180 terms

BCIS Final Review

Which of the following is a right of users of information systems?
Receiving effective training according to their requirements
Which of the following is the most important trait that an effective collaborator should have?
Willingness to enter into difficult conversations
Email spoofing is a synonym for ________.
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.
The major benefit of enterprise application integration is that it ________.
Enables organizations to use existing applications
A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.
HTML tag
The situation that occurs when adding more resources creates inefficiencies is known as ________.
diseconomies of scale
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
________ is a form of outsourcing.
Acquiring licensed software
________ processes span an organization and support activities in multiple departments.
Structured enterprise
________ is an example of an interenterprise information system.
With a(n) ________ , users can subscribe to content sources and be notified when they have been changed.
RSS reader
Which of the following conditions exists when data are isolated in separated information systems?
Information silo
The first step that any hyper-organization should take is to develop and publicize a(n) ________ policy.
social media
Every table in a normalized database has a(n) ________.
single theme
When you modify or delete data present in a database, you are ________.
processing the database
A(n) ________ is a person who is well versed in organizational strategy and systems alignment theory, and who also understands the proper role for technology.
business analyst
Compared to in-house hosting, cloud-based hosting ________.
minimizes the risk of investing in technology than will soon become obsolete
Focused cost leadership is observed when a product has the lowest cost ________.
within an industry segment
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
technical writer
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n) ________ is used.
layered protocol
________ is the use of information technology to support the sharing of content among networks of
Social media
Which of the following is considered information rather than mere data?
the return on investment of an advertising campaign
Which of the following is a design philosophy in which activities are organized into modules of functionality that are requested and delivered over the Internet using standards?
Service-oriented architecture
With ________, Google searches an organization's Web site and inserts ads that match content on that site. When users click those ads, Google pays the organization a fee.
Which of the following observations is true?
Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships.
An organization purchases server and client computers to build an information system. This is an example of a(n) ________ cost.
When using the relational model to represent data, one must ________.
add a foreign key to one of the tables
________ is a popular commercial webinar product used in virtual sales presentations.
A ________ shows the tasks, start and finish dates, and dependencies for the tasks of a project.
Gantt chart
Collaboration occurs when a number of people ________.
work together to achieve a common goal
Which of the following is the least critical aspect of good information?
Data abundance
________ is a standard for subscribing to content sources.
Real Simple Syndication (RSS)
Which of the following is an outsourcing alternative that provides hosted applications and data storage?
Software as a Service (SaaS)
The Privacy Act of 1974 covers ________.
records held by the U.S. government
Which of the following is a primary purpose of collaboration?
Becoming informed
________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function?
A digital divide exists between ________.
those who have Internet access and those who do not
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
In a BPMN process diagram, a ________ represents the start of a process.
Which of the following is an open source browser?
Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________.
learn basic computer skills
Which of the following alternatives for sharing content provides version control?
Microsoft SharePoint
The responsibilities of a ________ include advising the CIO, executive group, and project managers on emerging technologies.
Which of the following is an example of a measure in an OLAP report?
Average cost
Which of the following principles of competitive advantage is related to process implementations?
Locking in suppliers
Who pioneered Web 2.0 advertising?
Which of the following value chain activities involves transforming raw materials into a finished product or service?
________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.
A ________ is equivalent to 1,024 bytes.
Which of the following is a significant risk of using social media for inbound and outbound logistics?
Loss of privacy
Which of the following activities would seekers of the truth facilitate?
When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.
RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________.
supporting business processes
________ a site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system, and eliminating operating systems features and functions that are not required by the application.
Which of the following types of DBMS products is designed for smaller and simpler database applications?
Personal DBMS
To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.
industry-specific solutions
A(n) ________ converts an analog signal to a digital one during data transmission.
According to Hackman, which of the following is a primary criterion for judging team success?
Growth in team capability
________ is a version of Unix that was developed by an open source community.
Which of the following information system requirements falls into the content sharing category?
Tracking versions of many documents
In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
A(n) ________ is a self-describing collection of integrated records.
Managerial decisions in an organization concern ________.
the utilization of resources
Information systems improve process quality by ________.
controlling process flow
________ present the largest risk for an organization's infrastructure loss.
Natural disasters
The need for collaboration is greatest for ________ decisions.
You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category?
Steps for using the ERP applications to accomplish the activities in processes
Which of the following is a major implication of Moore's law?
Costs of data communications and storage have become very low.
The viewer of an OLAP report can change its format. Which term implies this capability?
A data integrity problem will occur only if ________.
data are duplicated
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
Which of the following is an example of a closed source project?
Microsoft Office
The final stage of systems development involves ________.
maintaining the system
The ________ is called the "brain" of the computer.
central processing unit
Which of the following is covered by the Gramm-Leach-Bliley Act of 1999?
Consumer financial data stored by financial institutions
Which of the following is the most basic cloud offering?
Identify the least important characteristic for an effective collaborator.
Being an experienced businessperson
Which of the following is the most common format for IP addresses?
In most cases, a business manager has no role in the specification of a ________.
server computer's hardware
Which of the following observations concerning expert systems is true?
They are difficult and expensive to develop.
Many companies create ________, which are false targets for computer criminals to attack. To an intruder, it would look like a particularly valuable resource, such as an unprotected Web site, but in actuality the only site content is a program that determines the attacker's IP address.
Which of the following is considered a support activity in the value chain of a business?
Contract negotiation
A service provider creates a service description, which documents how to use a service, and publishes that description using a standardized language called ________.
Virtualization is the process by which ________.
one computer hosts the appearance of many computers
Which of the following statements is true about data marts?
Data marts address only a particular component or functional area of a business.
You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill.
systems thinking
In BPMN notation, ________ represent decisions and usually contain a question that is answered with yes or no.
Which of the following is the smallest data element in a database?
________ is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.
The inherent processes defined in an ERP solution are known as ________.
process blueprints
If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by ________.
business and systems analysts
Which of the following observations is true of a cold site?
It requires customers to install and manage systems themselves.
The fundamental purpose of the starting phase of a project is ________.
setting the ground rules for the collaboration
Which of the following terms refers to a collection of servers?
server farm
In the SDLC, the first major task for an assembled project team is to ________.
plan the project
Machine code ________.
cannot be modified by humans
In a business process, resources are ________.
people or computer applications that are assigned to roles
Which of the following is an example of a database management system?
Which of the following is a function of the steering committee for an IS department?
Setting IS priorities
An administrator should create a(n) ________ before developing a database design.
data model
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.
PC virtualization
Project teams create a ________, which is a hierarchy of the tasks required to complete a project.
work-breakdown structure
Which of the following devices is used during the processing stage of computing?
Main memory
Which of the following business processes is related to manufacturing?
Planning and scheduling
________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.
Moore's Law
SM communities differ from communities in the past because they are ________.
formed based on mutual interests
Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.
data warehouse
The four major ERP products of ________ are AX, Nav, GP, and Solomon.
Microsoft Dynamics
Which factor of risk assessment refers to the probability that a given asset will be compromised by a given threat, despite the safeguards?
The five-component framework considers individuals who maintain the data and who support the networks of computers as ________ components.
Deleting problematic content on social networking sites is best reserved for when ________.
the content is obscene and inappropriate
Which of the following principles of competitive advantage is associated with product implementations?
Differentiating service offerings
With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.
Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system.
For a printer or laptop to connect to a wireless LAN, it must have a(n) ________.
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
Drive-by sniffers
Which of the following statements is true about the IEEE 802.11 protocol?
It allows speeds of up to 600 Mbps.
Which of the following ratios has fallen as a result of Moore's law?
An ERP solution does not include ________.
a company's operational data
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
Data mining
When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page.
Which of the following is a function of the technology office in an organization's IS department?
Investigating new IS technologies
A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
Inbound logistics
In organizations that operate significant non-accounting information systems, the chief information officer is most likely to report to the ________.
chief executive officer
________ is the activity of altering and designing business processes to take advantage of new information systems.
Business process reengineering
A(n) ________ is a program used to create, process, and administer a database.
Porter's five forces model is used to assess ________.
industry structure
You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is ________.
In an E-R diagram, a line between two entities represents a(n) ________.
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
Social capital
Web 2.0 companies provide software ________.
as a free service
10 TB is equivalent to ________ Gigabytes.
Which of the following is a common description of information?
Knowledge derived from data
It is generally more difficult to make changes to the ________ of an information system than to the databases itself.
Users employ servers for ________.
processing shared databases
As an IS user, you have a right to a secure computing environment. This means that ________.
the organization should protect your computer and its files
Identify the first step in transforming a data model into a relational database design.
Creating a table for each entity
You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.
The information that your secretary gave will be considered as good information.
Employees resent physical searches when arriving at and departing from work. Which aspect of computer security described in the NIST Handbook is reflected here?
Computer security is constrained by societal factors.
The ________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes.
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
systems thinking
Which of the following is true of source data for a BI system?
It refers to data that the organization purchases from data vendors.
Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so?
sales and marketing
________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.
Version control
Ajax is one of the customers of a well known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.
Which of the following would be a consequence of teleaction?
The value of robotics would increase.
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.
steering committee
Which of the following is an accurate representation of the steps in the business process management
Model processes; create components; implement processes; assess results
The ________ is the most popular BI server today.
Microsoft SQL Server Report manager
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.
The Web 2.0 business model relies on ________.
Which of the following statements about enterprise information systems is true?
They are very difficult to change.
In BPMN diagrams, a square with a plus sign means that ________.
an activity is independent of the process and is defined in detail in another diagram
Which of the following is an example of a system-specific security policy?
Deciding what customer data from the order-entry system will be shared with other organizations
Being ________ is one of the most important characteristics of an effective collaborator
able to give negative feedback
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
Web servers
Which of the following is a part of the materials ordering process?
Inbound logistics
Which of the following is true of information systems?
Database data for information systems is provided in-house.
Which of the following is a basic operation used by reporting tools to produce information from data?
________ is installed in special, read-only memory in devices like printers or communication devices.
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
Push publishing delivers business intelligence ________.
according to a schedule or as a result of an event or particular data condition
Which of the following is NOT a function of the information systems department?
Conducting external audits
To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.
strength of a relationship
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing?
Product differentiation
Which of the following observations about RFM and OLAP reports is true?
OLAP reports are more dynamic than RFM reports.
Andrea, the floor supervisor at a call center, calls Bryan, a call attendant, to her office. She reports observing a few critical omissions in his calls, a finding supported by recent customer surveys. Bryan feels that Andrea is just throwing her weight around. Which of the following is a valid observation of this scenario?
Bryan needs to learn to receive feedback.
Which of the following statements is true of business process designs?
Most process designs require people to work in new ways.
Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.
brute force
In 2005, Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing.
business function
Which of the following statements is consistent with the central idea of business process design?
Organizations should create new business processes rather than improving existing systems.
Which of the following is a component of an information system but not of information technology?
________ is the essence of SM relationships.
User-generated content
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.
Which of the following value chain activities involves assisting users to handle the product after sale, thus maintaining and enhancing the product's value?
Customer service
The ________ tier of three-tier architecture consists of computers, phones, and other devices that have browsers that request and process Web pages.