Which of the following statements is true about the quality of information?
Information should be just barely sufficient for its purpose.
Which of the following components of an information system is the easiest to change and results in the least amount of organizational disruption?
According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems.
Which of the following is a major implication of Moore’s Law?
Costs of communications and storage have become very low.
________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
Which of the following statements is true of information technology (IT)?
Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information.
Which of the following is considered information rather than mere data?
the return on investment of an advertising campaign
Mark follows certain steps to access the supplementary readings for a course when using his organization’s library management system. These steps that he follows are examples of the ________ component of an information system.
The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers.
Which of the following is a critical characteristic of good information?
Which of the following is a primary activity in the value chain?
receiving and distributing inputs to the product
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
Which of the following is a support activity in the value chain of a firm?
setting up contractual arrangements for procurement
Porter’s five forces model is used to assess ________.
Which of the following statements is true of business process designs?
Most process designs require people to work in new ways.
The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter’s five forces model, this statement illustrates ________.
high levels of rivalry
Which of the following principles of competitive advantage is related to process implementations?
locking in suppliers
Which of the following principles of competitive advantage is associated with product implementations?
differentiating service offerings
According to Porter’s five forces model, which of the following would be most affected by the threat of substitutes?
Which of the following statements is consistent with the central idea of business process design?
Organizations should create new business processes rather than improve existing systems.
Organizational feasibility assesses ________.
whether the new system fits within the organization’s customs or legal requirements
A ________ shows the tasks, dates, and dependencies for the tasks of a project.
Which of the following are the four dimensions of feasibility?
cost, schedule, technical, and organizational feasibility
The traditional process for developing information systems is ________.
the systems development life cycle
Which of the following statements is true of the swim-lane layout used for modeling the business processes?
It draws attention to the interactions among components of the diagram.
In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process.
A ________ involves balancing three critical factors: requirements, cost, and time.
In business process management (BPM), an as-is model ________.
documents the existing business process
The situation where addition of resources creates inefficiencies is known as ________.
diseconomies of scale
Which of the following statements is true about the relationship between business processes and information systems?
A business process need not relate to any information system, but an information system relates to at least one business process.
Which of the following is an international standard language for processing a database?
In an E-R diagram, a line between two entities represents a(n) ________.
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required.
A ________ describes the data and relationships that will be stored in a database.
Which of the following refers to the problem that exists in database applications when two users modify the same data item, but only one of those changes is recorded?
Entities in a data model have ________ that describe the characteristics of the entity.
________ is the process of converting a poorly-structured table into two or more well-structured tables.
A(n) ________ is a request for data from a database.
The columns in a database are called ________.
Each entity in a database has a unique attribute called a(n) ________.
Virtualization is the process by which ________.
one computer hosts the appearance of many computers
Linux is an example of a(n) ________.
open source operating system software
Which of the following memory devices is volatile in nature?
A client-server application that requires nothing more than a browser is called a(n) ________.
The ________ is sometimes called “the brain” of the computer.
central processing unit
A thin-client application is designed to run within a program such as ________.
Microsoft Internet Explorer
________ is installed in special, read-only memory in devices like printers, print servers, or various types of communication devices.
Thin-client applications are typically limited by the capabilities of the ________.
Which of the following statements is true of firmware?
Users do not need to load firmware into the device’s memory.
Which of the following terms refers to a collection of servers?
Which of the following is a characteristic of in-house hosting?
in-depth visibility of disaster preparedness
A private internet that is used exclusively within an organization is called a(n) ________.
A(n) ________ is a number that identifies a particular device.
A(n) ________ uses the Internet to create the appearance of private, secure connections.
Which of the following TCP/IP application-layer protocols is used for email transmissions?
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.
Which of the following characteristics is a disadvantage of in-house hosting?
A ________ is a set of rules that programs on two communicating devices follow.
Which of the following is a function of an ISP?
It serves as a gateway to the Internet.
Which of the following protocols guarantees secure data transmission?