MIS MT3

Card Set Information

Author:
emach532
ID:
214583
Filename:
MIS MT3
Updated:
2013-04-20 02:46:05
Tags:
emach532 MIS
Folders:

Description:
MIS MT3
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user emach532 on FreezingBlue Flashcards. What would you like to do?


  1. Deleting problematic content on social networking sites is best reserved for when ________.
    a.  the content is obscene and inappropriate
  2. E-commerce leads to ________, which is the elimination of middle layers of distributors and suppliers.
    b.  disintermediation
  3. Meaningful social networking applications ________.
    b.  address real needs
  4. ________ are a form of User-Generated-Content in which customers and partners can offer advice and assistance regarding products.
    c.  Wikis and blogs
  5. Clearinghouses ________.
    a.  provide goods and services at a stated price
  6. The use of User-Generated Content has been decreasing with the growth of e-commerce and Web 2.0.
    a.  false
  7. Deleting content on User-Generated-Content sites should be reserved for contributions that criticize a firm's products or services.
    a. false
  8. Social networking groups can be of three types. The group that anyone can find by searching, and anyone can join it is a(n) ________ group.
    b. public
  9. Social networking applications run on servers provided by ________.
    c. the application's creator
  10. If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.
    a. leave it
  11. A typical information system for B2C provides a Web-based application or Web __________ by which customers enter and manage their orders.
    storefront
  12. Price __________ measures the amount that demand rises or falls with changes in price.
    elasticity
  13. When you buy direct from a manufacturer from their Web site, eliminating the distributor and maybe the retailer, you are engaging in the process of __________.
    disintermediation
  14. Electronic exchanges that serve to match up buyers and sellers are an example of __________.
    clearinghouses
  15. __________ is the elimination of the middle layers in the supply chain.
    disintermediation
  16. 1 petabyte is made up of ________ bytes.
    b. 1015
  17. With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis.
    b. true
  18. Knowledge management streamlines operations and reduces costs by eliminating redundant or unnecessary processes.
    b. true
  19. Which of the following observations concerning expert systems is true?
    c. They are difficult and expensive to develop
  20. Which of the following is a standard for subscribing to content sources?
    c. Real Simple Syndication
  21. Which of the following can store the maximum amount of data?
    a. 1 exabyte (EB)
  22. In market-basket terminology, the ratio of confidence to the base probability of buying an item is the ________. 
    a. lift
  23. A market-basket analysis is a data-mining technique used for determining sales patterns.
    b. true
  24. Reporting tools tend to use simpler operations while data-mining tends to use more sophisticated statistical techniques.
    b. true
  25. RFM analysis, a technique readily implemented using reporting tools, is used to analyze and rank customers according to their purchasing patterns.
    b. true
  26. Data about what customers are doing on a company Web site is called __________ data.
    clickstream
  27. A BI __________ tracks users and authorizations.
    application server
  28. Data from a Siebel CRM system and an Oracle supply chain management application usually must be __________ before it can be used for BI processing.
    integrated
  29. If the granularity of the data is too fine, it is easy to make it __________ by summing and combining.
    coarser
  30. One problem with data-mining is that at the beginning of a project it is often not clear which __________ should be studied. Then by the time it is clearer, there is no time or budget left.
    variables
  31. Two __________ of storage would be equivalent to all the information stored in all of the research libraries in the United States. 
    petabytes
  32. If you want to classify which customers are most likely to switch to another firm according to the number of years as your customer, you would use a ________ technique.
    decision tree
  33. A(n) ________ notifies the user of an exceptional event, such as a dramatic fall in a stock price.
    d.  exception alert
  34. ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
    d. Data mining
  35. Which of the following is an example of a question that data-mining will help address?
    a. Will a given customer default on a loan?
  36. Data mining tools process data using statistical techniques.
    b. true
  37. In marketing transactions, the fact that customers who buy product X also buy product Y creates a cross-selling opportunity.
    b. true
  38. With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis.
    b. true
  39. In most cases, data-mining tools are used to make ________.
    c. predictions
  40. Knowledge discovery in databases (KDD) is used as a synonym for data mining. 
    b. true
  41. In a BPMN process diagram, data is represented by ________.
    a. a square with a folded corner
  42. A(n) ________ is a formal description of the system's response to use and misuse scenarios.
    c. test plan
  43. Which of the following is NOT one of the five components of an information system?
    d. policies
  44. In the ________ installation style of system conversion, the organization shuts off the old system/business processes and starts the new one directly.
    a. plunge
  45. Which of the following is not a functional process in an organization?
    a. customer relationship management
  46. ________ is the process by which project managers compress the schedule by moving resources, typically people, from noncritical path tasks onto critical path tasks.
    b. Critical path analysis
  47. In systems development, documents, designs, prototypes, data models, database designs, working data entry screens, and the like are examples of ________.
    d. deliverables
  48. A ________ installation is the riskiest because the old system is turned off and the new system is turned on. 
    d. plunge
  49. Functional business processes involve activities across several business functions.
    a. false
  50. In business processes, resources are collections of procedures.
    a. false
  51. In cross-functional business process management, __________.
    c. BPM authority is shared across several departments in a single company
  52. Tasks in the ________ phase of the system development process are to build, test, and convert the users to the new system.
    d. implementation
  53. According to Brooks' Law, adding more people to a late project makes the project later.
    b. true
  54. In a BPMN process diagram, the swim-lane layout is used to simplify process diagrams and to draw attention to interactions among components of the diagram.
    b. true
  55. Organizations should avoid the plunge installation style unless the new system is providing a new capability that will not disrupt the operation of the organization if it fails.
    b. true
  56. The ________ stage of the information systems development process involves identifying what is to be produced, how frequently and how fast it is to be produced.
    a. requirements analysis
  57. A data flow is the movement of data from one activity or another or from an activity to a repository.
    b. true
  58. Which of the following is NOT one of the five components of an information system?
    d. policies
  59. In a BPMN process diagram, a ________ represents the start of a process.
    c. circle
  60. In BPMN, all activities for a given role are shown in that role's swim lane.
    b. true
  61. According to Brooks' Law, adding more people to a system development project will ________.
    c. delay the project's completion
  62. The situation that occurs when adding more resources creates inefficiencies is known as ________.
    a. diseconomies of scale
  63. A ________ installation is the riskiest because the old system is turned off and the new system is turned on. 
    d. plunge
  64. User involvement is critical throughout the system development process.
    b. true

What would you like to do?

Home > Flashcards > Print Preview