Professional Documents
Culture Documents
1. If almost all of an organization's significant business relationships are digitally enabled, it would be called a(n) ________.
digital firm
3. In 2014, American business will spend approximately ________ on information systems hardware, software, and telecommunications
equipment.
$600 billion
4. ________ deals with both behavioral and technical issues regarding information systems, and focuses on the development, use, and
impact of systems by managers and employees.
Management information systems (MIS)
5. A company that produces a new low-cost product based on improved decision making has likely achieved a(n) ________.
competitive advantage
6. _______ includes hardware and software an organization needs to compete in the marketplace.
Information technology (IT)
10. A ________ links two or more computers which enables the sharing of information.
network
11. The emergence of the Internet into a full-blown international communications system has drastically ________ the costs of operating
and transacting on a global scale.
reduced
12. A scanner used to capture a products code (i.e., SKU) is considered ________.
an input
14. The value of an information system to a business, as well as the decision to invest in any new information system, is in large part
determined by the extent to which the system will lead to better management decisions, more efficient business processes, and higher
firm ______________.
Profitability
15. A(n) ________, such as a clerk, uses data for things such as scheduling.
worker
17. A philosophy on how a company conducts business (i.e., how it produces, delivers and sells) in the marketplace is called a(n)
________.
business model
18. The information systems approach to this textbook is the ________.
sociotechnical approach
19. ________ includes components that collect, process, store, and distribute information to support decision making and control in a
business.
Information systems (IS)
21. Companies analyzing huge amounts of data, social media, and other data points represent an emerging area of ________.
big data
24. Workers that produce and deliver products and services are called ________.
service workers
Chapter 2 Quiz
1. A display which presents graphs and charts of key performance indicators on a single screen for managing a company is called a
________.
digital dashboard
2. _________ help businesses become more flexible and productive by integrating groups of processes so they focus on efficient
management of resources and customer service such as sales, marketing, and accounting.
Enterprise resource planning (ERP) systems
3. Downloading a Kindle e-book from Amazon, buying a computer online at Best Buy, and downloading a music track from iTunes, are
examples of how information systems help business processes ________.
change the flow of information
5. BASF, a leading German chemical company, needed ________ to provide the foundation for a social network within the company.
a central resource that would support dynamic knowledge-sharing
7. A(n) ________ system helps capture, manage, and apply the experience of the organization.
knowledge management (KM)
8. A supply chain management system is considered a type of ________ system because it shares data across multiple organizations.
interorganizational
9. ________ include(s) the strategy and policies for using information technology within an organization.
IT governance
10. ___________________ filter, compress, and track critical data, displaying the data of greatest importance to senior managers
including business intelligence analytics for analyzing trends, forecasting, and "drilling down" to data at greater levels of detail.
Executive support systems (ESS)
13. Working together as a team to produce a business plan to align strategy with the company's goals is an example of ________.
collaboration
15. In many companies, the information systems department is headed by a(n) ________.
chief information officer (CIO)
16. Decision-support systems (DSS) support management decisions that are unique and rapidly changing by providing ___________.
advanced analytical models
17. Businesses that collaborate and use social business often see benefits in productivity, quality, innovation, sales growth, and ________.
customer service
21. A Web interface which presents integrated personalized business content delivered to senior managers is ________.
a portal
23. Which of the following is NOT an example of a company's transaction processing system?
A company's internal email system
25. The order fulfillment process requires a great deal of information to flow rapidly both within the firm from one decision maker to
another; with business partners, such as delivery firms; and with the customer. What makes it possible is ___________________.
information systems
Chapter 3 Quiz
1. According to the value chain model, sales and marketing is considered a ________ of the firm.
primary activity
2. The assumption that an MIS professor knows more about normalization than a student is an example of ________.
organizational culture
5. According to research, about ________ of a firm's profits can be explained by alignment of IT with business.
50 percent
6. An innovation that dramatically changes the business environment is called a(n) ________.
disruptive technology
7. The power of the customer ________ if they have an easy time switching from one company (e.g., not having to pay an exit fee) to
another.
grows
8. According to the value chain model, human resources is considered a ________ of the firm.
support activity
10. Customer relationship management (CRM) that includes analytical capabilities is often called ________.
contemporary CRM
11. According to the value chain model, technology is considered a ________ of the firm.
support activity
12. In the music industry, ________ are considered a newer substitute for CD-based music stores.
Internet music sites
13. Technological change generally implies some changes to organizations, and very often requires changes in who owns and controls
information, who has the right to access and update that information, and who makes decisions about whom, when, and how. This
more complex view forces us to look at the way work is designed and the _____________________________.
procedures used to achieve outputs
14. According to the value chain model, operations are considered a ________ of the firm.
primary activity
15. A collection of routines for producing goods and services is called a(n) ________.
business process
18. Information systems can ________ the organization by giving lower-level employees more capabilities.
flatten
19. Information systems technology can be viewed as a factor of production that can be substituted for traditional capital and labor. As the
cost of information technology __________, it is substituted for labor, which historically has been a rising cost.
decreases
20. Hilton Hotels' OnQ system analyzes detailed data collected on active guests in all of its properties to determine the preferences of each
guest and each guest's ___________ to choose guests for additional privileges such as late checkouts.
profitability
22. In Porter's competitive forces model, the strategic position of the firm and its strategies are determined not only by competition with
its traditional direct competitors but also by four other forces in the industry's environment: _________________________________.
new market entrants, substitute products, customers, and suppliers
24. A(n) ________ includes interdependent networks of suppliers, distributors, and outsourcing firms.
business ecosystem
25. Another name for standard operating procedures for creating goods and services is (are) ________.
26. routines
Chapter 4 Quiz
2. _____________is more tightly regulated in Europe than in the United States, considering that in 2002, the European Parliament
passed a ban on unsolicited commercial messaging.
Spamming
3. Regarding moral dimensions of the information age, ________ include(s) the issue of what standards should we demand to protect the
safety of society.
system quality
4. Regarding moral dimensions of the information age, ________ include(s) the issue of who can and will be held liable for harm done to
property rights.
accountability and control
6. ________ are small text files loaded on a computer when a user visits Web sites.
Cookies
8. Advances in information technology facilitate ___________________, such as credit card purchases making personal information
available to market researchers, telemarketers, and direct mail companies.
invasion of privacy
9. The "patent trial of the century" in 2011 was between ________ and ________ for violating patents for iPhones.
Apple; Samsung
10. ________ refers to the principles of right and wrong that individuals use to make choices.
Ethics
11. EU member nations cannot transfer personal data to countries that do not have similar privacy protection regulations to theirs, such as
_____________.
the United States
12. ________ scans data and can help identify a man at a ticket counter who shares a phone number with a known terrorist.
NORA
13. The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and
financial records.
Privacy Act of 1974
14. The act that aims at protecting consumers in the mobile market place regarding tracking is the ________.
Do-Not-Track Online Act of 2011
16. Regarding moral dimensions of the information age, ________ include(s) the issue addressing intellectual property rights in a digital
society.
property rights and obligations
17. Related to technology raising ethical issues, the doubling of computing power every 18 months makes it possible ________.
for organizations to use information system for their core production processes
19. Regarding moral dimensions of the information age, ________ include(s) which cultural values are supported by a digital society.
quality of life
20. Under the United Kingdom's ________________________, the employer must ensure that employee monitoring is justified. It takes
into account any negative effects the monitoring may have on staff.
data protection law
21. Related to technology raising ethical issues, advances in data storage techniques and rapidly declining associated costs are responsible
for ________.
the multiplying databases on individuals, employees, customers, and potential customers
22. The act that aims at protecting medical records is the ________.
HIPAA
24. A(n) ________ grants the owner an exclusive monopoly on an invention for 20 years.
patent
25. Regarding moral dimensions of the information age, ________ include(s) the issue of what individuals and organizations can protect.
information rights and obligations
Chapter 5 Quiz
1. _____________ continue to be used to reliably and securely handle huge volumes of transactions, for analyzing very large quantities
of data, and for handling large workloads in cloud computing centers.
Mainframes
2. Your firm's IT strategy is a(n) ________ of the competitive forces model for IT infrastructure.
internal part
4. Competitor firms' IT services is a(n) ________ of the competitive forces model for IT infrastructure.
external part
5. About _____________ people worldwide own smartphones, and most of these users access the Internet with their mobile devices.
1.75 billion
6. ________ is defined as the shared technology resources that provide the platform for the firm's specific information systems
applications.
Information technology infrastructure
9. The services a firm is capable of providing to its customers, suppliers, and employees are a direct function of its IT infrastructure,
which should support the firm's business and information systems ____________.
strategy
10. According to Moore's Law (1965), the ratio of price to performance has ________.
fallen
12. Setting up a system so that it is not restricted by physical configuration or geographic location is an example of ________.
Virtualization
14. Regarding the IT infrastructure ecosystem, Microsoft Windows, Unix, and Mac OS X are examples of ________.
operating systems platforms
16. The five eras of computer evolution are general-purpose mainframe and minicomputer computing, ________________________,
client/server networks, enterprise computing, and cloud and mobile computing.
personal computers
17. ________ is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used
for transferring data.
XML
19. Your firm's business strategy is a(n) ________ of the competitive forces model for IT infrastructure.
internal part
24. The size of a nanotube is about ________ thinner than a human hair.
10,000 times
25. ________ is a page description language for generating Web pages (e.g., text, dynamic links).
HTML
Chapter 6 Quiz
6. A ________ provides the link from one table to another table's primary key.
foreign key
7. Amazon is one of the first to provide cloud computing relational databases. This effort is called ________.
Amazon Relational Database Service
8. The formal process to remove data problems such as repeating groups is called ________.
normalization
9. Although "Big Data" doesn't refer to a specific amount of data, it usually does involve ________.
Petabytes
12. The DBMS acts as a(n) ________ between application programs and physical data files.
interface
13. For DBMS's that do NOT include a reports generator, ________ is a popular option for large corporate DBMS.
Crystal Reports
14. Data cleansing, working to identify and fix incorrect data, is also called ________.
data scrubbing
15. A ________ is a component in the computer system data hierarchy consists of multiple records of the same type.
file
16. Software that allows an organization to manage and provide access to data is a ________.
database management system (DBMS)
17. ____________ data management services have special appeal for Web-focused start-ups or small- to medium-sized businesses
seeking database capabilities at a lower price than in-house database products.
Cloud-based
18. Microsoft's DBMS that includes built-in report generation and reporting is called ________.
Access
19. A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to
what data.
information policy
21. A ________ is the smallest component in the computer system data hierarchy.
bit
22. A computer system organizes data in a hierarchy that starts with the ____, which represents either a 0 or a 1. Bits can be grouped to
form a _____ to represent a letter, number, or symbol.
bit, byte
24. The field that uniquely identifies a row in a relational database table is called a ________.
primary key
25. A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and
Grade A.
field
Chapter 7 Quiz
11. Corporate networks today are increasingly using a single, common, worldwide networking standard called ______________.
Transmission control protocol/internet protocol (TCP/IP)
12. A network that stretches between Paris and Rome is a(n) ________.
wide area network
14. Client/server computing is a __________ computing model in which some of the processing power is located within small,
inexpensive client computers, and resides literally on desktops, laptops, or in handheld devices.
distributed
15. The number of cycles per second that can be sent through a network medium is calculated in ________.
hertz
17. If a computer is sending a file, and a packet being sent is damaged, the ________ computer asks the ________ computer to retransmit
it.
receiving; sending
18. A(n) ________ signal is represented by a continuous waveform that passes through a communications medium.
Analog
19. No one "owns" the Internet, and it has no formal management. However, worldwide Internet policies are established by a number of
professional organizations and government bodies, including _____________________, which helps define the overall structure of the
Internet.
the Internet Architecture Board (IAB)
21. ________ are used to track movements of products through the supply chain.
RFIDs
22. A ________ links two or more computers which enable the sharing of information.
network
24. A small business that connects personal devices within a 500-meter radius is a(n) ________.
local area network
Chapter 8 Quiz
1. If someone loads a program that tracks everything you type, the specific spyware is a ________.
key logger
2. A ________ is a program that monitors information traveling over a network and ________.
sniffer; can be used for criminal purposes
3. The most commonly used authentication technique used for end users is a(n) ________.
password
4. Someone who intends to gain unauthorized access to a computer system is considered to be a ________.
hacker
5. ______________refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or
physical damage to information systems.
Security
6. If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are
________.
Phishing
7. In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.
Sarbanes-Oxley
11. A ________ is a software program that mimics another program and often causes damage.
Trojan horse
12. If someone asks you to stay home and click advertising without being interested in the product or service, they may be asking you to
commit ________.
click fraud
14. ________ deal(s) with both behavioral and technical issues regarding information systems, and focuses on the development, use, and
impact of systems by managers and employees.
Information systems (IS)
17. According to McAfee, ________ now pose the greatest security risks.
mobile devices
18. The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to
databases, with each presenting _________ challenges and vulnerabilities.
security
20. _______________ are sources of customer personal information name, address, and phone number that are key
targets for identity theft and other criminal uses.
E-commerce sites
22. MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are
disrupted.
disaster recovery planning
23. An information systems ________ examines a firm's overall security environment and determines if the organization is properly
prepared to address threats.
audit
24. ________ are data files used to identify and protect online transactions using a trusted third party.
Digital certificates