logo image

MIS 201 – Chapter 6 & 7

It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions
Business intelligence
The business processes outlined within strategic plans are often implemented as envisioned at the managerial and operational level of the organization
FALSE
It is possible for a database to consist of only a single file or table
TRUE
“Backward looking” budgets are typically based on..?
Historical data
responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ______ level of the organization
Operational level
The structure of the data is typically captured in a data model
TRUE
Data dictionaries restrict business rules
FALSE
when we consider entities as tables, each row is a(n)
record
when we consider entities as tables, each column is a(n)
attribute
Structured Query Language is the most common language used to interface with RDBMSs.
TRUE
Online transaction processing (OLTP) systems enable us to fill out a grid, or template, in order to construct a sample or description of the data we would like to see, typically using the drag-and-drop features of a graphical user interface to create a query quickly and easily.
FALSE
An attribute is also referred to as a
Field
Collection of related attributes about a single instance of an entity
record
In a distributed online environment, performing real-time analytical processing enhances the performance of transaction processing.
FALSE
Master data management is a management rather than a technology focused issue.
TRUE
In DBMS, data are kept separate from the application’s programing code. This means that
a database does not need to be changed if a changes is made to an application
One of the advantages of the database approach is program-data independence, which means that it is
easier to evolve and alter software to changing business needs when data and programs are independent.
When the database approach makes it easier to deploy and control data access, what advantage is being referred to?
Improved data sharing
Disadvantage of the database approach?
organizational conflict
Data type helps the DBMS
allocated storage space
Once the data model is created, the format of the data is documented in a(n)
data dictionary
A data dictionary is also known as a(n)
metadata repository
Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory…….
Bringes’ channel partners use a database system that supports the Oracle database system.
Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company’s internal ……
Treston’s new database system was not supported by the database system of its suppliers and distributors.
Business rules are captured by the designers of the database and included in the data dictionary to
prevent illegal or illogical entries from entering the database
Used to capture data to be added, modified, or deleted from the database
Forms
A compilation of data from the database that is organized and produced in printed format.
Report
A query is used to
retrieve data from a database
Query by example (QBE) capabilities in a database
It helps to create a query quickly and easily.
System that are used to interact with customers and run a business in a real time are
Operational systems
Data that is deemed most important in the operation of a business
Master Data
It consists of narrow and simple updates and queries
Operational system
Its design goal is to enhance ease of access and use
Information system
Integrates data from various operational systems
A data warehouse
The purpose of a data warehouse is to
put key business information into the hands of more decision makers
Involves standardizing the format of data retrieved from different systems
Data cleansing
A Data warehouse that is limited in scope
data mart
It contains selected data from the data warehouse
Data mart
Ad hoc queries are always saved because they need to be executed on a regular basis
FALSE
Information and knowledge discovery tools are used primarily to
Extract information from existing data
Produced at predefined intervals to support routine decisions
Scheduled reports
Online analytical processing systems are designed for efficient retrieval of data and categorize data as measures and dimensions
TRUE
Data mining algorithms search for patterns, trends, or rules that are hidden in the date
TRUE
They provide a summary of critical information on a recurring schedule
key-indicator reports
They highlight situatins that are out of the normal range.
exception reports
Sequence discovery is used to discover associations over time
TRUE
Text mining refers to extracting textual information from Web documents
FALSE
Help analyze why a key indicator is not at an appropriate level or why an exception occured
Drill – down reports
They answer unplanned information requests to support a nonroutine decision
ad hoc queries
Business analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes
TRUE
Expert systems are used to mimic human expertise by manipulating knowledge rather than simply manipulating information.
TRUE
Process of quickly conducting complex, multidimensional analyses of data stored in a database that is optimized for retrieval, typically using graphical software tools.
Online analytical processing
Online analytical processing tools enable users to
scrutinize different dimensions of data beyond simple data summaries.
The output from an expert system is called inferencing
FALSE
An intelligent agent is also referred to as a bot
TRUE
It understands how data are organized in the database and has special functions for analyzing the data.
Online analytical processing server.
How do online analytical processing systems improve performance
They preaggregate data so that only the subset of the data necessary for the queries is extracted
Data mining agents are also known as shopping bots.
FALSE
Knowledge portals can be customized to meet the unique needs of their intended users
TRUE
In online analytic processing systems__________are the values or numbers the user want to analyze.
Measures
In online analytical processin systems, _______ provide a way to summarize the data
dimensions
My combining human intelligence and reasoning capabilities with technology’s retrieval and analysis capabilities, visual analytics can help in decision making.
TRUE
It is data structure allowing for multiple dimensions to be added to a traditional two-dimensional table
online analytic processing cube
Data mining complements online analytical processing in that it
provides capabilities for discovering “hidden” predictive relationships in the data
Achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals.
Data reduction
It is a technique used to find correlations among sets of items.
Association discovery
Process of grouping related records together on the basis of having similar values for attributes
Clustering
Use of analytical techniques for extracting information from written documents
Text mining
Extracting textual information from online documents
Web content mining
Used for Web content mining
Web crawler
Used by organizations to determine patterns in customers’ online utilization data.
Web usage mining
A recording of a user’s path through a Web site
clickstream data
The ability of a page to attract and keep visitors
Stickiness
Business analytics augments business intelligence by using_____analysis to help identify trends or predict business outcomes.
Predictive
A special purpose information system designed to support organizational decision making related to a particular recurring problem
decision support system
Analyses involves making hypothetical changes to the data associated with a problem and observing how these changes influence the results
what-if analysis
it uses reasoning methods based on knowledge about a specific problem domain in order to provide advice
expert system
it is typically expressed using an “if-then” format
“rule” in expert systems
Allows expert system rules to be represented using approximations or subjective values in order to handle situations where information about a problem is incomplete
Fuzzy logic
The processing in an expert system (ES) is
inferencing
It attempts to approximate the functioning of the human brain and can learn by example.
Neutral network
They are agents that automatically perform a task for a user
user agents
role of monitoring and sensing agents
tracking inventory levels
role of data mining agents
analyzing data warehouse to detect changes deemed important by a user
It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.
explicit knowledge asset
Primary goal for deploying a knowledge management system
identifying how to recognize, generate, store, share, and manage tacit knowledge.
Social network analysis is a technique that attemeps to
find experts in particular subject areas
refers to the display of complex data relationships using a variety of graphical methods
Visualization
It supports push reporting, exception reporting and alerts, and pull reporting usage models.
digital dashboard
Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends. this usage model is known as
push reporting
while using digital dashboards, pull reporting is conducted to
analyze the root causes of an exception
it includes facts and numbers
hard data
it is transformed into coordinates
explains the phrase “data is geocoded”
Which of the following is a basic concept associated with Web 2.0?
a. Allows user to form active so customer bases
b. Shift in users’ role from the passive consumer of content to its creator
c. Provides public users with a data base
shift in users’ role from the passive consumer of content to its creator
Which of the following is a consequence of the use of social software?
a. People are sharing more personal information
b. A rise in antisocial behavior
c. People literally turning into vaginas
People are sharing more personal information
The use of _______ within a company’s boundaries or between a company and its
customers or stakeholders is referred to as Enterprise 2.0.
a. Web 2.0 techniques and social software
b. Vaginas
c. Social Networking Sites
Web 2.0 techniques and social software
Which of the following statements is true about web 1.0?
a. It allows consumers to more easily access information.
b. VAGINA
c. It helps rulers ?nd information
It helps rulers ?nd information
A major bene?t of social software is the ability to harness the “wisdom of
crowds”, which is also referred to as _____.
a. Crowd analysis
b. Collective Intelligence
c. Vaginas
d. Crowd intelligence
Collective Intelligence
The concept of _____ is based on the notion that distributed groups of people
with a divergent range of information and expertise will be able to outperform
the capabilities of individual experts.
a. Crowd analysis
b. Collective Analysis
c. Collective Intelligence
d. Crowd intelligence
e. Vagina intelligence
Collective Intelligence
Which of the following statements is true about a discussion forum?
a. It is dedicated to a speci?c topic, and users can start new threads
b. It is dedicated to a bunch of vaginas
c. Provide services to consumers
It is dedicated to a speci?c topic, and users can start new threads
Which of the following statements is true about blogs?
a. They allow individuals to express their thoughts in a one-to-many fashion
b. They allow individuals to restrict their privacy settings
c. They allow users to post about vaginas
They allow individuals to express their thoughts in a one-to-many
fashion
Which of the following Web 2.0 applications has been classi?ed as the
“amateurization” of journalism?
a. Social Network
b. Blogs
c. Email
d. internet
Blogs
Keith Norat, the Chief Technology Officer of Kender Internationals, relies on
blogs while making decisions. In his words, “Blogs are an important part of our
purchase decisions.” Which of the following is an underlying assumption?
a. Blogs lead to the “amateurization” of journalism
b. Blogs deny users the ability to post
c. Blogs lead to vaginas
d. Blogs allow users to do stuff
Blogs lead to the “amateurization” of journalism
Which of the following explains the term “blogosphere”?
a. How blogs are made
b. The community of all blogs
c. Where all blogs go to die
The community of all blogs
Social presence tools are also known as ________ tools.
a. Blogs
b. Microblogging
c. Macroblogging
d. Vagina-blogging
Microblogging
Which of the following facilitates real-time written conversations?
a. Email
b. Snap chat
c. Instant Messaging
d. Blogging
Instant Messaging
_______ take the concept of real-time communication a step further by allowing
people to communicate using avatars.
a. Virtual Worlds
b. Virtual Intelligence
c. Vagina Intelligence
d. Spacial Worlds
Virtual Worlds
Which of the following statements is true about virtual worlds?
a. It allows people do act inappropriately with little consequence
b. It allows people to virtual date.
c. It allows people to communicate using avatars
It allows people to communicate using avatars
The network effect refers to the notion that the value of a network is dependent
on ______.
a. Who owns the network
b. The number of other users
c. The customers of that network
d. Your moms vagina
The number of other users
_____ is a cooperative Web 2.0 application making use of the network effect.
a. Media sharing
b. Message sharing
c. email sharing
Media sharing
_______ is the distribution of digital media, such as audio or video ?les via
syndication feeds for playback on digital media players.
a. Internet
b. Netcasting
c. Social Media
Netcasting
Podcasting is a misnomer because podcasts _______.
a. Can be played on a variety of devices in addition to Apple’s iPods
b. Can be streamed to any technological device
c. Is compatible with Apple’s Vag-ipod
Can be played on a variety of devices in addition to Apple’s iPods
Social bookmarking allows users to share Internet bookmarks and to create
categorization systems. These categorization systems are referred to as _____.
a. Technology economics
b. Sociology
c. Folksonomies
Folksonomies
Which of the following statements is true about social bookmarking?
a. It allow users to “tag” their friend
b. It allows users to create folksonomies
c. It allows users to bookmark
It allows users to create folksonomies
______ is the creation of a categorization system made by users.
a. Media cataloging
b. Social cataloging
c. Vagina cataloging
d. Folksonomy cataloging
Social cataloging
_____ refers to manually adding metadata to media or other content.
a. Tagging
b. Blogging
c. Economics
d. Dirp
Tagging
Which of the following statements is true about tagging?
a. It is the process of adding metadata to pieces of information
b. It is the process of adding your friends on Facebook
c. It is the process of spray painting a public wall illegally
d. It is the process of deleting data from an interphase.
It is the process of adding metadata to pieces of information
______ refer(s) to a way of visualizing user generated tags or content on a site.
a. Tag generator
b. Tag simulator
c. Tag clouds
d. Vagina
Tag clouds
Which of the following is one of the uses of geotagging?
a. Boredom
b. To know the location of a person sending out a breaking news update
c. To geographically tag your anus
d. To know the area of the servers technological orientation
To know the location of a person sending out a breaking news update
Which of the following is an example of synchronous communication?
a. Instant messaging
b. Email.
c. Intranets
d. Videoconferencing
C) Intranets or D) Videoconferencing
Which of the following is an example of asynchronous communication?
a. Instant messaging
b. Videoconferencing
c. Shared whiteboards
d. Vagina
Shared whiteboards
Which of the following factors differentiates asynchronous communication from
synchronous communications?
a. The location of the communication
b. The f word
c. Coordination in time
Coordination in time
In today’s business environment, project teams comprise highly specialized
members, many of whom are not collocated. _______ are comprised of members from different geographic areas.
a. Virtual teams
b. Virtual collections
c. Virtual spendings
Virtual teams
Which of the following is an electronic communication tool that allows users to
?les, documents, and pictures to each other and share information?
a. Instant messaging
b. E-mail
c. Social Media
E-mail
Which of the following is an electronic conferencing tool that facilitates
information sharing and rich interactions between users?

a. Vagina
b. E-mail
c. Social Media
d. Instant messaging

Instant messaging
Which of the following is a collaboration management tool that is used to
facilitate virtual or collocated meetings?
a. Intranets
b. E-Mail
c. Instant messaging
Intranets
Web-based collaboration tools ________.
a. Allow for easy transferability from one person to another
b. Create an easier interphase to data base communication link
c. Vagine
Allow for easy transferability from one person to another
Which of the following statements is true about Gmail?
a. It allows users to select a custom domain name for an additional fee
b. It allows users to access their banking accounts
c. It allows user to stream their photos directly by phone.
It allows users to select a custom domain name for an additional fee
Which of the following Google Apps is an instant messaging client?
a. Google Talk
b. Google Text
c. Google Chat
Google Talk
______ is an online office suite comprised of a spreadsheet application, a word
processor, and a presentation application
a. Google Docs
b. Google Word
c. Google Write
Google Docs
Which of the following statements is true about Google Sites?
a. It is a social networking tool that allows users to view each others profiles.
b. It is an enterprise-level collaboration tool that allows users to create group websites and share team information
c. It is a business to consumer tool that allows users to sell their merchandise online.
It is an enterprise-level collaboration tool that allows users to create
group websites and share team information
A(n) _______ system allows users to publish, edit, version track, and retrieve
digital information.
a. Content management
b. Publish management
c. Digital management
Content management
Which of the following statements is true about content managing systems?
a. It allows the assignment of different roles for different users
b. It allows the user to organize micro data
c. It denies access to foreign servers
It allows the assignment of different roles for different users
Which of the following is the responsibility of an administrator in a content
management system?
a. Over see all account activity
b.
c. Managing account access levels to the digital information
Managing account access levels to the digital information
______ is the creation of goods or services by self-organizing communities.
a. Peer production
b. Community production
c. Community services
Peer production
Which of the following statements is true about peer production?
a. Allows for the creation of goods and services through corporate manufacturers
b. Anyone can help in producing or improving the ?nal outcome
c. Denies access to anyone outside your peer connections
Anyone can help in producing or improving the ?nal outcome
Which of the following occurs during wiki wars?
a. Contributors continuously edit or delete each other’s posts
b. Contributors create wikis slandering other users.
c. Legal battles sprung from discredited information.
Contributors continuously edit or delete each other’s posts
_____ is a phenomenon where companies use everyday people as a cheap labor
force.
a. Outsourcing
b. Crowdsourcing
c. Vaginasourcing
d. Hiring illegal immigrants
Crowdsourcing
_______ enables people to work in more ?exible ways on a variety of Internet-
related projects.
a. E-lancing
b. A-lancing
c. C-lancing
d. Freelancing
E-lancing
______ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.
a. Email
b. Blogging
c. Social Networking
d. Instant messaging
Social Networking
Which of the following statements is true about viral marketing?
a. It uses the network effect to increase brand awareness
b. It uses the viral effect to increase brand awareness
c. It uses the doppler effect to increase brand awareness.
d. It uses your moms vagina to increase brand awareness.
It uses the network effect to increase brand awareness
Which of the following is a critical factor in the success of a viral marketing
campaign?
a. Advertisement
b. Media marketing
c. Making sequels
Making sequels
______ attempts to provide relevant search results by including content from
blogs and microblogging services.
a. Google search
b. Social search
c. Bing search
Social search
Which of the following statements is true about Real Simple Syndication (RSS)?
a. It helps to syndicate the consumers orders in a user friendly environment
b. It is used in nearly every aspect of social networking
c. It is used to publish the most current blogs, podcasts, videos and news stories
It is used to publish the most current blogs, podcasts, videos and news stories
For companies operating in the digital world, online collaboration with
suppliers, business partners, and customers is crucial to being successful.
________ allow(s) data to be accessed without intimate knowledge of other
organizations’ systems, enabling machine-to-machine interaction over the
Internet.
a. Web services
b. Data Services
c. Micro-Services
Web services
Android is a Web service hosted by Google to _______.
a. Compete with Apple’s iPhone
b. Build mobile phone applications
c. Be compatible with Google
Build mobile phone applications
Which of the following statements is true about widgets?
a. They are small interactive tools used for a single purpose
b. They are used in blogging to add and delete information
c. They are used to send information from one serve to the next.
They are small interactive tools used for a single purpose
Together, Web services and widgets enable the creation of ______.
a. Intranets
b. Mashups
c. Web servers
Mashups
Which of the following statements is true about a mashup?
a. It allows for compatibility with html files
b. It is an application or a Website that integrates one or more Web services
c. It is something
It is an application or a Website that integrates one or more Web
services
Which of the following is a reason for the development of semantic Web?
a. Web pages can be understood by people but not by computers
b. Web pages cannot be understood by people but by computers
c. Web pages can be use with virtually every type of server.
Web pages can be understood by people but not by computers
Which of the following is NOT true about an Enterprise 2.0 strategy?
a.
b.
c. Enterprise 2.0 applications are not suited to traditional top-down organizational structures
Enterprise 2.0 applications are not suited to traditional top-down organizational structures
Enterprise 2.0 is likely to fail if _______.
a. The state has a regressive tax structure
b. The nation is in an economic crisis
c. An organization’s workforce is dominated by baby boomers.
An organization’s workforce is dominated by baby boomers.
Which of the following statements is true about business intelligence?
A) It is the act of outsourcing tasks, traditionally performed by an employee or contractor, to an undefined, large group of people or community, through the use of information technology.
B) It is the process by which a customer-owned mutual organization or co-operative changes legal form to a joint stock company.
C) It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.
D) It is an organization’s process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people.
E) It is the use of human resources to gather and analyze information from external sources in order to make better business decisions.
It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.
“Backward looking” budgets are typically based on ________.
A) forecasts
B) marketing research
C) future trends
D) historical data
E) current market conditions
historical data
Responding to threats and opportunities and continuous planning is based on analyzing data from the ________ level of the organization.
A) operational
B) executive
C) tactical
D) business
E) strategic
operational
Taking entities as tables, each row is a ________.
A) field
B) record
C) attribute
D) form
E) query
record
Taking entities as tables, each column is a(n) ________.
A) attribute
B) record
C) form
D) bot
E) query
attribute
An attribute is also referred to as a(n) ________.
A) form
B) record
C) field
D) query
E) bot
field
A(n) ________ is a collection of related attributes about a single instance of an entity.
A) bot
B) form
C) query
D) field
E) record
record
In DBMS, data are kept separate from the applications’ programming code. This means that ________.
A) an application cannot be changed without making changes to the database
B) an application’s programming code needs to be updated continuously to keep up with the database
C) an application needs to be changed when database is changed
D) database does not need to be changed if a change is made to an application
E) database needs to be changed when a change is made to an application
database needs to be changed when a change is made to an application
A common way to represent a data model is a(n) ________.
A) entity-relationship diagram
B) normalization diagram
C) report-query diagram
D) form-record diagram
E) report generator
entity-relationship diagram
Data type helps the DBMS ________.
A) present the data in a useful format
B) format data
C) allocate storage space
D) eliminate data duplication
E) retrieve information
allocate storage space
To finalize the data model in order to actually build the database, a process called ________ is used to make sure the database will operate efficiently.
A) slicing and dicing
B) normalization
C) clustering
D) visualization
E) inferencing
normalization
In DBMS, normalization helps to ________.
A) eliminate data duplication
B) retrieve information
C) format data
D) present the data in a useful format
E) allocate storage space
eliminate data duplication
Once the data model is created, the format of the data is documented in a(n) ________.
A) data warehouse
B) data mart
C) expert system
D) data type
E) data dictionary
data dictionary
A data dictionary is also known as ________.
A) data mart
B) data warehouse
C) metadata repository
D) entity-relationship diagram
E) clickstream data
metadata repository
Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory levels for its stores. It is planning to implement Oracle database systems to replace this legacy system. Which of the following most supports Bringes’ decision to replace its legacy system with an Oracle database system?
A) Implementing Oracle database system means hiring additional specialized personnel to manage it.
B) Partial implementation of the Oracle database system can create more problems than it solves.
C) Conversion cost required for the implementation of Oracle database system is supported by IT budgets.
D) Bringes’ channel partners use a database system that supports the Oracle database system.
E) Maintenance cost of an Oracle database system is more than the legacy system presently in use.
Bringes’ channel partners use a database system that supports the Oracle database system.
Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company’s internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston’s database system?
A) Microsoft launched a new version of Enterprise Microsoft Access which is better than Treston’s database system.
B) The maintenance cost of Treston’s new database system was three times more than the one it was previously using.
C) Treston’s new database system was not supported by the database system of its suppliers and distributors.
D) Treston’s competitors implemented its database a few days prior to Treston’s implementation date.
E) Treston had to hire specialized personnel to manage its new database system, which added to its costs.
Treston’s new database system was not supported by the database system of its suppliers and distributors.
Business rules are captured by the designers of the database and included in the data dictionary to ________.
A) organize and sort the data, complete calculations, and allocate storage space
B) prevent illegal or illogical entries from entering the database
C) eliminate data duplication
D) make sure that each table contains only attributes that are related to the entity
E) capture the structure of the database
prevent illegal or illogical entries from entering the database
________ are used to capture data to be added, modified, or deleted from the database.
A) Forms
B) Reports
C) Queries
D) Bots
E) Layers
Forms
A(n) ________ is a compilation of data from the database that is organized and produced in printed format.
A) form
B) attribute
C) field
D) entity
E) report
report
A query is used to ________.
A) organize and sort the data in a database
B) allocate storage space for a database
C) eliminate data duplication
D) retrieve information from a database
E) prevent illegal or illogical entries from entering the database
retrieve information from a database
Which of the following statements is true about query by example capabilities in a database?
A) It helps to create a query quickly and easily.
B) It refers to immediate automated responses to the requests of users.
C) It is designed to handle multiple concurrent transactions from customers.
D) Its primary use is gathering new information.
E) It prevents illegal entries into a database.
It helps to create a query quickly and easily.
The systems that are used to interact with customers and run a business in real time are called ________.
A) tactical systems
B) strategic systems
C) operational systems
D) informational systems
E) executive systems
operational systems
________ is the data that is deemed most important in the operation of a business.
A) Metadata
B) Master data
C) Reference data
D) Query data
E) Tactical data
Master data
Which of the following statements is true about an operational system?
A) Its primary purpose is to support managerial decision making.
B) It consists of historical or point-in-time data.
C) Its goal is to enhance ease of access and use.
D) It consists of narrow and simple updates and queries.
E) It is primarily used by managers.
It consists of narrow and simple updates and queries.
Which of the following statements is true about informational systems?
A) Its primary purpose is to run the business on a current basis.
B) It is primarily used by online customers, clerks, salespersons, and administrators.
C) It consists of narrow and simple updates and queries.
D) Its goal is to enhance performance.
E) Its goal is to enhance ease of access and use.
Its goal is to enhance ease of access and use.
________ integrates data from various operational systems.
A) Data warehouse
B) Metadata repository
C) Data modeling
D) Master data
E) Data mining
Data warehouse
The purpose of a data warehouse is to ________.
A) standardize the format of data retrieved from different systems
B) allow managers to run queries and reports themselves without having to know query languages or the structure of the underlying data
C) provide capabilities for discovering “hidden” predictive relationships in the data
D) put key business information into the hands of more decision makers
E) reduce the complexity of the data to be analyzed
put key business information into the hands of more decision makers
________ refers to the process of standardizing the format of data retrieved from different systems.
A) Data cleansing
B) Data mining
C) Normalization
D) Content mining
E) Clustering
Data cleansing
A ________ is a data warehouse that is limited in scope.
A) metadata repository
B) master data
C) data model
D) data reduction
E) data mart
data mart
Which of the following statements is true about a data mart?
A) It standardizes the format of data retrieved from different systems.
B) It contains selected information from the data warehouse.
C) It stores master data only.
D) It is is a compilation of data from the database that is organized and produced in printed format.
E) It helps to eliminate data duplication.
It contains selected information from the data warehouse.
Information and knowledge discovery tools are used primarily to ________.
A) standardize the format of data retrieved from different systems
B) reduce the complexity of the data to be analyzed
C) extract information from existing data
D) discover “hidden” predictive relationships in the data
E) allow managers to learn query language for the effective maintenance of the database
extract information from existing data
________ are produced at predefined intervals to support routine decisions.
A) Ad hoc queries
B) Exception reports
C) Drill-down reports
D) Scheduled reports
E) Key-indicator reports
Ad hoc queries
Which of the following statements is true about key-indicator reports?
A) They provide a summary of critical information on a recurring schedule.
B) They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
C) They are produced at predefined intervals to support routine decisions.
D) They highlight situations that are out of the normal range.
E) They answer unplanned information requests to support a nonroutine decision.
They provide a summary of critical information on a recurring schedule.
Which of the following statements is true about exception reports?
A) They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
B) They are produced at predefined intervals to support routine decisions.
C) They answer unplanned information requests to support a nonroutine decision.
D) They provide a summary of critical information on a recurring schedule.
E) They highlight situations that are out of the normal range.
E) They highlight situations that are out of the normal range.
________ help analyze why a key indicator is not at an appropriate level or why an exception occurred.
A) Ad hoc queries
B) Exception reports
C) Drill-down reports
D) Scheduled reports
E) Key-indicator reports
Drill-down reports
Which of the following statements is true about ad hoc queries?
A) They are produced at predefined intervals to support routine decisions.
B) They provide a summary of critical information on a recurring schedule.
C) They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
D) They answer unplanned information requests to support a nonroutine decision.
E) They highlight situations that are out of the normal range.
They answer unplanned information requests to support a nonroutine decision.
________ refers to the process of quickly conducting complex, multidimensional analyses of data stored in a database that is optimized for retrieval, typically using graphical software tools.
A) Inferencing
B) Online analytical processing
C) Normalization
D) Data mining
E) Predictive analysis
Online analytical processing
Online analytical processing tools enable users to ________.
A) discover “hidden” predictive relationships in the data
B) find associations or correlations among sets of items
C) analyze different dimensions of data beyond simple data summaries
D) group related records together on the basis of having similar values for attributes
E) extract textual information from Web documents
analyze different dimensions of data beyond simple data summaries
Which of the following statements is true about online analytical processing server?
A) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
B) It groups related records together on the basis of having similar values for attributes.
C) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
E) It understands how data is organized in the database and has special functions for analyzing the data.
It understands how data is organized in the database and has special functions for analyzing the data.
How do online analytical processing systems improve performance?
A) They preaggregate data so that only the subset of the data necessary for the queries is extracted.
B) They use reasoning methods based on knowledge about a specific problem domain.
C) They make hypothetical changes to the data associated with a problem.
D) They allow for multiple dimensions to be added to a traditional two-dimensional table.
E) They provide capabilities for discovering “hidden” predictive relationships in the data.
They preaggregate data so that only the subset of the data necessary for the queries is extracted.
In online analytic processing systems, ________ are the values or numbers the user wants to analyze.
A) dimensions
B) forms
C) measures
D) queries
E) entities
measures
In online analytic processing systems, ________ provide a way to summarize the data.
A) forms
B) measures
C) facts
D) records
E) dimensions
dimensions
Which of the following statements is true about the online analytic processing cube?
A) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
B) It groups related records together on the basis of having similar values for attributes.
C) It understands how data is organized in the database and has special functions for analyzing the data.
D) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
E) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
Data mining complements online analytic processing in that it ________.
A) finds associations or correlations among sets of items
B) provides capabilities for discovering “hidden” predictive relationships in the data
C) extracts textual information from Web documents
D) groups related records together on the basis of having similar values for attributes
E) analyzes different dimensions of data beyond simple data summaries
provides capabilities for discovering “hidden” predictive relationships in the data
________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals.
A) Data cleansing
B) Normalization
C) Clustering
D) Data reduction
E) Inferencing
Data reduction
Which of the following statements is true about association discovery?
A) It is a technique used to find correlations among sets of items.
B) It is the process of grouping related records together on the basis of having similar values for attributes.
C) It is the use of analytical techniques for extracting information from textual documents.
D) It is a type of intelligent system that uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
E) It makes sure that each table contains only attributes that are related to the entity.
It is a technique used to find correlations among sets of items.
________ is the process of grouping related records together on the basis of having similar values for attributes.
A) Normalization
B) Data mining
C) Clustering
D) Inferencing
E) Slicing and dicing
Clustering
Which of the following is a recording of a user’s path through a Web site?
A) clustering
B) normalization
C) slicing and dicing
D) clickstream data
E) inferencing
clickstream data
________ is the ability to attract and keep visitors.
A) Normalization
B) Inferencing
C) Stickiness
D) Crowdsourcing
E) Visualization
Stickiness
Which of the following analysis are you conducting to make hypothetical changes to the data associated with a problem and observe how these changes influence the results?
A) predictive analysis
B) time-series analysis
C) linear regression analysis
D) what-if analysis
E) multivariate analysis
what-if analysis
Which of the following statements is true about expert systems?
A) It is composed of a network of processing elements that work in parallel to complete a task, attempt to approximate the functioning of the human brain and can learn by example.
B) It is a program that works in the background to provide some service when a specific event occurs.
C) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
D) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
E) It groups related records together on the basis of having similar values for attributes.
It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
Which of the following statements is true about a rule in expert systems?
A) It groups related records together on the basis of having similar values for attributes.
B) It makes sure that each table contains only attributes that are related to the entity.
C) It allows multiple dimensions to be added to a traditional two-dimensional table.
D) It is typically expressed using an “if–then” format.
E) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
It is typically expressed using an “if–then” format.
________ allows expert system rules to be represented using approximations or subjective values in order to handle situations where information about a problem is incomplete.
A) Fuzzy logic
B) Normalization
C) Clustering
D) What-if analysis
E) Stickiness
Fuzzy logic
The processing in an ES is called ________.
A) clustering
B) inferencing
C) normalization
D) recommending
E) data cleansing
inferencing
Which of the following statements is true about neural networks?
A) It allows multiple dimensions to be added to a traditional two-dimensional table.
B) It works in the background to provide some service when a specific event occurs.
C) It attempts to approximate the functioning of the human brain and can learn by example.
D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
E) It helps analyze why a key indicator is not at an appropriate level or why an exception occurred.
It attempts to approximate the functioning of the human brain and can learn by example.
Which of the following statements is true about user agents?
A) They are also known as Web spiders.
B) They are agents that search to find the best price for a particular product you wish to purchase.
C) They are agents that continuously analyze large data warehouses to detect changes deemed important by a user.
D) They are agents that automatically perform a task for a user.
E) They are agents designed by spammers and other Internet attackers to farm e-mail addresses off Web sites or deposit spyware on machines.
They are agents that automatically perform a task for a user.
Which of the following is a role of monitoring and sensing agents?
A) tracking inventory levels
B) sending a report at the first of the month
C) assembling customized news
D) analyzing data warehouses to detect changes deemed important to a user
E) finding the best price for a particular product the user wants to purchase
tracking inventory levels
Which of the following is a role of data mining agents?
A) tracking inventory levels
B) sending a report at the first of the month
C) assembling customized news
D) analyzing data warehouses to detect changes deemed important to a user
E) finding the best price for a particular product the user wants to purchase
analyzing data warehouses to detect changes deemed important to a user
Which of the following statements is true about explicit knowledge assets?
A) It reflects the processes and procedures that are located in a person’s mind on how to effectively perform a particular task.
B) It reflects the person’s ability to effectively solve a problem without external help.
C) It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.
D) It reflects an individual’s special knowledge about a new-to-the-world product.
E) It reflects the strategies that are located in a person’s mind on how to effectively perform a particular task.
It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.
Which of the following is the primary goal of a knowledge management system?
A) Identifying how to recognize, generate, store, share, and manage tacit knowledge.
B) Continuously analyzing large data warehouses to detect changes deemed important by a user.
C) Grouping related records together on the basis of having similar values for attributes.
D) Allowing hypothetical changes to the data associated with a problem to observe how these changes influence the results.
E) Identifying how to recognize, generate, store, share, and manage explicit knowledge.
Identifying how to recognize, generate, store, share, and manage tacit knowledge.
Social network analysis is a technique that attempts to ________.
A) analyze large data warehouses to detect changes deemed important by a user
B) analyze why a key indicator is not at an appropriate level or why an exception occurred
C) discover “hidden” predictive relationships in the data
D) allow hypothetical changes to the data associated with a problem to observe how these changes influence the results
E) find experts in particular subject areas
find experts in particular subject areas
________ refers to the display of complex data relationships using a variety of graphical methods.
A) Normalization
B) Visualization
C) Clustering
D) Inferencing
E) Textual mining
Visualization
Which of the following statements is true about digital dashboards?
A) It is the combination of various analysis techniques and interactive visualization to solve complex problems.
B) It supports usage models like push reporting, exception reporting and alerts, and pull reporting.
C) It can visualize features and relationships between features drawn from an underlying geographic database.
D) Analysts can combine geographic, demographic, and other data for locating target customers.
E) It a system for creating, storing, analyzing, and managing geographically referenced information.
It supports usage models like push reporting, exception reporting and alerts, and pull reporting.
Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends. This usage model is known as ________.
A) exception reporting
B) pull reporting
C) ad hoc reporting
D) drill-down reporting
E) push reporting
push reporting
While using digital dashboards, pull reporting is conducted to ________.
A) alert the user of any items that require immediate attention
B) provide the decision makers with a quick overview of key performance indicators
C) discover “hidden” predictive relationships in the data
D) analyze the root causes of an exception
E) extract textual information from Web documents
analyze the root causes of an exception
Which of the following statements is true about hard data?
A) It involves the use of text mining technologies.
B) It includes nonanalytical information.
C) It involves input from dedicated personnel.
D) It includes textual news stories.
E) It includes facts and numbers.
It includes facts and numbers.
Which of the following explains the phrase “data is geocoded”?
A) It is transformed into coordinates.
B) It is shared in the Internet.
C) It is used to create Web pages.
D) It is compared with similar historical data.
E) It is converted into soft data.
It is transformed into coordinates.
Traditionally, companies are organized around four distinct functional areas. Which of the following is one of those four areas?
A) supply chain management
B) risk management
C) technology management
D) communication management
E) systems management
supply chain management
Which of the following is a core business process?
A) time-to-purchase
B) make-to-stock
C) plan-to-produce
D) account-to-report
E) hire-to-retire
make-to-stock
Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the customer’s credit card. This process of selling a product or service is known as the ________ process.
A) make-to-order
B) time-to-market
C) order-to-cash
D) procure-to-pay
E) make-to-stock
order-to-cash
For most businesses, the ________ process entails subprocesses such as creating a customer record; checking the customer’s creditworthiness; creating an order; checking and allocating stock; picking, packing, and shipping; invoicing; and collecting the payment.
A) order-to-cash
B) make-to-order
C) procure-to-pay
D) make-to-stock
E) plan-to-produce
order-to-cash
An online retailer has finished creating a customer record. What should the retailer do next in an order-to-cash process?
A) create order
B) allocate stock
C) pick, pack, and ship
D) prepare and send invoice
E) check customer credit
check customer credit
In the order-to-cash process, once “checking credit” is done, it is followed by ________.
A) collecting payment
B) creating an order
C) allocating stock
D) picking, packing, and shipping
E) preparing and sending the invoice
creating an order
An online retailer has just finished creating an order for a customer. In an order-to-cash process what should the retailer do next?
A) collect payment
B) create customer record
C) allocate stock
D) pick, pack, and ship
E) prepare and send invoice
allocate stock
The processes associated with the acquiring of goods from external vendors are together referred to as the ________ process.
A) make-to-stock
B) make-to-order
C) order-to-cash
D) plan-to-produce
E) procedure-to-pay
procedure-to-pay
Which of the following is typically the first step in the procure-to-pay process?
A) negotiate price and terms
B) issue purchase order
C) receive goods
D) receive invoice
E) settle payment
negotiate price and terms
In the procure-to-pay process, the negotiation of price and terms is followed by ________.
A) settling the payment
B) creating the customer record
C) issuing the purchase order
D) receiving the goods
E) receiving the invoice
issuing the purchase order
________ immediately after the purchase order is issued in the procure-to-pay process.
A) Payment is settled
B) Price and terms are negotiated
C) Credit is checked
D) Goods are received
E) Invoices are received
Goods are received
Receiving the goods is immediately followed by ________ in the procure-to-pay process.
A) settling the payment
B) negotiating the price and terms
C) issuing the purchase order
D) creating the order
E) receiving the invoice
Receiving the invoice
In the ________ process, goods are produced based on forecasts and are stored in a warehouse and sales orders are then fulfilled from the inventory.
A) configure-to-stock
B) make-to-stock
C) make-to-order
D) engineer-to-order
E) assemble-to-order
make-to-stock
Which of the following uses a push-based approach?
A) order-to-cash
B) procure-to-pay
C) production-to-order
D) make-to-stock
E) make-to-order
make-to-stock
In the ________ process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received.
A) order-to-cash
B) procure-to-pay
C) make-to-stock
D) acquire-to-dispose
E) make-to-order
make-to-order
Which of the following uses a pull-based approach?
A) make-to-order
B) make-to-stock
C) plan-to-produce
D) account-to-report
E) acquire-to-dispose
make-to-order
Which of the following is typically the first step in the make-to-stock process?
A) scheduling production
B) procuring inputs
C) processing sales orders
D) negotiating price and terms
E) creating customer records
procuring inputs
Which of the following goods are typically produced under a make-to-order approach?
A) expensive high-volume goods
B) cheap low-volume goods
C) very expensive low-volume goods
D) mass-produced goods
E) goods from external vendors
very expensive low-volume goods
Which of the following goods are produced using the make-to-order approach?
A) commercial aircraft
B) shampoos
C) lipsticks
D) televisions
E) refrigerators
commercial aircraft
________ are performed by the functional areas that process inputs and produce outputs.
A) Base activities
B) Core activities
C) Support activities
D) Extended activities
E) Focus activities
Core activities
Which of the following is a core activity?
A) human resource activities
B) technology development
C) operations and manufacturing
D) administrative activities
E) infrastructure activities
operations and manufacturing
Inbound logistics involves business activities associated with ________.
A) distributing end products within the order-to-cash business process
B) creating marketing literature
C) communicating with potential and existing customers
D) receiving and stocking raw materials, parts, and products
E) order processing
receiving and stocking raw materials, parts, and products
Assembly processes are ________ activities.
A) outbound logistics
B) marketing and sales
C) customer sales
D) administrative
E) operations and manufacturing
operations and manufacturing
Outbound logistics activities focus on the ________.
A) processing of orders
B) distribution of end products within the order-to-cash business process
C) pricing of goods and services
D) transformation of raw materials into end products
E) receiving and stocking of raw materials, parts, and products
distribution of end products within the order-to-cash business process
The hardware and software that must be implemented to support the applications that the primary activities use are a part of the ________ activities.
A) human resources
B) technology development
C) procurement
D) inbound logistics
E) infrastructure
infrastructure
Which of the following is a support activity?
A) outbound logistics activities
B) operations and manufacturing activities
C) technology development activities
D) customer service activities
E) marketing and sales activities
technology development activities
Human resource activities ________.
A) is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them
B) includes the design and development of applications that support the primary business activities
C) includes the purchasing of goods and services that are required as inputs to the primary activities
D) integrate the internal applications with suppliers, business partners, and customers
E) streamline the organization’s internal value chain
Is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them
Designing and developing applications that support the primary business activities are a part of the ________ activities.
A) operations and manufacturing
B) outbound logistics
C) technology development
D) procurement
E) inbound logistics
technology development
A(n) ________ information flow consists of information that is received from another organization.
A) stand-alone
B) legacy
C) packaged
D) upstream
E) downstream
upstream
A(n) ________ information flow relates to the information that is produced by a company and sent along to another organization.
A) stand-alone
B) legacy
C) packaged
D) custom
E) downstream
downstream
Systems that focus on the specific needs of individual departments and are not designed to communicate with other systems in the organization are referred to as ________.
A) internally focused applications
B) externally focused systems
C) stand-alone applications
D) enterprise-wide systems
E) enterprise-information systems
stand-alone applications
Stand-alone systems are also known as ________.
A) ethernet systems
B) automated business systems
C) peripheral systems
D) legacy systems
E) converter systems
legacy systems
Legacy systems can prove problematic when information from multiple departmental systems is required to support business processes and decision making. Which of the following is most similar to the above scenario?
A) Chuck’s is a retail chain that has an inventory management system which is tied to an RFID system. This system notifies Chuck’s managers when the inventory in its stores fall below a certain level.
B) Quick Software Solutions has an automated system to track employee absence. It also uses a non-automated system like attendance registers that employees sign everyday. This information is updated to Quick’s database management system on a weekly basis.
C) Nuok Tires supplies its products to Fresto, an automobile manufacturer. Nuok Tires’ factories are located close to Fresto’s factories to minimize transportation costs.
D) Fender, a guitar manufacturer, allows customers to design their guitars online. Potential buyers need to send this design with the order to receive their customized guitars.
E) Jsutmi successfully pursues a just-in-time inventory system. Recently, however, it has not been able to meet demand due to labor problems.
Chuck’s is a retail chain that has an inventory management system which is tied to an RFID system. This system notifies Chuck’s managers when the inventory in its stores fall below a certain level.
A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database.
A) legacy system
B) management information system
C) decision support system
D) distributed system software
E) enterprise system
enterprise system
An internally focused system helps an organization coordinate with ________.
A) its suppliers
B) its business partners
C) the government
D) its departments
E) its customers
its departments
A(n) ________ coordinates business processes with customers, suppliers, and business partners of an organization.
A) internally focused system
B) legacy system
C) stand-alone system
D) intermediary system
E) externally focused system
externally focused system
A system that communicates across organizational boundaries is sometimes referred to as a(n) ________.
A) legacy system
B) interorganizational system
C) intraorganizational system
D) internally focused system
E) stand-alone system
interorganizational system
________ are applications written by third-party vendors for the needs of many different users and organizations.
A) Packaged software
B) Custom software
C) Bespoke software
D) Personalized software
E) Tailored software
Packaged software
Applications that are designed and developed exclusively for a specific organization are known as ________.
A) collaborative software
B) custom software
C) groupware
D) ready-made application software
E) packaged software
custom software
Customers can purchase ________ software off the shelf to help them with their personal documents and communications.
A) personalized
B) tailored
C) packaged
D) custom
E) bespoke
packaged
Packaged software is ________.
A) used for standardized, repetitive tasks
B) developed exclusively for a specific organization
C) unique to a particular business or organization
D) an application that needs to be maintained internally when changes are required
E) used to accommodate a customer’s particular preferences and expectations
used for standardized, repetitive tasks
Which of the following software is very cost effective since the vendor that builds the application spreads out the development costs by selling them to a large number of users?
A) packaged software
B) bespoke software
C) adapted software
D) corrected software
E) custom software
packaged software
Which type of software is best suited for tasks that are unique to a particular business?
A) collaborative
B) custom
C) groupware
D) packaged
E) ready-made application
custom
Which of the following is true regarding packaged software and custom software?
A) Packaged software are applications that are designed and developed exclusively for a specific organization.
B) The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them.
C) Packaged software is well suited for tasks that are unique to a particular business.
D) Custom software is cost effective since the vendor that builds the application can spread out development costs through selling to a large number of users.
E) Custom software is highly useful for standardized, repetitive tasks, such as writing a report or preparing a presentation.
The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them.
The features and modules that an enterprise system comes with out of the box are referred to as the ________.
A) best-practices version
B) reengineered version
C) vanilla version
D) customized version
E) modified version
vanilla version
________ is a systematic, structured improvement approach by all or part of an organization whereby people critically examine, rethink, and redesign business processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle time, or cost.
A) Business process management
B) Business activity monitoring
C) Business service management
D) Application performance management
E) Application service management
Business process management
In the 1990s, business process management was known as ________.
A) business systems management
B) business process reengineering
C) business service reengineering
D) application performance management
E) application service management
*document from Marz said business process management
business process reengineering
After deciding to focus on business process management, the management of a company has just finished developing a vision for the organization. This vision specifies the company’s business objectives. Typically, what should be the management’s next step?
A) They should identify the ways in which information systems can be used to improve the various business processes.
B) They should design and implement a prototype of the new processes.
C) They should manage the information technology to be used from a business transaction perspective.
D) They should identify the critical processes that are to be redesigned.
E) They should understand and measure the existing processes as a baseline for future improvements.
They should identify the critical processes that are to be redesigned.
After identifying the ways in which information systems can be used to improve the processes, which of the following is the next step in business process management?
A) identifying the critical processes that are to be redesigned
B) understanding and measuring the existing processes as a baseline for future improvements
C) reducing costs and shortening the time it takes to get products to market
D) designing and implementing a prototype of the new process
E) developing a vision for the organization that specifies the business objectives
designing and implementing a prototype of the new process
How is business process management similar to total quality management?
A) They are intended to be cross-functional approaches to improve an organization.
B) They focus on radical redesign and drastic improvement of processes.
C) They focus on incremental change of processes.
D) They focus on the activities typically occurring at the operational level of the organization.
E) They focus on providing capabilities for discovering “hidden” predictive relationships while conducting a forecast.
They are intended to be cross-functional approaches to improve an organization.
Applications that integrate business activities across departmental boundaries are often referred to as ________ systems.
A) manufacturing resource planning
B) computer-integrated manufacturing
C) capacity requirement planning
D) enterprise resource planning
E) materials requirement planning
enterprise resource planning
Which of the following is true regarding enterprise resource planning (ERP)?
A) It stores data in different locations.
B) It is an older version of materials requirement planning.
C) It helped in developing the manufacturing resource planning package.
D) Stand-alone applications are a developed version of ERP.
E) It makes the process of sharing information between business activities easier.
It makes the process of sharing information between business activities easier.
________ support the important internal activities of the organization for producing their products and services.
A) ERP focus components
B) ERP core components
C) ERP extended components
D) ERP base components
E) ERP covering components
ERP core components
Financial management, operations management, human resource management, and other important internal activities require the support of ________.
A) ERP essence components
B) ERP exterior components
C) ERP core components
D) ERP extended components
E) ERP basis components
ERP core components
________ support the primary external activities of the organization for dealing with suppliers and customers.
A) ERP components
B) ERP aggrandized components
C) ERP abridged components
D) ERP extended components
E) ERP core components
ERP extended components
Specifically, ERP extended components focus primarily on ________.
A) customer relationship management and product lifecycle management
B) product lifecycle management and supply chain management
C) customer relationship management and human capital management
D) human capital management and supply chain management
E) customer relationship management and supply chain management
customer relationship management and supply chain management
Which of the following is true regarding the formula for success of an enterprise system?
A) Enterprise systems implementations should include personnel from different departments.
B) The success of an enterprise system depends directly on the support received from middle-management.
C) Enterprise systems are simple to understand and implement when compared to stand-alone systems.
D) Using outside consultants tends to complicate the implementation of an enterprise system.
E) Once enterprise systems go live, employees experience an immediate growth in productivity.
Enterprise systems implementations should include personnel from different departments.
In service-oriented architecture, ________.
A) business processes are broken down into individual components or services
B) business processes of an organization are standardized
C) business processes of an organization are integrated from individual components
D) business processes are shared with channel partners
E) business processes are modified to prevent illegal activities within the process
business processes are broken down into individual components or services
By breaking down business processes into individual services, organizations can react more swiftly to changing business needs. To achieve these benefits, services have to follow three main principles:
A) reusability, interoperability, and reliability
B) reusability, reliability, and componentization
C) reusability, interoperability, and componentization
D) reusability, interoperability, and accessability
E) reusability, accessability, and componentization
reusability, interoperability, and componentization
Traditionally, companies are organized around four distinct functional areas. Which of the following is one of those four areas?
Supply Chain Management
Whenever an order is placed with online retailers, the retailers put together the order, ship it, and change the customer’s credit card. This process of selling a product or service is known as the _______ Process
Order-To-Cash
Inbound logistics involves business activities associated with
Receiving and stocking raw materials, parts, and products
Which of the following is a support activity
technology development activities
The purpose of a data warehouse is to _______
put up key business information into the hands of more decision makers
Information and knowledge discovery tools are used primarily to _____
extract information from existing data
Which of the following statements is true about association discovery
it is a technique used to find correlations among sets of items
Which of the following analysis are you conducting to make hypothetical changes to the data associated with a problem and observe how these changes influence the results
What-if-Analysis
Which of the following statements is true about explicit knowledge assets
it reflects knowledge that can be documented, archived, and codified, often with the help of information systems
Which of the following is the primary goal of a knowledge management system
identifying how to recognize, generate, store, share, and manage tactic knowledge
______ refers to the display of complex data relationships using a variety of graphical methods
visualization
Which of the following statements is true about digital dashboards
it supports usage models like push reporting, exception reporting and alerts, and pull reporting
Which of the following statements is true about business intelligence
it is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions
Responding to threats and opportunities and continuous planning is based on analyzing data from the ______ level of the organization
operational
Taking entities as tables, each row is a
record
An attribute is also referred to as a(n)
field
A common way to represent a data model is in a(n)
entity-relationship diagram
Data type helps the DBMS
allocate storage space
In DBMS, normalization helps to _______
eliminate data duplication
Bringes, a retail chain, has retail stores across three states. WIth its current legacy system, Bringes is having problems tracking the inventory levels for its stories. It is planning to implement Oracle database systems to replace this legacy system….
Bringes’ channel partners use a database system that supports the Oracle database system
Treston, an automobile manufacturer, has recently implemented a new database system….
Treston’s new database system was not supported by the database system of its suppliers and distributors
Business rules are captured by the designers of the database and included in the data dictionary to ______
prevent illegal or illogical entries from entering the database
A query is used to _____
retrieve information from a database
Which of the following statements is true about an operation system
it consists of narrow and simple updates and queries
Legacy systems can prove problematic when information from multiple departmental systems is required to support business processes and decision making. Which of the following is most similar to the above scenario
Jsutmi successfully pursues a just-in-time inventory system. Recently, however, it has not been able to meet demand due to labor problems
A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company wide basis using one large database
enterprise system
A system that communicates across organizational boundaries is sometimes referred to as a(n) _______
interorganizational system
Which of the following is true regarding packaged software and custom software?
The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them
_______ is a systematic, structured improvement approach by all or part of an organization whereby people critically examine, rethink, and redesign business processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle time, or cost
Business process management
After deciding to focus on business process management the management of a company has just finished developing a vision for the organization. This vision specifies the company’s business objectives. Typically what should be the managements next step
they should identify the critical processes that are to be redesigned
Which of the following is ture regarding enterprise resource planning (ERP)
It makes the process of sharing information between business activities easier
Which of the following is true regarding the formula for success of an enterprise system
Enterprise systems implementations should include personnel from different departments
The first phase of the systems development lifecycle is systems design.
FALSE
Requirements collection is the process of gathering and organizing information to understand how a proposed information system should function.
TRUE
Strategic alignment considers the number of individuals and the length of time needed to complete a project.
FALSE
In an entity-relationship diagram, each data entity can have only one attribute that describes it.
FALSE
Data flows represent the movement of data through an organization or within an information system.
TRUE
Processing logic represents the way in which data are transformed.
TRUE
System conversion is the process of decommissioning the current way of doing things and installing the new system in the organization.
TRUE
Corrective maintenance involves making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment.
FALSE
Purchasing an existing system from an outside vendor is referred to as outsourcing.
FALSE
An RFP is sent to buyers who might potentially be interested in buying hardware and/or software for the system.
FALSE
Systems benchmarking is the use of standardized performance tests to facilitate comparison between systems.
TRUE
Public domain software severely restricts access to the source code and gives users no rights to copy or modify the software.
FALSE
In a basic relationship, the buyer and the supplier set preferences and prices to the benefit of each other.
FALSE
Social media is a classification of Web 2.0 applications.
TRUE
Open source software is an example of the power of collective intelligence.
TRUE
Blogs are the only type of Web 2.0 application that are without controversy.
FALSE
Social presence tools are designed for lengthy posts.
FALSE
Asynchronous discussion forums emulate real-time written conversations.
FALSE
While individuals run successful small businesses in consumer-oriented virtual worlds, large companies have not been able to realize the potential of those environments beyond providing virtual showcases for their products.
TRUE
Shared content is hosted on media sharing sites; however, the content can also be embedded into other sites.
TRUE
The size of a word in a tag cloud represents its importance or frequency so that it is easy to spot the most important or frequent words or tags.
TRUE
Adding geospatial metadata to media is referred to as geotagging.
TRUE
E-mail is an example of synchronous communication.
FALSE
Web-based collaboration tools allow for easy access and easy transferability from one person to another, as the tools can run on any computer with a Web browser and Internet connectivity.
TRUE
Web-based collaboration tools are most suitable for working professionals who travel regularly.
FALSE
In a content management system, the editor is responsible for publishing new information.
FALSE
In a content management system, the guest can only view digital information.
TRUE
Content management systems are also known as digital asset management systems.
TRUE
Changes made to the content on a wiki cannot be reverted.
FALSE
The term viral marketing describes how good marketing techniques can be driven by sending out massive amounts of spam.
FALSE
The central idea behind Web services is that any device can use any network to access any service.
TRUE
Widgets have a standard format.
FALSE
Enterprise 2.0 applications work well within traditional top-down organizational structures based on rigid hierarchies and control.
FALSE
Which of the following IS personnel is responsible for the maintenance of information systems?
A) a systems analyst
B) a database administrator
C) a programmer
D) an IS security manager
E) a systems consultant
B
Which of the following IS personnel is responsible for coding, testing, debugging, and installing programs?
A) a programmer
B) a systems consultant
C) an IS manager
D) a systems analyst
E) an IS security manager
A
Which of the following IS personnel is responsible for strategic planning and IS use throughout a firm?
A) the chief information officer
B) the IS security manager
C) the IS manager
D) the Webmaster
E) the IS auditor
A
In information systems management, a systems consultant is responsible for ________.
A) analyzing business requirements and selecting information systems that meet those needs
B) coding, testing, debugging, and installing programs
C) auditing information systems for compliance with internal and external standards
D) managing security measures and disaster recovery
E) providing information systems knowledge to external clients
E
Which of the following IS personnel is responsible for analyzing business requirements and selecting information systems that meet those needs.
A) a programmer
B) a systems consultant
C) an IS manager
D) a systems analyst
E) an IS security manager
D
Services offered by Google, such as Gmail, Google docs, or Google Calendar are examples of cloud computing.
TRUE
The purpose of a knowledge management system is to create, store, analyze, and manage spatial data.
FALSE
Organizational learning is the ability of an organization to use past behavior and information to improve its business processes.
TRUE
A combined automating and learning approach, in the long run, is more effective than an automating approach alone.
TRUE
Increased costs and reduced quality are implications for firms that face an increasing threat of new entrants in its markets.
FALSE
Many organizations use the Internet to connect businesses with one another electronically so that they can exchange orders, invoices, and receipts online in real time. These systems are called intranets.
FALSE
Choosing and implementing an emerging information system is not sufficient to gain or sustain competitive advantage.
TRUE
The most significant change in the Information Systems field has been in mind-sets about technology rather than in technology itself.
TRUE
The e-business innovation cycle puts technology ahead of strategy and marketing.
TRUE
As digital technologies increase in capabilities and at the same time decrease in cost, the industry as a whole will see rapid cost reductions.
TRUE
Freeconomics is used by non-profit organizations because companies do not make money with this value proposition.
FALSE
Information systems infrastructure consists of hardware, software, communication and collaboration networks, databases, facilities, and human resources.
TRUE
Monitors and printers are examples of input technologies.
FALSE
Primary storage is nonvolatile memory.
FALSE
Primary storage is considerably faster than secondary storage.
TRUE
Software refers to programs, or sets of instructions, that allow all the hardware components in your computer system to speak to each other and to perform the desired tasks.
TRUE
The application software transparently controls the computer’s basic operations.
FALSE
A hypertext document is also known as a Web page.
TRUE
The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.
TRUE
Electronic commerce is limited to transactions between businesses and consumers, which is known as business-to-consumer (B2C) EC.
FALSE
Companies pursuing a click-only business strategy approach business activities in a traditional manner by operating physical locations.
FALSE
Companies pursuing a click-and-mortar business strategy have no physical store locations, allowing them to focus purely on electronic commerce.
FALSE
TRUE
TRUE
Click-only companies can often compete more effectively on price since they do not need to support the physical aspects of the click-and-mortar approach.
TRUE
Prior to the introduction of the Internet and Web, the use of EDI was generally limited to large corporations.
TRUE
Extranets look and act like public Web sites.
TRUE
Extranets do not impact a company’s bottom line.
FALSE
Supplier portals automate the business processes involved in procuring products.
TRUE
In global B2B transactions, organizations often use letters of credit issued by a bank to make payments.
TRUE
An electronic meeting system is a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting.
TRUE
M-commerce is defined as any electronic transaction or information interaction conducted using a wireless, mobile device and mobile networks that leads to the transfer of real or perceived value in exchange for information, services, or goods.
TRUE
Government-to-business (G2B) EC does not involve businesses’ relationships with all levels of government.
FALSE
Taking entities as tables, each row is a ________.
A) field
B) record
C) attribute
D) form
E) query
B
Taking entities as tables, each column is a(n) ________.
A) attribute
B) record
C) form
D) bot
E) query
A
An attribute is also referred to as a(n) ________.
A) form
B) record
C) field
D) query
E) bot
C
A(n) ________ is a collection of related attributes about a single instance of an entity.
A) bot
B) form
C) query
D) field
E) record
E
In DBMS, data are kept separate from the applications’ programming code. This means that ________.
A) an application cannot be changed without making changes to the database
B) an application’s programming code needs to be updated continuously to keep up with the database
C) an application needs to be changed when database is changed
D) database does not need to be changed if a change is made to an application
E) database needs to be changed when a change is made to an application
D
Data type helps the DBMS ________.
A) present the data in a useful format
B) format data
C) allocate storage space
D) eliminate data duplication
E) retrieve information
C
A(n) ________ is a unique identifier that should be created and used when designing a database for each type of entity, in order to store and retrieve data accurately.
A) foreign key
B) surrogate key
C) primary key
D) superkey
E) candidate key
C
In which of the following database models does the DBMS view and present entities as two-dimensional tables, with records as rows, and attributes as columns?
A) relational database model
B) hierarchical database model
C) network database model
D) object-oriented database model
E) semantic database model
A
The most common DBMS approach in use today is the relational database model.
TRUE
Elimination of data redundancy is a major goal and benefit of using data normalization techniques.
TRUE
Structured Query Language is the most common language used to interface with databases.
TRUE
Online analytical processing systems are designed for efficient retrieval of data and categorize data as measures and dimensions.
TRUE
Data mining algorithms search for redundancies that are hidden in the data.
FALSE
Text mining refers to extracting textual information from Web documents.
FALSE
Business analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes.
TRUE
Expert systems are used to mimic human expertise by manipulating knowledge rather than simply manipulating information.
TRUE
Traditionally, companies are organized around four distinct functional areas, namely, marketing and sales, supply chain management, accounting and finance, and information systems management.
FALSE
The core business processes common to most business organizations are order-to-cash, procure-to-pay, and make-to-stock.
TRUE
The order-to-cash process entails subprocesses such as price and terms negotiations, issuing of the purchase order, receiving the goods, and receiving and paying the invoice.
FALSE
The processes associated with procuring goods from external vendors are together referred to as the procure-to-pay process.
TRUE
In the make-to-stock process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received.
FALSE
The make-to-order process uses the pull-based approach.
TRUE
Systems that focus on the specific needs of individual departments are typically not designed to communicate with other systems in the organization and are therefore referred to as stand-alone applications.
TRUE
A legacy system is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database.
FALSE
Rather than storing information in separate places throughout the organization, enterprise systems provide a central repository common to all corporate users.
TRUE
Internally focused systems coordinate business processes with customers, suppliers, and business partners.
FALSE
A system that communicates across organizational boundaries is sometimes referred to as an interorganizational system (IOS).
TRUE
Customer relationship management applications concentrate on the activities involved in promoting and selling products to the customers as well as providing customer service and nourishing long-term relationships.
TRUE
Enterprise resource planning replaces stand-alone applications by providing various modules based on a common database and similar application interfaces that service the entire enterprise rather than portions of it.
TRUE
Enterprise resource planning control refers to the locus of control over the computing systems and data contained in these systems, as well as decision making authority.
TRUE
There are two major categories of enterprise resource planning (ERP) components – ERP core components and ERP extended components.
TRUE
Enterprise resource planning core components support the primary external activities of the organization for dealing with suppliers and customers.
FALSE
Enterprise resource planning extended components support internal operations such as financial management, operations management, and human resource management.
FALSE
The main objective of enterprise systems is to create competitive advantage by streamlining business activities within and outside a company.
TRUE
The flow of materials from suppliers to customers can be described as a supply network.
TRUE
Just-in-time is a business model in which the suppliers manage the manufacturer’s inventory based on preestablished service levels.
FALSE
One major problem affecting supply chains are ripple effects referred to as the multiplier effect.
FALSE
Supply chain management improves the coordination of suppliers, product or service production, and distribution.
TRUE
Supply chain management is primarily used to optimize business processes within the organization.
FALSE
Supply chain execution involves the development of various resource plans to support the efficient and effective production of goods and services.
FALSE
Although RFID tags contain more information than bar codes, they require time-consuming hand
scanning.
FALSE
Customer relationship management systems collect the data that can be mined to discover the next product line extension that consumers covet.
TRUE
Customer relationship management applications are commonly integrated with a comprehensive enterprise resource planning implementation to leverage internal and external information to better
serve customers.
TRUE
Customer relationship management allows organizations to focus on driving revenue as well as on reducing costs, as opposed to emphasizing only cost cutting.
TRUE

Need essay sample on "MIS 201 – Chapter 6 & 7"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy