It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions |
Business intelligence |
The business processes outlined within strategic plans are often implemented as envisioned at the managerial and operational level of the organization |
FALSE |
It is possible for a database to consist of only a single file or table |
TRUE |
"Backward looking" budgets are typically based on..? |
Historical data |
responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ______ level of the organization |
Operational level |
The structure of the data is typically captured in a data model |
TRUE |
Data dictionaries restrict business rules |
FALSE |
when we consider entities as tables, each row is a(n) |
record |
when we consider entities as tables, each column is a(n) |
attribute |
Structured Query Language is the most common language used to interface with RDBMSs. |
TRUE |
Online transaction processing (OLTP) systems enable us to fill out a grid, or template, in order to construct a sample or description of the data we would like to see, typically using the drag-and-drop features of a graphical user interface to create a query quickly and easily. |
FALSE |
An attribute is also referred to as a |
Field |
Collection of related attributes about a single instance of an entity |
record |
In a distributed online environment, performing real-time analytical processing enhances the performance of transaction processing. |
FALSE |
Master data management is a management rather than a technology focused issue. |
TRUE |
In DBMS, data are kept separate from the application’s programing code. This means that |
a database does not need to be changed if a changes is made to an application |
One of the advantages of the database approach is program-data independence, which means that it is |
easier to evolve and alter software to changing business needs when data and programs are independent. |
When the database approach makes it easier to deploy and control data access, what advantage is being referred to? |
Improved data sharing |
Disadvantage of the database approach? |
organizational conflict |
Data type helps the DBMS |
allocated storage space |
Once the data model is created, the format of the data is documented in a(n) |
data dictionary |
A data dictionary is also known as a(n) |
metadata repository |
Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory……. |
Bringes’ channel partners use a database system that supports the Oracle database system. |
Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company’s internal …… |
Treston’s new database system was not supported by the database system of its suppliers and distributors. |
Business rules are captured by the designers of the database and included in the data dictionary to |
prevent illegal or illogical entries from entering the database |
Used to capture data to be added, modified, or deleted from the database |
Forms |
A compilation of data from the database that is organized and produced in printed format. |
Report |
A query is used to |
retrieve data from a database |
Query by example (QBE) capabilities in a database |
It helps to create a query quickly and easily. |
System that are used to interact with customers and run a business in a real time are |
Operational systems |
Data that is deemed most important in the operation of a business |
Master Data |
It consists of narrow and simple updates and queries |
Operational system |
Its design goal is to enhance ease of access and use |
Information system |
Integrates data from various operational systems |
A data warehouse |
The purpose of a data warehouse is to |
put key business information into the hands of more decision makers |
Involves standardizing the format of data retrieved from different systems |
Data cleansing |
A Data warehouse that is limited in scope |
data mart |
It contains selected data from the data warehouse |
Data mart |
Ad hoc queries are always saved because they need to be executed on a regular basis |
FALSE |
Information and knowledge discovery tools are used primarily to |
Extract information from existing data |
Produced at predefined intervals to support routine decisions |
Scheduled reports |
Online analytical processing systems are designed for efficient retrieval of data and categorize data as measures and dimensions |
TRUE |
Data mining algorithms search for patterns, trends, or rules that are hidden in the date |
TRUE |
They provide a summary of critical information on a recurring schedule |
key-indicator reports |
They highlight situatins that are out of the normal range. |
exception reports |
Sequence discovery is used to discover associations over time |
TRUE |
Text mining refers to extracting textual information from Web documents |
FALSE |
Help analyze why a key indicator is not at an appropriate level or why an exception occured |
Drill – down reports |
They answer unplanned information requests to support a nonroutine decision |
ad hoc queries |
Business analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes |
TRUE |
Expert systems are used to mimic human expertise by manipulating knowledge rather than simply manipulating information. |
TRUE |
Process of quickly conducting complex, multidimensional analyses of data stored in a database that is optimized for retrieval, typically using graphical software tools. |
Online analytical processing |
Online analytical processing tools enable users to |
scrutinize different dimensions of data beyond simple data summaries. |
The output from an expert system is called inferencing |
FALSE |
An intelligent agent is also referred to as a bot |
TRUE |
It understands how data are organized in the database and has special functions for analyzing the data. |
Online analytical processing server. |
How do online analytical processing systems improve performance |
They preaggregate data so that only the subset of the data necessary for the queries is extracted |
Data mining agents are also known as shopping bots. |
FALSE |
Knowledge portals can be customized to meet the unique needs of their intended users |
TRUE |
In online analytic processing systems__________are the values or numbers the user want to analyze. |
Measures |
In online analytical processin systems, _______ provide a way to summarize the data |
dimensions |
My combining human intelligence and reasoning capabilities with technology’s retrieval and analysis capabilities, visual analytics can help in decision making. |
TRUE |
It is data structure allowing for multiple dimensions to be added to a traditional two-dimensional table |
online analytic processing cube |
Data mining complements online analytical processing in that it |
provides capabilities for discovering "hidden" predictive relationships in the data |
Achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals. |
Data reduction |
It is a technique used to find correlations among sets of items. |
Association discovery |
Process of grouping related records together on the basis of having similar values for attributes |
Clustering |
Use of analytical techniques for extracting information from written documents |
Text mining |
Extracting textual information from online documents |
Web content mining |
Used for Web content mining |
Web crawler |
Used by organizations to determine patterns in customers’ online utilization data. |
Web usage mining |
A recording of a user’s path through a Web site |
clickstream data |
The ability of a page to attract and keep visitors |
Stickiness |
Business analytics augments business intelligence by using_____analysis to help identify trends or predict business outcomes. |
Predictive |
A special purpose information system designed to support organizational decision making related to a particular recurring problem |
decision support system |
Analyses involves making hypothetical changes to the data associated with a problem and observing how these changes influence the results |
what-if analysis |
it uses reasoning methods based on knowledge about a specific problem domain in order to provide advice |
expert system |
it is typically expressed using an "if-then" format |
"rule" in expert systems |
Allows expert system rules to be represented using approximations or subjective values in order to handle situations where information about a problem is incomplete |
Fuzzy logic |
The processing in an expert system (ES) is |
inferencing |
It attempts to approximate the functioning of the human brain and can learn by example. |
Neutral network |
They are agents that automatically perform a task for a user |
user agents |
role of monitoring and sensing agents |
tracking inventory levels |
role of data mining agents |
analyzing data warehouse to detect changes deemed important by a user |
It reflects knowledge that can be documented, archived, and codified, often with the help of information systems. |
explicit knowledge asset |
Primary goal for deploying a knowledge management system |
identifying how to recognize, generate, store, share, and manage tacit knowledge. |
Social network analysis is a technique that attemeps to |
find experts in particular subject areas |
refers to the display of complex data relationships using a variety of graphical methods |
Visualization |
It supports push reporting, exception reporting and alerts, and pull reporting usage models. |
digital dashboard |
Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends. this usage model is known as |
push reporting |
while using digital dashboards, pull reporting is conducted to |
analyze the root causes of an exception |
it includes facts and numbers |
hard data |
it is transformed into coordinates |
explains the phrase "data is geocoded" |
Which of the following is a basic concept associated with Web 2.0? |
shift in users’ role from the passive consumer of content to its creator |
Which of the following is a consequence of the use of social software? |
People are sharing more personal information |
The use of _______ within a company’s boundaries or between a company and its |
Web 2.0 techniques and social software |
Which of the following statements is true about web 1.0? |
It helps rulers find information |
A major benefit of social software is the ability to harness the "wisdom of |
Collective Intelligence |
The concept of _____ is based on the notion that distributed groups of people |
Collective Intelligence |
Which of the following statements is true about a discussion forum? |
It is dedicated to a specific topic, and users can start new threads |
Which of the following statements is true about blogs? |
They allow individuals to express their thoughts in a one-to-many fashion |
Which of the following Web 2.0 applications has been classified as the |
Blogs |
Keith Norat, the Chief Technology Officer of Kender Internationals, relies on |
Blogs lead to the "amateurization" of journalism |
Which of the following explains the term "blogosphere"? |
The community of all blogs |
Social presence tools are also known as ________ tools. |
Microblogging |
Which of the following facilitates real-time written conversations? |
Instant Messaging |
_______ take the concept of real-time communication a step further by allowing |
Virtual Worlds |
Which of the following statements is true about virtual worlds? |
It allows people to communicate using avatars |
The network effect refers to the notion that the value of a network is dependent |
The number of other users |
_____ is a cooperative Web 2.0 application making use of the network effect. |
Media sharing |
_______ is the distribution of digital media, such as audio or video files via |
Netcasting |
Podcasting is a misnomer because podcasts _______. |
Can be played on a variety of devices in addition to Apple’s iPods |
Social bookmarking allows users to share Internet bookmarks and to create |
Folksonomies |
Which of the following statements is true about social bookmarking? |
It allows users to create folksonomies |
______ is the creation of a categorization system made by users. |
Social cataloging |
_____ refers to manually adding metadata to media or other content. |
Tagging |
Which of the following statements is true about tagging? |
It is the process of adding metadata to pieces of information |
______ refer(s) to a way of visualizing user generated tags or content on a site. |
Tag clouds |
Which of the following is one of the uses of geotagging? |
To know the location of a person sending out a breaking news update |
Which of the following is an example of synchronous communication? |
C) Intranets or D) Videoconferencing |
Which of the following is an example of asynchronous communication? |
Shared whiteboards |
Which of the following factors differentiates asynchronous communication from |
Coordination in time |
In today’s business environment, project teams comprise highly specialized |
Virtual teams |
Which of the following is an electronic communication tool that allows users to |
|
Which of the following is an electronic conferencing tool that facilitates a. Vagina |
Instant messaging |
Which of the following is a collaboration management tool that is used to |
Intranets |
Web-based collaboration tools ________. |
Allow for easy transferability from one person to another |
Which of the following statements is true about Gmail? |
It allows users to select a custom domain name for an additional fee |
Which of the following Google Apps is an instant messaging client? |
Google Talk |
______ is an online office suite comprised of a spreadsheet application, a word |
Google Docs |
Which of the following statements is true about Google Sites? |
It is an enterprise-level collaboration tool that allows users to create group websites and share team information |
A(n) _______ system allows users to publish, edit, version track, and retrieve |
Content management |
Which of the following statements is true about content managing systems? |
It allows the assignment of different roles for different users |
Which of the following is the responsibility of an administrator in a content |
Managing account access levels to the digital information |
______ is the creation of goods or services by self-organizing communities. |
Peer production |
Which of the following statements is true about peer production? |
Anyone can help in producing or improving the final outcome |
Which of the following occurs during wiki wars? |
Contributors continuously edit or delete each other’s posts |
_____ is a phenomenon where companies use everyday people as a cheap labor |
Crowdsourcing |
_______ enables people to work in more flexible ways on a variety of Internet- |
E-lancing |
______ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate. |
Social Networking |
Which of the following statements is true about viral marketing? |
It uses the network effect to increase brand awareness |
Which of the following is a critical factor in the success of a viral marketing |
Making sequels |
______ attempts to provide relevant search results by including content from |
Social search |
Which of the following statements is true about Real Simple Syndication (RSS)? |
It is used to publish the most current blogs, podcasts, videos and news stories |
For companies operating in the digital world, online collaboration with |
Web services |
Android is a Web service hosted by Google to _______. |
Build mobile phone applications |
Which of the following statements is true about widgets? |
They are small interactive tools used for a single purpose |
Together, Web services and widgets enable the creation of ______. |
Mashups |
Which of the following statements is true about a mashup? |
It is an application or a Website that integrates one or more Web services |
Which of the following is a reason for the development of semantic Web? |
Web pages can be understood by people but not by computers |
Which of the following is NOT true about an Enterprise 2.0 strategy? |
Enterprise 2.0 applications are not suited to traditional top-down organizational structures |
Enterprise 2.0 is likely to fail if _______. |
An organization’s workforce is dominated by baby boomers. |
Which of the following statements is true about business intelligence? |
It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions. |
"Backward looking" budgets are typically based on ________. |
historical data |
Responding to threats and opportunities and continuous planning is based on analyzing data from the ________ level of the organization. |
operational |
Taking entities as tables, each row is a ________. |
record |
Taking entities as tables, each column is a(n) ________. |
attribute |
An attribute is also referred to as a(n) ________. |
field |
A(n) ________ is a collection of related attributes about a single instance of an entity. |
record |
In DBMS, data are kept separate from the applications’ programming code. This means that ________. |
database needs to be changed when a change is made to an application |
A common way to represent a data model is a(n) ________. |
entity-relationship diagram |
Data type helps the DBMS ________. |
allocate storage space |
To finalize the data model in order to actually build the database, a process called ________ is used to make sure the database will operate efficiently. |
normalization |
In DBMS, normalization helps to ________. |
eliminate data duplication |
Once the data model is created, the format of the data is documented in a(n) ________. |
data dictionary |
A data dictionary is also known as ________. |
metadata repository |
Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory levels for its stores. It is planning to implement Oracle database systems to replace this legacy system. Which of the following most supports Bringes’ decision to replace its legacy system with an Oracle database system? |
Bringes’ channel partners use a database system that supports the Oracle database system. |
Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company’s internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston’s database system? |
Treston’s new database system was not supported by the database system of its suppliers and distributors. |
Business rules are captured by the designers of the database and included in the data dictionary to ________. |
prevent illegal or illogical entries from entering the database |
________ are used to capture data to be added, modified, or deleted from the database. |
Forms |
A(n) ________ is a compilation of data from the database that is organized and produced in printed format. |
report |
A query is used to ________. |
retrieve information from a database |
Which of the following statements is true about query by example capabilities in a database? |
It helps to create a query quickly and easily. |
The systems that are used to interact with customers and run a business in real time are called ________. |
operational systems |
________ is the data that is deemed most important in the operation of a business. |
Master data |
Which of the following statements is true about an operational system? |
It consists of narrow and simple updates and queries. |
Which of the following statements is true about informational systems? |
Its goal is to enhance ease of access and use. |
________ integrates data from various operational systems. |
Data warehouse |
The purpose of a data warehouse is to ________. |
put key business information into the hands of more decision makers |
________ refers to the process of standardizing the format of data retrieved from different systems. |
Data cleansing |
A ________ is a data warehouse that is limited in scope. |
data mart |
Which of the following statements is true about a data mart? |
It contains selected information from the data warehouse. |
Information and knowledge discovery tools are used primarily to ________. |
extract information from existing data |
________ are produced at predefined intervals to support routine decisions. |
Ad hoc queries |
Which of the following statements is true about key-indicator reports? |
They provide a summary of critical information on a recurring schedule. |
Which of the following statements is true about exception reports? |
E) They highlight situations that are out of the normal range. |
________ help analyze why a key indicator is not at an appropriate level or why an exception occurred. |
Drill-down reports |
Which of the following statements is true about ad hoc queries? |
They answer unplanned information requests to support a nonroutine decision. |
________ refers to the process of quickly conducting complex, multidimensional analyses of data stored in a database that is optimized for retrieval, typically using graphical software tools. |
Online analytical processing |
Online analytical processing tools enable users to ________. |
analyze different dimensions of data beyond simple data summaries |
Which of the following statements is true about online analytical processing server? |
It understands how data is organized in the database and has special functions for analyzing the data. |
How do online analytical processing systems improve performance? |
They preaggregate data so that only the subset of the data necessary for the queries is extracted. |
In online analytic processing systems, ________ are the values or numbers the user wants to analyze. |
measures |
In online analytic processing systems, ________ provide a way to summarize the data. |
dimensions |
Which of the following statements is true about the online analytic processing cube? |
It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table. |
Data mining complements online analytic processing in that it ________. |
provides capabilities for discovering "hidden" predictive relationships in the data |
________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals. |
Data reduction |
Which of the following statements is true about association discovery? |
It is a technique used to find correlations among sets of items. |
________ is the process of grouping related records together on the basis of having similar values for attributes. |
Clustering |
Which of the following is a recording of a user’s path through a Web site? |
clickstream data |
________ is the ability to attract and keep visitors. |
Stickiness |
Which of the following analysis are you conducting to make hypothetical changes to the data associated with a problem and observe how these changes influence the results? |
what-if analysis |
Which of the following statements is true about expert systems? |
It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice. |
Which of the following statements is true about a rule in expert systems? |
It is typically expressed using an "if–then" format. |
________ allows expert system rules to be represented using approximations or subjective values in order to handle situations where information about a problem is incomplete. |
Fuzzy logic |
The processing in an ES is called ________. |
inferencing |
Which of the following statements is true about neural networks? |
It attempts to approximate the functioning of the human brain and can learn by example. |
Which of the following statements is true about user agents? |
They are agents that automatically perform a task for a user. |
Which of the following is a role of monitoring and sensing agents? |
tracking inventory levels |
Which of the following is a role of data mining agents? |
analyzing data warehouses to detect changes deemed important to a user |
Which of the following statements is true about explicit knowledge assets? |
It reflects knowledge that can be documented, archived, and codified, often with the help of information systems. |
Which of the following is the primary goal of a knowledge management system? |
Identifying how to recognize, generate, store, share, and manage tacit knowledge. |
Social network analysis is a technique that attempts to ________. |
find experts in particular subject areas |
________ refers to the display of complex data relationships using a variety of graphical methods. |
Visualization |
Which of the following statements is true about digital dashboards? |
It supports usage models like push reporting, exception reporting and alerts, and pull reporting. |
Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends. This usage model is known as ________. |
push reporting |
While using digital dashboards, pull reporting is conducted to ________. |
analyze the root causes of an exception |
Which of the following statements is true about hard data? |
It includes facts and numbers. |
Which of the following explains the phrase "data is geocoded"? |
It is transformed into coordinates. |
Traditionally, companies are organized around four distinct functional areas. Which of the following is one of those four areas? |
supply chain management |
Which of the following is a core business process? |
make-to-stock |
Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the customer’s credit card. This process of selling a product or service is known as the ________ process. |
order-to-cash |
For most businesses, the ________ process entails subprocesses such as creating a customer record; checking the customer’s creditworthiness; creating an order; checking and allocating stock; picking, packing, and shipping; invoicing; and collecting the payment. |
order-to-cash |
An online retailer has finished creating a customer record. What should the retailer do next in an order-to-cash process? |
check customer credit |
In the order-to-cash process, once "checking credit" is done, it is followed by ________. |
creating an order |
An online retailer has just finished creating an order for a customer. In an order-to-cash process what should the retailer do next? |
allocate stock |
The processes associated with the acquiring of goods from external vendors are together referred to as the ________ process. |
procedure-to-pay |
Which of the following is typically the first step in the procure-to-pay process? |
negotiate price and terms |
In the procure-to-pay process, the negotiation of price and terms is followed by ________. |
issuing the purchase order |
________ immediately after the purchase order is issued in the procure-to-pay process. |
Goods are received |
Receiving the goods is immediately followed by ________ in the procure-to-pay process. |
Receiving the invoice |
In the ________ process, goods are produced based on forecasts and are stored in a warehouse and sales orders are then fulfilled from the inventory. |
make-to-stock |
Which of the following uses a push-based approach? |
make-to-stock |
In the ________ process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received. |
make-to-order |
Which of the following uses a pull-based approach? |
make-to-order |
Which of the following is typically the first step in the make-to-stock process? |
procuring inputs |
Which of the following goods are typically produced under a make-to-order approach? |
very expensive low-volume goods |
Which of the following goods are produced using the make-to-order approach? |
commercial aircraft |
________ are performed by the functional areas that process inputs and produce outputs. |
Core activities |
Which of the following is a core activity? |
operations and manufacturing |
Inbound logistics involves business activities associated with ________. |
receiving and stocking raw materials, parts, and products |
Assembly processes are ________ activities. |
operations and manufacturing |
Outbound logistics activities focus on the ________. |
distribution of end products within the order-to-cash business process |
The hardware and software that must be implemented to support the applications that the primary activities use are a part of the ________ activities. |
infrastructure |
Which of the following is a support activity? |
technology development activities |
Human resource activities ________. |
Is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them |
Designing and developing applications that support the primary business activities are a part of the ________ activities. |
technology development |
A(n) ________ information flow consists of information that is received from another organization. |
upstream |
A(n) ________ information flow relates to the information that is produced by a company and sent along to another organization. |
downstream |
Systems that focus on the specific needs of individual departments and are not designed to communicate with other systems in the organization are referred to as ________. |
stand-alone applications |
Stand-alone systems are also known as ________. |
legacy systems |
Legacy systems can prove problematic when information from multiple departmental systems is required to support business processes and decision making. Which of the following is most similar to the above scenario? |
Chuck’s is a retail chain that has an inventory management system which is tied to an RFID system. This system notifies Chuck’s managers when the inventory in its stores fall below a certain level. |
A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database. |
enterprise system |
An internally focused system helps an organization coordinate with ________. |
its departments |
A(n) ________ coordinates business processes with customers, suppliers, and business partners of an organization. |
externally focused system |
A system that communicates across organizational boundaries is sometimes referred to as a(n) ________. |
interorganizational system |
________ are applications written by third-party vendors for the needs of many different users and organizations. |
Packaged software |
Applications that are designed and developed exclusively for a specific organization are known as ________. |
custom software |
Customers can purchase ________ software off the shelf to help them with their personal documents and communications. |
packaged |
Packaged software is ________. |
used for standardized, repetitive tasks |
Which of the following software is very cost effective since the vendor that builds the application spreads out the development costs by selling them to a large number of users? |
packaged software |
Which type of software is best suited for tasks that are unique to a particular business? |
custom |
Which of the following is true regarding packaged software and custom software? |
The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them. |
The features and modules that an enterprise system comes with out of the box are referred to as the ________. |
vanilla version |
________ is a systematic, structured improvement approach by all or part of an organization whereby people critically examine, rethink, and redesign business processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle time, or cost. |
Business process management |
In the 1990s, business process management was known as ________. |
business process reengineering |
After deciding to focus on business process management, the management of a company has just finished developing a vision for the organization. This vision specifies the company’s business objectives. Typically, what should be the management’s next step? |
They should identify the critical processes that are to be redesigned. |
After identifying the ways in which information systems can be used to improve the processes, which of the following is the next step in business process management? |
designing and implementing a prototype of the new process |
How is business process management similar to total quality management? |
They are intended to be cross-functional approaches to improve an organization. |
Applications that integrate business activities across departmental boundaries are often referred to as ________ systems. |
enterprise resource planning |
Which of the following is true regarding enterprise resource planning (ERP)? |
It makes the process of sharing information between business activities easier. |
________ support the important internal activities of the organization for producing their products and services. |
ERP core components |
Financial management, operations management, human resource management, and other important internal activities require the support of ________. |
ERP core components |
________ support the primary external activities of the organization for dealing with suppliers and customers. |
ERP extended components |
Specifically, ERP extended components focus primarily on ________. |
customer relationship management and supply chain management |
Which of the following is true regarding the formula for success of an enterprise system? |
Enterprise systems implementations should include personnel from different departments. |
In service-oriented architecture, ________. |
business processes are broken down into individual components or services |
By breaking down business processes into individual services, organizations can react more swiftly to changing business needs. To achieve these benefits, services have to follow three main principles: |
reusability, interoperability, and componentization |
Traditionally, companies are organized around four distinct functional areas. Which of the following is one of those four areas? |
Supply Chain Management |
Whenever an order is placed with online retailers, the retailers put together the order, ship it, and change the customer’s credit card. This process of selling a product or service is known as the _______ Process |
Order-To-Cash |
Inbound logistics involves business activities associated with |
Receiving and stocking raw materials, parts, and products |
Which of the following is a support activity |
technology development activities |
The purpose of a data warehouse is to _______ |
put up key business information into the hands of more decision makers |
Information and knowledge discovery tools are used primarily to _____ |
extract information from existing data |
Which of the following statements is true about association discovery |
it is a technique used to find correlations among sets of items |
Which of the following analysis are you conducting to make hypothetical changes to the data associated with a problem and observe how these changes influence the results |
What-if-Analysis |
Which of the following statements is true about explicit knowledge assets |
it reflects knowledge that can be documented, archived, and codified, often with the help of information systems |
Which of the following is the primary goal of a knowledge management system |
identifying how to recognize, generate, store, share, and manage tactic knowledge |
______ refers to the display of complex data relationships using a variety of graphical methods |
visualization |
Which of the following statements is true about digital dashboards |
it supports usage models like push reporting, exception reporting and alerts, and pull reporting |
Which of the following statements is true about business intelligence |
it is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions |
Responding to threats and opportunities and continuous planning is based on analyzing data from the ______ level of the organization |
operational |
Taking entities as tables, each row is a |
record |
An attribute is also referred to as a(n) |
field |
A common way to represent a data model is in a(n) |
entity-relationship diagram |
Data type helps the DBMS |
allocate storage space |
In DBMS, normalization helps to _______ |
eliminate data duplication |
Bringes, a retail chain, has retail stores across three states. WIth its current legacy system, Bringes is having problems tracking the inventory levels for its stories. It is planning to implement Oracle database systems to replace this legacy system…. |
Bringes’ channel partners use a database system that supports the Oracle database system |
Treston, an automobile manufacturer, has recently implemented a new database system…. |
Treston’s new database system was not supported by the database system of its suppliers and distributors |
Business rules are captured by the designers of the database and included in the data dictionary to ______ |
prevent illegal or illogical entries from entering the database |
A query is used to _____ |
retrieve information from a database |
Which of the following statements is true about an operation system |
it consists of narrow and simple updates and queries |
Legacy systems can prove problematic when information from multiple departmental systems is required to support business processes and decision making. Which of the following is most similar to the above scenario |
Jsutmi successfully pursues a just-in-time inventory system. Recently, however, it has not been able to meet demand due to labor problems |
A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company wide basis using one large database |
enterprise system |
A system that communicates across organizational boundaries is sometimes referred to as a(n) _______ |
interorganizational system |
Which of the following is true regarding packaged software and custom software? |
The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them |
_______ is a systematic, structured improvement approach by all or part of an organization whereby people critically examine, rethink, and redesign business processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle time, or cost |
Business process management |
After deciding to focus on business process management the management of a company has just finished developing a vision for the organization. This vision specifies the company’s business objectives. Typically what should be the managements next step |
they should identify the critical processes that are to be redesigned |
Which of the following is ture regarding enterprise resource planning (ERP) |
It makes the process of sharing information between business activities easier |
Which of the following is true regarding the formula for success of an enterprise system |
Enterprise systems implementations should include personnel from different departments |
The first phase of the systems development lifecycle is systems design. |
FALSE |
Requirements collection is the process of gathering and organizing information to understand how a proposed information system should function. |
TRUE |
Strategic alignment considers the number of individuals and the length of time needed to complete a project. |
FALSE |
In an entity-relationship diagram, each data entity can have only one attribute that describes it. |
FALSE |
Data flows represent the movement of data through an organization or within an information system. |
TRUE |
Processing logic represents the way in which data are transformed. |
TRUE |
System conversion is the process of decommissioning the current way of doing things and installing the new system in the organization. |
TRUE |
Corrective maintenance involves making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment. |
FALSE |
Purchasing an existing system from an outside vendor is referred to as outsourcing. |
FALSE |
An RFP is sent to buyers who might potentially be interested in buying hardware and/or software for the system. |
FALSE |
Systems benchmarking is the use of standardized performance tests to facilitate comparison between systems. |
TRUE |
Public domain software severely restricts access to the source code and gives users no rights to copy or modify the software. |
FALSE |
In a basic relationship, the buyer and the supplier set preferences and prices to the benefit of each other. |
FALSE |
Social media is a classification of Web 2.0 applications. |
TRUE |
Open source software is an example of the power of collective intelligence. |
TRUE |
Blogs are the only type of Web 2.0 application that are without controversy. |
FALSE |
Social presence tools are designed for lengthy posts. |
FALSE |
Asynchronous discussion forums emulate real-time written conversations. |
FALSE |
While individuals run successful small businesses in consumer-oriented virtual worlds, large companies have not been able to realize the potential of those environments beyond providing virtual showcases for their products. |
TRUE |
Shared content is hosted on media sharing sites; however, the content can also be embedded into other sites. |
TRUE |
The size of a word in a tag cloud represents its importance or frequency so that it is easy to spot the most important or frequent words or tags. |
TRUE |
Adding geospatial metadata to media is referred to as geotagging. |
TRUE |
E-mail is an example of synchronous communication. |
FALSE |
Web-based collaboration tools allow for easy access and easy transferability from one person to another, as the tools can run on any computer with a Web browser and Internet connectivity. |
TRUE |
Web-based collaboration tools are most suitable for working professionals who travel regularly. |
FALSE |
In a content management system, the editor is responsible for publishing new information. |
FALSE |
In a content management system, the guest can only view digital information. |
TRUE |
Content management systems are also known as digital asset management systems. |
TRUE |
Changes made to the content on a wiki cannot be reverted. |
FALSE |
The term viral marketing describes how good marketing techniques can be driven by sending out massive amounts of spam. |
FALSE |
The central idea behind Web services is that any device can use any network to access any service. |
TRUE |
Widgets have a standard format. |
FALSE |
Enterprise 2.0 applications work well within traditional top-down organizational structures based on rigid hierarchies and control. |
FALSE |
Which of the following IS personnel is responsible for the maintenance of information systems? |
B |
Which of the following IS personnel is responsible for coding, testing, debugging, and installing programs? |
A |
Which of the following IS personnel is responsible for strategic planning and IS use throughout a firm? |
A |
In information systems management, a systems consultant is responsible for ________. |
E |
Which of the following IS personnel is responsible for analyzing business requirements and selecting information systems that meet those needs. |
D |
Services offered by Google, such as Gmail, Google docs, or Google Calendar are examples of cloud computing. |
TRUE |
The purpose of a knowledge management system is to create, store, analyze, and manage spatial data. |
FALSE |
Organizational learning is the ability of an organization to use past behavior and information to improve its business processes. |
TRUE |
A combined automating and learning approach, in the long run, is more effective than an automating approach alone. |
TRUE |
Increased costs and reduced quality are implications for firms that face an increasing threat of new entrants in its markets. |
FALSE |
Many organizations use the Internet to connect businesses with one another electronically so that they can exchange orders, invoices, and receipts online in real time. These systems are called intranets. |
FALSE |
Choosing and implementing an emerging information system is not sufficient to gain or sustain competitive advantage. |
TRUE |
The most significant change in the Information Systems field has been in mind-sets about technology rather than in technology itself. |
TRUE |
The e-business innovation cycle puts technology ahead of strategy and marketing. |
TRUE |
As digital technologies increase in capabilities and at the same time decrease in cost, the industry as a whole will see rapid cost reductions. |
TRUE |
Freeconomics is used by non-profit organizations because companies do not make money with this value proposition. |
FALSE |
Information systems infrastructure consists of hardware, software, communication and collaboration networks, databases, facilities, and human resources. |
TRUE |
Monitors and printers are examples of input technologies. |
FALSE |
Primary storage is nonvolatile memory. |
FALSE |
Primary storage is considerably faster than secondary storage. |
TRUE |
Software refers to programs, or sets of instructions, that allow all the hardware components in your computer system to speak to each other and to perform the desired tasks. |
TRUE |
The application software transparently controls the computer’s basic operations. |
FALSE |
A hypertext document is also known as a Web page. |
TRUE |
The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. |
TRUE |
Electronic commerce is limited to transactions between businesses and consumers, which is known as business-to-consumer (B2C) EC. |
FALSE |
Companies pursuing a click-only business strategy approach business activities in a traditional manner by operating physical locations. |
FALSE |
Companies pursuing a click-and-mortar business strategy have no physical store locations, allowing them to focus purely on electronic commerce. |
FALSE |
TRUE |
TRUE |
Click-only companies can often compete more effectively on price since they do not need to support the physical aspects of the click-and-mortar approach. |
TRUE |
Prior to the introduction of the Internet and Web, the use of EDI was generally limited to large corporations. |
TRUE |
Extranets look and act like public Web sites. |
TRUE |
Extranets do not impact a company’s bottom line. |
FALSE |
Supplier portals automate the business processes involved in procuring products. |
TRUE |
In global B2B transactions, organizations often use letters of credit issued by a bank to make payments. |
TRUE |
An electronic meeting system is a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting. |
TRUE |
M-commerce is defined as any electronic transaction or information interaction conducted using a wireless, mobile device and mobile networks that leads to the transfer of real or perceived value in exchange for information, services, or goods. |
TRUE |
Government-to-business (G2B) EC does not involve businesses’ relationships with all levels of government. |
FALSE |
Taking entities as tables, each row is a ________. |
B |
Taking entities as tables, each column is a(n) ________. |
A |
An attribute is also referred to as a(n) ________. |
C |
A(n) ________ is a collection of related attributes about a single instance of an entity. |
E |
In DBMS, data are kept separate from the applications’ programming code. This means that ________. |
D |
Data type helps the DBMS ________. |
C |
A(n) ________ is a unique identifier that should be created and used when designing a database for each type of entity, in order to store and retrieve data accurately. |
C |
In which of the following database models does the DBMS view and present entities as two-dimensional tables, with records as rows, and attributes as columns? |
A |
The most common DBMS approach in use today is the relational database model. |
TRUE |
Elimination of data redundancy is a major goal and benefit of using data normalization techniques. |
TRUE |
Structured Query Language is the most common language used to interface with databases. |
TRUE |
Online analytical processing systems are designed for efficient retrieval of data and categorize data as measures and dimensions. |
TRUE |
Data mining algorithms search for redundancies that are hidden in the data. |
FALSE |
Text mining refers to extracting textual information from Web documents. |
FALSE |
Business analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes. |
TRUE |
Expert systems are used to mimic human expertise by manipulating knowledge rather than simply manipulating information. |
TRUE |
Traditionally, companies are organized around four distinct functional areas, namely, marketing and sales, supply chain management, accounting and finance, and information systems management. |
FALSE |
The core business processes common to most business organizations are order-to-cash, procure-to-pay, and make-to-stock. |
TRUE |
The order-to-cash process entails subprocesses such as price and terms negotiations, issuing of the purchase order, receiving the goods, and receiving and paying the invoice. |
FALSE |
The processes associated with procuring goods from external vendors are together referred to as the procure-to-pay process. |
TRUE |
In the make-to-stock process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received. |
FALSE |
The make-to-order process uses the pull-based approach. |
TRUE |
Systems that focus on the specific needs of individual departments are typically not designed to communicate with other systems in the organization and are therefore referred to as stand-alone applications. |
TRUE |
A legacy system is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database. |
FALSE |
Rather than storing information in separate places throughout the organization, enterprise systems provide a central repository common to all corporate users. |
TRUE |
Internally focused systems coordinate business processes with customers, suppliers, and business partners. |
FALSE |
A system that communicates across organizational boundaries is sometimes referred to as an interorganizational system (IOS). |
TRUE |
Customer relationship management applications concentrate on the activities involved in promoting and selling products to the customers as well as providing customer service and nourishing long-term relationships. |
TRUE |
Enterprise resource planning replaces stand-alone applications by providing various modules based on a common database and similar application interfaces that service the entire enterprise rather than portions of it. |
TRUE |
Enterprise resource planning control refers to the locus of control over the computing systems and data contained in these systems, as well as decision making authority. |
TRUE |
There are two major categories of enterprise resource planning (ERP) components – ERP core components and ERP extended components. |
TRUE |
Enterprise resource planning core components support the primary external activities of the organization for dealing with suppliers and customers. |
FALSE |
Enterprise resource planning extended components support internal operations such as financial management, operations management, and human resource management. |
FALSE |
The main objective of enterprise systems is to create competitive advantage by streamlining business activities within and outside a company. |
TRUE |
The flow of materials from suppliers to customers can be described as a supply network. |
TRUE |
Just-in-time is a business model in which the suppliers manage the manufacturer’s inventory based on preestablished service levels. |
FALSE |
One major problem affecting supply chains are ripple effects referred to as the multiplier effect. |
FALSE |
Supply chain management improves the coordination of suppliers, product or service production, and distribution. |
TRUE |
Supply chain management is primarily used to optimize business processes within the organization. |
FALSE |
Supply chain execution involves the development of various resource plans to support the efficient and effective production of goods and services. |
FALSE |
Although RFID tags contain more information than bar codes, they require time-consuming hand |
FALSE |
Customer relationship management systems collect the data that can be mined to discover the next product line extension that consumers covet. |
TRUE |
Customer relationship management applications are commonly integrated with a comprehensive enterprise resource planning implementation to leverage internal and external information to better |
TRUE |
Customer relationship management allows organizations to focus on driving revenue as well as on reducing costs, as opposed to emphasizing only cost cutting. |
TRUE |
MIS 201 – Chapter 6 & 7
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price