BMAL 590 /BMAL 590 Information Management Systems Exam.Test Questions
Organizations, Technology and the Globalization of Business
Business Software
1. I
... [Show More] n cloud terms, __________ means delivering the right amount of IT resources right when its needed.
Elasticity
2. The branch of artificial intelligence known as ___________ is based on the concept that systems can
learn from data by identifying patterns and making decisions with minimal human intervention.
Machine Learning
3. Knowledge management systems are the integral components of __________. Knowledge
Management
Business Hardware
4. __________ has provided the ability to host multiple systems on a single physical machine.
Virtualization
5. _________ operating systems use code that is proprietary and kept secret to prevent its use by other
entities. Closed Source
6. TCP/IP (Transmission Control Protocol/Internet Protocol) is the underlying communication
language or __________ of the internet. Protocol
7. A(n) ___________ is a hardware or software architecture that serves as a foundation or base.
Platform
Decision Support and Expert Systems
8. Project _____________ is typically indicated by the dollars spent, the amount of implementation staff
involved, time allocated, and number or organizational components affected. Size
9. The Sarbanes Oxley Act (SOX) of 2002 and the Gramm-Leach-Billey Act are examples of __________
US’s businesses are expected to adhere to when providing products and services. Regulations
10. __________ are software-based systems that provide feedback through an iterative process and
include Kanban, Extreme Programming (XP) and Dynamic Systems development method (DSDM).
Agile methods
11.The ________ process is a plan to build numerous software methods that allow different elements to
be tested out before fully developing them. Prototype method
12.___________ websites automatically change sizes and layouts according to the visitors screen
resolution. Responsive
13._________ software typically provides capabilities for ordering tasks, assigning resources to tasks,
establishing starting and ending dates, tracking progress and facilitating modifications to tasks
and resources. Project Management
Business Information Systems: An overview
14.The rapid decline of data storage costs means organizations can easily maintain detailed databases
on individuals. This is known as _______. The Law of Mass Digital Storage
15.A Customer Relationship Management (CRM) system allows the storage and management of
prospects and ________ information, like contact information, accounts, and sales opportunities.
Customer
16.________ is the claim of individuals to protect themselves from unwarranted interference in their
lives. Privacy
17.Supply chain management systems (or SCM system) aids a business in the management or
dealings with________. Suppliers
18. In order for information to be useful in decision-making and problem solving, information must
be presented in a _________ and logical way within a specific context. Meaningful
19.The information systems department generally consists of specialists, such as __________, systems
analysts, project leaders, and information system managers. Programmers
Business Networks and telecommunications
20.In general ____________ attacks have become much more widespread, sophisticated, and potentially
devastating. Cyberwarfare
QUIZ section 1
-a computer cannot make independent decisions or formulate steps for solving problems unless
programed to do so by: A user
-A geographic Information System (GIS) is a toll that can analyze and display data using digital
_________ to enhance planning and decision-making. Maps
-Many of the American and European privacy laws are based on the________. Fair Information
Practices of 1973
-A _______ is a set of detailed procedures, methods, processes or course of action intended to
achieve a specific result or carry out a particular activity. System
QUIZ section 2
- An ___________ is the software that allows a user to run other applications on a computing device.
Operating System
- These “clouds” of computing resources are accessed on an ___________ basis from any connected
device and location over the internet.
As-Needed
- Through a virtual point-to-point connection, user can access a private network________. Remotely
- The Internet Protocol Version 4 (IPv4) addressing system is currently being replaced by a new
version of this IP addressing schema known as _______. Internet Protocol Version 6 (IPv6)
QUIZ Section 3
- A category of application programs that allows a user to produce items such as documents,
spreadsheet, graphs, worksheets and presentations is known as ____________ software. Productivity
- A ________ is an exclusive network that can only be accessed by a specific group of people. Intranet
- Content Management systems allow multiple __________ to create, edit, and publish a given site.
Contributors
- The branch of computer science known as _________ encompasses the creation of intelligent
machines that work and react like humans. Artificial Intelligence
- QUIZ Section 4
- -Malicious software, better known as ________, is the term used to describe any malicious program
or code that is designated to be harmful to systems. Malware
- - ________ allows someone else to use the resource of a computer to mine cryptocurrencies like
Bitcoin or monero. Malicious cryptomining
-
- - Publically traded companies must comply by the Public Company Accounting Reform and
Investor Protection Act of 2002, better know at the_______. Sarbanes-Oxley Act
-
- -The most common type of electronic evidence is ______. Email
QUIZ Section 5
- The ______ of a project is created to define what work is or is not included in a project. Scope
- Encouraging _________ participation in the design and operation of information systems can help
facilitate positive organizational change. User
- Information management systems__________ provides a structure for aligning IT strategy with
business strategy. Governance
- The Sarbanes-Oxley Act of 2002 and the Gramm-Leach-Billey Act are examples of ______ United
States’ businesses are expected to adhere to when providing products and services. Regulations
- If an information system project has the backing and commitment of _______ it is more likely to be
embraced by users within the organization. Management [Show Less]