BCIS

  1. In a BPMN process diagram, all activities for a
    given role are shown in that role's ________.
    Swim lane
  2. The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources.
    Configuration control
  3. The situation that occurs when adding more
    resources creates inefficiencies is known as ________.
    Diseconomies of scale
  4. In a BPMN process diagram, a ________ represents an activity.
    Rectangle w/ rounded corners
  5. In a business process, a role refers to ________.
    A collection of activities
  6. In the SDLC, the first major task for an
    assembled project team is to ________.
    Plan the project
  7. In paired programming ________.
    Two team members share the same computer to write a computer program together
  8. The Information Systems Audit and Control Association has created a set of standard practices called ________ that are often used in the assessment stage of the BPM cycle.
    COBIT
  9. The resulting project plan from the system
    definition is the input to the second SDLC phase, which is ________.
    Requirement analysis
  10. ________ is a standard set of terms and graphical notations for documenting business processes.
    Business Process Modeling Notation
  11. Which of the following is true of information
    systems?
    Every information system has at least one application
  12. A ________ is a person who is well versed in an organization's strategy and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies.
    Business analyst
  13. A ________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function.
    Business process
  14. In BPMN, ________ depict the flow or sequence of activities in a process.
    Solid lines
  15. The rapid application development, the unified
    process, extreme programming, and Scrum are examples of ________.
    SLDC
  16. During the requirements definition stage of
    developing an information system, the project team will include mostly ________.
    Business and systems analysts
  17. In business process management, once the as-is model is created, the very next step that a team must take is to ________.
    Create system components
  18. Fixing a system so that it works correctly, or
    adapting it to changes in requirements, occurs in the ________ phase of the SDLC.
    Maintenance
  19. ________ include identifying what is to be
    produced, how frequently and how fast it is to be produced.
    Requirements
  20. The final WBS plan is denoted as the ________ WBS, and it shows planned tasks, dependencies, durations, and resource
    assignments.
    Baseline
  21. The ________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes.
    OMG
  22. The first step in the system definition phase of
    systems development is to ________.
    Determine the goals and scope
  23. Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system.
    Implementation
  24. The final phase of systems development involves ________.
    Maintaining the system
  25. A ________ shows the tasks, start and finish
    dates, and dependencies for the tasks of a project.
    Gantt chart
  26. Once we have defined a project's goals and
    scope, the immediate next step is to _______.
    Access feasibility
  27. Project teams create a ________, which is a
    hierarchy of the tasks required to complete a project.
    Work-breakdown structure
  28. An as-is model ________.
    Documents the current situation of a business process
  29. A(n) ________ is a formal description of a
    system's response to use and misuse scenarios.
    Test plan
  30. In a business process, resources are _______.
    People or computer applications that are assigned to roles
  31. The ________ is a sequence of activities that determines the earliest date by which a project will be completed.
    Critical path
  32. When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________.
    Vendor
  33. Which of the following is true about outsourcing?
    It saves both direct & indirect management time
  34. Users should not bother IS personnel for trivial
    issues, so they have a responsibility to _______.
    Learn basic computer skills
  35. Which of the following statements is true of the operations group in an organization's IS department?
    It monitors the user experience & responds to user problems
  36. Which of the following is a right of users of
    information systems?
    Receiving effective training according to their requirements
  37. ________ is the process of hiring another
    organization to perform a service.
    Outsourcing
  38. Outsourcing gathers all of the possible risks
    into the risk of choosing the right ________.
    Vendor
  39. Which of the following is NOT a function of the
    information systems department?
    Conducting external audits
  40. If the primary information systems in an
    organization support only accounting and finance activities, the CIO should most likely report to the ________.
    CFO
  41. In organizations that operate significant
    nonaccounting information systems, the chief information officer is most likely to report to the ________.
    Chief executive officer
  42. Which of the following is a function of the
    technology office in an organization's IS department?
    Investigating new IS technologies
  43. Which of the following is an outsourcing
    alternative, in which hardware and both operating system and application software are leased?
    Software as a service (SaaS)
  44. In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.
    Development
  45. A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
    System analyst
  46. In 2005, Marriott International chose Hewitt
    Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing.
    Business function
  47. The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies.
    Data administration
  48. Which of the following is a risk of outsourcing
    IS/IT functions?
    It involves the potential loss of intellectual capital
  49. Which of the following is true about the "maintenance" of information systems?
    It involves fixing problems or adapting existing systems to support new features
  50. Which of the following is an example of a company that offers SaaS?
    Salesforce.com
  51. Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.
    Information systems
  52. International outsourcing companies like Amazon.com are particularly advantageous as they provide ________.
    Customer support
  53. The responsibilities of a computer technician
    include ________.
    Installing software & repairing networks
  54. Users of smart cards are required to enter a
    ________ to be authenticated.
    Personal identification number
  55. You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
    https
  56. ________ involve the people and procedure
    components of information systems.
    Human safeguards
  57. ________ is a technique for intercepting
    computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.
    Sniffing
  58. What is a major difference between spyware and adware?
    Unlike spyware, adware does not perform malicious acts
  59. ________ is the process of transforming clear
    text into coded, unintelligible text for secure storage or communication.
    Encryption
  60. ________ are the primary means of authentication and are important not just for access to a user's computer, but also for
    authentication to other networks and servers to which the user may have access.
    Passwords
  61. A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers,
    Social Security numbers, account passwords, and so forth.
    Phisher
  62. Which of the following statements is true of
    biometric identification?
    It often faces resistance from users for its invasive nature
  63. A(n) ________ has a microchip in it to hold data.
    Smart card
  64. The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to achieve ________.
    Physical security
  65. The process of hardening is actually a _______
    safeguard.
    Technical
  66. A ________ is a type of virus that propagates
    using the Internet or other computer networks.
    Worm
  67. A ________ is a person or organization that
    seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.
    Threat
  68. ________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee
    data, and other proprietary and confidential data.
    Hacking
  69. Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
    HIPAA of 1996
  70. Which of the following is an example of a technical safeguard?
    Firewalls
  71. ________ enable you to access Web sites  without having to sign in every time.
    Cookies
  72. ________ is a staff function to the chief information officer.
    Data administration
  73. Which of the following is an example of a sniffing technique?
    Adware
  74. A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
    IDS
  75. A ________ examines each part of a message and determines whether to let that part pass.
    Packet-filtering firewall
  76. Which of the following is considered a threat
    caused by human error?
    An employee inadvertently installs an old database on top of the current one
  77. ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing
    to spy, steal and manipulate data, or other purposes.
    Usurpation
  78. _______ present the largest risk for an organization's infrastructure loss.
    Natural disaster
  79. Secure Socket Layer is also known as ______.
    Transport layer security
  80. Which of the following is true of the Secure Socket Layer (SSL)?
    It is a useful hybrid of symmetric and asymmetric encryption techniques
  81. ________ occurs through human error when
    employees do not follow proper procedures or when procedures have not been well designed.
    Incorrect data modification
  82. If a defined project is determined to be feasible in the SDLC, the immediate next step is to ________.
    Form the project team
  83. ________ set the stage for the requirements  or any information systems and applications that need to be created or adapted.
    Business process models
  84. With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.
    Parallel
  85. A ________ involves balancing of three critical factors: requirements, cost, and time.
    Trade-off
  86. According to Brooks' Law, adding more people to a late project will ________.
    Create diseconomies of scale
  87. A ________ installation is the riskiest because
    the old system is shut down and the new system is introduced.
    Plunge
  88. According to the Scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________.
    Points
  89. According to the SDLC, progress of a business process goes in a linear sequence from requirements to design to implementation. This is called the ________.
    Waterfall method
  90. Once a system has passed integrated testing, the organization installs the new system. Which term is used to refer to this activity?
    System conversion
  91. In systems development, documents, designs, prototypes, data models, database designs, working data entry screens, and the like are examples of ________.
    Deliverables
  92. The first phase of systems development involves ________.
    Defining the system
  93. Which of the following is true for the relationship between business processes and information systems?
    A business process need not relate to any information system, but an information system relates to at least one business process.
  94. The traditional technique for developing information systems is ________.
    The system development life cycel
  95. Plunge installation is sometimes called _______ installation.
    Direct
  96. What are the four dimensions of feasibility?
    Cost, schedule, technical, and organizational feasibility
  97. In BPMN diagrams, a square with a plus sign means that ____.
    An activity is independent of the process
  98. _____ are collections of related tasks that receive inputs and produce outputs
    Activities
  99. Which of the following is a form of hardware outsourcing?
    IaaS cloud hosting
  100. One of the reasons outsourcing is undertaken is to ________.
    Cap an organization's financial exposure
  101. The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.
    Chief technology officer
  102. A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
    Technical writer
  103. A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.
    Steering committee
  104. Which of the following is true about IS infrastructure?
    Changing IS infrastructure is expensive and time-consuming
  105. ____ is a form of outsourcing.
    Acquiring licensed software
  106. The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.
    Chief information officer
  107. Which of the following is a critical security function of senior management in an organization?
    Establishing the security policy and managing risk
  108. An SQL ________ occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
    Injection attack
  109. The Privacy Act of 1974 provides protection to
    individuals regarding ________.
    Records held by the U.S. government
  110. Which of the following is generally a responsibility of users of information systems?
    Following security and backup procedures
  111. Which of the following is true about users of information systems?
    They must learn standard techniques and procedures for the applications they use
  112. Which of the following is a function of the steering committee for an IS department?
    Setting IS priorities
  113. Which of the following statements is true about the steering committee of an IS department?
    Its meetings are conducted by the IS department
  114. If an organization does not develop programs
    in-house, then the development group of the IS department will be staffed primarily by ________.
    Business and systems analysts
  115. Which of the following systems procedures is specifically the responsibility of operations personnel?
    Creating back up system database
  116. A ________ is a number used to encrypt the data.
    Key
  117. ________ are viruses that masquerade as useful programs or files.
    Trojan horses
  118. In asymmetric encryption, each site has a ________ for encoding messages.
    Public key
  119. In a locked room, maintaining the computers of an organization that run the DBMS is a part of ________.
    Physical security procedures
  120. In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
    Manufacturing
  121. Which of the following is true about the changes and developments foreseen for 2023?
    Most organizations will more their internal hardware infrastructure into the cloud
  122. As an IS user, you have a right to a secure computing environment. This means that ________.
    The organization should protect your computer and its files
  123. Organizational feasibility concerns whether the
    new system aligns with ________.
    Legal requirements
  124. Which of the following statements about human safeguards for employees is true?
    Users' computer accounts should give users the least possible privilege necessary to perform their jobs
  125. ________ protect databases and other organizational data.
    Data safeguards
  126. Which of the following is used for biometric authentication?
    Facial features
  127. ________ are false targets for computer criminals to attack.
    Honeypots
  128. Which of the following would be the most disruptive to an organization when implementing an information system?
    Changing reporting relationships
  129. Abstract reasoning is the ability to ______.
    Make and manipulate models
  130. Which of the following is the least critical aspect of good information?
    Additional data
  131. The five-component framework considers individuals who maintain the data and who support the networks of computers as ______ components.
  132. You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is _______.
    Inaccurate
  133. _____ states that the number of transistors per square inch on an integrated chip doubles every 18 months.
    Moore's Law
  134. Which of the following components in the five-component model of information system is considered an actor?
    Hardware
  135. The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the details of each invoice drawn up in the previous quarter. This information is not good because it is ________.
    More that what is required
  136. Which of the following is true about the quality of information?
  137. The storage disk in your computer is an example of the _____ component of information systems.
    Hardware
  138. Which of the following is a common description of information?
    Knowledge derived from data
  139. Vera wants to create a password. Which one is the strongest?
    NOOCSmypw$42
  140. Which of the following types of skills is most likely be outsourced to the lowest bidder?
    Accounting skills
  141. Which of the following is a major implication of Moore's Law?
    Costs of data communications and storage have become very low
  142. Which of the following statements is true of good information?
    Good information should be based on correct and complete data
  143. Which of the following is a component of an information system, but not of information technology?
    People
  144. Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
    Buying and installing new computers in the new outlets
  145. You follow certain steps to access the supplementary readings for a course when using your organization's library management system. These steps that you follow are examples of the________ component of an information system.
    Procedure
  146. Which of the following components of information system is the easiest to change and causes the least amount of organizational disruption when changed?
    Hardware
  147. Glazer & Hicks is a firm that offers enterprise software solutions to independent retailers. The firm recently bagged a contract from a major national retail chain to develop and implement proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?
    Training the employees to use and manage the new system
  148. Identify how information technology differs from information systems.
    You can buy information technology, but not information systems
  149. According to the five-component model of information systems, the ______ component function as instructions for the people who use the information system
    Procedure
  150. You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.
  151. ____ is the activity of two or more people working together to achieve a common goal, result, or work product.
    Collaboration
  152. Good information must be _____.
    Relevant
  153. The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.
    Data
  154. Which of the following statements regarding information technology (IT) is true?
    Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information.
  155. The words that you type in a MS Word document is an example of ______.
    Data
  156. Which of the following is a valid guideline for maintaining good password etiquette?
    Never ask someone else for their password
  157. Which of the following is a low-tech information system?
    A file of email addresses stored in an email program
  158. Which of the following is a non routine cognitive skill?
    System thinking ability
  159. Which of the following ratios has fallen as a result of Moore's Law?
  160. You have a spreadsheet that provides the airfares to different cities from New York. If this is used to make a decision, it will be considered as ________.
    Data
  161. Which of the following components constitute the computer side of information systems?
    Hardware and software
  162. An operating system like Windows or Linux is an example of the ________ component of an information system.
    Software
  163. You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.
    Irrelevant
  164. Which of the following is the best description of data?
    Recorded facts or figures
  165. Kerin is a business student interning at Benson and Hodgson, a firm specializing in exports of sophisticated equipment to other countries. She finds that she is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that she lacks ________ skills.
    Abstract reasoning
  166. Which of the following is a critical characteristic of good information?
    Accuracy
  167. Which of the following components constitute the human side of information systems?
    People and procedures
  168. You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill.
    Systems thinking
  169. The process of automation is a process of moving work from ________.
    Human side to computer side
  170. Adobe Acrobat is an application that allows users to create and edit digital documents. Adobe Acrobat is an example of a ________.
    Software
  171. Identify how information technology differs from information systems.
  172. A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
    Systems thinking
  173. As the IT manager of your organization, you need to use a coworker's account to access some information. In keeping with password etiquette, how would you go about getting his password?
    You ask the coworker to type in the password where required, while you look away
  174. The hardware components of an information system will act as a(n) ________.
    Actor on the computer side
  175. A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________ component.
    Data
  176. The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.
    Irrelevant
  177. Which among the following is the most appropriate technique for creating memorable, strong passwords?
    Base your password on the first letter of the word in a phrase
  178. The use of a conference call is an example of ________ communication.
    Synchronous
  179. The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
    Strategic
  180. Which of the following is an example of a strategic decision?
    Deciding to open a centralized distribution system
  181. Version-management systems ________.
    Track changes to shared documents
  182. Which of the following alternatives for sharing content provides version control?
    Microsoft SharePoint
  183. Collaboration occurs when a number of people ______.
    Work together to achieve a common goal
  184. A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________phase of project management.
    Planning
  185. Being ________ is one of the most important characteristics of an effective collaborator.
    Able to give negative feedback
  186. Who is most likely to use asynchronous communication?
    Members of a team who work in different time zones
  187. One of the procedures of a collaboration project is task status reporting. This is performed in the _____ phase of the project.
    Doing
  188. ______ communication occurs within a team when all team members meet at the same time.
    Synchronous
  189. Which of the following questions is best answered through unstructured decision making?
    Should we continue to outsource our bookkeeping process?
  190. Which of the following is a feature of Microsoft Lync?
    Multi-party text chain
  191. _____ decisions are decisions that support day-to-day activities
    Operational
  192. Which of the following is a comprehensive tool for content sharing?
    SharePoint
  193. Identify the project management phase in which the tasks of a project are performed.
    Doing
  194. The main purpose of the planning phase in a project is to ________.
    Determine who will do what and by when
  195. A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following is lacking in this activity?
    Collaboration
  196. A project manager has to manage tasks and budgets and solve problems during the ________ phase of project management.
    Doing
  197. Andrea, the floor supervisor at a call center, calls Bryan, a call attendant, to her office. She reports observing a few critical omissions in his calls, a finding supported by recent customer surveys. Bryan feels that Andrea is just throwing her weight around. Which of the following is a valid observation of this scenario?
    Bryan needs to learn to receive feedback
  198. With version-control systems, shared documents are placed into shared directories called ______.
    Libraries
  199. Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function?
    Finalizing
  200. Asynchronous communication occurs when team members________.
    Do not meet at the same time
  201. A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making.
    Unstructured
  202. ________ decisions are the most structured and have very little need for collaboration.
    Operational
  203. Identify the least important characteristic for an effective collaborator.
    Being an experienced businessperson
  204. An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.
    Structured
  205. ________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.
    Version control
  206. Which of the following is a primary purpose of collaboration?
    Becoming informed
  207. _____ is a popular commercial webinar product used in virtual sales presentations.
    WebEx
  208. The fundamental purpose of the starting phase of a project is ______.
    Setting the ground rules for the collaboration
  209. Which of the following information system requirements fall into the content sharing category?
    Tracking versions of many documents
  210. The decisions about team members' roles and authorities is made during the _____ phase of a project.
    Starting
  211. Project metadata is data that is ________.
    Utilized to manage the project
  212. Which of the following observations about the relationship between decision type and decision process is true?
    The higher levels of decision making are associated with unstructured decision processes
  213. Which of the following statements is true about working with Google Drive?
    Google tracks document revisions, with brief summaries of changes made
  214. An organization defines the rules that govern a project that it needs to undertake and the people who should perform the tasks. The project is in the ________ phase of project management.
    Finalizing
  215. The need for collaboration is greatest for ________ decisions.
    Strategic
  216. Which of the following decisions is least likely to involve collaboration?
    How much of product A should be ordered from vendor B
  217. The term ________ refers to a collaboration tool where team members can easily respond and the management can easily identify the people who have not responded to a request.
    Wikis
  218. Which of the following is a key difference between strategic decisions and managerial decisions?
    Managerial decisions concern allocation and utilization of resources, whereas strategic decisions concern organizational issues.
  219. Using a standardized procedure to calculate the incentives of employees is an example of a(n)________ decision.
    Structured
  220. Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.
    Managerial
  221. Which of the following is a reason why discussion forums are better than emails in asynchronous communication?
    They keep the discussion from getting off track
  222. According to Hackman, which of the following is a primary criterion for judging team success?
    Growth in team capability
  223. Which of the following collaboration activities is mainly concerned with content sharing rather than communication?
    Iteration
  224. Which of the following tools facilitates asynchronous communication?
    Discussion forum
  225. Project data is data that is ________.
    Part of the collaboration's work product
  226. Which of the following is an example of project data?
    Design document
  227. Project leaders have to take decisions on the allocation and utilization of materials and labor. Such decisions are called ________ decisions.
    Managerial
  228. A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
    Inbound logistics
  229. According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market?
    Military services
  230. According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?
    A firm that sells the only drug used for a disease
  231. Which of the following is a support activity in the value chain?
    Setting up contractual arrangements for procurement
  232. Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?
    Customer service
  233. Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
    Inbound logistics
  234. Which of the following principles of competitive advantage is associated with product implementations?
    Differentiating service offerings
  235. The difference between the value that an activity generates and the cost of the activity is called the ________.
    Margin
  236. ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC Motors is characterized by ________.
    High bargaining power over its suppliers
  237. Porter's five forces model is used to assess ________.
    Industry structure
  238. Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
    Outbound logistics
  239. Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
    Outbound logistics
  240. According to Porter's model of business activities, interactions across value activities are called ________.
    Linkages
  241. The difference between the total value added and the total costs incurred is called the ________ of the value chain.
    Total margin
  242. A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________.
    Establishing alliances
  243. A ________ is a collection of something, such as data and raw materials.
    Repository
  244. Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
    Switching costs
  245. RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than its competitors and uses tamperproof containers to ship its products. RedDart distinguishes itself from competitors by ________.
    Providing an enhanced service
  246. According to Porter's five forces model, in which of the following situations would the suppliers have the highest bargaining power?
    A single vendor providing raw materials to many department stores
  247. A group of grain farmers in a surplus year will have reduced ________.
    Bargaining power
  248. Which of the following principles of competitive advantage is related to process implementations?
    Locking in suppliers
  249. Porter defined value as the ______.
    Amount of money that a customer is willing to pay for an offering
  250. Focused differentiation occurs when ________.
    A better product is provided within an industry segment
  251. Organizations can lock in suppliers by making it difficult to switch to another organization or by ________.
    Making it easy to work with the organization
  252. PowerCruise, a holiday cruise firm, recently offered its existing customers, who had registered for a two-year membership, an extension of six months to their membership without any additional charges. By doing this, which competitive strategy did PowerCruise implement?
    Locking in customers
  253. According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?
    Southwest Airlines
  254. Which of the following value chain activities involves transforming raw materials into a finished product or service?
    Operations
  255. A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. The strategy used is ________.
    Switching cost strategy
  256. N-joi Ice Cream recently faced competition against their flagship brand of "black currant ice cream." The competitor made significant in-roads into this market by offering three varieties of "black currant ice cream." N-joi decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is N-joi implementing?
    Product differentiation
  257. Which of the following statements is consistent with the central idea of business process design?
    Organizations should create new business processes rather than improve existing systems.
  258. Bargaining power of customers is likely to be the highest for markets involving ________.
    Industrial products
  259. A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.
    Low threat of substitutions
  260. Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?
    Sales and marketing
  261. Which of the following is a primary activity in the value chain?
    Receiving and disseminating inputs to the product
  262. A database is an example of a ________.
    Repository
  263. Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz has ________.
    Created an entry barrier
  264. The automobile industry is characterized by many manufacturers and intense competition among them. This statement illustrates ________.
    High levels of rivalry
  265. Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-enabled games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing?
    Product differentiation
  266. A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
    Business process
  267. July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing?
    Locking in customers
  268. In a manufacturing business, the ________ transforms finished goods into cash.
    Sales process
  269. ________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.
    Business process design
  270. Reduction in production cost results in ______.
    Increased profitability
  271. Focused cost leadership is observed when a product has the lowest cost ________.
    Within an industry segment
  272. An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that?
    Establishing alliances
  273. The cost of the business process is the sum of the cost of the inputs and the ________.
    Cost of the activities
  274. An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________.
    Industry-wide differentiation
  275. Mae manages delivery at a custom-kitchen outlet. Based on her customer's feedback, she contacts Gem Cabinets and places an order for a full-motion wall mount. Which of the following primary activities is Mae performing here?
    Inbound logistics
  276. Which of the following factors determines the structure, features, and functions of an information system used in a company?
    The competitive strategy
  277. Which of the following devices is an example of a storage hardware device?
    Optical disk
  278. Main memory is also known as ________.
    Random access memory
  279. A spreadsheet program is an example of a(n) ________.
    Horizontal-market application software
  280. Which of the following statements is true of closed source projects?
    Only trusted programmers are allowed to make changes to a closed source project
  281. When you buy an operating system for your personal computer, you are actually buying a software ________.
    License
  282. 10 TB is equivalent to ______ gigabytes
    10,240
  283. Linux applications are developed using ________.
    Java
  284. Which of the following is the operating system designed by Apple?
    Mac OS
  285. A ________ is equivalent to 1,024 bytes.
    Kilobyte
  286. Which of the following is a nonvolatile memory device?
    Optical memory device
  287. Programs that perform business functions, such as general ledger and accounting, are known as ________.
    Application software
  288. Mac OS and iOS applications are constructed using _______.
    Objective C
  289. Which of the following is an output device?
    Projector
  290. Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.
    PC virtualization
  291. Which of the following terms refers to a collection of servers?
    Server farm
  292. Which of the following is an example of an application program?
    Microsoft Word
  293. A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access.
    Mobile device
  294. A user interface (UI) is the ________ format of an application.
    Presentation
  295. Which of the following is an advantage to the organization, if its BYOD policy offers wireless network to mobile devices?
    The organization can sniff employee's mobile traffic
  296. Thin-client applications are limited by the capabilities of the ________.
    Browser
  297. The term "open source" means that the source of the code of the program is ____.
    Available to the public
  298. Linux is an example of a(n) ____.
    Open source operating system
  299. Thin-client applications are developing using ___.
    HTML5
  300. Bits are grouped into 8-bit chunks called ____.
    Bytes
  301. Machine code ________.
    Cannot be modified by humans
  302. Which of the following terms refers to the process of a single server hosting many versions of desktop operating systems?
    Desktop virtualization
  303. With ________, a computer, such as a desktop or portable computer, hosts several different operating systems.
    PC virtualization
  304. Which of the following is a function of an application program?
    Accessing a customer database
  305. ________ is installed in special, read-only memory in devices like printers or communication devices.
    Firmware
  306. Bits are used for computer data because they ________.
    Are easy to represent electronically
  307. Server application programs are programs that ________.
    Are processed on server computers
  308. An application that requires support beyond a browser on the user's computer is known as a(n) ________.
    Thick-client application
  309. ________ is data delivered to the user at the precise time it is needed.
    Just-in-time data
  310. Which of the following memory devices is volatile in nature?
    Cache
  311. Which of the following is an example of an open source operating system?
    Ubuntu
  312. Android applications are developed using _______.
    Java
  313. Which of the following is an open source browser?
    Firefox
  314. ________ is a version of Unix that was developed by an open source community.
    Linux
  315. To run a program or process data, the computer first transfers the program or data from disk to the ________.
    Main memory
  316. Which of the following is an example of a closed source project?
    Microsoft Office
  317. A client-server application that nothing more than a browser is called a ________.
    Thin-client application
  318. Which of the following statements is true of firmware?
    Users do not need to load firmware into a device's memory
  319. ________ occurs when users move their activities, especially long-running transactions, across devices.
    Roaming
  320. When using volatile memory, the ________.
    Contents are lost when power is off
  321. DenTimes, a software package for dentists, is an example of a ________.
    Vertical-market application software
  322. Which of the following is an example of a vertical-market application software?
    Inventory tracking software for an auto manufacturer
  323. Which of the following is an input hardware device?
    Bar code scanner
  324. ________ install and update software, back up and restore mobile devices, wipe software and data from devices in the event the device is lost or the employee leaves the company, report usage, and provide other mobile device management data.
    MDM software
  325. In a data model, a(n) ________ is something that a user wants to track.
    Entity
  326. Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.
    Development
  327. A ________ is a collection of forms, reports, queries, and programs that process a database.
    Database application
  328. From among the following, identify the open source DBMS product.
    MySQL
  329. Which of the following types of DBMS products is designed for smaller and simpler database applications?
    Personal DBMS
  330. Which of the following is a nonrelational data store developed by Amazon?
    Dynamo
  331. A(n) ________ is a program used to create, process, and administer a database.
    DBMS
  332. ________ is an example of a personal DBMS.
    Access
  333. When you modify or delete data present in a database, you are ________.
    Processing the database
  334. In a database, when data items disagree with one another, this leads to a(n) _______.
    Data integrity problem
  335. Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________.
    Entities
  336. A ________ is a request for data from a database.
    Query
  337. Which of the following data elements is placed higher than records in the data hierarchy?
    File
  338. A(n) ________ DBMS is designed to process large organizational and workgroup databases.
    Enterprise
  339. A data integrity problem will occur only if ________.
    Data are duplicated
  340. Which of the following is a nonrelational data store developed by Google?
    Bigtable
  341. Which of the following is the smallest data element in a database?
    Byte
  342. A primary key used in a database is a _____.
    Column or group of columns that identifies a unique row in a table
  343. Which of the following is a valid observation of MySQL?
    It is license-free for most application
  344. The purpose of a(n) ________ is to keep track of things.
    Database
  345. Which of the following is an example of an enterprise DBMS?
    SQL Server
  346. Which of the following is true about the database development process?
    Changing a relationship from 1:N to N:M is simply a matter of changing the notations
  347. Entities in a data model have _____ that describe the characteristics of the entity.
    Attributes
  348. A database design team transforms entities into tables and expresses relationships by defining ________.
    Foreign keys
  349. Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.
    Query
  350. Identify the first step in transforming a data model into a relational database design.
    Creating a table for each entity
  351. A ________ describes the data and relationships that will be stored in a database.
    Data model
  352. Which of the following database administration tasks is related to adaptation?
    Managing configuration changes in systems
  353. ________ is the process of converting a data model into tables, relationships, and data constraints.
    Database design
  354. When using the relational model to represent data, one must ________.
    Add a foreign key to one of the tables
  355. In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required.
    Vertical bar
  356. A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
    N:M
  357. An organization buys a proprietary database application to be used by a small workgroup of five people. This is an example of a(n) ________ DBMS.
    Personal
  358. The database administrator of an organization constantly manages the processing rights and responsibilities of employees. This is an example of a(n) ________ task.
    Operational
  359. A data model is a ________.
    Logical representation of database data
  360. Every table in a normalized database has ________.
    Single theme
  361. Which of the following is true of N:M relationships?
    They can have more than one entity on each side of the relationship
  362. Which of the following is a nonrelational data store developed by Facebook?
    Bigtable
  363. ________ forms are used to read, insert, modify, and delete data.
    Data entry
  364. Metadata are ____.
    Data that describes data
  365. The rows in a database are called ________.
    Records
  366. Which of the following is an example of a database management system?
    Access
  367. The forked lines on the right side of a line on an diagram that indicates a 1:N relationship between two entities is referred to as ________.
    Kerberos
  368. An administrator should create ________ before developing a database design.
    Data model
  369. Which of the following is a developmental task of database administration?
    Creating and staffing the DBA function
  370. Minimum cardinalities in an E-R diagram refer to the minimum number of entities required in a(n) ________.
    Relationship
  371. ________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
    Users
  372. What are the three tiers in three-tier architecture?
    User, server, and database
  373. A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.
    Switch
  374. ________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.
    Cable
  375. A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.
    Router
  376.  A(n) ________ is a piece of a message that is handled by programs that implement IP.
    Packet
  377. A(n) ________ is a number that identifies a particular device.
    IP address
  378. A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.
    HTML tag
  379. For a printer or laptop to connect to a wireless LAN, it must have a ________.
    WNIC
  380. A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
    Network
  381. A ________ is a worldwide-unique name that is affiliated with a public IP address.
    Domain name
  382. Which of the following TCP/IP application-layer protocols is used for email transmission?
    SMTP
  383. The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.
    IP
  384. ________ is the most common language for defining the structure and layout of Web pages.
    HTML
  385. Which of the following is true of DSL modems?
    DSL modem signals do not interfere with telephone signals
  386. Which of the following is the most basic cloud offering?
    IaaS
  387. The IEEE 802.3 protocol standard is also known as ________.
    Ethernet
  388. The organization responsible for assigning public IP addresses is called ________.
    ICANN
  389. Which of the following statements is true about the IEEE 802.11 protocol?
    It allows speeds of up to 600 Mbps
  390. Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?
    FTP
  391. A private internet that is used exclusively within an organization is called a(n) ________.
    Intranet
  392. The top layer of TCP/IP Protocol architecture is related to ________.
    Applications
  393. To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.
    Layered protocol
  394. ________ is a wireless protocol designed for transmitting data over short distances, replacing cables.
    Bluetooth
  395. ________ typically have transmission speeds less than 56 Kbps.
    Narrowband lines
  396. ________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
    Web servers
  397. Which of the following statements is true about IEEE 802.3?
    It is the protocol for wired LAN connections
  398. Which of the following is the most common format for IP addresses?
    IPv4
  399. Communications speeds are expressed in ____.
    Bits
  400. Communications speeds are expressed in _____.
    Hyperlink
  401. A(n) ________ uses the Internet to create the appearance of private point-to-point connections.
    VPN
  402. Compared to in-housing hosting, cloud-based hosting _____.
    Minimizes the risk of investing in technology that will soon become obsolete
  403. A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services?
    PaaS
  404.  In cloud computing, resources are said to be "pooled" because ________.
    Organizations share the same physical hardware through virtualization
  405. Amazon S3 (Simple Storage Service) is an example of ________.
    IaaS
  406. An HTML document has a(n) ________ that provides metadata about the page.
    Heading
  407. Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?
    The cloud
  408. A ________ is a set of rules that programs on two communicating devices follow.
    Protocol
  409. Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?
    HTTP
  410. An ________ and its value indicate which Web page is to be displayed when a user clicks on a link.
    href
  411. Which of the following is true about a VPN?
    It encrypts messages to ensure secure transmissions
  412. Which of the following is an example of IaaS?
    Amazon EC2
  413. Computers that reside in different geographic locations are connected using a(n) ________.
    WAN
  414. Which of the following is a function of an ISP?
    It serves as a gateway to the Internet
  415. Which of the following is an example of a PaaS?
    Oracle on Demand
  416. Which of the following protocols guarantees secure data transmission?
    HTTPS
  417. Most LAN connections are made using ________.
    UTP cable
  418. Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?
    Training employees on the successful use of the new system
  419. Which ERP vendor acquired PeopleSoft and Siebel?
    Oracle
  420. Which of the following is a characteristic of dynamic processes?
    They are adaptive processes that change structure rapidly and readily
  421. The information system that a restaurant uses to order supplies and ingredients from its suppliers is an example of a(n) ________.
    Inter-enterprise information system
  422.  Which of the following statements is true of enterprise application integration?
    It connects system "island" via a new layer of software
  423. Which of the following workgroup processes is related to customer service?
    Accounting tracking
  424. ________ refers to a person's belief that he or she can be successful at his or her job.
    Self-efficacy
  425. The inherent processes defined in an ERP solution are known as ________.
    Process blueprints
  426. ________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
    Enterprise resource planning
  427.  Enterprise application integration is ________.
    A suite of software application that consolidates existing systems by providing layers of software that connects applications together
  428. Which of the following workgroup processes is related to sales and marketing?
    Lead tracking
  429. The major benefit of enterprise application integration is that it ________.
    Enables organization to use existing applications
  430. ________ is a measure of the ratio of process outputs to inputs.
    Process efficiency
  431. ________ are predesigned procedures for using software products.
    Inherent processes
  432. Process ________ is a measure of how well a process achieves organizational strategy.
    Effectiveness
  433. The two dimensions of process quality are ________.
    Efficiency and effectiveness
  434. To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.
    Industry-specific soultions
  435. When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is ________.
    Developing committees and steering groups
  436. ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category?
    Steps for using the application to accomplish the activities in processes
  437. Which of the following statements about a structured inter-enterprise information system is true?
    Its procedures are formalized and the problem solutions affect multiple organizations
  438. ________ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.
    Customer relationship management
  439. ________ is an example of an inter-enterprise information system.
    PRIDE
  440. Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product?
    Relationship management
  441. ________ processes span an organization and support activities in multiple departments.
    Enterprise
  442. ________ are flexible, informal, and adaptive processes that normally involve strategic and less specific managerial decisions and activities.
    Dynamic processes
  443. ________ is a major task when implementing enterprise systems.
    Gap identification
  444. A stored procedure is a ________.
    Computer program stored in a database that is used to enforce business rules
  445.  Which of the following information systems minimizes data duplication among departments?
    Enterprise information systems
  446. A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise.
    Trigger
  447. ________ is one of the SOA protocols.
    OData
  448. Which of the following is an example of a structured process?
    Purchasing raw materials
  449. ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________.
    Train the trainer
  450. The four major ERP products of ________ are AX, Nav, GP, and Solomon.
    Microsoft Dynamics
  451. Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects?
    Marketing
  452. ERP vendor Infor acquired which of the following ERP products?
    Baan
  453. Which of the following is true of SOA?
    It enables the requesting and releasing of cloud resources.
  454. ________ is the activity of altering and designing business processes to take advantage of new information systems.
    Business process reengineering
  455. _______ are formally defined, standardized processes that involve day-to-day operations.
    Structured processes
  456. Which of the following workgroup processes is related to human resources?
    Assessment
  457. The primary purpose of an ERP system is _____.
    Integration
  458. Which of the following conditions exists when data are isolated in separated information systems?
    Information silo
  459. Which of the following is an example of a dynamic process?
    Nike uses Facebook and Twitter to generate buzz about its new line of running shoes
  460. The top two ranked ERP vendors are ________.
    Oracle and SAP
  461. Which of the following workgroup processes is related to manufacturing?
    Planning and scheduling
  462. Which of the following statements is true regarding workgroup information systems?
    They support 10 to 100 users
  463. Information systems improve process quality by ________.
    Controlling process flow
  464. Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
    Sponsors
  465. ________ is the application of social media to facilitate the cooperative work of people inside organizations.
    Enterprise 2.0
  466. The Web 2.0 business model relies on _______for revenue.
    Advertising
  467. To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.
    Strength of a relationship
  468. Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?
    Possibility of error
  469. Highest advertising revenue is generated from ________.
    Mobile users
  470. A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.
    Defenders-of-belief
  471. According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
    Social capital
  472. ________ measures the frequency that someone who clicks on an ad makes a purchase, Likes a site, or takes some other action desired by the advertiser.
    Conversion rate
  473. Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
    Extensions
  474. Deleting problematic content on social networking sites is best reserved for when ________.
    The content is obscene and inappropriate
  475. When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.
    Social
  476. Web 2.0 companies provide software _______.
    As a free service
  477. A(n) ________ is a person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
    Key user
  478. Defenders-of-belief communities facilitate activities like ________.
    Sales and marketing
  479. Which of the following best represents the value of social capital?
    Number of Relationships X Relationship Strength X Entity Resources
  480. Web 2.0 as Web-delivered services and content that are paid for by ________.
    Advertising
  481. A characteristic of Web 2.0 is that the value of a Web site increases ________.
    With the number of users
  482. A ________ is content structure that has emerged from the processing of many user tags.
    Folksonomy
  483. The first step that any hypersocial organization should take is to develop and publicize a(n) ________ policy.
    Social media
  484. Which of the following revenue model is followed by companies providing Web 2.0 services?
    Pay per click
  485. Which of the following is a significant risk of using social media for inbound and outbound logistics?
    Loss of privacy
  486. ________ is the essence of SM relationships.
    User-generated content
  487. Which of the following observations is true about a hypersocial organization?
    It creates relationships in which both parties perceive and gain value
  488. Which of the following statements is true of defenders-of-belief communities?
    They seek conformity and want to convince others of the wisdom of their belief
  489. Emergence in the context of management means loss of control of ________.
    Employees
  490. Which of the following is true of the model of social media developed by Gossieaux and Moran?
    It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.
  491. Which of the following activities would seekers of the truth facilitate?
    Operations
  492. ________ differentiates SMIS from Web site applications.
    Connection data
  493. Social capital depreciates, but such depreciation can be ameliorated by ________.
    Adding something of value to the interaction
  494. Being linked to a network of highly regarded contacts is a form of ________.
    Social credential
  495. SM communities differ from communities in the past because SM communities are ________.
    Formed based on mutual interests
  496. ________ is the use of information technology to support the sharing of content among networks of users.
    Social media
  497. ________ is data and responses to data that are contributed by users and SM sponsors.
    Content data
  498. A ________ is an inducement for passing the message along through the tiers.
    Viral hook
  499. In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.
    Authoring
  500. Which of the following is an SM application provider?
    LinkedIn
  501. According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.
    Seekers of the truth
  502. The primary risk of peer-to-peer support is ________.
    Loss of control
  503. According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component.
    Signals
  504. If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.
    Leave it
  505. A student invests money and time in taking a business administration course. In this example, the student invests in ________.
    Human capital
  506. Which of the following describes the meaning of "sense" activity, in the SEAMS dynamic process?
    The communities which are important to a person
  507. Which of the following is one of the main principles used by companies implementing Web 2.0 to attract viewers?
    Free content
  508. Web 2.0 encourages ________, which occur when the output from two or more Web sites is combined into a single user experience.
    Mashups
  509. A social media policy is a statement ________.
    That delineates employee's rights and responsibilities
  510. Responding to problematic content on social networking sites is best reserved for when ____.
    The problematic content has caused the organization to do something positive as a result
  511. In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y," or "If they're buying Y, sell them X."
    Cross-selling
  512. OLAP stands for ________.
    Online analytical processing
  513. KM benefits organizations because it ________.
    Enables employees and partners to work smarter
  514. In market-basket terminology, ________ describes the probability that two items will be purchased together.
    Support
  515. Which of the following statements is true about reporting applications?
    Two important reporting applications are RFM analysis and OLAP
  516. Which of the following is a basic operation used by reporting tools to produce information from data?
    Calculating
  517. Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor.
    Curse of dimensionality
  518.  Which of the following shows the products that customers tend to buy together?
    Market-basket analysis
  519. ________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.
    RFM
  520. Which of the following is fundamental category of BI analysis?
    Data mining
  521. A sales report that is current, as of the time the user accessed it on a Web server, is an example of a(n) ________.
    Dynamic report
  522. BI servers use ________ to determine what results to send to which users and on which schedule.
    Metadata
  523. ________ is a hierarchical arrangement of criteria that predict a classification or a value.
    A decision tree
  524. With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.
    Supervised data mining
  525. The ________ is the most popular BI server today.
    Microsoft SQL Server Report manager
  526. Which of the following statements is true about data marts?
    Data marts address only a particular component or functional area of business
  527. With ________, statistical techniques can identify groups of entities that have similar characteristics.
    Cluster analysis
  528. ________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.
    Content Management Systems (CMS)
  529. A data ________ is a data collection, smaller than the data warehouse, that addresses a particular department or functional area of the business.
    Mart
  530. Which of the following terms is used as a synonym for data mining?
    Knowledge discovery in database
  531. Which of the following is an example of a measure in an OLAP report?
    Average cost
  532. Which of the following observations about RFM and OLAP reports is true?
    OLAP reports are more dynamic than RFM reports
  533.  Ajax is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.
    511
  534. A ________ takes data from the data manufacturers, cleans and processes the data, and then stores it.
    Data warehouse
  535. Which of the following is an example of a supervised data-mining technique?
    Regression analysis
  536. ________ attempt to directly capture employee expertise.
    Expert systems
  537. Problematic operational data are termed ________.
    Dirty data
  538. ________ is the application of social media and related applications for the management and delivery of organizational knowledge resources.
    Hyper-social knowledge management
  539. U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?
    SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
  540. The viewer of an OLAP report can change its format. Which term implies this capability?
    Online
  541. The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format.
    Dynamic
  542. Which of the following observations concerning expert systems is true?
    These systems encode human knowledge in the form of "If...Then" rules.
  543. ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
    Data mining
  544. ________ is defined as information containing patterns, relationships, and trends of various forms of data.
    Business intelligence
  545. Which of the following accurately defines a dimension in an OLAP report?
    It is a characteristic of measure
  546. ________ is a term that refers to the level of detail represented by the data.
    Granularity
  547. Because of the various problems with operational data, large organizations choose to extract operational data and store them into a(n) ________.
    Data warehouse
  548. ________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.
    Knowledge management
  549. An OLAP report has measures and dimensions. Which of the following is an example of a dimension?
    Sales region
  550. An ________ and an OLAP report are the same thing.
    OLAP cube
  551. Which of the following statements is true about operational data?
    Purchased operational data often contains missing elements.
  552. Which of the following is true of source data for a BI system?
    It refers to data that the organization purchases from data vendors.
  553. A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.
    113
  554. Data ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
    Acquisition
  555. How should a sales team respond to a customer who has an RFM score of 545?
    The sales team should let go of this customer; the loss will be minimal.
  556. In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________.
    Lift
  557. ________ requires the user to request BI results.
    Pull publishing
  558. Which of the following is true about knowledge management (KM)?
    KM boosts revenues by getting products and services to market faster.
Author
malpal84
ID
271829
Card Set
BCIS
Description
BCIS
Updated