1. According to Simon's description - there are four stages in any decision-making process. Decision support systems are designed primarily to help monitor the ______ stage.
2. Which of the following is an object-oriented programming language that can deliver only the software functionality needed for a particular task - and which can run on any computer or operating system?
3. Which of the following is a commercial digital information service that exists to provide business information?
4. In most organizations - the chief information officer is given a rank equivalent to
5. In what type of processing can more than one instruction be processed at once - by breaking down a problem into smaller parts and processing them simultaneously?
6. Which of the following is a shared network service technology that packages data into bundles for transmission but does not use error correction routines?
7. Which of the following steps in the business systems planning (BSP) process is typically performed FIRST?
8. Which of the following systems exists at the strategic level of an organization?
9. Of the following file organization methods - the only one that can be used on magnetic tape is
10. Which of the following signifies the international reference model for linking different types of computers and networks?
11. Which of the following styles of systems development is most often used for information systems at the enterprise level?
12. When all the elements in a system are in the same category - ______ is said to be at a minimum.
13. The predominant programming language for business was
14. Which of the following is NOT a type of knowledge work system (KWS)?
15. The most time-consuming element of system conversion plans is
16. Which of the following types of organizations is LEAST likely to make use of a hierarchical database?
17. The representation of data as they appear to an application programmer or end user is described as a(n) _____ view.
18. Which of the following types of applications is generally most dependent on the graphical user interface (GUI) environment?
19. In its current form - the technology of electronic data interchange (EDI) is appropriate for transmitting all of the following EXCEPT
20. A processing system rejects an order transaction for 10 -000 units - on the basis that no order larger than 70 units had been placed previously. This is an example of a
21. Which of the following storage media generally has the slowest access speed?
22. In an individual MIS - the most commonly-used technique for conducting operations research is ______ programming.
23. Which of the following concerns is addressed by front-end CASE (computer-assisted software engineering) tools?
24. The predefined packet of data in some LANs - which includes data indicating the sender - receiver - and whether the packet is in use - is known as a
25. _____ tools is a project management technique that structures and sequences tasks - and budgets the time - money - and technical resources required to complete these tasks.
26. A transmission over a telecommunications network in which data can flow two ways - but in only one direction at a time - is described as
27. Each of the following is a rule of thumb for handling graphics in desktop publishing application EXCEPT
28. Which of the following are included in an MIS audit?
29. Which of the following is most likely to rely on parallel processing?
30. Routines performed to verify input data and correct errors prior to processing are known as
31. ____ consists of predrawn electronic images.
32. ____ are normally expressed in the form of rules.
33. ____ converts a table that is in third normal form to a table no longer in third normal form.
34. ____ generally uses internal data and responds in real time.
35. ____ implies that no site should depend on another site to perform its database functions.
36. ____ is a process for controlling changes in system requirements during software development.
37. ____ policy creates standards for using corporate e-mail.
38. ____ provide(s) an employee more control over his or her work situation.
39. ____ refers to identifying the browser used by each visitor, typically via javascript code.
40. ____ rules specify which users have what type of access to which data in the database.
41. ____ uses multiple sources of information and provides multidimensional analysis.
42. _____ are an example of internal source of data for an information system.
43. _____ is an example of an enterprise-class electronic software.
44. ________ deals with more objective, rational, and technical knowledge.
45. ________ involve the people and procedure components of information systems.
46. ________ specifies the characteristics of a field, such as the type of data it will hold.
47. A building, office equipment, computer hardware, and network equipment are examples of _____.
48. A group of similar rows or records is known as ________.
49. Adware and spyware are similar to each other in that they both ________.
50. Data type helps a database management system (dbms) to ________.
51. In the ____ model, each record can have multiple parent and child records.
52. Information systems provide a competitive advantage by all of the following, except ________.
53. Measuring performance and __________ are parts of the foundation of any control system.
54. One of the goals of business intelligence is to _________.
55. The primary models used for oo detailed design are ____ diagrams.
56. Your organization can choose one of ________ alternative competitive strategies.
57. Value chains determine ________.
58. The dimension of ________ describes whether data elements are consistently defined.
59. The dimension of ________ in information quality describes whether data is available when needed.
60. Thin-client applications are typically limited by the capabilities of the ________.
61. The software and procedure components of the is framework are both ________.
62. Technology is the essential foundation of an effective information security program. _____________
63. The control dimension of a global information system requires a(n) _____ architecture for data.
64. The functions of a data warehouse are to do all of the following, except ________.
65. Traditional data formats change ______ while big data formats change _______.
66. To analzye various alternative scenarios, a manager would use _______.
67. A(n) _____ is a logical grouping of related fields.
68. Computed or derived facts are sometimes called ____ to differentiate them from stored facts.
69. Computers that reside in different geographic locations are connected using a(n) ________.
70. Fact and dimension tables are related by ____ keys.
71. In a star schema, attributes are often used to search, filter, or classify ____.
72. Knowing the sparsity of a column helps you decide whether the use of ____ is appropriate.
73. Security systems ultimately depend on the behavior of their ________.
74. The fiber-optic cables that span the globe over land and under sea make up the internet _____.
75. The field in a table that is used to relate that table to other tables is called the ____.
76. The need for collaboration is greatest for ________ decisions.
77. _____ is a term used to describe unpredictable, but highly impactful events.
78. A ________ is a hierarchical arrangement of criteria that predict a classification or a value.
79. Adaptive maintenance ____
80. Backup and recovery against computer security threats are ________.
81. For bi analysis, data need to represent the proper ________, the proper level of detail.
82. For communications equipment, k stands for ________.
83. In a typical company organizational model, middle managers ____.
84. Organizations should protect sensitive data by storing it in ________ form.
85. Problematic data are referred to as ________.
86. Transaction processing (tp) systems ____.
87. Users of smart cards are required to enter a ________ to be authenticated.
88. When customers access a web site and make purchases, they generate _____.
89. An e-commerce web site that processes orders requires, at minimum, a ________ system architecture.
90. The purpose of predeparture language and cross-cultural training is to _____.
91. All of the following are challenges in implementing an enterprise system except ________.
92. A(n) _____ provides software and a network that connects businesses within an industry.
93. All of the following sequences are stages of the machine cycle except _________.
94. An end-user license agreement, or _____, grants one user the right to use the software.
95. An enterprise resource planning (erp) solution does not include ________.
96. An organization is ________.
97. Bookseller barnes & noble is an example of a ________ company.
98. In cloud computing, resources are said to be ""pooled"" because organizations ________.
99. In comparison with unstructured information, semi-structured information ________.
100. In dbms, data are kept separate from the application's programming code. this means that ________.
101. A typical example of a geographic information system is a(n) _____.
102. As a result of moore's law, ________.
103. The outermost components of the is framework ________.
104. The output of an information system is _____.
105. The results generated in the map phase are combined in the ________ phase.
106. The traditional network design approach does not work well for _________ networks.
107. The two types of visionary leadership are _____.
108. Traditional database application programs are ________.
109. Using a vpc, an organization can store its ________.
110. When the granularity of data is too fine, ________.
111. ________ are viruses that masquerade as useful programs or files.
112. ________ can be induced by tens of thousands of repetitions under low-impact loads.
113. ________ decisions are the most structured and have very little need for collaboration.
114. ________ delivers business intelligence to users without any request from the users.
115. ________ is a popular commercial webinar product used in virtual sales presentations.
116. ________ is defined as recorded facts or figures.
117. ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
118. ________ refers to the source, format, assumptions and constraints, and other facts about the data.
119. ________ systems are designed to handle multiple concurrent transactions from customers.
120. A ________ is a worldwide-unique term that is affiliated with a public ip address.
121. A ________ pretends to be a legitimate company and sends emails requesting confidential data.
122. A build-to-order supply-chain model is also called a ________ model.
123. A business process in the ________ function is producing bills of material.
124. A business process is a network of ________ that receive inputs and produce outputs.
125. A field or a group of fields that make a record unique in a table is called a(n) ________.
126. A(n) ________, in which the highest bidder wins, is the most common form of auction.
127. Browser-based database applications differ from traditional applications in that they ________.
128. Business intelligence systems generate business intelligence by __________ data.
129. Discussion forums are better suited than emails in asynchronous communication because ________.
130. E-commerce fulfills the product information activity using _____.
131. Identifying competitive advantages can be difficult and explains why they are typically __________.
132. In 2025, emergence in the context of management would most likely mean a(n) ________.
133. Identifying customers is a responsibility of the ________ function.
134. Significant changes in is should trigger a reassessment of the _____________.
135. Control in a global information system (gis) requires _____.
136. Data mining is more ________ than olap.
137. The data ____ component is used to add, delete, modify, and retrieve records from a database.
138. An organization that uses cloud services ________.
139. One of the challenges with unsupervised data mining is ________.
140. The connection between two tables in a database is called a _________.
141. Symmetric dsl usually has an upstream rate of ____ mbps.
142. By default, access and other dbmss create indexes automatically for the ____ keys.
143. The basal nuclei (basal ganglia) ________.
144. In online analytical processing systems, ________ provide a way to summarize the data.
145. Semistructured decisions are often used in _____.
146. __________ are achieved by using middleware
147. You use ________ to predict when a computer hardware system becomes saturated.
148. An executive information system (eis) is a branch of ____.
149. As water warms, it ________.
150. A web ______ is a computer that delivers requested webpages to your computer or mobile device.
151. An internal user is one who is a ____.
152. A _____ can be as powerful as a desktop computer.
153. Peering usually takes place at neutral sites called _____.
154. The key use of the order promising module of supply chain management is to ________.
155. The executive level of an organization is also known as the ________ level.
156. In most large organizations, the is department is divided into the following functions __________.
157. Identifying the stage of a group's development is important to managers because ___________.
158. Record keeping, payroll, and simple inventory problems are examples of ____ tasks.
159. ____ enables business partners to send and receive information on business transactions.
160. ________ includes general management, finance, accounting, legal, and government affairs.
161. An internally focused system helps an organization coordinate with its ________.
162. In the _____, the production process begins with a forecast.
163. In the 1990s, business process management was known as ________.
164. Lead generation is a common departmental information system activity in the ________ department.
165. A social media policy used by an organization is a statement that ________.
166. Costs that do not vary according to production volume are called _____.
167. In the ________ phase a prototype of the website will often be created.
168. A _____ is automatically launched by some trigger and appears behind the active window.
169. You can sort files ____.
170. ________ is a management methodology that translates a firm's goals into operational targets.
171. ________ is redistributing goods or products we own by sharing them.
172. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.
173. ________ is used to solve large-scale computing problems.
174. ________ a site means to take extraordinary measures to reduce a system's vulnerability.
175. ________ are predesigned procedures for using software products.
176. ________ are reports produced when something out of predefined bounds occurs.
177. ________ behavior is not conforming to a set of approved standards of behavior.
178. ________ is an example of an inter-enterprise information system.
179. ________ solicits online input such as product ratings from consumers.
180. A ________ has a microchip that is loaded with identifying data.
181. A ________ involves balancing three critical factors: requirements, cost, and time.
182. A ________ is a group of related data that can be stored, sorted, organized, and queried.
183. A schematic diagram that uses symbols to represent the parts of a system is a(n) ____.
184. A social bookmarking site is dedicated to providing all of the following except ________.
185. A(n) ________ capability allows users to view more detailed views of data.
186. A(n) ________ is a formal description of a system's response to use and misuse scenarios.
187. According to brooks' law, adding more people to a late project ________.
188. According to the disruptive growth engine, executive leadership will allow a firm to ________.
189. The ____ e-commerce model is an example of the government selling confiscated cars at auction.
190. Click-through rate reflects ________.
191. In the criterion, <=250, the operator will return values for the specified field that are ____.
192. In the design of an organization, another name for ""market structure"" is ""________ structure.""
193. In the five-component model, the process of automation is a process of moving work from ________.
194. ______ is a form of database processing that supports top-down, query-driven data analysis.
195. ____ software helps you carry out tasks using a computer, such as editing a photo.
196. Instead of using the if-then-else rules that expert systems use, _____ use patterns.
197. most current displays are a type of ______ display.
198. Scheduling and assigning employees might be handled by a _____.
199. Search tools typically use a(n) ______, which stores a variety of information about a file.
200. The ________ manager makes tactical decisions to implement the strategic goals of an organization.
201. The principal manager of the is department is typically referred to as the ______.
202. The term hard drive refers collectively to hard disks and ______.
203. The web page displayed when a user first visits a site is called a(n) _____.
204. To get the number of items stored in a listbox, use the ________ property.
205. The ability to _____ is a characteristic of an mis system.