






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A study guide or exam preparation material for the msm 6630 course. It covers a wide range of topics related to information systems, including collaboration, employee fraud, data marts, operations in a value chain, knowledge management, cloud computing, database design, networking, and more. The correct answers to various multiple-choice questions, suggesting it is intended to help students prepare for the final exam in this course. The level of detail and the comprehensive coverage of key concepts make this document potentially useful as study notes, lecture notes, or a summary for students enrolled in this or related university-level courses.
Typology: Exams
1 / 10
This page cannot be seen from the preview
Don't miss anything!
___ is the activity of two or more people working together to achieve a common goal, result, or work product - ✔✔Collaboration Which type of employee fraud has the highest median loss? - ✔✔Financial statement fraud The difference between the total value added and the total costs incurred is called the ________ of the value chain - ✔✔total margin Neil creates an application which facilitates the easy storage and access of employee information like name, age, experience, and qualifications for his organization. The application is an example of a(n) - ✔✔repository Which of the following statements is TRUE about data marts? - ✔✔Data marts address the needs of a particular department or functional area of a business. is focused on completing a single specific task - ✔✔Weak AI All of the following is considered metadata except __ - ✔✔the granularity of the data According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems. - ✔✔procedure Lynn, the manager of a transportation company, goes through the product delivery schedule. She assigns territories to each executive of the delivery team, and also contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing? - ✔✔outbound logistics
Which of the following statements best describes the role of operations in a value chain - ✔✔transforming inputs into the final products Samuel, a researcher, deduces that single women between the ages of 25 and 30, who usually live in the suburbs and make thrifty purchases, prefer a particular brand of washing machines. In this case, Samuel uses ________ to understand customer behavior - ✔✔cluster analysis The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the list of products sold in the previous quarter. These details do NOT qualify as good information because they are ____ - ✔✔not relevant All of the following are sources Watson's acquires content except ___ - ✔✔from question but it does get it from dictionaries, databases, literature, and reports Competitive strategy determines all of the following except __ - ✔✔the company's PE ratio The ________ created by Porter states that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain. - ✔✔business process design According to Porter's five forces model, in which of the following situations would the supplier have the highest bargaining power - ✔✔a dealer of a patented material for smartphone manufacturers Robert is a strategic planner for a consulting firm. He receives countless reports for daily analysis, but he avoids being inundated with information by selecting only the few reports that actually serve his purpose. Which principle of data characterization is Robert following? - ✔✔Information should be just barely sufficient for its purpose Artificial intelligence (AI) research has been driven by the demand for applications that ________ such as ways to filter offense content. - ✔✔solve practical problems Which of the following is a common description of information? - ✔✔knowledge derived from data
Identify a characteristic that is a disadvantage of cloud-based hosting - ✔✔loss of control over data location Which of the following is a characteristic of cloud-based hosting? - ✔✔no obsolescence In 2017, the FCC reversed the 2015 ruling on net neutrality classifying the Internet as ________. an information service - ✔✔a luxury DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients.DenTimes is an example of - ✔✔vertical-market application software The rows in a database are also called - ✔✔records Jed is a database administrator for a mid-sized computer component manufacturer. Part of his duties include managing security, tracking problems, and monitoring the performance of the database. This is an example of Jed's ________ tasks. - ✔✔development is a completely computer-generated virtual world with interactive digital objects. - ✔✔Virtual reality (VR) Which of the following TCP/IP application-layer protocols is used for email transmissions - ✔✔smtp Which of the following is the most controlling BYOD policy - ✔✔For an organization to declare that it owns any device that employees connect to its network In cloud computing, resources are said to be "pooled" because organizations - ✔✔share the same physical hardware through virtualization Which of the following is TRUE of N:M relationships? - ✔✔They are the same as N:N relationships Which of the following devices is an example of a storage hardware device - ✔✔optical disk
a category of cloud hosting where vendors provide hosted computers with an operating system, runtime environment, and middleware like a Web server or a DBMS - ✔✔PaaS A(n) ________ uses the Internet to create the appearance of private, secure connections - ✔✔VPN Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a column labeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a - ✔✔primary key What is the impact of mobile systems growth on the procedures under the five components model? - ✔✔Always on, always at work Tristom Technologies, based in New York, opens branches in Chicago and Detroit. Which of the following networks will the company use to connect computers in the three offices - ✔✔WAN Ryan, a database administrator, is in the process of designing his company's database. Which of the following would Ryan have had to create before he began designing? - ✔✔data model All of the following are benefits to using cryptocurrencies except - ✔✔it is insured by the Federal Reserve Bank A data integrity problem will occur only if - ✔✔data are duplicated in a database Relational databases represent relationships using - ✔✔foreign keys Version control involves all of the following capabilities except - ✔✔access to the documents on your personal hard drive
Which of the following workgroup processes is related to operations? - ✔✔finished goods inventory management Providing incentives for enterprise social network adoption and use is under the ________ best practice.
ABC Corp is partnering with a company to offer ads. The company will show the ads for free and ABC Corp only pays if the customer visits the page from that ad. ABC Corp is using the - ✔✔pay-per-click User generated content should only be deleted by the organization in all of the following cases except - ✔✔if the user community requests it ERP training falls into two broad categories. One of the categories is training on how to use the ERP application software. What does the training include? - ✔✔steps for using the applications to accomplish the activities in various processes In business process management (BPM), once the as-is model is created, the very next step that a team must take is to - ✔✔look for improvement opportunities Outsourcing is done to - ✔✔cap an organization's financial exposure The information technology department is frustrated because they are constantly training one group on the same issue. The department manager reports it is the ________ to learn the system and not expect repetitive training. - ✔✔users' responsibility In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs - ✔✔activities A(n) ________is a combination of hardware, software, and data components that accomplishes a set of requirements. - ✔✔application Which of the following statements is TRUE of the information systems (IS) department - ✔✔the operations group monitors user experience and responds to user problems Which of the following is a responsibility of a chief information officer (CIO) - ✔✔serving as the principal manager of the IS department
Which of the following statements is TRUE of outsourcing? - ✔✔To achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff. Which of the following statements is TRUE about human safeguards for employees - ✔✔User accounts should be defined to give users the least possible privilege needed to perform their jobs Email spoofing is a synonym for - ✔✔phishing present(s) the largest risk for an organization's infrastructure loss - ✔✔Natural disasters Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost. - ✔✔cookies jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a - ✔✔honeypot a standard set of terms and graphical notations for documenting business processes - ✔✔Business Process Modeling Notation (BPMN) In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works. - ✔✔