MIS Exam 2

Your page rank:

Total word count: 4859
Pages: 18

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

T/F
The IT department is solely responsible for the quality of the data in the data warehouse.

False

T/F
Governance of a data warehouse must be a collaboration between business users and IT personnel.

True

T/F
Data in a data warehouse are organized by business process, where data in corporate databases are organized by subject.

False

T/F
Data updates in a data warehouse are performed by the MIS department, not the users.

True

Each ___ in a relational database is a record.

Row

T/F
One of the attributes in a record must be a primary key.

True

T/F
A data warehouse is a repository of historical data that are organized by subject to support decision makers in the organization.

True

T/F
Organizational databases access one record at a time, where data warehouses access groups of related records.

True

Which of the following problems do organizations face when managing data?

Processing and analyzing the data that are being stored Collecting the vast amounts of data that are being generated Storing the data that are being collected

The term "data rot" refers to

The deterioration of the medium on which the data are stored.

Data redundancy refers to:

Having copies of the same data in multiple locations.

T/F
In the United States, federal law requires companies to store, evaluate, and disclose financial data for fixed periods of time, even if the company no longer has any use for the data.

True

The management of data across the entire organization is most accurately defined as:

Data governance

T/F
Social data is not a form of big data.

False

T/F
NoSQL databases can process both structured and unstructured data.

True

The use of databases enables organizations to (choose all that apply):

-Minimize data inconsistency -Minimize data security risks -Minimize data isolation NOT -Eliminate data redundancy -Eliminate data integrity

T/F
A database must be associated with only one computer program or information system.

False

T/F
A group of related fields is generally called a data file.

False

A data model is the diagrammatic representation of a database that clearly defines a database’s ___ , ____ and ____.

Entities, attributes, relationships.

A standardized language used to manipulate data is _____.

Query-by-example language

T/F
A relational database typically consists of one large two-dimensional table.

False

_____ is a method for analyzing and reducing a relational database to its most streamlined form.

Normalization

T/F
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.

True

T/F
A data warehouse is a low-cost, scaled-down version of a data mart designed for the end-user needs in a department in a large organization.

False

Operational data that are constantly updated are stored in:

Databases

T/F
Online analytical processing involves the analysis of accumulated data by end users.

True

____ is the cumulative store of subjective or experiential learning.

Tacit knowledge

T/F
Knowledge management systems (KMS) are used by organizations to capture, store, and disseminate knowledge within the organization.

True

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that is part of the organization’s memory and typically resides inside the organization in an unstructured manner.

Knowledge management

T/F
Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading.

False

T/F
Broadband refers to a network with a high transmission capacity.

True

The following can be considered as broadband technologies (choose all that are correct):

-DSL -Cable

A collection of the following devices: two desktop computers, three laptops, two smart phones and a printer, can be described as a(n):

LAN

A(n) ___ can consist of one or more ___.

Enterprise network, LANs

A modem can perform which of the following operations?

Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only

Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct):

-Fiber optic cables have very high bandwidth. -Fiber optic cables offer higher security.

Network protocols describe

The rules for communication within the network.

T/F
Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols.

True

T/F
Distributed computing refers to the distribution of computing tasks among one or more computers.

True

T/F
An Intranet is a scaled-up version of the Internet that uses similar technologies.

False

An Intranet that allows limited access to its partners, suppliers, and customers is called a(n):

Extranet

IPv6 will allow for ___ unique IP addresses.

2128

T/F
DNS are a convenient alternative to the difficult-to-remember IP naming system for computers.

True

T/F
A free software package is called a browser.

False

Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using:

Automated webcrawlers.

Networks enable which of the following applications?

Discovery Communications Collaboration All of these*

With _____, phone calls are treated as just another kind of data.

Voice over Internet Protocol

Workflow, groupware, and telepresence systems are examples of which network application?

Collaboration

The popularity of online classes and online universities can be attributed to which of the following network applications?

Discovery Communications Collaboration All of these*

Businesses and organizations set up Web sites to:

Sell goods and services. Induce people to visit a physical location. Reduce operational and transaction costs. Enhance their reputation. All of the above.*

The opening case illustrates how e-commerce has increased (choose all that apply):

-The volume of business transactions. -The speed at which we do business.

T/F
In order to be considered as an e-commerce Web site, the site must sell some tangible good.

False

Downloading a book on an Amazon Kindle is an example of:

Pure e-commerce

____ accounts for the majority of e-commerce transactions.

B2B

eBay employs the ___ auction mechanism.

Forward

____ and ____ are the two major challenges for the sellers in e-commerce.

Channel conflict, order fulfillment

T/F
In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores.

False

T/F
In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores.

False

For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply):

-The ability to offer lower prices to customers. -The ability to reach a wider customer base. -The ability to offer a larger selection of products.

T/F
Information is the major component of the e-commerce offerings of service industries.

True

T/F
Internet marketing typically is one-way and impersonal.

False

When organizations come to a company’s Web site for procurement, such business is classified as a(n):

Sell-side marketplace.

When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n):

Buy-side marketplace.

T/F
Vertical exchanges are typically used only to buy and sell materials required for an organization’s support activities.

False

In an e-credit card transaction, the clearinghouse plays the following role:

Validates and verifies the seller’s payment information

T/F
Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions.

False

The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by:

The payer.

T/F
The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores.

False

T/F
One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications.

True

Global outsourcing helps an organization to:

Find the best person for the job. Find more economical resources. Implement spatial and temporal flexibility. All of these.*

Managing information systems in a modern organization is challenging because:

Both of the following are correct: the systems are very expensive to acquire, operate, and maintain; and the systems are critical to the organization’s operations.

T/F
Process and procedures are important but not critical to the effective use of computer based information systems.

False

The core capabilities of computer-based information systems include (check all that apply):

-Quick access to information -High-speed calculations -Staging and processing of large amounts of data

HR information systems, POM information systems, CRM information systems, and marketing information systems are usually classified as:

Functional area information systems

T/F
One impact of IT will be to decrease the numbers of managers employed in organizations.

True

While information systems, such as transaction processing systems, generate more information for managers to process, other information systems, such as ___, help them analyze this information to make better-informed decisions.

Business intelligence applications

Telepresence systems can help make ___________ a more popular choice for small and medium enterprises.

Global outsourcing

Which of the following is a useful, cost-effective, hands-on, and safe teaching tool in the medical field?

Simulation environments

Which of the following technologies is wireless but not mobile?

Microwave towers

T/F
Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.

True

The major types of wireless media are:

Microwave, satellite, radio, and infrared.

Which of the following statements about wireless devices is not true?

They have strong security feature that make them impossible to hack.

GPS are supported by ___ satellites

MEO

Which of the following statements about Wi-Fi is not correct?

Wi-Fi is expensive to set up.

_____ use multiple Wi-Fi access points to create a wide area network.

Mesh networks

T/F
Bluetooth devices can be used to establish NFC for mobile commerce.

False

Wi-Fi networks are typically classified as _______ wireless networks

Medium-range

The two major characteristics that differentiate mobile computing from other forms of computing are _______ and _________.

mobility, broad reach

With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.

Both of the following are correct: convenience and instant connectivity

T/F
The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.

False

The development of mobile commerce is driven by the following factors (choose all that apply)

-widespread availability of mobile devices -bandwidth improvement

The technology that uses radio waves to identify individual items is:

radio-frequency identification

All of the following statements regarding QR codes are true except:

QR codes can only store information that is comprised of numbers or text.

_____ collect data from many points over an extended space.

Wireless sensor networks

T/F
War driving is the act of locating wireless networks while driving around a certain area.

True

T/F
Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.

False

An "evil twin" is associated with which type of threat to wireless networks?

Rogue access points

Web 2.0 sites include:

User participation. Collaboration. Social interaction. All of these.*

Folksonomies are:

Keywords that describe a piece of information.

Really simple syndication is:

A system that allows you to receive information from sites you identify without having to go to the individual Web sites.

The blogosphere is defined as:

Millions of blogs on the Web.

A wiki is:

A Web site on which anyone can post material and make changes to already posted material.

Netcasting is:

The distribution of audio files and video files.

Social networking Web sites:

Provide an easy, interactive tool for communicating and collaborating with other people on the Web.

T/F
Many employees have organized work groups usually social networking sites because their companies don’t offer similar tools.

True

T/F
Social commerce involves paying for services such as online dating.

False

T/F
Collaborative consumption allows strangers to make connections through peer-to-peer sharing.

True

In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as:

Conversational marketing

T/F
Human Resource Departments use social computing applications only in the area of training.

False

T/F
The amount of data is increasing exponentially over time.

True

It is very difficult to manage data for which of the following reasons?

Data are scattered throughout organizations.

When customers access a Web site and make purchases, they generate _____.

clickstream data

Which of the following are ways for companies to leverage big data to gain value? (check all that apply)

-Segmenting a population to customize actions -Providing automated algorithms to support decision making -Creating transparencies

T/F
The primary key is a field that uniquely and completely identifies a record.

True

In a relational database, the customer record contains information regarding the customer’s last name. The last name is a(n):

Attribute

T/F
When various copies of the data agree, this is an example of data integrity.

False

Place the following members of the data hierarchy in the correct order:

bit – byte – field – record – file – database

A(n) _____ is a logical grouping of related fields.

Record

In a database, the primary key field is used to _____.

uniquely identify a record

T/F
Normalization is a method for eliminating redundant data elements.

True

T/F
The data dictionary defines the format necessary to enter data into a database.

True

Data dictionaries perform all of the following functions except:

Providing information on each record

A standardized language used to manipulate data is _____.

structured query language

_____ is a method for analyzing and reducing a relational database to its most streamlined form.

Normalization

T/F
Transferring data from the organization’s operational databases into its data warehouse is called data reconciliation.

False

The data in a data warehouse have which of the following characteristics?

They are organized by subject.

Compared to data warehouses, data marts have which one of the following characteristics?

cost less

Which of the following is an example of explicit knowledge?

procedural guides

Explicit knowledge has which of the following characteristics?

objective

The most important benefit of knowledge management systems is:

they make best practices available to employees.

Which of the following are advantages of computer networks?

-They enable organizations to be more flexible. -They enable companies to share hardware, computer applications, and data. -They enable geographically dispersed employees to work together. -They provide a critical link between businesses and their customers. -All of the above.*

T/F
Voice and data communication networks are becoming more expensive.

False

Place the different types of computer networks in size order, ranging from smallest to largest.

PAN-LAN-MAN-WAN

__________ are high speed central networks to which multiple smaller networks connect

Corporate backbone networks

T/F
Digital signals have two parameters, amplitude and frequency.

False

Which wireline communication has the highest security?

Fiber-optic cable

Which transmission technology utilizes existing telephone lines?

DSL

Which of the following is not a basic function of transmission control protocol?

analyzing the packets for size

T/F
File sharing is a type of peer-to-peer processing.

True

T/F
The Internet is managed by a central agency which bears all the cost and responsibility.

False

If broadband is not available in your area, which for the following Internet connection methods would allow you to connect to the Internet?

Satellite

Where in a domain name do you find the top-level domain (TLD)?

all the way to the right

T/F
A browser is used to prevent web surfing.

False

_____ portals support communities such as hobby groups or a political party.

Affinity

Many organizations have implemented corporate portals for which of the following reasons?

-to cut costs -to free up time for busy managers -to improve profitability -to offer customers self-service opportunities -all of the above*

With _____, phone calls are treated as just another kind of data.

voice over IP

Workflow, groupware, and telepresence systems are examples of which network application?

Collaboration

Electronic business includes which of the following?

-buying and selling -servicing customers -collaborating with business partners -conducting electronic transactions within an organization -all of the above*

When e-commerce is done in a wireless environment, this is called:

mobile commerce

eBay is an example of which type of e-commerce?

consumer-to-consumer

Manufacturers or retailers sell directly to customers in which of the following business models?

online direct marketing

In this type of e-commerce, buyers and sellers are individuals.

consumer-to-consumer

T/F
The primary characteristic of auctions is that prices are determined dynamically by competitive bidding.

True

T/F
Electronic commerce makes national and international markets less accessible.

False

In the _____ marketplace model, the reverse auction is typically used.

buy-side

T/F
The key mechanisms in the sell-side marketplace are customized electronic catalogs and forward auctions.

True

Organizations typically face issues related to e-tailing including

Companies face issues in both of these areas

In _____, needed services such as temporary help or extra space are traded on an as-needed basis.

functional exchanges

A(n) _____ is automatically launched by some trigger and appears in front of the active window.

pop-up ad

Which type of electronic exchange connect buyers with sellers within a specific industry?

Vertical exchanges

Which type of electronic payment is typically favored in B2B

Electronic checks

T/F
Stored-value money cards contain chips with personal data.

False

Which of the following electronic payments is ideal for micropayments?

Smart cards

T/F
The use of electronic commerce requires companies to hire additional employees.

False

T/F
When two companies fight over a domain name the company that has been in business the longest is automatically considered the owner of the domain.

False

T/F
The stock market is the only area of business that has experienced fraud on the Internet.

False

T/F
Trademark owners in the US are not allowed to sue for damages in cases of cybersquatting.

False

_____ is the standard that enables wireless devices to access Web-based information and services.

Wireless Application Protocol

Which type of satellite requires the highest number of satellites to cover the earth?

low earth orbit

With which type of satellite is there a propagation delay?

geostationary

T/F
Microwave transmissions are broadcast, where as satellite transmissions are point-to-point.

False

T/F
Wireless computing can increase speed and improve customer service.

True

A(n) _____ is a new class of digital communication device that provides an organizer, cell phone, digital camera, access to e-mail, Internet access, and short message service.

smart phone

Which type of satellite has the shortest orbital life?

low earth orbit

T/F
Satellite radio offers uninterrupted, near-CD quality music that is beamed to your radio from satellites.

True

A transmitter with an antenna that connects a mobile device to a wired local area network is called a(n):

wireless access point

T/F
Wi-Fi is a wireless standard that enables temporary, short-range connections between mobile devices.

False

Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in health-care environments?

Ultra wideband

Mobile applications in financial services include which of the following?

-mobile banking -wireless electronic payment systems -micropayments -brokerage services -all of the these*

Using your cell phone to purchase a Coke from a vending machine is an example of:

micropayment

Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics?

mobility, broad reach

Which of the following is not a mobile application in financial services?

transaction processing systems

T/F
The OnStar system from General Motors is an example of telemetry.

True

The major problem with RFID has been:

Expense

The advantages of RFID tags to Staples include all of the following except:

reduced transaction costs at checkout

A(n) _____ allows unauthorized entry into a wireless network.

rogue access point

T/F
Rogue access points can be set up by employees.

True

Organizations are using social computing in which of the following functions?

-Marketing. -Customer Relationship Management. -Human Resource Management. -All of these.*

The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as:

AJAX

Blogs and wikis fundamentally differ in terms of

their ability of users to post content

Facebook is a__________.

social networking site

Customers using social commerce benefit from _____________.

faster responses from vendors

T/F
The only risk companies face when using social commerce is that customers may post negative feedback.

False

____________ act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.

Social marketplaces

T/F
All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews.

False

T/F
Social computing fosters close customer relationships

True

When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true?

Social computing generates faster and cheaper results.

T/F
Social computing forces companies to deal with customers reactively as opposed to proactively.

False

T/F
Human Resource departments only use social computing applications for recruiting purposes.

False

Which of the following statements is not true?

Most companies do not find it necessary to closely monitor social media.

T/F
The most common source system for a company’s data warehouse is its corporate operational databases.

True

T/F
Companies often have to clean up the data before it can be imported into the data warehouse.

True

T/F
The ETL process is now typically called data integration.

True

The most common method for storing data in a data warehouse is:

One central data warehouse

T/F
Electronic commerce gives customers access to a wider array of products and services than brick-and-mortar stores.

True

T/F
Electronic commerce can be problematic in developing countries due to a lack of bandwidth and expense in accessing the Web.

True

T/F
Big Data is the same thing as huge amounts of structured data in organizational databases.

False

Which of the following is not a type of Big Data?

None of the above; all are types of Big Data

T/F
In the sell-side marketplace, organizations sell their products or services to other organizations electronically from their private e-marketplace and/or from third-party Web site.

True

T/F
The buy-side marketplace is concerned with procurement.

True

___ exchanges connect buyers and sellers in one industry.

Vertical

T/F
B2B EC is more complex than B2C EC.

False

When shoppers visit a brick-and-mortar store, examine a product in person, and use digital technology to buy from an online rival, often at a lower price, this is called:

Showrooming

T/F
eBay uses a reverse auction.

False

T/F
An electronic marketplace is a central, virtual market space on the Web where many buyers and many sellers conduct e-commerce and e-business activities.

True

T/F
One of the advantages of e-learning is that it is easy to assess students’ work.

False

T/F
One of the drawbacks of telecommuting is that telecommuting employees have a lower chance at being promoted than employees who work in the office.

True

Cards that can be used only once, with a different, random card number every time you shop online are:

Virtual credit cards

Cards that contain a chip containing a large amount of information are:

Smart cards

T/F
The relationship between Student and Parking Permit is mandatory 1:1 because each student may have only one parking permit.

True

T/F
In an ER diagram, relationships are expressed as diamonds and entities are expressed as boxes.

True

T/F
The MIS department is solely responsible for the organization’s ER diagrams.

False

T/F
The 20-80 rule refers to the fact that 20% of the feedback on social media is typically negative.

False

When faced with negative feedback, companies should:

Respond constructively and appropriately

T/F
Registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else is called cybersquatting.

True

T/F
Claiming an Internet domain for five days at no cost and filling that site with ads is called domain tasting.

True

T/F
NoSQL databases can manage more different types of data than a traditional relational database.

True

T/F
A/B experiments are so-named because there are only two possible outcomes for each experiment.

True

T/F
Managing data is difficult because data is stored in one place in an organization, its database.

False

In the preceding example, "Robert Jones" is an example of:

Transaction data

___ enables peer-to-peer wireless communications without the need to go through a central wireless access point.

WiFi Direct

___ is a portable wireless device that provides users with a WiFi hotspot wherever they go.

MiFi

T/F
Electronic commerce transactions conducted in a wireless environment, especially via the Internet, is called mobile commerce.

True

T/F
The wireless transmission and receipt of data gathered from remote sensors is called telemetry.

True

T/F
A search engine that utilizes other search engines and integrates the results is a metasearch engine.

True

A single point of entry to an entire community of common interests is:

Affinity portal

T/F
A virtual group is one that works in the same room, but uses digital technologies to accomplish its goals.

False

T/F
Workflow is the movement of information as it progresses through a sequence of steps that make up an organizations’ work procedures.

True

T/F
Voice-over-IP transmits voice over the Internet in the form of analog waves.

False

T/F
Unified communications simplifies and integrates all forms of communications on a common hardware and software platform.

True

T/F
A digital signal consists of a stream of digital bits.

True

The least expensive cable medium is:

Twisted-pair wire

T/F
TCP/IP is a common LAN protocol.

False

T/F
Messages transmitted across the Internet are first divided into packets.

True

When you buy a book from Amazon for your Kindle, you are conducting:

Pure-play EC

___ is a type of EC where sellers and buyers are individuals.

C2C

Our most expensive, yet underutilized asset is:

Our cars

What is the biggest concern with collaborative consumption?

Trust

T/F
Invisible "everywhere" computing embedded in objects is called pervasive computing.

True

T/F
RFID tags and QR (quick response) codes designed to replace bar codes.

True

Why has LinkedIn become so important to recruiters?

Because LinkedIn enables recruiters to precisely target their searches

Why is marketing so valuable on social media?

-Marketers can assess markets in real time. -We often buy products that friends recommend. -We provide information voluntarily and for free. -All of the choices are correct.*

The monitoring, collection, and analysis of social generated data and the resultant strategic decisions is called:

Social intelligence

____ offers major discounts or special deals during a short time frame.

Group shopping

____ host sales for their members that last just a few days and often feature luxury brands.

Shopping clubs

The most important reason that social computing is so valuable is:

Information is not anonymous

T/F
Enterprise social networks and social networks are the same thing.

False

The number of connections you have within and between social networks is your:

Social capital

T/F
Computers typically work in isolation in modern organizations due to information security concerns.

False

T/F
Networks enable organizations to meet rapidly changing business conditions.

True

Data subject to constraints is an example of:

Data integrity

A group of logically related fields is a(n):

Record

The rightmost segment of a domain name is:

Top-level domain

The ___ is the transport mechanism, while the ___ is the application that uses the transport mechanism.

Internet, WWW

T/F
Servers are typically more powerful than client machines.

True

T/F
Thin clients depend on the network to be able to run applications.

True

A ___ is a personal Web site, open to the public, in which the creator expresses his or her opinions chronologically.

Blog

A ___ is a Web site made up entirely of content posted by users.

Wiki

A network that connects computing devices within the same building is:

LAN

A high-speed network that connects a firm’s LANs and WANS is:

Backbone network

T/F
As we have progressed through the generations of cellular phones, their transmissions have evolved from analog to digital; their transmission speeds (bandwidth) have increased; and they transmit voice and data.

True

T/F
Wireless broadband (WiMAX) is most useful for bringing Internet access to individuals in large cities.

False

The short-range wireless network best suited for eliminating the wires connecting keyboard, mouse, monitor, and computer in your office is:

Bluetooth

The short-range wireless network best suited for touchless credit card transactions is:

Near-field communications

An evil twin attack is a type of:

Rogue access point

Efforts by unauthorized users to access data traveling over a wireless network is called:

Eavesdropping

T/F
The terms, wireless and mobile, mean the same thing.

False

This type of satellite is used for the global positioning system:

MEO

This type of satellite has the largest footprint:

GEO

One field that uniquely identifies an entity or a record is:

File

T/F
ER diagrams consist of entities, attributes, and relationships.

True

A network that connects computing devices within the same building is:

LAN

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending