One form of spoofing involves forging the return address on an e-mail so that the e-mail message
appears to come from someone other than the sender. True
Hackers create a botnet by C
infecting Web search bots with malware.
using Web search bots
The telephone system is an example of a _ network. D
The most common Web server today is E
IBM HTTP Server.
Apache HTTP Server.
More than 50% of
Which of the following would not be classified as a knowledge work system? D
computer-aided design system
3D visualization system
virtual reality system
Tools for the management, delivery, tracking, and assessment of
Case Study 2
The Pleasures and Pitfalls of BYOD
What are some of the problems a company might run into by allowing their employees to
use their own personal smartphone for work activities?
Some benefits include allowing employees to
The ability to be in many different states at once, dramatically increasing processing power, is a
hallmark of E
_are computers consisting of a circuit board with processor
ISM3011C - 8096
Case Study 1 - Should computers grade essays?
A computer grading essays can have effective results. There are some methodical parts to
grammar that are easily recognized with an appropriate program. First, defining the intenti
_ are visual tools for presenting performance data in a BI system. A
Dashboards and scorecards
Reports and the drill-down feature
Scenarios and models
Ad hoc report creation
The intelligence phase of decision making consists of disco
An upscale organic foods grocery chain is implementing an information system that will enable
it to add same-day home delivery of groceries to its customers. This is an example of C
rationalization of procedures.
Systems that enable a firm to generate demand forecasts for a product and to develop sourcing
and manufacturing plans for that product best describes supply chain _ systems. E
A distortion of information abo
Content providers use _ systems to process large amounts of very small monetary
transactions cost-effectively. D
Disintermediation provides major benefits to the distributor. False
_ is a feature of social institutions that means mechanisms are in place to determine
responsibility for an action. B
The courts of appeal
The judicial system
The rate of global piracy is approximately 42%. True
In the strategy of product differentiation, information systems are used to enable new products
and services. True
From the point of view of economics, information systems technology can be viewed as a factor
of production that can be substitut
In order to understand how a specific business firm uses information systems, you need to know
something about the hierarchy and culture of the company. True
Computers are only part of an information system. True
Intranets allow firm
The logical and physical views of data are separated in a DBMS. True
The coupling of data with the software programs that manipulate the data, such that changes in
programs requires changes to the data, is called program-data dependence. True
Enterprise systems often include transactions with customers and vendors.
In social business, firms use social networks for coordinating production tasks.
Management information systems typically support nonroutine decision making.
Case Study 3 - Google, Apple and Facebook Struggle for Your Internet Experience
Compare the business models and areas of strength of Apple, Google, and Facebook.
Apple has created a unique device image,where they focus on m
Information Systems Analysis and Design Syllabus
ISM3113 Class 3734, Spring 2016
Information Systems Analysis and Design - ISM3113 Class 3734
Date: January 11 to May 2, 2016
Course topics include the structured design and development of