Info Systems Concepts Chap 7-14

Your page rank:

Total word count: 7902
Pages: 29

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

_____ are specially denoted text or graphics on a Web page that, when clicked, open a Web page containing related content.


The of an HTML document contains everything that is viewable in a Web browser window.


A _____ is a Web page that combines useful information and links and acts as an entry point to the Web.

Web Portal

_____ is NOT a Web programming language.


Like other programs, Java software can run only on specific types of computers.


_____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).

Transmission Control Protocol

All Hypertext Transfer Protocol (HTTP) tags are enclosed in a set of curly brackets.


Video content can be placed on the Internet using the same approach as a blog.


The Web is made up of computers, network hardware such as routers and fiber optic cables, software, and the TCP/IP protocols.


_____ provide members with a personal Web page and allow them to post photos and information about themselves.

Social networking sites

Which of the following is a means of providing custom layouts to devices based on the size of a browser window?

Responsive web design

A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest.

Search engine

Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web browser.


Internet access is distributed evenly throughout the world.


The ancestor of the Internet was _____.


Which of the following is a markup language for defining the visual design of a Web page or group of pages?

Cascading Style Sheets (CSS)

_____ consist of standards and tools that streamline and simplify communication among Web sites and that promise to revolutionize the way the Web is developed and used for business and personal purposes.

Web services

Vertical portals are pages that provide information and links for special-interest groups.


Twitter is a microblogging service.


A growing number of companies offer limited access to their private corporate network for selected customers and suppliers by use of _____.

an extranet

Domain names must always have at least _____ parts, with each part separated by a dot (period).


A meta search engine allows a user to run a keyword search on several search engines at once.


_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.

Cloud computing

_____ is software that has the functionality and complexity of traditional application software but that runs in a Web browser and does not require local installation.

a rich internet application (RIA)

_____ is the standard page description language for Web pages.

Hypertext Markup Language (HTML)

In a Hypertext Markup Language (HTML), the text of a Web page are codes that mark the way words will be displayed.


Companies and residences unable to connect directly to the Internet through a local area network (LAN) server must access the Internet through an Internet service provider.


The Internet is the infrastructure on which the Web exists.


The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names.

accredited domain name registrars

In an HTML document, the background color of a Web page is specified in the tag using a hexadecimal code.


Access to Wikipedia entries are tightly controlled so that the entries are always accurate and unbiased.


An intranet is an expensive alternative to other forms of internal communication such conventional computer networks.


An IP address is a 32-bit number that identifies a computer on the Internet.


The fiber-optic cables that span the globe over land and under sea make up the Internet _____.


The Internet is a hyperlink-based system that uses a client/server model.


Conducting classes over the Web with no physical class meetings is called _____.

distance education

The Web is made up of computers, network hardware such as routers and fiber optic cables, software, and the TCP/IP protocols.


Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document.


The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.


JavaScript can be used to validate data entry in a Web form.


Push email allows a user to view email from any mobile or desktop device connected to a corporate server.


The United States has high Internet penetration among its population constituting the majority of people online.


_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.

The web

The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet domain names.


Entering the words red*blue as the keywords for a search engine will be interpreted as the words "red" and "blue" separated by one or more words.


Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____.

web browsers

Consumers who have enrolled in mobile banking and downloaded the mobile application to their cell phones can check their credit card balances before making major purchases.


The _____ is a standard set of specifications for Internet applications that run on handheld, wireless devices that effectively serves as a Web browser for such devices.

Wireless Application Protocol

The market for m-commerce in North America is maturing much earlier than in Western Europe and Japan.


An organization uses buy-side e-commerce to purchase goods and services from its suppliers.


Authentication technologies are used by many organizations to _____.

confirm the identity of a user requesting access to information or assets

A digital certificate verifies ______.

both purchaser and supplier identities

Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online.


The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than that for a typical consumer-to-consumer (C2C) e-commerce.


Consortium-operated exchanges are open to any set of buyers and sellers within a given market.


A _____ is a credit card issued to selected employees to streamline the traditional purchase order and invoice payment processes.

procurement card

Which of the following forms of e-commerce offers customers the ability to design a personalized product?

Business-to-consumer (B2C) e-commerce

_____ is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.

Explicit personalization technique

In which of the following forms of e-commerce, is there much room for negotiation on price, payment and delivery options, quantity, quality, and options and features?

Business-to-business (B2B) e-commerce

_____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process.

Consumer-to-consumer (C2C) e-commerce

PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online.


A smart card carries no preset spending limit, and each month the user can pay all or part of the amount owed.


_____ is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant.

Payment Card Industry (PCI)

Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only when _____.

buyers live in a state where the merchant has a physical presence

The Asia-Pacific region has overtaken North America as the region with the largest B2C sales and now accounts for over one-third of total worldwide B2C sales.


Using a blind network, big brand advertisers can secure elite locations on top-tier destinations.


Government-to-citizen (G2C) applications support the purchase of materials and services from private industry by government procurement offices.


Digital certificates verify both purchaser and supplier identities in an e-commerce transaction.


A reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product.


Implicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.


Conversion to an e-commerce or m-commerce system enables organizations to:

improve the level of customer service.

A(n) _____ is a single Web site that offers many products and services at one Internet location.


A cybermall is a business that serves as an intermediary between a Web site and online merchants who have the actual products and retail expertise.


The three basic components of a successful e-commerce model include content, commerce, and community.


Which of the following statements is true of retargeting?

It employs personalized ads to direct shoppers back to a retailer’s Web site they previously abandoned.

Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Web sites?

Consumer-to-consumer (C2C) e-commerce

A growing trend is consumers researching products online but then purchasing those products at their local brick-and-mortar stores.


The growth of _____ is responsible for reducing the use of the classified pages of newspapers to advertise and sell personal items, so it has a negative impact on that industry.

consumer-to-consumer (C2C) e-commerce

Which of the following is NOT one of the three basic components of a successful e-commerce model?


A(n) _____ is a Web site that offers personalized shopping consultations for shoppers interested in upscale, contemporary clothing and accessories.


A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market.


The elimination of organizations that operate between the producer and the consumer is called _____.


In spite of the recent economic downturn, Web site operators have shunned the idea of bartering for goods and services.


_____ divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics.

Market segmentation

The predominant pricing model used in a blind advertising network and abbreviated CPC is _____.

cost per click

An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.


The smart card is used to secure sensitive data.


AdMob is a mobile advertising provider that serves up ads for displays on mobile devices and in applications like those that run on Android and iPhone.


Conversion to an e-commerce or m-commerce system enables organizations to increase the accuracy of order processing and order fulfillment.


The insurance business adapted to the Internet faster than any other arm of finance.


Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with _______ to develop an estimate of future customer demand.

sales forecasting

A key to the success of implementation of an enterprise resource planning (ERP) system is to make the transition from the old way of doing things to the new way as quickly as possible.


Payroll transactions and billing are typically done via _____.

batch processing

A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business.

enterprise system

While integrated transaction processing system solutions have been developed for small and medium (SMEs), unfortunately, most of these have a high total cost of ownership and are difficult to install.


In an organization, transaction processing systems (TPSs) support routine operations associated with its business processes.


With _____, business transactions are accumulated over a period of time for processing in a single unit.

bath processing systems

Effective use of an enterprise system requires changes in work processes and in the details of how work gets done.


In the context of purchasing systems involved in the traditional transaction processing systems, when a(n) _____ arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent.


Product lifecycle management (PLM) software and its data can be used by internal users only.


Enterprise resource planning (ERP) systems operate via an integrated database, using one set of data to support all business functions.


An enterprise system ensures that the information needed for a single business function and all levels of management within that function is isolated.


Many business application software vendors are pushing the use of _____ for small and medium-sized enterprise (SME) to help customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs.

hosted software model

A customer relationship management (CRM) system helps a company to plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers.


A customer relationship management (CRM) system helps a company in managing ______.

distribution and accounting

Large organizations were the first to take on the challenge of implementing enterprise resource planning (ERP).


Purchasing uses information from the _____ to place purchase orders for raw materials with qualified suppliers.

materials requirement plan

One of the primary benefits of implementing enterprise resource planning (ERP) is elimination of inefficient and outdated systems.


In a manufacturing enterprise resource planning (ERP) system, _____ refines a production plan by determining the amount of weekly or daily production needed to meet the demand for individual products.

demand management

Which of the following statements is true of product lifecycle management (PLM) software?

It provides documents required for FDA and environmental compliance.

_____ involves reentering data that was not typed or scanned correctly.

Data correction

_____ involves capturing and gathering all data necessary to complete the processing of transactions.

Data collection

The average enterprise resource planning (ERP) implementation cost is $5.5 million with an average project duration just over 14 months.


Using the hosted software model implies that a small business firm needs to employ a full-time IT person to maintain key business applications.


Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms?

Online transaction processing

An important step in processing transaction data is to check data for validity and completeness, a task called data correction.


Which of these is an advantage of the hosted software model?

Faster system start-up

Small and medium size organizations do not employ enterprise systems.


Organizations frequently need to customize a vendor’s enterprise resource planning (ERP) software to integrate other business systems.


Which of the following can help avoid common causes for failed enterprise system implementations?

Defining metrics to assess the progress of a project

Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and knowledge management systems.


The ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns is known as contact management.


The bill of materials (BOM) serves as a recipe of ingredients needed to make each item an organization manufactures.


Accounts payable is an example of a(n) _____.

transaction processing system

Customer support, sales management, and contact management are key features of a customer relationship management (CRM) system.


The individual application modules of an enterprise resource planning (ERP) system are designed to support best practices, the most efficient and effective ways to complete a business process.


In the context of transaction processing activities, data editing involves reentering data that was not typed or scanned properly.


_____includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers.

Supply chain management (SCM)

Capturing and gathering all data necessary to complete the processing of transactions is called data collection.


According to the classification of enterprise resource planning (ERP) vendors, _____ vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations.

Tier II

A key feature of an enterprise system is that:

it employs a database of key operational and planning data that can be shared by all.

The essential characteristic of a(n) _____ is that there is delay between an event and the eventual processing of the related transaction to update an organization’s records.

batch processing system

As an organization’s purchasing systems generate purchase orders and the items ordered are received, information is sent to the _____ system to manage the amounts owed by the organization.

accounts payable

_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

Computer-aided design

A small and medium-sized enterprise (SME) is legally independent enterprise with _____ employees.

up to 500

Adoption of an enterprise resource planning (ERP) system enables an organization to eliminate several separate systems and replace them with a single integrated set of applications for the entire enterprise.


With an online transaction processing (OLTP) system, each transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions.


Small and medium-sized enterprises (SMEs) are exploring the use of hosted software model to acquire, use, and benefit from new technology even though it means extra complexity and high start-up costs.


A decision support system includes people, procedures, software, databases, and devices to help assemble, store, manipulate, and display geographic information.


Product pricing is important to identify products, sales personnel, and customers that contribute to profits and those that do not.


An effective _____ MIS enables an organization to keep personnel costs at a minimum while serving the required business processes needed to achieve corporate goals.

human resource

Unlike an individual DSS, a GSS is more difficult to use and is not as flexible.


Revenue centers are units within a company that focus primarily on generating sales.


The economic order quantity is calculated to minimize the number of times an inventory item must be reordered.


Unstructured decisions are ones where the variables that affect the decision cannot be measured quantitatively.


The ultimate goal of management information and decision support systems is to help managers and executives at all levels make better decisions and solve important problems.


The _____ stage of the problem solving process requires selecting a course of action.


The ability to _____ is a function of a financial MIS.

provide easy access to financial data through use of a corporate intranet to access corporate Web pages

Decision support systems are skewed, and hence cannot be used at all levels.


Many manufacturing operations have been dramatically improved over the last decade as a result of advances in information systems.


Subsystems for the marketing MIS and their outputs help marketing managers and executives to _____.

develop plans for future products

A flexible manufacturing system determines when finished products are needed and then works backward to determine deadlines and resources needed.


The goal of _____ is to tie together all aspects of production, including order processing, product design, manufacturing, inspection and quality control, and shipping.

computer integrated manufacturing

_____ is a structured, interactive, iterative decision-making method that relies on input from a panel of experts.

Delphi approach

Decision support systems support optimization, satisficing, and heuristic approaches.


A(n) _____ report is the management report that summarizes the previous day’s critical activities and is typically available at the start of each workday.


The primary purpose of an MIS is to help an organization achieve its goals by providing managers with insight into the regular operations of the organization so they can control, organize, and plan more effectively.


Decision support systems:

are used for operational, tactical, and strategic decision making.

_____ reports are management reports that are automatically produced when a situation is unusual or requires management action.


An advantage of using the nominal group technique is that:

it encourages participation from everyone.

The ability to _____ is a characteristic of an MIS system.

use internal data stored in the computer system.

The first stage in the problem-solving process involves the identification and definition of potential problems or opportunities and the investigation of environmental constraints.


​DSS and MIS systems are similar in numerous ways, including the types of problems solved, the support given to users, the decision emphasis and approach, and the type, speed, output, and development of the system used.


Product design is the process of generating a new product or service to be sold by an organization to its customers.


Business decisions are always semistructured and are encountered only at the highest levels of an organization.


A _____ MIS uses data gathered from both internal and external sources to provide reporting and aid decision making in areas of product development, distribution, pricing, and promotions.


Programmed decisions are made using a rule, procedure, or quantitative method.


The performance of decision support systems is typically a function of decision quality, decision-making speed, and _____.

problem complexity

Unlike an individual DSS, a GSS is more difficult to use and is not as flexible.


The two phases of problem solving added by Huber to Simon’s original three-stage model are _____.

implementation and monitoring

The focus of a DSS is on decision-making _____ when faced with unstructured or semistructured business problems.


The model base is the component of a decision support system that allows managers and decision makers to perform qualitative analysis on external data.


Marketing functions are increasingly being performed on the Internet and mobile devices.


The use of MISs span few levels of management.


_____ are ones where the variables that comprise the decision are known and can be measured quantitatively.

Structured decisions

The data that enters an MIS originates entirely from internal sources.


The overall objective of master production scheduling is to provide vague plans for long-range scheduling of manufacturing facilities.


A _____ is an independent business unit that is treated as a distinct entity enabling its revenues and expenses to be determined and its profitability to be measured.

profit center

Unstructured decisions are ones where the variables that affect the decision cannot be measured quantitatively.


A wide area decision network is used when group members are located in the same building or geographic area and under conditions in which the decision frequency is low.


The most significant internal data sources for an MIS are the organization’s _____.

various TPS and ERP systems and related databases

A well-known model developed by Herbert Simon divides the decision making phase of the problem solving process into five stages.


The _____ is NOT a component of the typical DSS.

inference engine

A satisficing model is one that finds a good, but not necessarily the best, solution to a problem.


The overall purpose of the human resource planning subsystem in a human resource MIS is to aid in the recruiting and selecting of personnel.


The _____ approach forces members of a decision making group to reach a unanimous decision.

group consensus

Most financial MISs integrate financial and operational information from multiple sources, including the Internet, into a single system.


Expert systems use heuristics to arrive at conclusions or make recommendations.


After entering the appropriate attributes, the knowledge acquisition facility correctly stores information and relationships in the knowledge base, making the knowledge base easier and less expensive to set up and maintain.


The haptic interface relays the sense of _____ in the virtual world.


A perceptive system allows a machine to approximate the way a person sees, hears, and feels objects.


Robotics involves developing mechanical or computer devices that can paint cars, make precision welds, and perform tasks that require a high degree of precision or are tedious or hazardous for humans.


The user interface makes an expert system easier to develop and use.


_____ involves converting sound waves into words.

Voice recognition

Knowledge workers are people who earn their living by creating, using, and disseminating knowledge.


In an expert system, the _____ is the component that delivers the expert advice.

inference engine

Vision systems include hardware and software that permit computers to capture, store, and process visual images.


A new knowledge base must be built for each unique expert system application.


Many groups use patents, copyrights, trade secrets, Internet firewalls to keep prying eyes from seeing important knowledge that is expensive and hard to create.


_____ knowledge is hard to measure and document and typically is not objective or formalized.


_____ can process many pieces of data at the same time and learn to recognize patterns.

Neural networks

Virtual reality simulations require special interface devices that transmit the sights, sounds, and sensations of the simulated world to the user.


_____ is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing.

Assistive technology

A(n) _____ is a person who has training or experience in the design, development, implementation, and maintenance of an expert system, including training or experience with expert system shells.

knowledge engineer

Assistive technology systems help people overcome disabilities and perform various tasks.


A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.


Many organizations actively attempt to convert explicit knowledge to tacit knowledge.


A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.

community of practice (COP)

A genetic algorithm is an approach to solving problems based on the _____.

theory of evolution

_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning, reasoning, and self-correction.

Artificial intelligence systems

The domain expert is the person with the expertise the expert system is trying to capture.


Artificial intelligence involves the development of machines and computer systems that can stimulate human intelligence processes.


_____ is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision.


Expert system shells lessen the burden of programming, allowing nonprogrammers to develop and benefit from the use of expert systems.


A group of people with common interests who come together to create, store, and share knowledge of a specific topic is known as a community of practice.


The _____ allows an expert system user to understand how the system arrived at its results.

explanation facility

_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.

Game theory

edicine or science while considering the impact on individuals, organizations, and society.


Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence.


Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system.


An expert system can use a case-based solution process to develop the solution to a problem by finding cases stored in the knowledge base that are similar to the problem at hand and then modifying the solution to the cases to fit the current problem.


Voice recognition involves converting sound waves into words.


An expert system, using the explanation facility, can indicate all the facts and rules that were used in reaching a conclusion.


An expert system’s knowledge acquisition facility serves as an interface between _____.

the experts and the knowledge base

Data is the awareness and understanding of a set of information.


Although computers excel at numerical calculations, they are not as good at dealing with symbols and three-dimensional objects.


_____ is a file conversion program that can be used to compress multimedia files to make them easier to download from the Internet or send as an e-mail attachment.


A _____ is a conditional statement that links conditions to actions or outcomes.


_____ do not need any previous training in computers or expert systems.

Knowledge users

Graphic images can be stored in a variety of formats including _____.


Data mining and business intelligence are powerful tools to capture and use knowledge.


_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.

Augmented reality

Robotics involves developing mechanical or computer devices that can paint cars, make precision welds, and perform tasks that require a high degree of precision or are tedious or hazardous for humans.


The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.

knowledge base

A systems analyst is responsible for modifying or developing programs to satisfy user requirements.


During the _____ phase of the systems development life cycle, people attempt to answer the questions, "What must the information system do to solve the problem?"

systems analysis

In the context of system performance, _____ is the hours a system is actually available for use divided by the hours the system is scheduled to be available and is expressed as a percentage.


Information systems planning identifies those information systems development initiatives needed to support organizational strategic goals.


The _____ is a key member and leader of a steering team who plays such a critical role that lack of this essential individual raises the probability of project failure.​

project sponsor

System users and system stakeholders are essentially the same set of people.


In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

entity symbol

The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project.


A data flow diagram (DFD) is a technique to show relationships among data entities.


The success or failure of a joint application development (JAD) session depends on the budget of a project.


A professional who specializes in analyzing and designing business systems is called a(n) ____.

systems analyst

A data flow diagram (DFD) does not provide any information about process timing


The _____ is a sequential multistage process where work on the next stage cannot begin until the results of the previous stage are reviewed and approved or modified as necessary.

​traditional systems development life cycle

The systems design phase of a systems development life cycle (SDLC) identifies areas where system security and controls need to be defined.


Which of the following is an advantage of a traditional systems development life cycle (SDLC)?

Formal review at the end of each phase allows maximum management control.

​In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.

data-flow line

Who among the following has final approval of all requests for changes in project scope, budget, and schedule?

the project sponsor

The disaster recovery plan focuses on technology recovery and identifies the people or the teams responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes.


​_____ determines whether a project can be completed in a reasonable amount of time.

Schedule feasibility

Feasibility analysis assesses the technical, economic, legal, operational, and schedule feasibility of a project.


​Direct observation provides an opportunity for project sponsors to state their concerns and express their ideas for improvement.


In the context of data-flow diagrams (DFDs), the process symbol _____.

​identifies the function being performed

Determining the schedule feasibility is critical when new technology is first being considered for use within an organization, prior to its widespread use.


​_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.

Economic feasibility

​In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

entity symbol

A steering team consists of programmers to simplify the decision-making process.


Security and control considerations are a negligible part of the entire system development process.


The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance.


_____ document key points, issues, next steps, and decisions throughout a joint application development (JAD) session.


A(n) _____ is a duplicate operational hardware system or immediate access to one through a specialized vendor.

hot site

_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.

Critical analysis

_____ is a technique used primarily during the investigation phase of systems development to define the business processes included within the scope of a system.

Functional decomposition

Which of the following is an advantage of a traditional systems development life cycle (SDLC)

Formal review at the end of each phase allows maximum management control.

The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performnce


​Members of a systems development team stay the same throughout a project.


​_____ creates a complete set of technical specifications that can be used to construct an information system.

System design

A project manager is a person who performs all of the system development roles, including systems analyst, programmer, and technical specialist.


​_____ begins during systems analysis and identifies the two or three strongest contenders among the vendors.

Preliminary evaluation

The members of a systems investigation team are responsible for gathering and analyzing data, preparing an investigation phase report, and presenting the results to a project steering team


Security and control considerations are a negligible part of the entire system development


A systems investigation report is reviewed with a steering team to gain their input and cou


Effective systems development requires a team effort.


A data flow diagram (DFD) does not provide any information about process timing.


Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements.


The systems development team is responsible for determining the information system objectives and delivering a system that meets those objectives.


Managers and employees in all functional work areas shun working on systems development projects.


A disaster recovery plan is a component of an organization’s overall business continuity plan


​In the context of system performance, _____ is the hours a system is actually available for use divided by the hours the system is scheduled to be available and is expressed as a percentage


_____ are the people who will regularly interact with a system as they complete their work


Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders.


The traditional systems development life cycle (SDLC) has low management control.


The disaster recovery plan focuses on technology recovery and identifies the people or the teams responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business plan.


A(n) _____ is a formal document that outlines an organization’s hardware or software needs and requests vendors to develop a detailed plan of how they would meet those needs and at what

request for proposal

​_____ is a structured meeting process that can accelerate and improve the efficiency and effectiveness of not only the investigation phase, but also the analysis and design phases of a systems development project.

Joint application development

_____ involves using a new or modified system under all kinds of operating conditions.

Systems operation

Getting the most out of a new or modified system during its operation is the most important aspect of systems operations for many organizations.


An organization that writes its own program source code has a competitive advantage over other organizations.


_____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months.

Agile development

The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.

volume testing

_____ consists of written descriptions developed for people who use a program.

user documentation

System testing is often done by independent testers who are not involved in developing program code.


A _____ is a detailed description of when project activities are performed.

project schedule

Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.


Volume testing and beta testing are the same processes.


_____ involves running a complete new system for one group of users rather than all users.

Pilot start-up

Which of these is an advantage of prototyping?

Users can try the system and provide constructive feedback during development.

In the system construction phase, determining the specific equipment needed, ordering the equipment, and receiving the equipment require a short lead time.


Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system.


_____ is also known as beta testing and application testing.

User acceptance testing

Only select patches come from off-the-shelf software vendors.


The process of switching from an old information system to a replacement system is called _____.


User acceptance testing (UAT) is a critical activity that must be completed successfully before newly developed software can be rolled out to the market.


Which of these is a disadvantage of agile development?

It requires a larger percentage of stakeholders’ and users’ time than other approaches.

A slipstream upgrade is a minor upgrade—typically a code adjustment or minor bug fix.


A _____ is a minor change to correct a problem or make a small enhancement.


A _____ is a critical date for completing a major part of a project, such as program design, coding, testing, and cutover.

project milestone

The eventual success of any system solely depends on how users work with it.


Software as a Service (SaaS) allows individuals and organizations to access needed software applications over the Internet.


_____ explains the purpose of every major piece of computer code and also identifies and describes key variables.

Technical documentation

Testing that ideally forces an individual program to execute all of its various functions and user features is known as _____.

unit testing

Only internal employees can perform systems review.


Many companies don’t announce to users that a slipstream upgrade has been made.


The project milestone is the date an entire project should be completed and operational.


The product developer is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between the stakeholders and development team.


The systems development teams for mobile devices are typically quite large.


A throw-away prototype can be produced in days.


Unit testing uncovers any defects in the interface between individual components of an information system.


The maintenance costs for legacy systems can be quite expensive.


The system construction phase follows the completion of the system investigation phase.


Agile is better suited for developing larger information systems than smaller ones.


_____ is the creation, modification, or extension of software by people who are nonprofessional software developers.

End-user systems development

Monitoring is the process of analyzing systems to make sure they are operating as intended.


Pilot start-up involves running both the old and new systems for a period of time.


_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.

System testing

Which of the following statements is true of user acceptance testing (UAT)?

UAT must be completed successfully before newly developed software can be rolled out to the market.

_____ converts a system design into an operational system by acquiring and installing hardware and software, coding and testing
software programs, creating and loading data into databases, and performing initial program testing.

System construction

System backup and recovery, performance, and security issues can be overlooked in the haste to develop a prototype.


The temptation to add more features and functionality to the original range of the system is called _____.

scope creep

Site preparation can include _____.

installing special wiring and air conditioning

The Internet Crime Computer Center (IC3) is an alliance between ______.

the White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI)

A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.


IS professionals believe that their field offers few opportunities for unethical behavior.


Many computer crimes go unreported because companies do not want bad publicity or don’t think that law enforcement can help.


The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

USA Patriot Act of 2001

If an activity is defined as legal then it is ethical.


Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.


Patent laws protect processes, machines, and compositions of matter.


Under the Identity Theft and Assumption Deterrence Act of 1998, the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

Federal Trade Commission (FTC)

The Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment of, warning of, investigation of, and response to threats or attacks against the country’s critical infrastructure.


The Mask is a collection of malware that infects computers running the Windows, OS X, and Linux operating systems.


Organizations continue to operate their businesses using integrated information systems that leads to missed opportunities, increased costs, and lost sales.


Which of the following is a useful policy to minimize waste and mistakes?

Users should implement proper procedures to ensure correct input data.

_____ is a type of malware that executes when specific conditions occur.

Logic bomb

A script bunny is a young, female computer hacker.


Proper use of antivirus software requires:

scanning all removable media before copying programs from them.

A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

criminal hacker

Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.


To protect a person’s PC and prevent it from spreading malware to his or her coworkers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.


Penalties for software piracy are lenient and liberal.


A useful guideline to protect corporate computers from criminal hackers is to _____.

install antivirus software on all computers

The practice of disguising illegally gained funds so that they seem legal is called _____.

money laundering

_____ is a set of programs that enables its user to gain administrator level access to a computer or network.


A computer can be both the tool used to commit a crime and the object of that crime.


The use of e-mail among public officials might violate "open meeting" laws.


The _____ requires all financial institutions to protect and secure customers’ nonpublic data from unauthorized access or use.

Gramm-Leach-Bliley Act of 1999

Role-based system access means that only people who fill a particular role can access a specific system.


Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.


A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.


Which of the following is a computer-related mistake?

Mishandling computer outputs

Catching and convicting criminal hackers remains an easy task, and the method behind these crimes is often easy to determine.


The LeadsOnline Web-based service system is one of several information systems used by law enforcement to _____.

recover stolen property

The combining of duties is a key concept of good internal controls.


Only few small and mid-sized organizations are willing to outsource their network security operations.


A _____ is a small program hidden in a network or computer system that records identification numbers.

password sniffer

Some web sites offer digital tools—often without charge—that let people snoop, crash computers, hijack control of a machine, or retrieve a copy of every keystroke.


_____ involves publishing an intentionally false written statement that is damaging to a person’s or an organization’s reputation.


Smartphones—especially ones running the popular Android operating system—can run applications that are impervious to malware.


_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software.

Digital rights management

Which of the following statements is true of the E-Government Act of 2002?

It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.

In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.


_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people’s behavior.

Code of ethics

Which of the following statements is true of federal laws?

They permit employers to monitor instant messages sent and received by employees.

To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.


A job that requires sitting at a desk and using a computer for many hours a day can lead to:

formation of blood clots.

The Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment of, warning of, investigation of, and response to threats or attacks against the country’s critical infrastructure.


A virus can send copies of itself via a network.


_____ is a legislation that requires businesses to prove that they are securing their data.

Sarbanes-Oxley Act

Incidents of identity theft are reported to the Federal Trade Commission (FTC).


_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.

Carpal tunnel syndrome (CTS)

Tracking software sends messages via a wireless network to the specified e-mail address, pinpointing its location and including a picture of the thief (for those computers with an integrated Web cam).


Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message