Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Q1. Which of the following is a characteristic of competitive advantage?
a. It is a long lasting edge over competitors if based on IT.
b. It is short-lived if competitors quickly duplicate it.
c. It requires the use of social media and networks.
d. It always provides a big strategic payoff.

Q2. __________ is a series of processes in which an organization selects and arranges its businesses or services to keep the organization viable even when unexpected events disrupt its businesses, markets, products, or services.
a. Strategic planning
b. SWOT
c. Value proposition
d. Threat analysis

Q3. Managers decide to increase the number of new accounts by 4.0% within the next quarter. This is an example of:
a. an objective.
b. a strategy.
c. customer loyalty.
d. qualitative metric.

Q4. __________ involve the purchase of materials, the processing of materials into products, and delivery of products to customers.
a. Supply chains
b. Logistics
c. Primary activities
d. Support activities

Q5. How a company generates revenue from its assets is referred to as its __________.
a. asset infrastructure
b. business model
c. corporate culture
d. organizational structure

Q6. The value of an information system is determined by the relationships among ISs, people, and business processes which are influenced strongly by:
a. fast, accurate communication and collaboration.
b. huge amounts of information that is accessible via networks.
c. organizational culture..
d. automation of decision making

Q7. Ethical issues can be challenging because:
a. there are no standards of right and wrong.
b. security is more important than privacy.
c. all countries agree on what is ethical.
d. what is considered ethical by one person may seem unethical to another.

Q8. __________ consists of data that have been processed, organized, and put into context to be meaningful, and to convey understanding, experience, accumulated learning, and expertise.
a. Information
b. A transaction
c. Knowledge
d. Wisdom

Q9. Sales of fresh produce drop during an E. coli food contamination crisis. What type of reports would be generated in this unique situation?
a. Periodic
b. Exception
c. Ad hoc
d. Functional

Q10. __________ is the science concerned with managing material and information flows to optimize supply chain operations.
a. Database management
b. Process control
c. Logistics
d. Sourcing

Q11. __________ is data that has been processed, organized, or put into context so that it has meaning and value to the person receiving it.
a. Information
b. A transaction
c. Knowledge
d. A report

Q12. Which of the following represents the evolution to Internet-based infrastructure?
a. public cloud computing; private cloud computing; virtualization
b. wired; wireless; mobile computing
c. virtualization; cloud computing; enterprise computing
d. virtualization; private cloud computing; cloud computing

Q13. Decision support systems are __________ that support unstructured and semi-structured decision making.
a. interactive applications
b. reporting applications
c. operations support systems
d. process control systems

Q14. A __________ consists of stored data organized for access, search, retrieval, and update.
a. file
b. database
c. TPS
d. system

Q15. According to the principle of __________, the more recent the data, the more valuable they are.
a. data uncertainty
b. 90/90 data use
c. diminishing data value
d. data in context

Q16. Records can be arranged in several ways on a storage medium. The arrangement of records determines:
a. how individual records can be accessed.
b. how long it takes to access records.
c. how individual records can be accessed and how long it takes to
access them.
d. the storage media used for storage.

Q17. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.
a. electronic records management
b. database management
c. archive management
d. infrastructure management

Q18. The high costs of data warehouses can make them too expensive for a company to implement. As an alternative, many firms create lower-cost, scaled-down __________.
a. data marts
b. data stores
c. multidimensional databases
d. SBUs

Q19. Creating backups of records is not a form of electronic records management (ERM) because:
a. the content on backups is not organized so that it can be accurately and easily retrieved.
b. business records and documents may need to be modified.
c. records and documents cannot be stored together.
d. the requirement to save records is new.

Q20. In the healthcare industry, data errors __________.
a. increase healthcare costs by billions of dollars
b. have minimized healthcare costs
c. have no impact on patient care
d. have been eliminated by the use of data warehousing

Q21. Which of the following is a dysfunction of the group process?
a. Social pressures of conformity can lead to groupthink.
b. A group may produce synergy during problem solving.
c. Group members may have their egos embedded in the decision, and so
they may be committed to the solution.
d. Groups are better than individuals at understanding problems.

Q22. __________ is the throughput capacity of a network, which is a measure of the speed at which data is transmitted.
a. Bandwidth
b. Protocol
c. TCP/IP
d. Broadband

Q23. Networks transmit __________, which carry voice or data between a sender and a receiver.
a. nodes
b. routers
c. signals
d. switches

Q24. __________ shows the power of the individual in the connected age a better research tool than major corporations had in the 1990s.
a. Facebook
b. Google
c. Microsoft
d. eBay

Q25. Connectivity and mobility are __________ issues.
a. 4G
b. network
c. Wi-Fi
d. social media

Q26. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.
a. content indexing
b. usernames and passwords
c. biometrics
d. encryption

Q27. A(n) __________ is the probability of a threat exploiting a vulnerability.
a. threat
b. risk
c. vulnerability
d. exploit

Q28. Facebook, YouTube, Twitter, LinkedIn, and other social networks are making IT security dangers worse. Why?
a. Users invite in and build relationships with others. Cybercriminals hack into these trusted relationships using stolen log-ins.
b. E-mail viruses and malware have been increasing for years even though e-mail security has improved.
c. Communication has shifted from social networks to smartphones.
d. Web filtering, user education, and strict policies cannot help prevent IT security dangers on Facebook and other social networks.

Q29. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
a. Wireless packet analyzers
b. Password crackers
c. Firewall sniffers
d. Intrusion detectors

Q30. Before the people who are responsible for security make any decisions about infosec defenses, they must understand __________.
a. the requirements and operations of the business
b. how firewalls, anti-virus software, and other technology function
c. tactics of hackers, fraudsters, botnets, and identity thieves
d. how much to invest in risk management

Q31. A(n) __________ is something or someone that may result in harm to
an asset.
a. threat
b. risk
c. vulnerability
d. exploit

Q32. __________ is the chain of events linking the business continuity plan to protection and to recovery.
a. Disaster recovery
b. Auditing
c. Date recovery
d. Internal control

Q33. E-procurement strategies and solutions have two basic goals, which are _____.
a. to control costs and simplify processes
b. collaboration and negotiation
c. supplier selection and product selection
d. RFQ processing and exchanges

Q34. __________ refers to word-of-mouth marketing in which customers promote a product or service by telling others about it.
a. Affiliate marketing
b. Customizing ads
c. Sourcing
d. Viral marketing

Q35. Online channels and connectivity support __________, which minimizes the limitations of having to be physically present in a single location to collaborate or train.
a. the e-business process
b. telepresence
c. community
d. self-service

Q36. One of the problems with __________ advertising is that advertisers knew very little about the recipients.
a. direct mail
b. Web
c. interactive
d. social media

Q37. __________ is the filtering out of irrelevant information for consumers in order to reduce their information overload.
a. Affiliate marketing
b. Customizing ads
c. Sourcing
d. Viral marketing

Q38. American Express developed tools that improved compliance with procurement rules on indirect purchases, or MRO supplies. One of the major performance improvements was the __________.
a. increase in spot buying
b. elimination of maverick buying
c. reduction in billing errors
d. increase in purchases from local vendors

Q39. Which is not one of the three dominant PC operating systems (OSs)?
a. Apple
b. Java
c. Linux
d. Microsoft Windows

Q40. The __________ is expected to emerge as the predominant market for mobile banking services done via cell phones or other mobile device.
a. Asia-Pacific region
b. European Union (EU)
c. United States (US)
d. United Kingdom (UK)

Q41. According to the Daiwa Institute of Research, __________ account(s) for most of the purchases that are done on mobile phones, if the users are on flat-fee-based service.
a. entertainment
b. impulse shopping
c. travel
d. sports

Q42. Applying mobile computing to __________ may have strategic implications by shortening cycle time, reducing delays, and improving supplier and customer relationships. Such solutions enable organizations to proactively adjust plans or shift resources.
a. operations
b. job dispatch
c. supply chains
d. sales

Q43. End users can access a WLAN with their laptops, desktops, or PDAs by adding a(n) __________.
a. 4G network
b. Internet protocol
c. access point
d. wireless network card

Q44. A __________ device allows improved response with reduced resources, real-time tracking of work orders, increased dispatcher efficiency, and a reduction in administrative work.
a. mobile POS
b. inventory management
c. job dispatching
d. SCM

Q45. __________, such as Facebook, represent a special type of virtual community and are now the dominant form of online community. Individual users maintain an identity through their profile, for e.
a. Social graphs
b. RSS
c. Mashups
d. Social networking sites

Q46. Organizations previously communicated with their audiences using a __________ model, where messages flowed from the sender to the receiver. Now, they must learn to use a __________ model, where communication flows back and forth between sender and receiver.
a. talking; listening
b. outbound; inbound
c. broadcast; conversation
d. indirect; direct

Q47. Which is not a social media survey metric?
a. time spent on site
b. satisfaction
c. content relevance
d. quality and speed of issue resolution

Q48. Which of the following is a characteristic of Web 2.0?
a. static pages
b. user controlled content
c. the goal of marketing is to influence buyers
d. single source of data

Q49. WedMD is one of the popular __________, which are communities organized by interest, such as hobbies, vocations, political parties, and unions.
a. affinity portals
b. associations
c. ethnic communities
d. B2B online communities

Q50. Web 2.0 is also referred to as the __________.
a. public Internet
b. online community
c. Blog 2.0
d. social Web

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91997264
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Management Information System

Suppose that frames are 500 bytes long which includes 58

Suppose that frames are 500 bytes long which includes 58 bytes of overhead. Also assume that ACK frames are 64 bytes long. a) The transmission uses Stop-and-Wait ARQ. Let the transmission rate of the system be R where R= ...

Management of it systems and projects assignment - work

Management of IT Systems and Projects Assignment - "Work Breakdown Structure & Project Schedules using Microsoft Project" There are two parts to this assignment: Part 1: MS Project Project Title: Dai-Ichi Corporation Aus ...

1 with the explosion of users on social media sites

1. With the explosion of users on social media sites, businesses need to establish their presence on social media sites. Just search for "Vans" or "Starbucks" on Facebook for examples of company sites. To manage their in ...

1 discussion questionsearch scholar google for a company

1. Discussion Question Search "scholar google" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes wer ...

Team leadershipmanagement stylepart 1 according to the

Team Leadership/Management Style Part 1: According to the Sarin and O'Connor (2009) article, certain style and goal structures of team leaders have a strong influence on internal team dynamics. Based on your research wit ...

Discussion 1security countermeasures and strategic

Discussion 1. "Security Countermeasures and Strategic Governance" Please respond to the following: • Recommend three countermeasures that could enhance the information security measures of an enterprise. Justify your rec ...

The case study information systems failure at integrated

The case study Information Systems Failure at Integrated Solutions is a supplementary online case by Jessup and Valacich. Jessup, L., & Valacich. J. (2010). Chapter 8. Information Systems Today: Why IS Matters. Pearson P ...

Outlinesubmit a one page outline with your proposed term

Outline: Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. Term paper on a computer related crime which can be solved by using ...

As the new manager of a convenience store you have noticed

As the new manager of a convenience store, you have noticed issues with the manual method of tracking sales using paper sales tickets and spreadsheets, as well as, shortages on some of the more popular items carried in t ...

Questions what is your practical experience with physical

Questions : What is your practical experience with Physical Security Protocols? In your current job, what are the physical security protocols that you are required to follow and explain the one you find most annoying? Wh ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As