363

¡Supera tus tareas y exámenes ahora con Quizwiz!

________ codes are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU) of a computer. Select one: a. Morse b. Block c. Binary d. Object e. Source

Binary

________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard. Select one: a. Stealware b. Spyware c. Adware d. Hardware e. Malware

Hardware

Which of the following is NOT one of Porter's five primary forces? Select one: a. Bargaining power of suppliers in an industry b. Substitute products from another industry c. Threat of flooding the industry with excellent products d. Rivalry among competing sellers in an industry e. Threat of potential new entrants in an industry

Threat of flooding the industry with excellent products

E-filing is an example of a ________ tool. Select one: a. consumer-to-business b. government-to-citizen c. business-to-business d. government-to-government e. consumer-to-consumer

government-to-citizen

Many ________ systems used by organizations combine a variety of tools supporting both synchronous and asynchronous communication and collaboration. Select one: a. firmware b. spyware c. mashup d. malware e. groupware

groupware

According to basic economics within a competitive marketplace, the price of a product is set by its ________. Select one: a. fixed cost b. sunk cost c. marginal cost d. opportunity cost e. transaction cost

marginal cost

The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles that will allow computers to be able to better index Web sites, topics, and subjects. Select one: a. folksonomy b. affiliate c. phishing d. collaborative e. semantic

semantic

Traditionally, companies are organized around five distinct functional areas. Which of the following is one of them? Select one: a. risk management b. communication management c. supply chain management d. technology management e. systems management

supply chain management

A network of a broad range of physical objects that can automatically share data over the Internet is called ________. Select one: a. the Internet of Things b. the Internet of Big Data c. the Wireless Internet Network d. the Broad Internet e. the Industrial Internet of Things

the Internet of Things

Which of the following HTML tags is used to create a new paragraph? Select one: a. <p> . . . </p> b. <tr> . . . </tr> c. <b> . . . </b> d. <i> . . . </i> e. <u> . . . </u>

<p> . . . </p>

________ testing involves testing of the capabilities of the system in the user environment with actual data. Select one: a. Beta b. Comparative c. Evolutionary d. Developmental e. Alpha

Beta

________ are a set of activities an organization performs in order to reach their business goals. Select one: a. Business standards b. Business cases c. Business technocracies d. Business processes e. Business data flow models

Business processes

Which type of innovation is best described as using innovative ways to connect offerings with customers? Select one: a. Brand innovation b. Structure innovation c. Service innovation d. Channel innovation e. Process innovation

Channel innovation

Which of the following is NOT a typical revenue model in the digital world? Select one: a. Freemium b. Channel marketing c. Licensing d. Affiliate marketing e. Subscriptions

Channel marketing

Which of the following occurs during wiki wars? Select one: a. Editors agree with the creators of the content. b. Contributors continuously edit or delete each other's posts. c. Administrators refuse to publish a creator's content. d. Guests edit a creator's content without permission. e. Editors do not agree with the creators of the content.

Contributors continuously edit or delete each other's posts.

________ activities are performed by the functional areas that process inputs and produce outputs. Select one: a. Extended b. Focus c. Support d. Base e. Core

Core

________ is the use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments. Select one: a. Cybersquatting b. Cyberforensics c. Cyberterrorism d. Cyberstalking e. Cyberbullying

Cyberterrorism

Which of the following explains the term geocoded? Select one: a. Data is transformed into coordinates. b. Data is used to create Web pages. c. Data is shared on the Internet. d. Data is converted into soft data. e. Data is compared with similar historical data.

Data is transformed into coordinates.

The ________ Act of 1986 made it much more difficult for anyone, including the government, to eavesdrop on phone conversations. Select one: a. Electronic Communication Modernization b. Internet Privacy c. Electronic Communications Privacy d. Sarbanes-Oxley e. Gramm-Leach-Bliley

Electronic Communications Privacy

________ is an XML-based specification for publishing financial information. Select one: a. Extensible Rights Markup Language b. Extensible Business Reporting Language c. Enterprise Mashup Markup Language d. Extensible Access Control Markup Language e. Extensible Application Markup Language

Extensible Business Reporting Language

________ is a standard for exchanging structured information over the Web. Select one: a. MySQL b. Active Server Pages c. Unified Modeling Language d. JavaScript e. Extensible Markup Language

Extensible Markup Language

________ allows using approximations or subjective values to handle situations where information about a problem is incomplete. Select one: a. Clustering b. Stickiness c. What-if analysis d. Normalization e. Fuzzy logic

Fuzzy logic

________ activities encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management. Select one: a. Technology development b. Account c. Human resource d. Procurement e. Architectural

Human resource

Web servers process user requests for pages using the ________. Select one: a. Trivial File Transfer Protocol b. TOC Protocol c. Dynamic Host Configuration Protocol d. Address Resolution Protocol e. Hypertext Transfer Protocol

Hypertext Transfer Protocol

________ is the stealing of another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid. Select one: a. Logic bombing b. Bot herding c. Battery d. Spear phishing e. Identity theft

Identity theft

Which of the following statements is true about social bookmarking? Select one: a. It is the distribution of digital media. b. It allows users to post short "status updates." c. It allows podcasters to publish and push current shows to the viewers or listeners. d. It allows users to create folksonomies. e. It allows people to communicate using avatars.

It allows users to create folksonomies.

Which of the following statements is true about an IP address? Select one: a. It is written as eight numbers separated by periods. b. It is written as a number with a period at the end. c. The format of an IP address is a 64-bit numeric address. d. Each number separated by periods can have any number between 0 and 999. e. It can be used to navigate to particular Web addresses.

It can be used to navigate to particular Web addresses.

Which of the following best describes the network effect? Select one: a. It refers to the type of network an organization employs. b. It refers to the idea that networks are attached to each other. c. It refers to the notion that the value of a network increases with the number of users. d. The value of a network depends on the number of mobile devices that are attached. e. It refers to the effect of the wireless devices that are attached.

It refers to the notion that the value of a network increases with the number of users.

Which of the following is an example of reintermediation? Select one: a. Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute as meals in order to provide competition to the other food chains in the area. b. Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations. c. The diamond card of the Futilery Centriono, is issued by invitation only to customers who spend more than $250,000 a year on their shopping card. d. Nanny Duke, a baby products manufacturing company, acquires a list of parents-to-be and showers them with samples of diapers and other baby products to capture a share of their future purchases. e. Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers.

Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations.

________ is a programming language used to develop applications in artificial intelligence and high-speed arcade graphics. Select one: a. COBOL b. Perl c. LISP d. C++ e. FORTAN

LISP

________ refers to the process of identifying, quantifying, and presenting the value provided by a system. Select one: a. Deploying a software product b. Testing a process c. Making a prototype d. Making a business case e. Refining a prototype

Making a business case

________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data. Select one: a. Object-oriented language b. Authentication service c. Media access control d. Packet switching e. Source code

Media access control

________ systems are designed to handle multiple concurrent transactions from customers. Select one: a. Online transaction processing b. Network transaction maximization c. Product allocation d. Yield optimization management e. Real utility management

Online transaction processing

________ refers to the process of integrating external stakeholders into the innovation process. Select one: a. Social cataloging b. Nearshoring c. Open innovation d. Media sharing e. Crowdsourcing

Open innovation

________ software are applications written by third-party vendors that are used by many different users and organizations. Select one: a. Personalized b. Packaged c. Custom d. Tailored e. Bespoke

Packaged

________ are produced at predefined intervals to support routine decisions. Select one: a. Key-indicator reports b. Scheduled reports c. Drill-down reports d. Exception reports e. Security reports

Scheduled reports

________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source. Select one: a. Viral marketing b. Spear phishing c. Logic bombing d. Hacking e. Cyber tunneling

Spear phishing

________ refers to the use of key performance indicators to monitor performance of the entire supply chain, including sourcing, planning, production, and distribution. Select one: a. Supply chain optimization b. Supply chain integration c. Supply chain analytics d. Supply chain strategy e. Supply chain visibility

Supply chain analytics

________ involves the development of various resource plans to support the efficient and effective production of goods and services. Select one: a. Supply chain planning b. Supply chain analytics c. Requirement planning d. Supply chain networking e. Requirement execution

Supply chain planning

Which of the following statements is true about the infrastructure as a service model? Select one: a. The customer has to manage the licenses for the operating systems being used. b. The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. c. The user has control over the applications, but has limited or no control over the underlying infrastructure. d. The customer can run his or her own applications that are typically designed using tools provided by the service provider. e. The customer does not have to manage operating system licenses.

The customer has to manage the licenses for the operating systems being used.

Which of the following is true for tangible costs? Select one: a. They are recurring costs. b. They are always fixed costs. c. They are always non-recurring costs. d. They are the same as intangible benefits. e. They are relatively easy to quantify.

They are relatively easy to quantify.

Identify a true statement about the function of knowledge workers. Select one: a. They modify knowledge created by others, but do not create knowledge themselves. b. They work in a monotonous workplace and lack innovation. c. They lack the ability to solve non-routine problems at work. d. They create, modify, and/or synthesize knowledge as a fundamental part of their jobs. e. They use knowledge to perform their jobs, but do not create knowledge.

They create, modify, and/or synthesize knowledge as a fundamental part of their jobs.

Which of the following statements about vendor-managed inventory (VMI) is true? Select one: a. To make VMI possible, the manufacturer allows the supplier to monitor stock levels and ongoing sales data. b. Companies using this strategy try to optimize their ordering quantities such that parts or raw material arrive just when they are needed for production. c. Manufacturers using the VMI business model manage the inventories themselves and send out requests for additional items to the vendors as needed. d. Retailers using this strategy allow suppliers to maintain ownership of inventory within their warehouses or stores until items are scanned at the point of sale. e. To make VMI possible, the manufacturer must maintain large inventories of supplies, parts, warehousing resources, and extra workers to meet production contingencies.

To make VMI possible, the manufacturer allows the supplier to monitor stock levels and ongoing sales data.

Which of the following is a shifting perspective from Web 1.0 to Web 2.0? Select one: a. Web 1.0 - Me, Web 2.0 - You b. Web 1.0 - Read, Web 2.0 - Read, write c. Web 1.0 - Read, Web 2.0 - Write d. Web 1.0 - You, Web 2.0 - Me e. Web 1.0 - Write, Web 2.0 - Read

Web 1.0 - Read, Web 2.0 - Read, write

A hypertext document is otherwise known as a ________. Select one: a. Web host b. Web ring c. Webmaster d. Web consortium e. Web page

Web page

With regards to the World Wide Web, Web pages are stored on ________. Select one: a. Web rings b. Web consoles c. Web servers d. Web consortiums e. Web hosts

Web servers

Which of the following statements best describes the productivity paradox of technology investment? Select one: a. As investment in technology increases, productivity decreases steadily. b. The productivity of any technology is directly proportional to the investment in that technology. c. While it is easy to identify and quantify the intangible benefits of an information system, it is not easy to quantify the tangible benefits. d. The productivity of an information system is in no way related to the investment in the technology. e. While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use.

While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use

Requirements collection takes place during the systems ________ phase of the systems development life cycle (SDLC). Select one: a. maintenance b. operation c. implementation d. analysis e. design

analysis

Which of the following types of computer software utilities is used to archive files from hard disks to tapes, flash drives, or other storage devices? Select one: a. backup b. data compression c. disk and data recovery d. device drivers e. file defragmentation

backup

Entering a large number of separate forms or documents into a computer system and manipulating these data at a single time is referred to as ________. Select one: a. inter-processor communication b. process control block c. chain loading d. batch processing e. context switching

batch processing

With respect to the types of information systems used in organizations, an Online Analytical Processing (OLAP) system is an example of a(n) ________ system. Select one: a. electronic commerce b. office automation c. geographic information d. social software and collaboration e. business intelligence

business intelligence

What a company does, how a company uniquely does it, how a company gets paid for doing it, and what costs are involved are all part of an organization's ________. Select one: a. competitive model b. value model c. strategic model d. business model e. revenue model

business model

The form of electronic commerce that is used by organizations to conduct business with business partners without involving the end consumer is known as ________ electronic commerce. Select one: a. peer-to-peer b. business-to-intermediary c. business-to-supplier d. business-to-consumer e. business-to-business

business-to-business

The term "podcasting" is a misnomer because podcasts ________. Select one: a. cannot be played on Apple's iPods b. are concerned with the dissemination of information to a narrow audience c. can be played on a variety of devices in addition to Apple's iPods d. are not related to distribution of digital media for digital devices e. are concerned with outsourcing tasks to a large group of people or community

can be played on a variety of devices in addition to Apple's iPods

Companies using a ________ business strategy are also called virtual companies. Select one: a. bricks-and-clicks b. click-only c. click-and-flip d. brick-and-mortar e. click-and-mortar

click-only

A ________ is nothing more than an empty warehouse with all necessary connections for power and communication, but nothing else. Select one: a. cold backup site b. firewall c. buying center d. botnet e. collocation facility

cold backup site

Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system. Select one: a. office automation system b. functional area information system c. collaboration system d. data mining and visualization system e. geographic information system

collaboration system

Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power, backups, connectivity, and security. Such data centers are called ________. Select one: a. virtual private networks b. hot backup sites c. control centers d. offshore networks e. collocation facilities

collocation facilities

The ________ is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and to establish appropriate controls. Select one: a. control objectives for information and related technology (COBIT) b. U.S.A. Patriot Act c. Sarbanes-Oxley Act of 2002 (S-OX) d. Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) e. Electronic Communications Privacy Act of 1986

control objectives for information and related technology (COBIT)

With respect to the types of information systems used in organizations, sales force automation is an example of a(n) ________ system. Select one: a. customer relationship management b. geographic information c. electronic commerce d. data mining and visualization e. supply chain management

customer relationship management

Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name Fyroff Enterprise for the new solution. However, when the company attempts to register the domain name, it finds that a small unknown firm is already registered under the same domain name. The small firm is now attempting to sell the domain name to Fyroff. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks? Select one: a. logic bombing b. cybersquatting c. cyberbullying d. bot herding e. cyberstalking

cybersquatting

Identify the computer software utility that allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data. Select one: a. file conversion b. device drivers c. data compression d. disk and data recovery e. file defragmentation

data compression

Once the data model is created, the format of the data is documented in a data ________. Select one: a. dictionary b. domain c. warehouse d. entry e. mart

dictionary

The phenomenon of cutting out the "middleman" and reaching customers more directly and efficiently is known as ________. Select one: a. disintermediation b. dissemination c. demutualization d. defalcation e. gentrification

disintermediation

An example of an agile methodology approach is ________. Select one: a. eXtreme Programming b. Object VxP Programming c. Technet Extreme Programming d. Patch management e. SQL Extreme

eXtreme Programming

The extent to which tasks are accomplished well is called ________. Select one: a. accomplishment b. efficiency c. effort d. effectiveness e. goal setting

effectiveness

A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database. Select one: a. legacy system b. enterprise system c. distributed software system d. decision support system e. management information system

enterprise system

At the ________ level of an organization, information systems provide key performance indicators (KPIs) that are focused on balancing performance across the organization. Select one: a. executive b. tactical c. illusive d. operational e. managerial

executive

To assist ________ decision making, information systems are used to obtain aggregate summaries of trends and projections of the future. Select one: a. operational-level b. executive-level c. managerial-level d. tactical-level e. functional-level

executive-level

Business case arguments based on ________ focus on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on. Select one: a. fear b. facts c. fiction d. fallacy e. faith

faith

Which of the following key elements of supply chain execution includes information related to payment schedules, consignment, and ownership of products and materials? Select one: a. product flow b. information flow c. material flow d. financial flow e. personnel flow

financial flow

Two-tier ERP strategy can support operations at the corporate level, while providing the needed ________ at the subsidiary level. Select one: a. interoperability and reliability b. scalability and manageability c. flexibility and agility d. interoperability and accessibility e. reliability and componentization

flexibility and agility

A ________ key refers to an attribute that appears as a non-primary key attribute in one entity and as a primary key attribute (or part of a primary key) in another entity. Select one: a. primary b. candidate c. super d. foreign e. table

foreign

A ________ is a form of e-auction which allows businesses to buy seized and surplus government equipment. Select one: a. top-up b. rafter bid c. reverse auction d. forward auction e. mystery auction

forward auction

Iver Audio is an all-in-one music management tool that was first marketed in 1999. Most users can use the Basic version that is free, but a $19.99 upgrade provides extra features such as supertagging, faster ripping and burning. Which of the following explains this approach for applying freeconomics? Select one: a. cross subsidies approach b. labor exchange approach c. gift economy approach d. freemium approach e. zero marginal cost approach

freemium approach

According to the disruptive growth engine, executive leadership will allow a firm to ________. Select one: a. gain credibility and to bridge sustaining and disruptive product development b. build a disruptive team of expert innovators c. effectively identify and evaluate potential disruptive innovations d. gain the greatest disruptive opportunities e. educate those closest to customers and competitors in order to identify opportunities

gain credibility and to bridge sustaining and disruptive product development

Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________. Select one: a. social promoters b. internet activists c. hacktivists d. crackers e. online predators

hacktivists

"Backward looking" budgets are typically based on ________. Select one: a. marketing research b. current market conditions c. historical data d. future trends e. forecasts

historical data

In an information system, a ________ is the point of contact between a system and users. Select one: a. human computer interface b. point-to-point link c. data link d. network interface e. biointerface

human computer interface

Which of the following core competencies is part of an IS personnel's systems knowledge and skills? A) hardware platforms B) virtualization C) information gathering and analysis D) cabling and network interface cards E) application software

information gathering and analysis

With respect to computer networks, a typical ________ network has a bandwidth of 10 Mbps to 1 Gbps. Select one: a. local area b. wide area c. metropolitan area d. personal area e. campus area

local area

With respect to the general classes of computers, a ________ is very large and is used primarily as the main, central computing system for major corporations. Select one: a. workstation b. server c. personal computer d. supercomputer e. mainframe computer

mainframe computer

Which of the following core competencies are part of an IS personnel's technical knowledge and skills? Select one: a. systems analysis and design b. interpersonal skills and group dynamics c. network administration d. integrating subsystems and systems e. technological communication and presentation

network operating systems

Business rules are captured by the designers of a database and included in a data dictionary to ________. Select one: a. capture the structure of the database b. make sure that each table contains only attributes that are related to an entity c. prevent illegal or illogical entries from entering the database d. eliminate data duplication e. organize and sort the data, complete calculations, and allocate storage space

prevent illegal or illogical entries from entering the database

Subprocesses of the procure-to-pay process include ________. Select one: a. creating customer records b. creating customer satisfaction c. price and terms negotiations d. speeding up the collection process e. collecting the payment

price and terms negotiations

Analytical tools are used to optimally utilize materials, equipment, and labor during the ________ process of supply chain planning. Select one: a. production scheduling b. inventory planning c. demand forecasting d. safety stock scheduling e. distribution planning

production scheduling

The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________. Select one: a. rapid elasticity b. external network capability c. cloud engineered data d. packaged networking e. narrow network access

rapid elasticity

Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. The introduction of middlemen in business models is an example of ________. Select one: a. defalcation b. gentrification c. remutualization d. reintermediation e. disintermediation

reintermediation

The ability to adapt to increases or decreases in demand for processing or data storage is known as ________. Select one: a. reliability b. extensibility c. usability d. portability e. scalability

scalability

A way to ensure that a company's site is on the first page users see when looking for a specific term is using ________ advertising. Select one: a. stealth b. search c. buzz d. affiliate e. viral

search

With respect to organizational decision-making levels, for ________ decisions, some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made. Select one: a. planned b. unstructured c. asymmetrical d. semistructured e. structured

semistructured

The key use of the manufacturing execution module of supply chain management is to ________. Select one: a. assign optimal safety stock and target stock levels in all inventories in the supply network b. ensure that the materials required for production are available where needed and when needed c. support production processes, taking into account capacity and material constraints d. support receiving, storing, and picking of goods in a warehouse e. forecast and plan anticipated demand for products

support production processes, taking into account capacity and material constraints

Which of the following core competencies is part of an IS personnel's business knowledge and skills? A) cloud computing B) technological communication and presentation C) systems development life cycle D) integrating subsystems and systems E) virtualization

technological communication and presentation

Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________. Select one: a. the product is designed to last only for a certain life span b. the product is designed to avoid obsolescence c. the product is designed in such a way as to extend its life span d. the companies do not enter markets that have the risk of product obsolescence e. the companies have already decided when to launch their next product

the product is designed to last only for a certain life span

A(n) ________ information flow consists of information that is received from another organization. Select one: a. packaged b. downstream c. legacy d. upstream e. stand-alone

upstream

Which of the following is an example of synchronous communication? Select one: a. online reviews b. bulletin board systems c. work flow automation systems d. videoconferencing e. e-mail

videoconferencing

Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home. Select one: a. metropolitan area b. storage area c. near-me area d. virtual private e. body sensor

virtual private

Identify the programming language that allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code? Select one: a. scripting language b. prototype-based programming language c. Web development language d. object-oriented language e. visual programming language

visual programming language

Which of the following analyses involves making hypothetical changes to the data associated with a problem and observing how these changes influence the results? Select one: a. what-if analysis b. predictive analysis c. time-series analysis d. multivariate analysis e. linear regression analysis

what-if analysis

A ________ is a networking hardware component that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points. Select one: a. router b. network interface card c. modem d. wireless controller e. network switch

wireless controller


Conjuntos de estudio relacionados

Electrical Conduction Processes and Interactions

View Set

CH 1- EMS Systems, CH 2- Workforce Safety and Wellness, CH 3- Medical, Legal, and Ethical Issues, CH 4- Communications and Documentation, CH 5- Medical Terminology, CH 6- The Human Body, CH 7- Life-Span Development, CH 8- Lifting and Moving Patients,...

View Set

CompuScholar | Python | Chapter 1

View Set