What overall strategy is used to train artificial neural network programs?
An artificial neural network is programmed to learn _____ from each iteration during the training phase.
Thomas and Emily are discussing the effect of AI on future employment. Emily correctly points out that _____ the introduction of new technology has always resulted in the creation of more jobs than were lost.
According to experts, what organizational practice will allow the growth of AI to create new jobs?
Top career options in AI include becoming _____, who analyzes large data sets to follow patterns and find trends.
Reinforcement learning _____ emulates the trial-and-error method through which humans learn.
Technology that interacts with a human's neural structure and translates the information into activity is known as _____ the brain computer interface.
Robots that work with humans on manufacturing lines, handling work that is hard on a person and could cause repetitive injuries, are known as _____.
_____ can process many pieces of data at the same time and learn to recognize patterns.
A genetic algorithm is an approach to solving problems based on the _____ theory of evolution.
In an expert system, the _____ is the component that delivers the expert advice.
In the context of purchasing systems, when a(n) _____ arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent.
_____ includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivery of finished product to customers.
Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with _____ to develop an estimate of future customer demand.
In a manufacturing enterprise resource planning (ERP) system, demand management _____ refines a production plan by determining the amount of weekly or daily production needed to meet the demand for individual products.
A customer relationship management (CRM) system helps a company in managing _____ distribution and accounting.
One benefit for a small business using the hosted software model for its enterprise software is that it can succeed without _____ employing full-time IT professionals.
Percy is attracted by the advantages of enterprise software but his small business cannot afford to make a major up-front investment in new applications at this time. Percy could try hosted enterprise software, which offers _____ a pay-as-you-go approach.
How might a start-up company that has been using a paper-based document control approach benefit from switching to a cloud-based PLM system?
The average ERP implementation _____ costs in the millions and lasts over a year.
Millie's company is implementing an ERP, and her direct reports are complaining loudly of their frustrations with the new system. What should Millie request from upper management to alleviate this?
Rheneas wants to ensure his management team is aware of the common causes for failed enterprise system implementations before they begin their own. He points out to the team that _____ the failure rate for ERP implementations worldwide is 21 percent.
Innitrobe is ramping up to begin an ERP implementation. To promote its success, Innitrobe seeks project oversight and verification and validation of system performance from _____ an experienced, independent resource.
How much time do many project managers recommend be allocated for training staff to facilitate a successful enterprise system implementation?
For an organization with an enterprise system, processing transactions _____ creates a storehouse of data invaluable to decision making.
What component at the core of the ERP system allows all business functions to access current and consistent data for operational decision making?
Claudette is a developer working for a software company that uses JIRA, a PLM product. Claudette knows that using JIRA benefits her organization because _____ upper management can it to monitor project progress in order to make informed decisions.
Peter Sam's product development team studies a dashboard that shows the top product requests from customers in parallel with the product roadmap for the year in an effort to identify any gaps in their product offerings. What type of tool are they using?
Artificial intelligence _____ lacks outside context on the importance of unique patterns revealed by data.
What tool would likely be the best choice for a heavy machinery manufacturer seeking to improve the accuracy of its product demand forecasting?
Which of the following allows users to analyze customer data to identify ways to increase revenue, ways to decrease costs, and the company's 'best customers' and how to locate more of them?
_____ creates a complete set of technical specifications that can be used to construct an information system.
Your new software project manager is comfortable working on projects without fully specifying the requirements up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _____ approach to software development.
Which of the following statements is true of user acceptance testing (UAT)?
Buying off-the-shelf software _____ is less risky than building software.
What is one advantage that SaaS confers because it is deployed and managed from a central location?
Before signing a contract with a SaaS vendor, an organization must ensure that the vendor has acceptable answers to questions about the storage and protection of the data shared with them because _____ security and privacy must be addressed by all organizations.
If an organization elects to undergo system development, _____ it can choose to hire an outside company for this project.
Thomas is preparing to implement a new software package that his project team has selected and purchased. Thomas should _____ help his coworkers identify and make any needed changes to their current processes using a DFD.
Mavis and her project team are evaluating candidates for a new off-the-shelf software package for their company. Mavis calls some professional acquaintances who use these candidate packages in order to _____ elicit feedback regarding the software performance and the quality of technical support available.
The disadvantages of the Waterfall approach to software development relate primarily to _____ end users.
Within the Scrum framework for Agile software development, the prioritized list of project requirements collected from stakeholders prior to a sprint planning session is called a _____ product backlog.
Agile development requires _____ cooperation and frequent meetings.
An important role of the product owner in the Scrum framework for Agile development is to _____ describe what should be built and why.
_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.
Which of the following is considered an 'expense' among typical IS project-related costs?
_____ is a set of activities that includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project.
A useful model that describes how teams develop is the forming-storming-norming-performing-_____ model.
Suppose Task C has two predecessor tasks: Task A and Task B. Task A ends on May 8 and Task B ends on May 13. When can Task C begin?
Which statement about objectives and goals matches the way these terms are used in your text?
Mavis is a customer service manager. Suppose one of the business objectives at Mavis's firm is to improve customer service by offering a consistently high level of service that exceeds customers' expectations. Which of the following statements about this situation is FALSE?
The definition of which tasks are and which tasks are not included in a project is called the project's _____ scope.
Which project variable is defined as the degree to which the project meets the needs of its users?
The major understandings and assumptions for an organization, which are often neither stated nor documented as goals or formal policies, are known as _____ organizational culture.
Jeannine is aware that her company's IS needs a serious upgrade, and others in her department respect her opinion about this. Which is likely the most appropriate strategy for convincing Jeannine to adopt a new IS?
For members of what the diffusion of innovation theory calls the early majority, the recommended strategy for promoting a new technology is to _____ provide them with evidence of the system's effectiveness and success stories.
An IS manager has identified several of what the diffusion of innovation theory would term 'laggards' in his department. It is likely that the most successful approach to persuading them to adopt a new information system would be to _____ have their peers demonstrate how this change has helped them and bring pressure to bear from other adopters.
In terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of _________ a workgroup information system.
Compared with the traditional licensing model in which users purchase and install software, SaaS _____ offers less expensive upgrades and new releases.
A SaaS provider such as Oracle or SAP manages service levels and availability. This is advantageous because _____ it allows SaaS customers to increase the number of users without expanding their communications capacity.
Once a _____ is installed, the attacker can gain full access to the computer.
Which of the following activities does the USA Patriot Act define?
You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?
Which of the following security incidents is least costly to fix?
Which of the following companies develops one of the most widely used antivirus software products?
Someone who attempts to destroy the infrastructure components of governments is known as a ______________.
The US-CERT newsletter has alerted you about a specific vulnerability in some software installed on your organization's computers. To detect any attempts at exploiting this vulnerability, you employ a(n) ____-based intrusion detection system.
You discover that one of your organization's computers has stopped working properly due to malware. Who is most likely responsible for the presence of malware on this machine?
What is an attack vector?
Imagine you are conducting a security self-assessment. Which of the following might indicate one of your account passwords is too weak?
The first two steps an organization must take to perform a security risk assessment are to identify _____, respectively.
Because some threats, such as insider fraud, are more likely to occur than others, step 3 of the risk assessment process is to _____ assess the frequency of events or the likelihood of each potential threat.
Operating virtual servers requires software to control the host processor and resources, allocate necessary resources to virtual machines, and prevent virtual machines from disrupting each other. What type of software performs these functions?
Server virtualization offers significant cost savings because _____ it increases the total operating capacity of each physical server.
IS professionals at PKO Bank Polski S.A. use an approach where they logically divide the resources of a physical server to reduce hardware-related costs, cut unscheduled downtime for applications, and reduce the time spent on problem solving. What strategy do they use?
_____ is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results.
Sensors inside IoT wearable devices typically collect information such as _____ location and heart rate.
Which type of IoT application enables automatic monitoring combined with remote control, trend analysis, and reporting by using individual devices that each gather a small amount of data?
Compology's dumpster-monitoring software uses data from garbage container sensors plus external data to determine when dumpsters need service and alert sanitation workers so they can take preemptive action. Which type of IoT application is this?
Security is a serious issue with IoT applications because _____ they can expose internal systems to hacking, viruses, and malware.
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
After entering data into a relational database, users can make all of the following basic data manipulations except:
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?
Mollie's company is having problems with their data integrity because multiple database users sometimes access and alter a record at the same time. A database management system could eliminate these problems by implementing _____.
The number of mobile Web sites worldwide has grown rapidly, in part because of _____ the development of new and useful applications.
Authentication technologies are used by many organizations to _____ confirm the identity of a user requesting access to information or assets.
What are the components of Leavitt's Diamond?
Which part of Leavitt's diamond is most important?
What are the 4 types of Information Systems?
What is a personal information system?
What is a workgroup information system?
What is an enterprise information system?
What is an interorganizational information system?
What is an advanced persistent threat?
What is a blended threat?
What is social engineering?