Management Information Systems

 Management Information Systems

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Changing and manipulating the data in an information system is called ________.  

Select one:
 Correct

Feedback

Question 50

Answer saved
Marked out of 1.00
Flag question

Question text

An expert system uses a(n), which is a collection of facts and the relationships among them.

Question 48

Answer saved
Marked out of 1.00
Flag question

Question text

A _____ is a type of malware that spreads in a network without human intervention.
Select one:

Question 49

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: A firm gains bargaining power with a supplier when the firm has many competitors.

Question 47

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: An exchange is an extranet for organizations that offer for sale and bid on products and services of a particular type.

Question 46

Answer saved
Marked out of 1.00
Flag question

Question text

The developers of ______ can obtain the source code free of charge, usually on the web.
Select one:

Question 45

Answer saved
Marked out of 1.00
Flag question

Question text

Which of the following conditions must exist for an information system to be a strategic information system?

Select one:

Question 44

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: New processor-making technologies let engineers increase the processing speed of computers while enabling computers to use less energy and give off less heat.

Question 43

Answer saved
Marked out of 1.00
Flag question

Question text

can be rewritten and hold its content without electric power. 

Question 42

Answer saved
Marked out of 1.00
Flag question

Question text

_____ is a set of disks that is programmed to replicate stored data to provide a higher degree of reliability.
Select one:

Question 41

Answer saved
Marked out of 1.00
Flag question

Question text

is a calculation of the difference between the stream of benefits and the stream of costs over the life of the system, discounted by the applicable interest rate.

Question 40

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: The developers of proprietary software make the source code of their software public.

Question 39

Answer saved
Marked out of 1.00
Flag question

Question text

A(n)consists of one or more rigid platters installed in the same box that holds the CPU and other computer components, or attached externally to the computer, usually through a USB port.  

Question 38

Answer saved
Marked out of 1.00
Flag question

Question text

The CPU and primary memory are usually plugged into a circuit board in the computer case called the ______.
Select one:

Question 37

Answer saved
Marked out of 1.00
Flag question

Question text

receive records of routine business transactions—such as the purchase of raw materials or services, or the sale of manufactured goods.

Question 36

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: The fact that countries have different laws has little impact on global business in general, and on e-commerce in particular.

Question 35

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: The larger the number of companies competing within an industry, the better off each company is.

Question 34

Answer saved
Marked out of 1.00
Flag question

Question text

_________ refers to an organization's initiative of adding to a product or service to increase its value to the consumer.
Select one:

Question 33

Answer saved
Marked out of 1.00
Flag question

Question text

The meaningful information gleaned from data warehouses using software tools is referred to as ____.
Select one:

Question 32

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: Thinking globally and acting locally are ideas that contradict each other.

Question 31

Answer saved
Marked out of 1.00
Flag question

Question text

A person who holds the position ofmust have both technical understanding of current and developing information technologies and business knowledge.

Question 30

Answer saved
Marked out of 1.00
Flag question

Question text

Coding a message into a form unreadable to an interceptor is called ____.
Select one:

Question 29

Answer saved
Marked out of 1.00
Flag question

Question text

__________ help to find the populations and regions that are most likely to purchase a new product or service.
Select one:

Question 28

Answer saved
Marked out of 1.00
Flag question

Question text

receive signals from outside the computer and transfer them into the computer.  

Question 27

Answer saved
Marked out of 1.00
Flag question

Question text

A company achievesby using strategy to maximize its strengths, resulting in a competitive advantage.

Question 26

Answer saved
Marked out of 1.00
Flag question

Question text

Business intelligence applications access large pools of data, usually transactional records stored in large databases called _______.
Select one:

Question 25

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: With encryption, the original, unencrypted message is called ciphertext.

Question 24

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: The permissive model of software licensing permits anyone to use, modify, and make applications with the code, but not to use it in proprietary products for sale or licensing.

Question 23

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: Designing a website for an international audience usually requires less planning than a national one.

Question 22

Answer saved
Marked out of 1.00
Flag question

Question text

Since ________ reduces the amount of paper in organizations, some of its most enthusiastic adopters are companies in paper-intensive fields such as law, retail, insurance, and banking.
Select one:

Question 21

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: An alliance can be created to enable customers to use the same technology for purchases from different companies.

Question 20

Answer saved
Marked out of 1.00
Flag question

Question text

The implementation of a new IS, also called ____, consists of two steps: conversion and training.
Select one:

Question 19

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: Compilers and interpreters are types of programming language translators.

Question 18

Answer saved
Marked out of 1.00
Flag question

Question text

systems are designed to support any and all relationships with customers.

Question 17

Answer saved
Marked out of 1.00
Flag question

Question text

Themodel provides application software developed and maintained by a third-party provider and offered to organizations for a recurring fee.

Question 16

Answer saved
Marked out of 1.00
Flag question

Question text

WiMAX is a(n) ____ technology.

Question 15

Answer saved
Marked out of 1.00
Flag question

Question text

Ford created a joint venture with General Motors Corp. and DaimlerChrysler to establish, a website that serves as an electronic market for parts suppliers who can bid online on requests for proposals posted by the automakers.

Question 14

Answer saved
Marked out of 1.00
Flag question

Question text

The ___________ of a specific raw material is the optimal quantity that allows a business to minimize overstocking and save cost, without risking understocking and missing production deadlines.
Select one:

Question 13

Answer saved
Marked out of 1.00
Flag question

Question text

A _________ is a body of clients that is large enough to attract many other clients.

Select one:

Question 12

Answer saved
Marked out of 1.00
Flag question

Question text

_________ is the raw material in the production of information.
Select one:

Question 11

Answer saved
Marked out of 1.00
Flag question

Question text

A single Wi-Fi router can be connected to a(n), which in turn is connected to a wired network and usually to the Internet.

Question 10

Answer saved
Marked out of 1.00
Flag question

Question text

Instead of spending money on the purchase of data storage devices, a company can contract with a(n) ____ and have all or some of its files stored remotely on the provider's devices.

Question 9

Answer saved
Marked out of 1.00
Flag question

Question text

Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called ____ retailers.  

Select one:

Question 8

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: If the return on investment (ROI) of an economic analysis is negative, the system is economically feasible, or cost justified.

Question 5

Answer saved
Marked out of 1.00
Flag question

Question text

The model uses the object-oriented approach to maintaining records.

Question 6

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: Modern customer relationship management (CRM) systems can help capture the entire customer experience with an organization, from response to an online advertisement to automatic replenishment of products to proactive service.

Question 7

Answer saved
Marked out of 1.00
Flag question

Question text

True or False: The three phases involved in building a data warehouse from transactional data are extraction, transforming, and loading.

Question 3

Answer saved
Marked out of 1.00
Flag question

Question text

Organizations must use software tools to process data into meaningful information to make _____ useful.
Select one:

Question 4

Answer saved
Marked out of 1.00
Flag question

Question text

With a(n), a user controls the cursor by moving his or her finger along a touch-sensitive pad.

Question 1

Answer saved
Marked out of 1.00
Flag question

Question text

The purpose of __________ is to pinpoint the people and organizations most likely to purchase what the organization sells and to promote the appropriate products and services to those people and organizations.
Select one:

Question 2

Answer saved
Marked out of 1.00
Flag question

Question text

_______ are high-frequency radio waves that can carry signals over long distances with high accuracy.
Select one:

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically, a process referred to as data.

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

_____ software records individual keystrokes.
Select one:

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

_____ encryption is defined as encryption that comprises two keys: a public key, and a private key.
Select one:

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The cost of damage is the aggregate of all the potential damages multiplied by their respective ____.

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To prepare for mishaps, either natural or malicious, many organizations have well-planned programs in place, called.

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

, the time during which ISs or data are not available in the course of conducting business, has become a dreaded situation for almost every business worldwide.

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Hardware or software that blocks access to computing resources is called a(n) ____.

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.
Select one:

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Once criminals have a person’s identifying details, such as a Social Security number, driver’s license number, orcredit-card number, they can pretend to be this person, which is a crime called ___.

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Managers should focus on the asset they must protect, which in most cases is ____, not applications.
Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

are total losses of electrical power.

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

are constraints and other restrictions imposed on a user or a system, and they can be used to secure systems against risks or to reduce damage caused to systems, applications, and data.

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Several manufacturers of computer equipment offer individual keyboard-embedded and mouse-embedded fingerprint devices.

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Redundancies increase expected downtime in business information systems.

Feedback

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

_____ are measures taken to ensure that only those who are authorized can use a computer or network or to certain applications or data.
Select one:

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Symmetric encryption is also called “public‐key” encryption.

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: The greater the number of interdependent systems, the greater the expected downtime.

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: A protocol called Transport Layer Security (TLS) is used for transactions on the Web.

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Controls translate business policies into system features.

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To ensure against interruptions in power supply, organizations use ____ systems, which provide an alternative power supply for a short time, as soon as a power network fails.

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee’s password to fix a problem. This is an example of ____.
Select one:

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Encryption slows down communication because the software must encrypt and decrypt every message.

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Perpetrators use other people's computers in distributed denial-of-service (DDoS) attacks. Professionals call such computers ____.

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

When both the sender and recipient use the same secret key, the technique is called ____.

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.
Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Sometimes a(n) _____ is automatically created using data, such as the date and time of a transaction or the name or password of the user updating the file.
Select one:

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A(n) ___ is a way to authenticate online messages, analogous to a physical signature on a piece of paper, but implemented with public-key cryptography.

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In ____, the voltage of the power decreases, or there are very short interruptions in the flow of power.
Select one:

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: With single sign-on, users are required to identify themselves every time they access each of several different systems.

Feedback

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Companies that choose not to fully develop their own recovery plan can outsource it to companies that specialize in either disaster recovery planning or provision of alternative sites.

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Outsourcing is a concept that might encompass more than just commissioning the development of an application.

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Offshoring has caused layoffs of programmers in Western countries and created much bitterness among those professionals and supporters of local labor.

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The greatest disadvantage of tailored applications is their ____.

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The concept in which an application service provider offers the use of computer programs through a network (the Internet or private network) is known as ____.
Select one:

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Companies that provide IT services are commonly called ____.
Select one:

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

When soliciting vendor details, the project manager sends a ____ to the vendors identified, requesting general, somewhat informal information about a product.
Select one:

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The most important element of an outsourcing agreement for both parties, but mostly for the client, is what professionals call the ____.

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: In-house development teams can usually complete a new application project in less time than an IT vendor can.

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In order to overcome connectivity issues and reduce security risks, some clients prefer to use a(n) ___ rather than the Internet to connect to application service providers.

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In user development of applications, the lack of ____ makes system maintenance difficult at best and impossible at worst.

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

_____ include ERP, SCM, and CRM applications and typically cost millions of dollars.
Select one:

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Companies that are growing fast and rely on software for deployment of their operations often hire the services of ASPs.

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: When end users develop applications, they should be encouraged to develop applications that interface with other organizational systems.

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

____ software closely conforms to an individual unit’s subculture, which makes the transition to a new system easier for employees.
Select one:

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

_____ allows clients to take advantage of the vendor’s experience that the vendor hasgained through work with many clients in different environments.
Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Companies should not rely on end users to develop applications that ____.
Select one:

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Since no provider can guarantee 100 percent uptime, ASPs often promise 99.9 percent uptime.

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The practice of outsourcing routine activities, such as customer order entry or human resource transactions, is called.

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: An application service provider (ASP) installs software on a client’s computers.

Feedback

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Vendor selection criteria include functionality, architectural fit, price, services, and support.

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: For many companies, IT is not their core competency and should not be a focus of their efforts.

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

When ______ a software package, the buyer gains several benefits such as immediate system availability, high quality, low price, and available support.
Select one:

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Before licensing a particular software package, the company should test the system using ____, which is comparing actual performance against specific quantifiable criteria.

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Many North American and European countries have outsourced development of well-defined applications to professionals in other countries, an act often referred to as ___.

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

in general means hiring the services of another organization or individual to perform some of the work that otherwise would be performed by the hiring organization or its employees.

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To ensure compatibility with other applications within an organization, the organization’s IT professionals should adopt and supply_________tools to interested users.
Select one:

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: In recent years, enterprise applications have constituted a far larger part of IT expenditures on packaged software.

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: In the IT arena, outsourcing has a single meaning.

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

is the proportion of time that the ASP’s systems and communication links are up and running.

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

IT companies that provide both hardware and software have seen revenue from ____ service portion of their business grow faster than from the sale of hardware and software.
Select one:

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

An organization that offers the use of software through communication lines is called a(n).

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Studies show thatis not the most common reason for outsourcing.

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: A paradoxical aspect to IT outsourcing is that while contracts are signed for long periods of time, they typically involve rapidly changing technologies.

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Authorities usually deal with unauthorized use of computers as theft.

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

If the cost-accounting procedures of a particular company are so specific that no commercially available software can perform them, the company must develop ____ software.
Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Contracts for ____ software development might be incompatible with agile development methods.
Select one:

Feedback

Question 4

Correct
Mark 0.00 out of 1.00
Flag question

Question text

Among the methods for system development, ____ is clearly the best option for many small companies.
Select one:

Feedback

Question 3

Correct
Mark 0.67 out of 1.00
Flag question

Question text

If someone from outside a company accessed the company’s computer without authorization and used it for any purpose whatsoever, the act would beunder the laws of every state in the United States.

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: The greatest advantage of tailored applications is their low cost.

Feedback

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Clients should not expect vendors to list the service level and ____; the clients must do it.
Select one:

Feedback

Question 29

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Rather than containing a set of IF-THEN rules, more sophisticated ESs use ____, which are designed to mimic the way a human brain learns.
Select one:

Feedback

Question 30

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Intelligentallow employees to enter questions in free form or close to free form.

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Agile methods are an efficient approach to development when a system is ____, when it deals with unstructured problems, and when the users cannot specify all the requirements at the start of the project.
Select one:

Feedback

Question 27

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The first step in systems analysis is ____, which determines whether there is a real need for a system and whether the system as conceived is feasible.
Select one:

Feedback

Question 26

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Expertise in narrow domains can be programmed in expert systems.

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A carefully drawn can provide a useful representation of a system, whether existing or planned.
Select one:

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Flag question

Question text

One objective of data mining is _____, the discovering of patterns in data that can lead to reasonable predictions.
Select one:

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

consists of post-implementation debugging and updating (making changes and additions), including adding features that were originally desired but later postponed so budget and time limits could be met.

Feedback

Question 22

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Expert systems and neural networks are two techniques researched and implemented in a field called.

Feedback

Question 21

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the risk factor in decision support systems that lead to ethical issues.
Select one:

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

____ are excellent tools for building both the data and the models that decision support systems need.
Select one:

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Some software companies, such as Tacit Systems, Hivemine, and Safeharbor Knowledge Solutions have developed , tools that facilitate knowledge sharing through intranets.

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Geographic information systems (GISs) are often the best decision aids for map-related decisions.

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: A small ad hoc team usually performs a quick preliminary investigation to determine the need for a new system.

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A major effort of most businesses, especially retail businesses, in using customer relationship management (CRM) systems is to collect ____ about customers.
Select one:

Feedback

Question 15

Correct
Mark 0.67 out of 1.00
Flag question

Question text

Businesses use ______ to analyze data.
Select one:

Feedback

Question 14

Correct
Mark 0.67 out of 1.00
Flag question

Question text

True or False: Mathematicians call a sequence of steps a parameter.

Feedback

Question 13

Correct
Mark 0.67 out of 1.00
Flag question

Question text

True or False: Online analytical processing (OLAP) applications are powerful tools created specifically for shift employees.

Feedback

Question 12

Correct
Mark 0.33 out of 1.00
Flag question

Question text

Identify an advantage of certifications.
Select one:

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

In thephase of decision making, decision makers collect facts, ideas, and beliefs.

Feedback

Question 9

Correct
Mark 0.67 out of 1.00
Flag question

Question text

consists of diagrams that describe the following types of software: use case, class, interaction, state, activity, and physical components.

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Legacy systems are older systems that organizations decide to continue to use because the investment in a new system would not justify the improved features or because the old systems have some advantage that cannot be obtained from newer systems.

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: A data store is any event or sequence of events in which data is either changed or acted on.

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The popular name of an interface for business intelligence tools is ____.
Select one:

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A cut-over conversion is also calledconversion.

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In the ____ phase of decision making, the method for considering a data is designed.

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

______is the attempt by organizations to put procedures and technologies in place to transfer individual knowledge into databases.
Select one:

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A(n) ____ is required when it is not possible to exploit expertise by coupling quantitative data from a database with decision models.
Select one:

Feedback

Question 2

Correct
Mark 0.67 out of 1.00
Flag question

Question text

OLAP applications can process ____ records per second.
Select one:

Feedback

Question 1

Correct
Mark 0.67 out of 1.00
Flag question

Question text

True or False: Direct marketing is a data-mining application that identifies the reasons customers switch to competitors and predicts which customers are likely to do so.

Feedback

Question 19

Correct
Mark 0.67 out of 1.00
Flag question

Question text

When a system is developed by a software vendor for a wide market rather than for a specific client, conversion often takes place at ___.
Select one:

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

takes place when an operation switches from using an old system to using a new system.

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A(n) ____ diagram is used to describe the flow of data in a business operation.

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Agile methods developed out of ___, an application development approach that emerged in the 1980s aimed at cutting costs and time.

Feedback

Question 3

Correct
Mark 0.00 out of 1.00
Flag question

Question text

______ is a structured, disciplined approach that facilitates the adoption of new or modified systems by various groups and individuals within an organization.
Select one:

Feedback

Question 17

Correct
Mark 0.00 out of 1.00
Flag question

Question text

____ is meant to guarantee that the experts have passed tests that ensure their skills.
Select one:

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The part of the BI software application that parses the questions entered by employees is known as the ____.
Select one:

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Business intelligencehelp executives quickly receive metrics, ratios, and trends in mostly graphic format.

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The data-mining application that identifies which prospective clients should be included in a mailing or email list to obtain the highest response rate is known as ____.
Select one:

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Applications can easily answer questions such as, “Where are my weakest performing sales offices?” and “What products are selling well?”

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Online analytical processing (OLAP) is increasingly used by corporations to gain efficiencies.

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

automates the classification of data into categories for future retrieval.

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

One objective of data mining is, the finding of groups of related facts not previously known.

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Both data-mining and OLAP software are often integrated into ____ for the purpose of collecting business intelligence about customers.
Select one:

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Loyalty programs, such as frequent flier and consumer clubs, help organizations amass a steady flow of data about their customers.

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Knowledge management tools buildand help employees access them.

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Companies such as Razorfish, DoubleClick, and Engage Software use ____ to collect consumer data.
Select one:

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Knowledge management attempts to transfer individual knowledge into.

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

is the process of selecting, exploring, and modeling large amounts of data to discover previously unknown relationships that can support decision making.

Feedback

Question 1

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

is a process by which one starts with a table that shows broad information and successively retrieves tables of more specific information.

Feedback

Question 2

Correct
Mark 0.33 out of 1.00
Flag question

Question text

In banking, ____ is employed to find profitable customers and patterns of fraud.
Select one:

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In, the raw data is organized in tables that show information in summaries and ratios so that the inquirer does not have to wait for processing raw data.

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

OLAP applications are usually installed on a special server that communicates with both the user’s computer and theserver or servers that contain a data warehouse or ____.
Select one:

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Knowledge management software makes storage and organization of unstructured data more of a challenge.

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Data-mining software searches through large amounts of data for meaningful patterns of information.

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The research company IDC argues that almost half of the work that ____ do in organizations has already been done, at least partially.

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A dynamicapplication responds to commands by composing tables “on the fly.”

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Data warehouses could be regarded as a type of ____, where new useful information is the precious find.
Select one:

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To group knowledge into manageable data, companies use ___ software.
Select one:

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Practically all search engine sites, such as Google and Yahoo!, usesoftware, and continue to improve the software to provide more precise and faster responses to queries.

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Some companies require workers to create reports of their finding to transfer knowledge into manageable ___.
Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

BI software has become so popular in large companies that Microsoft decided to integrate such software into its popular database management system, _____.
Select one:

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Information that can be gleaned from stored data is ____.
Select one:

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: Companies find that the data that they collect directly from consumers provides a full picture of customer needs.

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

______are often designed to quickly present predefined business metrics, such as occupancy ratios in hotels and hospitals, or inventory turns in retail.
Select one:

Feedback

uestion 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

An organization can learn much about its customers, sellers, and itself by mining data warehouses and using OLAP software, but such techniques still do not satisfy another important challenge: how to manage.

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Outcomes rarely respond in equal measure to changes in ____, which are categories of data considered when following a sequence of steps.
Select one:

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A DSS’s ____ is a database or data warehouse that provides the data for the intelligence phase of decision making.

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

_____ are applications that combine features of two or more online applications.
Select one:

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

are sequences of steps, formulas, models, and other tools that systematically reduce the alternatives to a manageable number.

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: The majority of problems in the business world are structured.

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

True or False: People are often denied credit based on the decisions made by machines.

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A(n) __________ system is used at all levels of an organization, and often by non-managerial staff.
Select one:

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

When using a(n) _____, the user enjoys the knowledge and experience that have been accumulated by other people over many years.
Select one:

Feedback

Question 12

Correct
Mark 0.67 out of 1.00
Flag question

Question text

A decision support system’s _____ module is a database or data warehouse that provides the data for the intelligence phase of decision making.
Select one:

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

An increasing amount of ____ in the financial services and many other industries are made in real time using DSSs.
Select one:

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

is an expert system that includes instrumentation that connects to the patient’s body and feeds various data about the patient’s condition into the ES to be analyzed for pulmonary diseases.

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The ____ part of the DSS that allows the user to interact with it is called the .
S