Computer Software – Information Technology

Twitter - Quiz Tutors
Computer Software - Information Technology. Facebook - Quiz Tutors

Computer Software Information Technology

The key terms included in this Information Technology chapter, Computer, Software, Data, Business Driver, Customer, Service.


When talking about changes related to information​ technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital​ platform, ________________________, and the growth of cloud computing.

the growing use of big data


___________________ is a business driver which focuses on ways to achieve better efficiencies to increase profits.

Operational Excellence


If a competitor to your business introduces an effective product or service​ (i.e., when Citibank first introduced the​ ATM), your need to follow is considered an example of the business​ driver:

Survival


A manager upset that he or she is not receiving​ forecasts, sales​ projections, or appropriate dashboards is expressing frustration for having a poor​ ______________ business​ driver:

Improved Decision Making


An automobile rental company interested in learning and adapting to the needs of its customers is focusing on the business​ driver:

Customer and Supplier Intimacy


Which is an example of a business using information systems for customer​ intimacy?

Mandarin Oriental​ Hotel’s customer-preference tracking system


In its simplest​ form, ___________ represents streams of raw facts with limited usefulness until organized.

Data


An information system can be defined technically as a set of interrelated components that collect​ (or retrieve),​ process, store, and distribute information to support which of the​ following?

Decision making and control in an organization


Maintenance phase

monitor and support the new system to ensure it continues to meet the business goals


Selfsourcing (end-user development)

the development and support of IT systems by end users with little or no help from IT specialists


Prototype

a model of a proposed product, service, or system


Prototyping

the process of building a model that demonstrates the features of a proposed product, service, or system


Outsourcing

the delegation of specified work to a third party for a specified length of time, at a specified cost, and at a specified level of service


Intellectual property

intangible creative work that is embodied in physical form


Copyright

legal protection afforded an expression of an idea


Fair Use Doctrine

may use copyrighted material in certain situations


Pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software


Privacy

the right to left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent


Phishing (carding, brand spoofing)

a technique to gain personal information for the purpose of identity theft


Pharming

rerouting your request for a legitimate Web site


Cookie –

a small file that contains information about you and your Web activities, which a Web site places on your computer


Spam –

unsolicited e-mail from businesses advertising goods and services


Adware

software to generate ads that installs itself when you download another program


Spyware (sneakware, stealthware)

software that comes hidden in downloaded software and helps itself to your computer resources


Trojan horse software

software you don’t want inside software you do want


Hackers

knowledgeable computer users who use their knowledge to invade other people’s computers


Computer virus (virus)

software that is written with malicious intent to cause annoyance or damage


Worm

type of virus that spreads itself from computer to computer usually via e-mail


Denial-of-service (DoS) attack

floods a Web site with so many requests for service that it slows down or crashes


Anti-virus software –

detects and removes or quarantines computer viruses


Firewall –

hardware and/or software that protects a computer or network from intruders


Encryption –

scrambles the contents of a file so that you can’t read it without having the right decryption key


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


With​ E-commerce and the​ Internet, which of the following depicts a trend in​ advertising?

E-commerce and Internet advertising have grown while traditional advertising and commerce have remained flat.


What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate​ computers?

Cloud Computing

Which of the following most accurately describes an information​ system?

A set of components that​ gather, analyze,​ store, and utilize information for making better decisions for a firm


What are the dimensions of information​ systems?

Organizations, People, and Information Technology


What are the steps of the problem solving​ process?

Problem​ Identification, Solution​ Design, Solution Evaluation and​ Choice, and Implementation


As Julie explains to​ Trey, she needs sales data in order to plan future cookie production. Based on her​ explanation, data is defined as​ _____.

recorded facts or figures


When Julie describes calculating the average number of cookies sold in​ February, she is describing an example of obtaining​ _____ from​ _____.

​information; data


Based on the information in this​ video, which of the following describes high quality​ data?

It is​ correct, current, and complete.


In this video​ dramatization, Julie and Trey discuss the need to document any changes they make to a cookie recipe. If they change the recipe for red velvet cookies and​ don’t change the list of ingredients they use for the procurement of​ inputs, this is an example of failure of data to be​ _____.

correct

As Julie explains to​ Trey, she needs information obtained from high quality data to help her make good decisions. Which of the following four documents would not be a good source of information for​ Julie?

a social media report that shows the total number of​ “likes” for each cookie


What primary goal does the San Francisco​ Giants’ “dynamic ticket​ pricing” help​ accomplish?

It allows ticket prices to fluctuate according to demand


Businesses in America will spend approximately​ $600 ____________ on​ hardware, software, and telecommunications equipment in 2015.

Billion

With new laws requiring the storage of emails and other important​ documents, estimates of information systems storage now exceeds​ 1.8:

Zettabytes


When talking about changes related to information​ technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital​ platform, ________________________, and the growth of cloud computing.

the growing use of big data


___________________ is a business driver which focuses on ways to achieve better efficiencies to increase profits.

Operational Excellence


If a competitor to your business introduces an effective product or service​ (i.e., when Citibank first introduced the​ ATM), your need to follow is considered an example of the business​ driver:

Survival

A manager upset that he or she is not receiving​ forecasts, sales​ projections, or appropriate dashboards is expressing frustration for having a poor​ ______________ business​ driver:

Improved Decision Making


An automobile rental company interested in learning and adapting to the needs of its customers is focusing on the business​ driver:

Customer and Supplier Intimacy


Which is an example of a business using information systems for customer​ intimacy?

Mandarin Oriental​ Hotel’s customer-preference tracking system


In its simplest​ form, ___________ represents streams of raw facts with limited usefulness until organized.

Data


An information system can be defined technically as a set of interrelated components that collect​ (or retrieve),​ process, store, and distribute information to support which of the​ following?

Decision making and control in an organization


Homepage