteristics of an effective collaborator
able to give negative feedback
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
Which of the following is true of information systems?
Database data for information systems is provided in-house.
Which of the following is a basic operation used by reporting tools to produce information from data?
________ is installed in special, read-only memory in devices like printers or communication devices.
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
Push publishing delivers business intelligence ________.
according to a schedule or as a result of an event or particular data condition
Which of the following is NOT a function of the information systems department?
Conducting external audits
To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.
strength of a relationship
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing?
Which of the following observations about RFM and OLAP reports is true?
OLAP reports are more dynamic than RFM reports.
Andrea, the floor supervisor at a call center, calls Bryan, a call attendant, to her office. She reports observing a few critical omissions in his calls, a finding supported by recent customer surveys. Bryan feels that Andrea is just throwing her weight around. Which of the following is a valid observation of this scenario?
Bryan needs to learn to receive feedback.
Which of the following statements is true of business process designs?
Most process designs require people to work in new ways.
Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.
In 2005, Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing.
Which of the following statements is consistent with the central idea of business process design?
Organizations should create new business processes rather than improving existing systems.
Which of the following is a component of an information system but not of information technology?
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.
Which of the following value chain activities involves assisting users to handle the product after sale, thus maintaining and enhancing the product's value?