信息管理与信息系统填空

1. Information is data that has been shaped into a form that is meaningful to human beings
2. Feedback is output returned to appropriate members of the organization to help them evaluate or correct the input stage
3. The world’s largest and most widely used network is the Internet.
4. Computer software/software consists of the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.
5. The World Wide Web/Web/WWW is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format
6. Extranets are private corporate networks extended to authorized users outside the organization
7. In business problem solving, the three major categories of factors are organization, technology, and people.
8. Training employees to handle new business processes is an example of change management.
9. Being aware of organizational and personal limitations is one of the four elements of critical thinking.
10. Having inadequate resources is a business problem that falls into the organizational dimension.
11. A(n) business process is a set of logically related activities for accomplishing a specific business result.
12. A firm depends heavily on its environment to supply capital, labor, customers, new technology, services and products, stable markets and legal systems, and general educational resources.
13. Enterprise applications span the entire firm, integrating information from multiple functions and business processes to enhance the performance of the organization as a whole.
14. A(n) decision-support system is used by middle management to combine data and sophisticated analytical models or data analysis tools to support semistructured and unstructured decision making.
15. The “economic order quantity” formula calculates the least expensive quantity to reorder for restocking inventory.
16. The human resources function is responsible for attracting, developing, and maintaining the firm’s workforce.
17. The total elapsed time from the time a purchase requisition is generated to the time the payment for the purchase is made is called the requisition-to-pay cycle time.
18. Supply chain management systems are one type of interorganizational system because they automate the flow of information across organizational boundaries.
19. Cross-docking enables goods earmarked for a specific customer to move directly from the receiving dock to the shipping dock without being checked into the system and picked from inventory.
20. Programmers are highly trained technical specialists who write the software instructions for computers.
21. End users are representatives of departments outside of the information systems group for whom applications are developed.
22. The activity of measuring performance of your business processes against strict standards is called benchmarking
23. A virtual company/virtua

l organization uses networks to link people, assets, and ideas, enabling it to work with other companies to create products and services without being limited by traditional organizational boundaries or physical locations.
24. Business process reengineering /BPR is a radical rethinking of business processes to take advantage of information systems.
25. Six Sigma is the measure of quality that represents 3.4 defects per million opportunities
26. Quality control is seen as an end in itself in Total Quality Management (TQM)
27. A CAD/computer aided design system automates and the creation and revision of designs using computers and sophisticated graphics software
28. Mass customization is the ability to offer individually tailored products and services using the same production resources as mass production.
29. The value chain model highlights the primary or support activities that add a margin of value to a firm’s products or services where information systems can best be applied to achieve a competitive advantage.
30. A(n) primary activity is one that is directly related to the production and distribution of a firm’s products or services.
31. A(n) support activity is a part of the organization’s infrastructure, human resources, technology, and procurement that makes the delivery of the firm’s products or services possible.
32. The value web is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.
33. Product differentiation is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors.
34. Switching costs are the expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system.
35. A(n) core competency is an activity at which a firm excels as a world-class leader.
36. Porter’s competitive forces model illustrates that a firm faces a number of external threats and opportunities.
37. According to the law of diminishing returns the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional outputs.
38. Information technology infrastructure is the shared technology resources that provide the platform for the firm’s specific information systems applications.
39. Telecommunication services provide voice and video connectivity to employees, customers, and suppliers.
40. Systems integration means ensuring the new infrastructure works with the firm’s older, legacy systems and ensuring the new elements of the infrastructure work with one another.
41. Legacy systems are generally older transaction processing systems created for mainframe computers that continue to be used to avoid the high cost of replacing or redesigning them.
42. A(n) workstation fits o

n a desktop but has more powerful mathematical and graphics-processing capabilities than a PC.
43. Grid computing involves connecting geographically remote computers into a single network to create a virtual supercomputer by combining the computational power of all computers on the grid.
44. In the n-tier architecture, the work of the entire network is balanced over multiple levels of servers.
45. Client/server computing enables businesses to distribute computing work across a series of smaller, inexpensive machines that cost much less than minicomputers or centralized mainframe systems.
46. The use of multiple computers linked by a communications network for processing is called distributed processing.
47. Storage area networks connect multiple storage devices on a separate high-speed network dedicated to storage.
48. A(n) storage area network (SAN) is a high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays.
49. Autonomic computing is an industry-wide effort to develop systems that can configure, optimize, tune, heal, and protect themselves from outside intruders and self-destruction.
50. Edge computing is a multitier, load-balancing scheme for Web-based applications in which significant parts of Web site content, logic, and processing are performed by smaller, less expensive servers located nearby the user.
51. The operating system manages and controls the computer’s activities.
52. GUI is the dominant model for the user interface of PC operating systems and for many types of application software.
53. Open-source software is software created and updated by a worldwide community of programmers and available for free.
54. A software package is a prewritten commercially available set of software programs that eliminates the need for a firm to write its own software programs for certain functions.
55. A Web browser is an easy-to-use software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources.
56. Middleware is software that connects two otherwise separate applications, enabling them to communicate with each other and to exchange data.
57. XML provides a standard format for data exchange, enabling Web services to pass data from one process to another.
58. Web services refer to a set of loosely coupled software components that exchange information with each other using standard Web communication standards and languages.
59. In a service-oriented architecture, software applications are created by combining self-contained software services that communicate with each other.
60. Capacity planning is the process of predicting when a computer hardware system becomes saturated.
61. Outsourcing takes place when a firm contracts custom software development or maintenance of existing legacy programs to outside firms.
62. A Web hosting service maintains a large Web server, or series of servers, and

provides fee-paying subscribers with space to maintain their Web sites.
63. The total cost of ownership (TCO) model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations.
64. Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
65. On-demand computing refers to firms off-loading peak demand for computing power to remote, large-scale data processing centers.
66. Utility computing is the model of computing in which companies pay only for the information technology resources they actually use during a specified time.
67. An application service provider (ASP) is a business that delivers and manages applications and computer services from remote computer centers to multiple users using the Internet or a private network.
68. Databases record information about general categories of information referred to as entities.
69. Relational databases organize data into two-dimensional tables with columns and rows.
70. Difficulty: Easy Reference: p. 152
71. A(n) attribute is a piece of information describing a particular entity.
72. A group of related files containing records is called a(n) database.
73. A(n) field is a column in a relational database used for storing individual elements of data.
74. A(n) record is a row of data in a database table.
75. A(n) key field is a field in a record that uniquely identifies instances of that record so that it can be retrieved, updated, or sorted.
76. A(n) tuple is a row or record in a relational database.
77. A(n) entity-relationship diagram is schematic used to clarify relationships in a relational database.
78. Normalization is the process of streamlining complex groups of data to minimize redundant data elements and awkward many-to-many relationships.
79. Data that is duplicated in multiple files is called redundant
80. A(n) database management system/DBMS is special software for creating, storing, organizing, and accessing data from a database.
81. A(n) physical view shows data as it is actually organized and structured on physical storage media.
82. A(n) logical view shows data as the end user would perceive them.
83. DBMS have a data definition capability to specify the structure of the content of the database.
84. The join operation combines relational tables to provide the user with more information than is available in individual tables.
85. A(n) data manipulation language is a language associated with a database management system that end users and programmers use to manipulate data in the database.
86. Structured Query Language (SQL) is the standard data manipulation language for relational database management systems.
87. A(n) data dictionary is an automated or manual file that stores definitions of data elements and their characteristics.
88. A(n) object-oriented DBMS is an approach to data management that stores both data

and procedures acting on the data as objects that can be automatically retrieved and shared.
89. A(n) data warehouse is a database, with reporting and query tools that stores current and historical data extracted from various operational systems and consolidated for management reporting and analysis.
90. Online analytical processing (OLAP) is the capability for manipulating and analyzing large volumes of data from multiple perspectives.
91. Data mining is the analysis of large pools of data to find patterns and rules that can be used to guide decision making and predict future behavior.
92. A(n) application server is software that handles all application operations between browser-based computers and a company’s back-end business applications or databases.
93. A(n) database server is a dedicated computer in a client/server environment that hosts a DBMS.
94. Information policies are the formal rules governing the maintenance, distribution, and use of information in an organization.
95. Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource.
96. Database administration is a special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design and maintenance.
97. Each computer on a network contains a network interface device called a network interface card.
98. The network operating system /NOS routes and manages communications on the network and coordinates network resources
99. Special software that routes and manages communications on the network and coordinates networks resources is referred to as the network operating system.
100. A(n) hub is a device that is used to connect network components, sending a packet of data to all other connected devices.
101. A(n) router is a device that forwards packets of data from one LAN or WAN to another.
102. The connection medium for linking network components can be a telephone wire, coaxial cable, or radio signal
103. The Internet is the world’s largest implementation of client/server computing.
104. Packet switching is technology that breaks blocks of text into small, fixed bundles of data and routes them in the most economical way through any available communications channel.
105. Prior to the development of packet switching, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations
106. A(n) protocol is a set of rules and procedures governing transmissions between the components in a network.
107. A protocol is a set of rules and procedures governing transmission of information between two points in a network.
108. As transmission media, twisted wire is low in cost, often already in place, but can be relatively slow and noisy for transmitting data.
109. A(n) digital signal is a discrete waveform that transmits data coded into two d

iscrete states such as 1-bits and 0-bits.
110. A(n) modem is a device for translating digital signals into analog signals and vice versa.
111. Coaxial cable is a transmission medium consisting of thickly insulated copper wire.
112. Fiber-optic cable is a fast, light, and durable transmission medium consisting of thin strands of clear glass fiber bound into cables.
113. A(n) backbone is that part of the network handling the major traffic and providing the primary path for traffic flowing to or from other networks.
114. The backbone acts as the primary path for major traffic flowing to or from other networks
115. Multiplexing enables a single communications channel to carry data transmissions from multiple sources simultaneously.
116. DWDM boosts transmission capacity by using many different wavelengths to carry separate streams of data over the same fiber strand at the same time
117. A satellite is a specialized wireless receiver/transmitter that is launched by a rocket and placed in orbit around the earth.
118. Cellular telephones work by using radio waves to communicate with radio antennas (towers) placed within adjacent geographic areas called cells.
119. Hertz measures the number of cycles per second that can be sent through a transmission medium
120. Bandwidth is the capacity of the communications channel as measured by the difference between the highest and lowest frequencies that can be transmitted by that channel.
121. A(n) local area network is designed to connect personal computers and other digital devices within a half mile or 500-meter radius.
122. A(n) peer-to-peer network architecture gives equal power to all computers on the network.
123. Topology is the manner in which the components of a network are connected.
124. In a(n) bus network topology, there is no central host computer, and if one of the computers in the network fails, none of the other components in the network are affected.
125. In a star topology, all devices on the network connect to a single hub.
126. Ethernet is the dominant LAN standard at the physical network level
127. Bus networks are the most common Ethernet topology.
128. Frame relay takes advantage of higher-speed, more reliable digital circuits that require less error checking than packet switching.
129. A(n) T1 line is a dedicated telephone connection comprising 24 channels each of which can be configured to carry voice or data traffic.
130. Internetworking is the linking of separate networks, each of which retains its own identity, into an interconnected network.
131. A(n) Internet service provider/ISP is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
132. DNS servers maintain a database containing IP addresses mapped to their corresponding domain names.
133. A(n) domain name is the English-like name that corresponds to the unique 32-bit numeric Internet Protocol (IP) address for each computer connected

to the Internet.
134. The backbone networks of the Internet are typically owned by long-distance telephone companies called network service providers.
135. A(n) information appliance is a device that has been customized to perform a few specialized computing tasks well with minimal user effort.
136. Hypertext Markup Language is the standard language for formatting Web page documents.
137. A(n) Web server is software for managing stored Web pages.
138. The person in charge of an organization’s Web site is called a(n) Webmaster.
139. Google is the most popular Web search engine.
140. A private intranet extended to authorized users outside the organization is called a(n) extranet.
141. A firewall is specialized software that protects the resources of a private network from users from other networks.
142. Lotus Notes is an example of software called groupware
143. A(n) virtual private network is a private network that has been configured within the public Internet.
144. Smart phones are hybrid devices combining the functionality of a PDA with that of a digital cell phone.
145. The standard for digital cellular services in Europe is Global System for Mobile Communication.
146. A microbrowser is an Internet browser with a small file size that works with the low-memory constraints of handheld wireless devices and the low bandwidth of wireless
147. Bluetooth is the popular name for the 802.15 wireless networking standard, which is useful for creating small personal area networks.
148. A Wi-Fi system can operate in two different modes. In ad-hoc/peer-to-peer mode, wireless devices communicate with each other directly.
149. Devices in a Wi-Fi network operating in infrastructure mode communicate using access points.
150. An access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
151. Hotspots typically consist of one or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area.
152. Radio Frequency Identification (RFID) systems use tiny tags with embedded microchips containing data about an item and its location to transmit radio signals over a short distance to special readers.
153. EV-DO provides wireless access to the Internet over a cellular network at an average speed of 300 to 500 Kbps.
154. Wireless sensor networks (WSNs) are networks of interconnected wireless devices that are embedded into the physical environment to provide measurements of many points over large spaces.
155. Methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its accounting records, and operational adherence to management standards are called controls.
156. Security is the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to an information sys

tem.
157. A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as war driving.
158. Malicious software programs referred to as malware include a variety of threats such as computer viruses, worms, and Trojan horses.
159. Independent computer programs that copy themselves from one computer to others over a network are called worms.
160. A(n) Trojan horse is a software program that appears legitimate but contains a second hidden function that may cause damage.
161. Small programs that install themselves on computers to monitor user Web surfing activity and serve up advertising are called spyware.
162. A(n) hacker is a person who intends to gain unauthorized entry to a computer system.
163. The intentional disruption, defacement, or even destruction of a Web site or corporate information systems is referred to as cybervandalism.
164. Spoofing can involve redirecting a Web link to an address different form the intended one, with the site masquerading as the intended destination.
165. A sniffer is a type of eavesdropping program that monitors information traveling over a network.
166. A(n) denial of service attack floods a network server or Web server with false communications or requests for services in order to crash the network.
167. Identify theft is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
168. Phishing involves setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses.
169. The practice of tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information is called social engineering.
170. Computer forensics is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
171. A(n) risk assessment determines the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur.
172. A security policy consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
173. Authorization policies determine differing levels of access to information assets for different levels of users.
174. High-availability computing refers to the tools and technologies, including backup hardware resources, to enable a system to recover quickly from a crash.
175. Business continuity planning focuses on how the company can restore business operations after a disaster strikes.
176. A(n) disaster recovery plan includes procedures for the restoration of computing and communications services after they have been disrupted by a natural event such as an earthquake.
177. A(n) MIS audit identifies all the controls that govern individual information

systems and assesses their effectiveness.
178. Access control consists of all the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders.
179. Authentication allows each party in a transaction to be certain of the identity of the other party.
180. A(n) token is a physical device similar to an identification card that is designed to prove the identity of a single user.
181. Biometric authentication is based on the measurement of a physical or behavioral trait that makes each individual unique.
182. Packet filtering examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation.
183. A(n) intrusion detection system monitors the most vulnerable points in the network to detect and deter unauthorized users.
184. Antivirus software is designed to detect, and often eliminate, rogue software programs from an information system.
185. A(n) encrypted message is coded and scrambled to prevent it being read or accessed without authorization
186. A(n) digital certificate is an attachment to an electronic message to verify the identity of the sender and to provide the receiver with the means to encode a reply.



相关文档
最新文档