Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

Which of the following is a right of users of information systems?

Receiving effective training according to their requirements

Which of the following is the most important trait that an effective collaborator should have?

Willingness to enter into difficult conversations

Email spoofing is a synonym for ________.


The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.


The major benefit of enterprise application integration is that it ________.

Enables organizations to use existing applications

A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.

HTML tag

The situation that occurs when adding more resources creates inefficiencies is known as ________.

diseconomies of scale

________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.


________ is a form of outsourcing.

Acquiring licensed software

________ processes span an organization and support activities in multiple departments.

Structured enterprise

________ is an example of an interenterprise information system.


With a(n) ________ , users can subscribe to content sources and be notified when they have been changed.

RSS reader

Which of the following conditions exists when data are isolated in separated information systems?

Information silo

The first step that any hyper-organization should take is to develop and publicize a(n) ________ policy.

social media

Every table in a normalized database has a(n) ________.

single theme

When you modify or delete data present in a database, you are ________.

processing the database

A(n) ________ is a person who is well versed in organizational strategy and systems alignment theory, and who also understands the proper role for technology.

business analyst

Compared to in-house hosting, cloud-based hosting ________.

minimizes the risk of investing in technology than will soon become obsolete

Focused cost leadership is observed when a product has the lowest cost ________.

within an industry segment

A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.

technical writer

To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n) ________ is used.

layered protocol

________ is the use of information technology to support the sharing of content among networks of

Social media

Which of the following is considered information rather than mere data?

the return on investment of an advertising campaign

Which of the following is a design philosophy in which activities are organized into modules of functionality that are requested and delivered over the Internet using standards?

Service-oriented architecture

With ________, Google searches an organization's Web site and inserts ads that match content on that site. When users click those ads, Google pays the organization a fee.


Which of the following observations is true?

Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships.

An organization purchases server and client computers to build an information system. This is an example of a(n) ________ cost.


When using the relational model to represent data, one must ________.

add a foreign key to one of the tables

________ is a popular commercial webinar product used in virtual sales presentations.


A ________ shows the tasks, start and finish dates, and dependencies for the tasks of a project.

Gantt chart

Collaboration occurs when a number of people ________.

work together to achieve a common goal

Which of the following is the least critical aspect of good information?

Data abundance

________ is a standard for subscribing to content sources.

Real Simple Syndication (RSS)

Which of the following is an outsourcing alternative that provides hosted applications and data storage?

Software as a Service (SaaS)

The Privacy Act of 1974 covers ________.

records held by the U.S. government

Which of the following is a primary purpose of collaboration?

Becoming informed

________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.


Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function?


A digital divide exists between ________.

those who have Internet access and those who do not

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.


In a BPMN process diagram, a ________ represents the start of a process.


Which of the following is an open source browser?


Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________.

learn basic computer skills

Which of the following alternatives for sharing content provides version control?

Microsoft SharePoint

The responsibilities of a ________ include advising the CIO, executive group, and project managers on emerging technologies.


Which of the following is an example of a measure in an OLAP report?

Average cost

Which of the following principles of competitive advantage is related to process implementations?

Locking in suppliers

Who pioneered Web 2.0 advertising?


Which of the following value chain activities involves transforming raw materials into a finished product or service?


________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.


A ________ is equivalent to 1,024 bytes.


Which of the following is a significant risk of using social media for inbound and outbound logistics?

Loss of privacy

Which of the following activities would seekers of the truth facilitate?


When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.


A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.


RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________.

supporting business processes

________ a site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system, and eliminating operating systems features and functions that are not required by the application.


Which of the following types of DBMS products is designed for smaller and simpler database applications?

Personal DBMS

To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.

industry-specific solutions

A(n) ________ converts an analog signal to a digital one during data transmission.


According to Hackman, which of the following is a primary criterion for judging team success?

Growth in team capability

________ is a version of Unix that was developed by an open source community.


Which of the following information system requirements falls into the content sharing category?

Tracking versions of many documents

In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.


A(n) ________ is a self-describing collection of integrated records.


Managerial decisions in an organization concern ________.

the utilization of resources

Information systems improve process quality by ________.

controlling process flow

________ present the largest risk for an organization's infrastructure loss.

Natural disasters

The need for collaboration is greatest for ________ decisions.


You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?


ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category?

Steps for using the ERP applications to accomplish the activities in processes

Which of the following is a major implication of Moore's law?

Costs of data communications and storage have become very low.

The viewer of an OLAP report can change its format. Which term implies this capability?


A data integrity problem will occur only if ________.

data are duplicated

A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.


Which of the following is an example of a closed source project?

Microsoft Office

The final stage of systems development involves ________.

maintaining the system

The ________ is called the "brain" of the computer.

central processing unit

Which of the following is covered by the Gramm-Leach-Bliley Act of 1999?

Consumer financial data stored by financial institutions

Which of the following is the most basic cloud offering?


Identify the least important characteristic for an effective collaborator.

Being an experienced businessperson

Which of the following is the most common format for IP addresses?


In most cases, a business manager has no role in the specification of a ________.

server computer's hardware

Which of the following observations concerning expert systems is true?

They are difficult and expensive to develop.

Many companies create ________, which are false targets for computer criminals to attack. To an intruder, it would look like a particularly valuable resource, such as an unprotected Web site, but in actuality the only site content is a program that determines the attacker's IP address.


Which of the following is considered a support activity in the value chain of a business?

Contract negotiation

A service provider creates a service description, which documents how to use a service, and publishes that description using a standardized language called ________.


Virtualization is the process by which ________.

one computer hosts the appearance of many computers

Which of the following statements is true about data marts?

Data marts address only a particular component or functional area of a business.

You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill.

systems thinking

In BPMN notation, ________ represent decisions and usually contain a question that is answered with yes or no.


Which of the following is the smallest data element in a database?


________ is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.


The inherent processes defined in an ERP solution are known as ________.

process blueprints

If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by ________.

business and systems analysts

Which of the following observations is true of a cold site?

It requires customers to install and manage systems themselves.

The fundamental purpose of the starting phase of a project is ________.

setting the ground rules for the collaboration

Which of the following terms refers to a collection of servers?

server farm

In the SDLC, the first major task for an assembled project team is to ________.

plan the project

Machine code ________.

cannot be modified by humans

In a business process, resources are ________.

people or computer applications that are assigned to roles

Which of the following is an example of a database management system?


Which of the following is a function of the steering committee for an IS department?

Setting IS priorities

An administrator should create a(n) ________ before developing a database design.

data model

Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.

PC virtualization

Project teams create a ________, which is a hierarchy of the tasks required to complete a project.

work-breakdown structure

Which of the following devices is used during the processing stage of computing?

Main memory

Which of the following business processes is related to manufacturing?

Planning and scheduling

________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.

Moore's Law

SM communities differ from communities in the past because they are ________.

formed based on mutual interests

Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.

data warehouse

The four major ERP products of ________ are AX, Nav, GP, and Solomon.

Microsoft Dynamics

Which factor of risk assessment refers to the probability that a given asset will be compromised by a given threat, despite the safeguards?


The five-component framework considers individuals who maintain the data and who support the networks of computers as ________ components.


Deleting problematic content on social networking sites is best reserved for when ________.

the content is obscene and inappropriate

Which of the following principles of competitive advantage is associated with product implementations?

Differentiating service offerings

With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.


Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system.


For a printer or laptop to connect to a wireless LAN, it must have a(n) ________.


________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

Drive-by sniffers

Which of the following statements is true about the IEEE 802.11 protocol?

It allows speeds of up to 600 Mbps.

Which of the following ratios has fallen as a result of Moore's law?


An ERP solution does not include ________.

a company's operational data

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

Data mining

When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "", which is the ________ of the Web page.


Which of the following is a function of the technology office in an organization's IS department?

Investigating new IS technologies

A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.

Inbound logistics

In organizations that operate significant non-accounting information systems, the chief information officer is most likely to report to the ________.

chief executive officer

________ is the activity of altering and designing business processes to take advantage of new information systems.

Business process reengineering

A(n) ________ is a program used to create, process, and administer a database.


Porter's five forces model is used to assess ________.

industry structure

You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is ________.


In an E-R diagram, a line between two entities represents a(n) ________.


According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

Social capital

Web 2.0 companies provide software ________.

as a free service

10 TB is equivalent to ________ Gigabytes.


Which of the following is a common description of information?

Knowledge derived from data

It is generally more difficult to make changes to the ________ of an information system than to the databases itself.


Users employ servers for ________.

processing shared databases

As an IS user, you have a right to a secure computing environment. This means that ________.

the organization should protect your computer and its files

Identify the first step in transforming a data model into a relational database design.

Creating a table for each entity

You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.

The information that your secretary gave will be considered as good information.

Employees resent physical searches when arriving at and departing from work. Which aspect of computer security described in the NIST Handbook is reflected here?

Computer security is constrained by societal factors.

The ________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes.


A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

systems thinking

Which of the following is true of source data for a BI system?

It refers to data that the organization purchases from data vendors.

Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so?

sales and marketing

________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.

Version control

Ajax is one of the customers of a well known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.


See more

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording