UOP CIS207 All Weeks WileyPLUS Weekly Exams

CIS207 Information Systems Fundamentals
Week 1 WileyPLUS Weekly Exam
Which of the following is NOT an advantage of central management of information systems in the University System of Georgia?
The University System of Georgia’s CIO believes the best way to collaborate with 31 independent-minded university CIO’s is to look for scenarios where three to five universities are planning to purchase the same product and therefore can consolidate their buying or centralize their service. One specific example of how the CIO utilized this strategy to resolve a problem was to develop a centralized system for _________.
All _______ are ____________.
____________ is developed through learning and is the experience and expertise that managers can apply to business problems.
In the following table, column A is _____, column B is _____, and column C is ______.
As you are walking to the cafeteria to pick up your lunch, you see a poster with the word “apple” on it with a picture of an apple below it. This is ____.
The IT infrastructure is ___________.
___________ are the “capstone” information systems in an organization.
___________ handle tactical decisions.
__________ analysis involves identifying the best advertising channels.
Warby Parker can offer cheaper glasses than their competition because they _______.
Warby Parker is competitor of __________.
Watch the following video and answer the question below.
IT decreases the number of employees who can report to a single manager.
Chevron employed ________ to provided detailed work instructions to its employees.
Chevron initially utilized ___________ to improve their supply chain, followed by employee-driven ________ initiatives, and then adopted a unified _____ approach to standardize business processes.
Chevron has used _________, a methodology that combines statistical process analysis with techniques to eliminate waste and improve process flow, since 2006.
Organizations adopt BPI to sustain BPM over time.
Chevron’s strategy was to analyze its existing processes to identify specific areas to improve.
A(n) __________ refers to a small number of companies that dominate the business and are making large margins.
IT has changed the manager’s job in many ways. Which of the following is NOT the result of this change?
Which of the following is TRUE?
Which company used software to disrupt the previous market-leading companies in the book industry?
Which of the following is a fast-growing company that is disrupting the traditional job recruiting industry?
Which industry is currently using drones as part of its business model?
CIS207 Information Systems Fundamentals
Week 2 WileyPLUS Weekly Exam
B2B e-commerce comprises about _____ percent of e-commerce volume.
Buy-side marketplaces use _______________ auctions and are suitable for ___________.
Your textbooks are examples of a _____________ for your education.
_____________________ exchanges connect buyers and sellers across many industries.
The goal of group purchasing in the buy-side marketplace is to ____________.
The sell-side marketplace is similar to the _________ model.
Buy-side marketplaces use reverse auctions.
When organizations come to a company’s Web site for procurement, such business is classified as a(n):
Information Systems for marketing incorporate the following functions: (check all that apply)
Information Systems for production and operations management (POM) incorporate the following functions: (check all that apply)
Which of the following is not a function of functional area information systems?
Functional information systems support the entire enterprise or major portions of it.
Exception reports show a greater level of detail than is included in routine reports.
_____ reports show a greater level of detail than is included in routine reports.
GM’s new service lane automation application is a type of ___________ system.
______________________ are often populated with data from source data automation technologies such as bar code scanners.
Sentiment analysis extracts _________ information in source materials, which is particularly useful in __________.
Sentiment analysis algorithms use simple terms to express sentiment about a product or service, so ________ makes it __________ to classify online content as positive, negative, or neutral.
The entertainment industry primarily uses sentiment analysis to improve their ______.
BI encompasses applications, processes, and technology.
BI can support organizational transformation.
____________ is NOT categorized as BI.
___________ is a subset of BI according to Thomas Davenport.
Which of the following is NOT a requirement of TPSs?
_____ reports contain special information not found in routine reports.
CIS207 Information Systems Fundamentals
Week 3 WileyPLUS Weekly Exam
Place the different types of computer networks in size order, ranging from smallest to largest.
__________ are high speed central networks to which multiple smaller networks connect
Watch the following video and answer the question below. Networks enable organizations to meet rapidly changing business conditions.
Watch the following video and answer the question below. A network that connects computing devices within the same building is
Watch the following video and answer the question below. A high-speed network that connects a firm’s LANs and WANS is
The following can be considered as broadband technologies (choose all that are correct):
A collection of the following devices — two desktop computers, three laptops, two smart phones and a printer — can be described as a(n):
A legacy IT system can be easily transferred to cloud computing.
Least privilege is a concept associated with ___________________.
Safe harbors address the concerns associated with __________.
Anonymity on the internet enhances the problems associated with _______.
Web services are applications delivered over ______________ that MIS professionals can select and combine through almost any device.
A collection of web services constitutes a ___________.
Which of the following is NOT a web service protocol?
_______ describes how data should look on a web site; ______ describes data being exchanged between business partners.
__________ is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML.
__________ is used to create the XML document that describes the tasks performed by the various web services.
_________ is a registry for searching web services.
Utility computing service providers charge a flat rate for the computer services they provide.
The US-China Safe Harbor is a streamlined process for US companies to comply with the Chinese directive on the protection of personal data.
PCI compliance addresses reliability issues in cloud computing.
HTML and XML are both used to design web pages.
The traditional IT department
In cloud computing, multiple virtual servers can be created on a single physical server.
All of the following are cloud computing security issues except
CIS207 Information Systems Fundamentals
Week 4 WileyPLUS Weekly Exam
Watch the following video and answer the question below. Big Data is the same thing as huge amounts of structured data in organizational databases.
Which of the following is NOT a type of Big Data?
NoSQL databases can manage more different types of data than a traditional relational database.
Watch the following video and answer the question below. A/B experiments are so-named because there are only two possible outcomes for each experiment.
Watch the following video and answer the question below. Data subject to constraints is an example of
Watch the following video and answer the question below. A group of logically related fields is a(n)
Watch the following video and answer the question below. Each _________ in a relational database is a record.
Watch the following video and answer the question below. One of the attributes in a record must be a primary key.
Watch the following video and answer the question below. Normalization typically improves processing performance.
Watch the following video and answer the question below. When data are normalized, attributes in the table depend on the primary key and the secondary key.
Watch the following video and answer the question below. A data warehouse is a repository of historical data that are organized by subject to support decision makers in the organization.
Watch the following video and answer the question below. Organizational databases access one record at a time, where data warehouses access groups of related records.
Watch the following video and answer the question below. Data in a data warehouse are organized by business process, where data in corporate databases are organized by subject.
Watch the following video and answer the question below. Data updates in a data warehouse are performed by the MIS department, NOT the users.
Watch the following video and answer the question below. The MOST common source system for a company’s data warehouse is its corporate operational databases.
Watch the following video and answer the question below. Companies often have to clean up the data before it can be imported into the data warehouse.
Watch the following video and answer the question below. The ETL process is now typically called data integration.
Watch the following video and answer the question below. The MOST common method for storing data in a data warehouse is
Watch the following video and answer the question below. The IT department is solely responsible for the quality of the data in the data warehouse.
Watch the following video and answer the question below. Governance of a data warehouse must be a collaboration between business users and IT personnel.
Watch the following video and answer the question below. After you have taken a particular course, your insights on how to do well in that course would be considered to be tacit knowledge.
The IT infrastructure needed for you to register online for next semester would be considered to be explicit knowledge.
Watch the following video and answer the question below. Robots are being used in a decreasing number of everyday tasks.
Process and procedures are important but not critical to the effective use of computer based information systems.
An App (Application) is a computer program designed to support a specific task?
CIS207 Information Systems Fundamentals
Week 5 WileyPLUS Weekly Exam
The law basically does not support an employer’s right to read electronic mail and other electronic documents.
Privacy regulations are basically the same from country to country around the world.
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
______________ is an electronic profile of you and your habits.
______________ is the process of forming a digital dossier.
Which of the following is NOT an example of a profiler?
The right of privacy ___________ absolute.
Risk management identifies, controls, and minimizes the impact of threats to the organization’s information security.
Which if the following is not a common risk mitigation strategy?
Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014?
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.
Phishing is an example of __________.
You start browsing your favorite home improvement company’s website and notice someone has changed all the logos to their main competitor’s logos. This is an example of ___________.
Application software is a set of instructions that serves primarily as an intermediary between computer hardware and application programs.
Software consists of the instructions given to computer hardware.
Application software is a set of computer instructions that provide specific functionality for a user.
Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software.
Hardware costs have been _______________ over time and software costs have been _______________ over time.
_________________ software is an intermediary between computer hardware and _________________ software.
Hardware interacts directly with _______________ software.
Hardware has become less complex while software has become more complex.
Discrete speech-recognition software recognizes and interprets one word at a time.
The set of computer programs used to manage hardware resources is called:
It is not necessary for computer programs to have documentation, because the code itself is easy to read and follow.
Computer hardware is designed specifically for a particular application.

-
Rating:
5/
Solution: UOP CIS207 All Weeks WileyPLUS Weekly Exams