Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
A combination of software, hardware and telecom networks to collect useful data, particularly in an organization to complete and manage its operations.
Which is not the core capabilities of computer-based information systems include (check 2 that applies):
_________ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over the Internet.
Has a way of fouling up people's lives, especially when the party with the inaccurate information has an advantage in power and authority.
IT personnel use the IT infrastructure to develop information systems.
Which of the following best describes CRM?
An auditing manager focuses on the ethical and legal use of information systems.
Which of the following is not a major capability of information systems?
__ is a set of interrelated components that collect, manipulate, store, and disseminate data and information and provide a feedback mechanism to meet an objective.
Network interface cards are special adapters that link an individual device to the communications medium on a local area network.
Deals directly with a firm, avoiding intermediaries such as retail stores.
Which of the following is not a customer touch point?
When users ask for added functionality during a systems development project, this is called:
Information technology refers to computer-based tools used to support the needs of an organization
________ integrate the planning, management, and use of all of an organization's resources, and are designed to tightly integrate the functional areas of the organization.
Misinformation has a way of fouling up people's lives, especially when the party with the inaccurate information has an advantage in power and authority.
__________ is (are) data that have been organized to have meaning and value to a recipient.
Differentiation Strategy - Offer different products, services, or product features than your competitors.
Which of the following statements is false?
Search engines and metasearch engines are examples of which network application?
An organization's information technology architecture:
LinkedIn is a _____________social networking site that makes money from advertising and services.
A(n) _____ connects two or more devices in a limited geographical area.
One impact of IT will be to decrease the numbers of managers employed in organizations.
Which of the following is not a disadvantage of telecommuting for employees?
WiFi provides excellent security.
The most common solution to supply chain problems is building inventories.
CRM systems are designed to achieve customer intimacy.
Microwave transmissions are affected by environmental conditions such as storms.
The wired medium with the highest bandwidth is:
Which of the following factors is not a significant influence on a company's competitive environment?
True or False: Liability means that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.
In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time.
A search engine is a software program you can use to find Web sites, Web pages, and Internet files
The pull model is make-to-stock.
Process and procedures are important but not critical to the effective use of computer based information systems.
When a business must abide by government regulations such as HIPPA or FERPA, what type of business pressure is created?
Any computer based tool that people use to work with information and support the information processing needs of an organization.
If you are an worker managing your fringe benefits over your company's intranet, you are engaging in _______ e-commerce.
_________ auctions are the most common auction model for large purchases.
When a business must abide by government regulations such as HIPPA or FERPA, what type of business pressure is created ?
________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen.
An organization's IT platform consists of the IT components and IT services.
Each computer or device on a communications line has a numeric address called
Which of the following statements about the impact of IT on managers is not correct?
End user computing is when employees directly use computers in their work to solve problems or produce results.
Improving the manner in which internal business processes are executed is which strategy for competitive advantage?
The advantages of electronic commerce for consumers include all of the following except:
Data marts are often built and controlled by a single department within an organization
The deliverable of the systems design stage is:
A major problem of the discovery applications of networks is the huge amount of information available.
In the _________ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time.
A firm implements a new information system in one of its plants, assesses the new system's performance, and then implements the new system in its other plants. This is an example of ___________ conversion.
CRM data can show you this and enable you to profile target groups which may be underperforming in order to try and boost this area of your business, with the goal of boosting profits.
With regard to mobile computing, _______ means that knowing where a user is physically located is a key to offering relevant products and services.
__________ consist of data that are related to demand, shipments, orders, returns, and schedules.
True or False: The growth of information technology, with its enhanced capacity for surveillance, communication, computation, storage, and retrieval.
Knowledge is data that have been organized to convey accumulated learning.
Information security students in a graduate degree program take courses in all of the following except:
A data warehouse, unlike a data mart, deals with multiple subject areas and is typically implemented and controlled by a central organizational unit such as the corporate Information Technology (IT) group.
True or False: Responsibility is accepting any consequences of decisions and/or actions.
Today's customers have __________ .
Electronic commerce provides opportunities for companies to do all of the following except:
End-user computer refers to a group of end users working together to manage their interactions with a computer.
Information technology and information systems are the same thing
Which of the following are advantages of computer networks?
Is the increased value of information in decision-making.
______ is another very common solution. EDI is a communication standard that enables business partners to exchange routine documents, such as purchase orders, electronically.
Wi-Fi provides excellent security.
_______ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.
By improving the way your business operates, how the customer interacts with your business and producing effective marketing strategies, you can hope to improve the way your business is viewed and encourage new customers, as well as ensuring that existing ones keep coming back.
Enterprise resource planning systems
__________ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.
IT workers are still in demand and are projected to be in demand for the next ten years
_____ portals support communities such as hobby groups or a political party.
In _________ , the organization purchases insurance as a means to compensate for any loss.
All of the following use an advertising revenue model except:
The greatest problem with GEO satellites is which of the following?
A situation when a producer or supplier bypasses the normal channel of distribution and sells directly to the end user.
A method of trying to integrate all forms of electronic communication under one standardized platform or method.
A system composed of people and computers that processes or interprets information. The term is also sometimes used in more restricted senses to refer to only the software used to run a computerized database or to refer to only a computer system.
While information systems, such as transaction processing systems, generate more information for managers to process, other information systems, such as ___, help them analyze this information to make better-informed decisions.
A student's decision to drop one course and add another would be considered a transaction to the university's information system but not to its accounting system.
Which of the following is not a strategy for mitigating the risk of threats against information?
Office automation systems
An organization's IT components include all of the following except:
Over time, the customer relationship with vendors has become more impersonal for all of the following reasons except:
An informed user of IT can enhance his or her organization's competitive position.
This information is closely related to property right.
Which of the following statements concerning Web 2.0 sites is false?
Contains content that describes a cause, opinion, or idea.
Deals with multiple subject areas and is typically implemented and controlled by a central organizational unit such as the corporate Information Technology (IT) group.
Which of the following is not a characteristic of a transaction processing system?
_____ reports are produced at scheduled intervals.
The transmission capacity (speed) of a network-measured in bits per second (bps).
The Internet increases traditional barriers to entry into a market.
Uses customer behavior and perceptions in order to provide actionable business intelligence (back-end).
Biometrics are an example of:
Uses customer behavior and perceptions in order to provide actionable business intelligence (back-end)
Information-based industries face a great threat from substitute products.
A systems analyst focuses on designing specifications for new technology.
Digital dashboards-evolved from executive information systems, which were information systems designed specifically for the information needs of top executives.
Pressures on organizations are generated by the global economy and strong competition facilitated by the global, web-based platform
A_____________ refers to a choice among two or more alternatives that individuals and groups make. Decisions are diverse and are made continuously.
Which of the following is the correct hierarchy from the lowest level to the highest level?
Which of the following is not a characteristic of twisted-pair wire?
The most common wireless technology for TV and DVD remote control devices is:
__________ conveys understanding, accumulated learning, and expertise as they apply to a current problem.
Is a communication standard that enables business partners to exchange routine documents, such as purchase orders,electronically.
A software program used to access and view Web pages.
You do not have to work in the IT department to benefit from learning about IT
_______ refers to efforts by unauthorized users to access data traveling over wireless networks.
In a process called _________, a company allows nothing to run unless it is approved, whereas in a process called _________, the company allows everything to run unless it is not approved.
Customer-facing applications is an organization's sales, field service, and customer interaction center representatives interact directly with customers.
_______ is a wireless standard that enables temporary, short-range connection between mobile devices.
Development in software technologies result in
A wiki is a collection of blogs.
All IT applications require data.
Which of the following is not a problem along the supply chain?
eBay uses all of the following business models except:
Searching for valuable business information in a database, data warehouse, or data mart is referred to as ________.
Data and/or information that is organized to convey understanding as it applies to a current problem is
Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online.
Using CRM can help businesses to develop better working practices, especially with departments such as customer service.
Having one backup of your business data is sufficient for security purposes.
GEO satellites are used to comprise the GPS network.
True or False: Information forms the intellectual capital from which human beings craft their lives and secure dignity.
An organization's _______consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.
Information technology deals with the planning, development, management, and use of management information tools to help people perform all the tasks related to information processing and management.
At the end of a semester, a student knows that she must achieve a grade of 81 or higher on her final exam to get an A in the course. She has just performed what kind of analysis
Data can be gathered and analyzed from customers using what are known as
____________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen.
Which of the following is not a problem along the supply chain
Information silos were particularly efficient when business processes crossed functional boundaries in an organization.
The data processed by transaction processing systems provide the inputs for other organizational information systems.
Provides a collection of content from the web
E-commerce affects only businesses that sell products online.
This category of privacy concerns all forms of personal communication which a person wishes to keep private.
You can always trust the content of Web 2.0 sites.
An ERP system is an inter-organizational information system.
The SDLC encourages changes to user requirements once they have been established.
Can be defined as an individual condition of life characterized by exclusion from publicity.
IT personnel use _______to produce _____.
Refers to the practice of registering domain names solely for the purpose of selling them later at a higher price.
Spying on potential or actual enemies primarily for military purposes.
In this type of e-commerce, the sellers and buyers are organizations.
Dashboards provide rapid access to timely information and direct access to structured information in the form of reports.
An information system that uses computer technology to perform some or all of its intended tasks.
Competitive advantage for an organization manifests itself as all of the following except:
Being a figurehead and leader is part of the ________ managerial role.
A simple form of a data warehouse that is focused on a single subject (or functional area), such as Sales, Finance, or Marketing.
Which of the following is NOT a reason that managers need IT support?
Which of the following statements about your future role as a manager is false?
Which of these consists of raw facts, such as an employee's name?
Central Processing Unit collects, processes, stores, analyzes, and disseminates information for a specific purpose.
Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except:
Unlike a data mart, deals with multiple subject areas and is typically implemented and controlled by a central organizational unit such as the corporate Information Technology (IT) group.
A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.
Decision support systems support only lower and middle level managers.
Which of the following statements about IT's role in society is false?
Which of the following is not an example of Web 2.0 applications?
Writing computer code is as much art as it is science.
__________ auctions are the most common auction model for large purchases.
_________ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
Exploring the reasons why customers fail to make purchases or why they may not rate your company's services can help you adapt new policies and techniques which may help you attract new customers.
The function of SCM is to improve the way a company finds the raw materials it needs to produce a product or service and deliver it to its customers.
Approach that defines an initial list of user requirements builds a prototype system and then improves the system in several iterations based on users' feedback.
Twisted-pair wire is the least-used form of communications wiring.
Describes the buying, selling, transferring or exchanging of products, services, information via computer networks.
Which of the following statements concerning the management of information resources is not true?
A ___________ refers to a choice among two or more alternatives that individuals and groups make. Decisions are diverse and are made continuously.
True or False: Information is the means through which the minds expands and increases its capacity to achieve its goals, often as the result of an input from another mind.
The applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions
A collection of related activities and services that produce a product of value to an organization
Which of the following is not a part of the typical IS operational plan?
Data mining refers to the process of searching valuable business information in a large database, data warehouse or data mart.
The computing skills necessary to be a hacker are increasing.
_______ are simple tools for answering repetitive customer questions.
The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the
A (n) ________ provides rapid access to timely information and direct access to management reports.
Which of the following are Amazon's primary value propositions?
The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ________________.
Prototyping allows the users to clarify their information requirements as they use the prototype.
Enterprise resource planning systems take a (n) ________ view of the overall organization.
You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?
Data warehouse deals with multiple subject areas and is typically implemented and controlled by a central organizational unit such as the corporate Information Technology (IT) group.
Information is data that have been organized to provide value.
An Internet service provider (ISP) provides temporary Internet connections to individuals and companies.
Managing the IS function within an organization is the exclusive responsibility of the IS department
A combination of your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be considered knowledge.
_____ auctions are the most common auction model for large purchases.
When Amazon welcomes you by name back to its Web site on your second visit, this is an example of which strategy for competitive advantage?
If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its __________.
IT security is the responsibility of everyone in the organization.
An ongoing collection of related activities that create a product or a service of value to the organization, its business partners, and/or its customers.
Which of the following is not a part of systems analysis phase of the SDLC?
The introduction of the ATM in the banking industry is an example of the innovation strategy.
____________ restrict unauthorized individuals from using information resources and are concerned with user identification.
Unintentional threats to information systems include all of the following except:
The ratio between organizational inputs and outputs is an indication of the organization's productivity.
The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectInvestment and Portfolio Management
International Marketing
Data Structures and Algorithms
Application Lifecycle Management
Introduction to Criminology
International Issues for Human Resources Management
Integrative Programming and Technology 2
Information Management
Income Taxation
Fundamentals of Business Analytics
Franchising
Fundamentals of Accounting Theory and Practice
Basic Finance
Accounting Information System
Information Technology Practicum
Information Technology Capstone Project
Introduction to Multimedia
Introduction to Human Computer
Introduction to Computing
Intro to Hardware Description Language
Internet Technology in Real Estate
Internet Marketing and Entrepreneurship
Information Systems Operations and Maintenance
Information Security and Management
Information Assurance and Security 3
Information Assurance and Security 2
Fundamentals of Investigation and Intelligence
Fundamentals of Database System
Chemistry for Engineers
Digital Imaging
Database Management System
Data Communications and Networking 2
Data Communications and Networking
Cyber Security: Theories and Practice
Current Trends and Issues
Computer Programming
Computer Fundamentals
Software Engineering
System Administration and Maintenance
Integrative Programming and Technology
Data Communications and Networking 4
Linux Administration
Applied Business Tools and Technologies
Systems Integration and Architecture
Information Assurance and Security
Principles of Operating System and its Application
Data Communications and Networking 3
Auditing and Assurance Concepts and Applications
Animation Project
3D Game Art Development
Load Testing
Introduction to Basic Accounting
International Business and Trade
Intermediate Accounting 3
Intermediate Accounting
Financial Accounting and Reporting
Financial Analysis and Reporting
Financial Management
Environmental Marketing
Entrepreneurship in Tourism and Hospitality
Entrepreneurship
Entrepreneurial Management
Entrepreneurial Behavior
Distribution Management
Capital Markets
Cost Accounting and Control System
Business Research
Business Ethics with Good Governance and Social Res
Business Laws and Regulation
Technopreneurship
Shopee Helmet
Shopee 3D Floor
Lazada Smart TV Box
Amazon iPhone Charger
Shopple Deals
Our team has been certified on Ezoic the google award-winning platform for publishers.
We just wanted to take this opportunity to genuinely thank you for visiting with us and supporting our team hard work.