Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
A combination of software, hardware and telecom networks to collect useful data, particularly in an organization to complete and manage its operations.
The data processed by transaction processing systems provide the inputs for other organizational information systems.
A software program used to access and view Web pages.
This information is closely related to property right.
Which of the following statements concerning Web 2.0 sites is false?
Describes the buying, selling, transferring or exchanging of products, services, information via computer networks.
Which of the following is not a strategy for mitigating the risk of threats against information?
LinkedIn is a _____________social networking site that makes money from advertising and services.
Over time, the customer relationship with vendors has become more impersonal for all of the following reasons except:
__________ conveys understanding, accumulated learning, and expertise as they apply to a current problem.
Process and procedures are important but not critical to the effective use of computer based information systems.
Which of the following are Amazon's primary value propositions?
Uses customer behavior and perceptions in order to provide actionable business intelligence (back-end)
A simple form of a data warehouse that is focused on a single subject (or functional area), such as Sales, Finance, or Marketing.
A method of trying to integrate all forms of electronic communication under one standardized platform or method.
In _________ , the organization purchases insurance as a means to compensate for any loss.
In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time.
This category of privacy concerns all forms of personal communication which a person wishes to keep private.
The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ________________.
When a business must abide by government regulations such as HIPPA or FERPA, what type of business pressure is created?
Contains content that describes a cause, opinion, or idea.
Pressures on organizations are generated by the global economy and strong competition facilitated by the global, web-based platform
Which of the following is not a part of the typical IS operational plan?
E-commerce affects only businesses that sell products online.
Is a communication standard that enables business partners to exchange routine documents, such as purchase orders,electronically.
Which of the following statements about the impact of IT on managers is not correct?
Which of the following is not a problem along the supply chain
Refers to the practice of registering domain names solely for the purpose of selling them later at a higher price.
The applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions
Central Processing Unit collects, processes, stores, analyzes, and disseminates information for a specific purpose.
Information is data that have been organized to provide value.
Which of the following is not a customer touch point?
__ is a set of interrelated components that collect, manipulate, store, and disseminate data and information and provide a feedback mechanism to meet an objective.
Data warehouse deals with multiple subject areas and is typically implemented and controlled by a central organizational unit such as the corporate Information Technology (IT) group.
A systems analyst focuses on designing specifications for new technology.
By improving the way your business operates, how the customer interacts with your business and producing effective marketing strategies, you can hope to improve the way your business is viewed and encourage new customers, as well as ensuring that existing ones keep coming back.
The most common solution to supply chain problems is building inventories.
When a business must abide by government regulations such as HIPPA or FERPA, what type of business pressure is created ?
The greatest problem with GEO satellites is which of the following?
The introduction of the ATM in the banking industry is an example of the innovation strategy.
Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except:
Microwave transmissions are affected by environmental conditions such as storms.
The computing skills necessary to be a hacker are increasing.
Being a figurehead and leader is part of the ________ managerial role.
IT personnel use _______to produce _____.
True or False: The growth of information technology, with its enhanced capacity for surveillance, communication, computation, storage, and retrieval.
CRM data can show you this and enable you to profile target groups which may be underperforming in order to try and boost this area of your business, with the goal of boosting profits.
All of the following use an advertising revenue model except:
Improving the manner in which internal business processes are executed is which strategy for competitive advantage?
Any computer based tool that people use to work with information and support the information processing needs of an organization.
______ is another very common solution. EDI is a communication standard that enables business partners to exchange routine documents, such as purchase orders, electronically.
A firm implements a new information system in one of its plants, assesses the new system's performance, and then implements the new system in its other plants. This is an example of ___________ conversion.
Having one backup of your business data is sufficient for security purposes.
Is the increased value of information in decision-making.
Which of the following statements concerning the management of information resources is not true?
Which of these consists of raw facts, such as an employee's name?
In the _________ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time.
_____ auctions are the most common auction model for large purchases.
Misinformation has a way of fouling up people's lives, especially when the party with the inaccurate information has an advantage in power and authority.
_________ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over the Internet.
Information technology deals with the planning, development, management, and use of management information tools to help people perform all the tasks related to information processing and management.
Has a way of fouling up people's lives, especially when the party with the inaccurate information has an advantage in power and authority.
Which of the following is not a characteristic of a transaction processing system?
An organization's _______consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.
With regard to mobile computing, _______ means that knowing where a user is physically located is a key to offering relevant products and services.
Network interface cards are special adapters that link an individual device to the communications medium on a local area network.
Today's customers have __________ .
_______ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.
__________ is (are) data that have been organized to have meaning and value to a recipient.
eBay uses all of the following business models except:
Search engines and metasearch engines are examples of which network application?
Unlike a data mart, deals with multiple subject areas and is typically implemented and controlled by a central organizational unit such as the corporate Information Technology (IT) group.
Information security students in a graduate degree program take courses in all of the following except:
Provides a collection of content from the web
A_____________ refers to a choice among two or more alternatives that individuals and groups make. Decisions are diverse and are made continuously.
____________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen.
GEO satellites are used to comprise the GPS network.
You do not have to work in the IT department to benefit from learning about IT
A combination of your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be considered knowledge.
A system composed of people and computers that processes or interprets information. The term is also sometimes used in more restricted senses to refer to only the software used to run a computerized database or to refer to only a computer system.
The ratio between organizational inputs and outputs is an indication of the organization's productivity.
________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen.
A (n) ________ provides rapid access to timely information and direct access to management reports.
The pull model is make-to-stock.
In this type of e-commerce, the sellers and buyers are organizations.
Can be defined as an individual condition of life characterized by exclusion from publicity.
Each computer or device on a communications line has a numeric address called
You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?
IT security is the responsibility of everyone in the organization.
__________ consist of data that are related to demand, shipments, orders, returns, and schedules.
Dashboards provide rapid access to timely information and direct access to structured information in the form of reports.
Unintentional threats to information systems include all of the following except:
__________ auctions are the most common auction model for large purchases.
__________ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.
The wired medium with the highest bandwidth is:
Development in software technologies result in
Which of the following is not a part of systems analysis phase of the SDLC?
_____ reports are produced at scheduled intervals.
The transmission capacity (speed) of a network-measured in bits per second (bps).
True or False: Responsibility is accepting any consequences of decisions and/or actions.
A(n) _____ connects two or more devices in a limited geographical area.
Which of the following is not a disadvantage of telecommuting for employees?
Information technology refers to computer-based tools used to support the needs of an organization
Which of the following is NOT a reason that managers need IT support?
Digital dashboards-evolved from executive information systems, which were information systems designed specifically for the information needs of top executives.
Enterprise resource planning systems
True or False: Information is the means through which the minds expands and increases its capacity to achieve its goals, often as the result of an input from another mind.
If you are an worker managing your fringe benefits over your company's intranet, you are engaging in _______ e-commerce.
WiFi provides excellent security.
Managing the IS function within an organization is the exclusive responsibility of the IS department
Which of the following statements about IT's role in society is false?
Deals directly with a firm, avoiding intermediaries such as retail stores.
An organization's IT components include all of the following except:
A ___________ refers to a choice among two or more alternatives that individuals and groups make. Decisions are diverse and are made continuously.
An organization's information technology architecture:
End user computing is when employees directly use computers in their work to solve problems or produce results.
An informed user of IT can enhance his or her organization's competitive position.
The SDLC encourages changes to user requirements once they have been established.
A situation when a producer or supplier bypasses the normal channel of distribution and sells directly to the end user.
Twisted-pair wire is the least-used form of communications wiring.
________ integrate the planning, management, and use of all of an organization's resources, and are designed to tightly integrate the functional areas of the organization.
IT personnel use the IT infrastructure to develop information systems.
Biometrics are an example of:
While information systems, such as transaction processing systems, generate more information for managers to process, other information systems, such as ___, help them analyze this information to make better-informed decisions.
True or False: Liability means that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.
The advantages of electronic commerce for consumers include all of the following except:
Data mining refers to the process of searching valuable business information in a large database, data warehouse or data mart.
Information-based industries face a great threat from substitute products.
At the end of a semester, a student knows that she must achieve a grade of 81 or higher on her final exam to get an A in the course. She has just performed what kind of analysis
An information system that uses computer technology to perform some or all of its intended tasks.
Which of the following factors is not a significant influence on a company's competitive environment?
An organization's IT platform consists of the IT components and IT services.
The function of SCM is to improve the way a company finds the raw materials it needs to produce a product or service and deliver it to its customers.
Information silos were particularly efficient when business processes crossed functional boundaries in an organization.
Which of the following are advantages of computer networks?
A search engine is a software program you can use to find Web sites, Web pages, and Internet files
A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.
Spying on potential or actual enemies primarily for military purposes.
Which of the following is not a characteristic of twisted-pair wire?
Electronic commerce provides opportunities for companies to do all of the following except:
Which of the following statements about your future role as a manager is false?
Writing computer code is as much art as it is science.
Office automation systems
An ongoing collection of related activities that create a product or a service of value to the organization, its business partners, and/or its customers.
Uses customer behavior and perceptions in order to provide actionable business intelligence (back-end).
Which of the following is not a major capability of information systems?
Customer-facing applications is an organization's sales, field service, and customer interaction center representatives interact directly with customers.
You can always trust the content of Web 2.0 sites.
Which of the following statements is false?
A wiki is a collection of blogs.
True or False: Information forms the intellectual capital from which human beings craft their lives and secure dignity.
Which of the following is not a problem along the supply chain?
A major problem of the discovery applications of networks is the huge amount of information available.
The Internet increases traditional barriers to entry into a market.
Which is not the core capabilities of computer-based information systems include (check 2 that applies):
An Internet service provider (ISP) provides temporary Internet connections to individuals and companies.
Exploring the reasons why customers fail to make purchases or why they may not rate your company's services can help you adapt new policies and techniques which may help you attract new customers.
_________ auctions are the most common auction model for large purchases.
Differentiation Strategy - Offer different products, services, or product features than your competitors.
Searching for valuable business information in a database, data warehouse, or data mart is referred to as ________.
A student's decision to drop one course and add another would be considered a transaction to the university's information system but not to its accounting system.
When users ask for added functionality during a systems development project, this is called:
All IT applications require data.
Approach that defines an initial list of user requirements builds a prototype system and then improves the system in several iterations based on users' feedback.
Competitive advantage for an organization manifests itself as all of the following except:
The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?
Enterprise resource planning systems take a (n) ________ view of the overall organization.
The deliverable of the systems design stage is:
The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the
One impact of IT will be to decrease the numbers of managers employed in organizations.
Which of the following is not an example of Web 2.0 applications?
When Amazon welcomes you by name back to its Web site on your second visit, this is an example of which strategy for competitive advantage?
_________ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
IT workers are still in demand and are projected to be in demand for the next ten years
CRM systems are designed to achieve customer intimacy.
A collection of related activities and services that produce a product of value to an organization
_____ portals support communities such as hobby groups or a political party.
_______ refers to efforts by unauthorized users to access data traveling over wireless networks.
Which of the following is the correct hierarchy from the lowest level to the highest level?
Data can be gathered and analyzed from customers using what are known as
Data marts are often built and controlled by a single department within an organization
An ERP system is an inter-organizational information system.
If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its __________.
_______ are simple tools for answering repetitive customer questions.
Wi-Fi provides excellent security.
Which of the following best describes CRM?
The most common wireless technology for TV and DVD remote control devices is:
Prototyping allows the users to clarify their information requirements as they use the prototype.
Information technology and information systems are the same thing
In a process called _________, a company allows nothing to run unless it is approved, whereas in a process called _________, the company allows everything to run unless it is not approved.
A data warehouse, unlike a data mart, deals with multiple subject areas and is typically implemented and controlled by a central organizational unit such as the corporate Information Technology (IT) group.
Deals with multiple subject areas and is typically implemented and controlled by a central organizational unit such as the corporate Information Technology (IT) group.
Decision support systems support only lower and middle level managers.
Data and/or information that is organized to convey understanding as it applies to a current problem is
____________ restrict unauthorized individuals from using information resources and are concerned with user identification.
Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online.
Using CRM can help businesses to develop better working practices, especially with departments such as customer service.
An auditing manager focuses on the ethical and legal use of information systems.
Knowledge is data that have been organized to convey accumulated learning.
_______ is a wireless standard that enables temporary, short-range connection between mobile devices.
End-user computer refers to a group of end users working together to manage their interactions with a computer.
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectBig Lots Business Insights
Retail Sales Surge in October
Minnesota Vikings: A Deep Dive into the Team's 2024 Season
Massage Machines
Knowledge Management
Intrusion Detection System
Retail Merchandising
Forensic Science
Geographic Information Systems
Engineering
System Analysis Design and Development
Thesis Writing 2
Strategic Business Analysis
Risk Management
Real Estate Consulting and Investment Analysis
Quantitative Methods
Reading and Writing Skills
Research in Psychology 2
Investment and Portfolio Management
International Marketing
Data Structures and Algorithms
Application Lifecycle Management
Modeling and Simulation
Algorithms and Complexity
South Korea's Yoon Presidency
Maia Sandu Triumphs in Moldova
Sociology
Anthropology
Understanding Culture Society and Politics
Science Technology and Society
Society and Culture with Family Planning
Introduction to Criminology
Super Micro's Accounting Irregularities
Accounting
Operations Management in the Tourism and Hospitality Industry
Web Systems Technologies
International Issues for Human Resources Management
Integrative Programming and Technology 2
Tax Accounting Assistant
Small Business Management
Business Administration
Bookkeeper and Clerk
Law on Obligations and Contracts
Income Taxation
Information Management
Fundamentals of Accounting Theory and Practice
Fundamentals of Business Analytics
Franchising
Accounting Information System
Basic Finance
Object Oriented Programming Laboratory
Mobile Programming
Network Security
Mobile Application Design and Development 2
Mobile Application Design and Development
Management Information Systems
Managing Information and Technology
Mail and Web Services
Living in the Information Technology Era
Information Technology Capstone Project
Information Technology Practicum
Intro to Hardware Description Language
Introduction to Computing
Introduction to Human Computer
Introduction to Multimedia
Internet Technology in Real Estate
Internet Marketing and Entrepreneurship
Information Assurance and Security 3
Information Systems Operations and Maintenance
Information Security and Management
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts