ISM Exam 2 HW Questions

7 September 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
a. Business intelligence
answer
Which extended ERP component collects information used throughout an organization, organizes it, and applies analytical tools to assist managers with decisions? a. Business intelligence b. Ebusiness c. Customer relationship management d. Supply chain management
question
d. All of the above
answer
Which of the following describes an ERP system? a. ERP systems provide a foundation for collaboration between departments b. ERP systems enable people in different business areas to communicate c. ERP systems have been widely adopted in large organizations to store critical knowledge used to make the decisions that drive the organization's performance d. All of the above
question
d. All of the above
answer
Which of the following is one of the four perspectives included in the balanced scorecard? a. Learning and growth perspective b. Internal business process perspective c. Customer perspective d. All of the above
question
b. Joint problem solving
answer
What is it called when you have a novice and an expert work together on a project to help bring the expert's approach to light? a. Shadowing b. Joint problem solving c. Social networking analysis d. Digital asset management system
question
a. Explicit knowledge
answer
What consists of anything that can be documented, archived, and codified, often with the help of IT? a. Explicit knowledge b. Tacit knowledge c. WCM d. DMS
question
d. Information partnership
answer
What is it called when two or more organizations cooperate by integrating their IT systems, thereby providing customers with the best of what each can offer? a. Core competency b. Core competency strategy c. Collaboration system d. Information partnership
question
a. Social networking analysis
answer
What is the process of mapping a group's contacts to identify who knows whom and who works with whom? a. Social networking analysis b. Messaging-based workflow system c. Database-based workflow system d. Instant messaging
question
c. Database-based workflow system
answer
What stores documents in a central location and automatically asks the team members to access the document when it is their turn to edit the document? a. Social networking analysis b. Messaging-based workflow system c. Database-based workflow system d. Instant messaging
question
a. People first, technology second
answer
What is the recommended way to implement information security lines of defense? a. People first, technology second b. Technology first, people second c. None of the above d. All of the above
question
a. Acceptable use policy
answer
Which policy typically contains a nonrepudiation clause? a. Acceptable use policy b. Anti-spam policy c. Ethical computer use policy d. Information privacy policy
question
d. All of the above
answer
Which of the following is included in the four quadrants of ethical and legal behavior? a. Legal behavior and ethical behavior b. Illegal behavior and ethical behavior c. Legal behavior and unethical behavior d. All of the above
question
d. Combination of all of the above
answer
What is the most secure type of authentication? a. Something the user knows such as a user ID and password b. Something the user has such as a smart card or token c. Something that is part of the user such as a fingerprint or voice signature d. Combination of all of the above
question
d. None of the above
answer
Which of the following authentication methods is 100 percent accurate? a. Smart card b. Fingerprint authentication c. User ID d. None of the above
question
b. Mimic human intelligence
answer
What is the ultimate goal of AI? a. Perform advanced transactional processing b. Mimic human intelligence c. Build and execute models d. All of the above
question
d. All of the above
answer
Which of the following can an AI system perform? Learn or understand from experience a. Make sense of ambiguous or contradictory information b. Use reasoning to solve problems and make c. decisions effectively d. All of the above
question
d. All of the above
answer
What can AI scientists learn by observing parts of the ecosystem, like ant or bee colonies, and using hardware and software models that incorporate insect characteristics and behavior? a. Learn how people-based systems behave b. Predict how they will behave under a given set of circumstances c. Improve human systems to make them more efficient and effective d. All of the above
question
c. EIS, DSS, TPS
answer
Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems? a. TPS, DSS, EIS b. DSS, TPS, EIS c. EIS, DSS, TPS d. None of the above, it varies from organization to organization
question
c. To create logical relationships
answer
Why do relational databases use primary keys and foreign keys? a. To create a database b. To create physical relationships c. To create logical relationships d. All of the above
question
b. System will not allow returns of fresh produce after 15 days past delivery
answer
All of the following are business-critical integrity constraints, except: a. System will not allow an entry for an order for a nonexistent customer b. System will not allow returns of fresh produce after 15 days past delivery c. System will not allow shipping a product to a customer who does not have a valid address d. Systems will not allow shipping of a nonexistent product to a customer
question
b. False
answer
One of the advantages found in a relational database is increased information redundancy. a. True b. False