MIS Chapter Quiz 1-8

8 September 2022
4.7 (114 reviews)
80 test answers

Unlock all answers in this set

Unlock answers (76)
question
______________ strategy evaluates a project's position.
answer
SWOT Analysis
question
_________ are material items or products that customers will buy to satisfy a want or need.
answer
Goods
question
__________ is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).
answer
Supplier Power
question
Which department manages the process of converting or transforming resources into goods or services?
answer
Operations Management
question
_________ are the rate at which goods and services are produced based upon total output given total inputs.
answer
Productivity
question
Which of the following statements is correct when considering a SWOT analysis? a. Strengths and weaknesses originate outside an organization b. Opportunities and threats originate outside an organization c. Strengths and threats originate inside an organization d. Opportunities and weaknesses organization outside an organization.
answer
b. Opportunities and threats originate outside an organization
question
The __________ consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
answer
Supply Chain
question
Strengths would be categorized as ___________ in a typical SWOT analysis.
answer
Internal and Helpful
question
When evaluating the value chain, all of the following are included in the primary value activities except _________.
answer
MIS development
question
Which data types are typically found in the Marketing department?
answer
Promotion data, sales data, advertising data
question
______________ is/are measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer.
answer
Customer satisfaction
question
What is the process of learning from ecosystems and adapting their characteristics to human and organization situations?
answer
Biomimicry
question
Which of the following statements are examples of unstructured or strategic level decisions? (Check all that apply.)
answer
-Deciding to enter a new market -Deciding to enter a new industry over the next three years -Choosing to eliminate an entire product line
question
Which are types of organization information systems? (Check all that apply.)
answer
-Executive information system -Decisions support system -Transactional processing system
question
Which of the following is considered the output in the systems-thinking example of a DSS?
answer
Forecasts
question
Which of the following examples indicates when the time is right to initiate a business process change?
answer
-The market being served makes a distinctive shift. -The company is below industry benchmarks on its core processes. -The company strategically passes or leapfrogs the competition on key decisions to regain competitive advantage.
question
What is the first phase in the business process reengineering model?
answer
Set the project scope
question
Which of the following statements are examples of structured or operational level decisions? (Check all that apply.)
answer
-Reordering inventory -Creating the employee weekly staffing schedule -Creating the employee weekly production schedule -Determining payroll issues
question
____________ uses technology allowing humans to interact with a computer through bodily sensations and movements-for example, a cell phone vibrating in your pocket.
answer
Haptic interface
question
________ improve(s) managerial level business processes.
answer
Streamlining
question
___________ sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet.
answer
Crowdfunding
question
A(n) _________ is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
answer
Open System
question
_________ converts an audio broadcast to a digital music player.
answer
Podcasting
question
What are the four main types of ebusiness models? (Check all that apply.)
answer
1. Business-to-business 2. Consumer-to-business 3. Consumer-to-consumer 4. Business-to-consumer
question
___________ are keywords that advertisers choose to pay for and appear as sponsored links on Google results pages.
answer
Adwords
question
What allows user to access the WWW?
answer
Web browser
question
_________ is a new way of doing things that initially does not meet the needs of existing customers.
answer
Disruptive technology
question
Twitter is an example of a __________.
answer
Microblogging website
question
Which of the following evaluates a project's position?
answer
SWOT Analysis
question
In a SWOT analysis, potential internal strengths are helpful when they identify all key strengths associated with the competitive advantage including cost advantages, new and/or innovative services, special expertise and/or experience, proven market leader, improved marketing campaigns, and so on. True or False?
answer
True
question
Within a company's information security policy, managers should consider including virus protection, which includes how often the system should be scanned and how frequently the software should be __________.
answer
updated
question
Spoofing is the forging of a _________ address on an email so that the email message appears to come from someone other than the actual sender.
answer
return
question
The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
answer
Child
question
Which of the following are epolicies a business should implement to protect itself? (Check all that apply.)
answer
-Technological privacy policy -Gaming use policy -Informing privacy policy
question
________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
answer
Spyware
question
An __________ policy contains general principles regarding information privacy.
answer
information privacy policy
question
What is unsolicited email that plagues employees at all levels and clogs email systems?
answer
Spam
question
Which of the following is an example of a way to maintain information security that a company should include in their information security policies? (Check all that apply.)
answer
-Requiring computer users to log off before leaving for lunch -Never sharing user or password information with anyone -Changing passwords every 30-60 days
question
A _________ is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information.
answer
black-hat hacker
question
Which of the following are types of Internet monitoring technology? (Check all that apply.)
answer
-Key logger -Clickstream -Spyware -Adware
question
What is an MIS infrastructure?
answer
It includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets.
question
The increased demand for technology devices has caused an increase in discarded devices, a phenomenon known as ________.
answer
Ewaste
question
What is corporate social responsibility?
answer
A company's acknowledged responsibility to society
question
Miranda White likes taking old computer parts and remaking them into products like earrings and clocks. Which of the following represents what Miranda is doing?
answer
Upcycle
question
What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability?
answer
Hybrid cloud
question
Which of the following are characteristics of cloud computing? (Check all that apply.)
answer
-On-demand self-service -Broad network access -Multi-tenancy -Rapid elasticity
question
Which of the following are key areas of a technology recovery strategy? (Check all that apply.)
answer
-Hardware -Software -Networking -Data center
question
The information MIS infrastructure supports the day-to-day business operations and plans for ____________.
answer
-Security breaches and theft -Floods and earthquakes -Malicious internet attacks
question
What is software?
answer
The set of instructions the hardware executes to carry out specific tasks.
question
Which of the following terms represents how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability, or availability?
answer
Serviceability
question
What is immediate, up-to-date information?
answer
Real-time information
question
Which of the following represent the information levels in an organization? (Check all that apply.)
answer
-Individual -Enterprise -Department
question
Which of the following systems allow users to create, read, update, and delete data in a relational database?
answer
-Relational database management system
question
What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?
answer
Master data management
question
Which of the following are the reasons business analysis is difficult from operational databases? (Check all that apply.)
answer
-Inconsistent data definitions -Lack of data standards -Inadequate data usefulness
question
_________ can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.
answer
Infographics
question
_________ maintains information about various types of objects, events, people, and places.
answer
-A database
question
Which of the following would not be considered part of the unique characteristic of high-quality information?
answer
Is aggregate information in agreement with detailed information?
question
Which of the following represent the information formats in an organization? (Check all that apply.)
answer
-Document -Presentation -Individual
question
Which of the following are problems associated with dirty data? (Check all that apply.)
answer
-Duplicate data -Non-formatted data -Violates business rules data -Nonintegrated data
question
___________ is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area.
answer
A satellite
question
What is IT consumerization?
answer
The blending of personal and business use of technology devices and applications
question
The ___________ domain is reserved for the U.S. military.
answer
.mil
question
What is wireless fidelity (Wi-Fi)?
answer
A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
question
What is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons?
answer
Proxy
question
Which of the following are legitimate Internet domains. (Check all that apply.)
answer
-.biz -.net -.org -.info
question
Which of the following are network access technologies? (Check all that apply.)
answer
-DSL -Broadband -Cable Modem
question
_________ is the science and art of making an illustrated map or chart. This allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.
answer
Cartography
question
What is the major challenge of networking or performing business in a connected world?
answer
Security issues
question
What is a chipless RFID tag?
answer
Plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
question
What guides users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis?
answer
Campaign management system
question
Which of the following are included in the three business areas of supply chain management? (Check all that apply.)
answer
-Materials Management -Logistics -Procurement
question
What takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors?
answer
Enterprise application integration middleware
question
Which extended ERP component collects information used throughout an organization, organizes it, and applies analytical tools to assist managers with decisions?
answer
Business intelligence
question
Who are the primary users of ERP systems?
answer
Accounting, finance, logistics, and production
question
Which of the following is not one of the three phases in the evolution of CRM?
answer
Processing
question
Which of the following is not one of the five basic components of supply chain management?
answer
Service
question
What is automatic call distribution?
answer
A phone switch routes inbound calls to available agents
question
What systems are used to create the digital designs and then manufacture the products?
answer
Computer-aided design/computer-aided manufacturing
question
Which of the following are included in the five basic supply chain activities? (Check all that apply.)
answer
-Plan -Source -Make -Deliver