CIS 251 Final!

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the intangible creative work that is embodied in physical form and includes trademarks and patents? (A) Intellectual software (B) Intellectual property (C) Tradework property (D) Ethical property

(B) Intellectual property

Which of the below metrics represents the time it takes to manufacture a product and deliver it to the retailer? (A) Back order (B) Inventory cycle time (C) Customer order cycle time (D) Inventory turnover

(B) Inventory cycle time

What are the three cloud computing service delivery models?

(B) Infrastructure as a Service, Software as a Service, Platform as a Service

What are the rules that help ensure the quality of information? (A) Information integrity (B) Integrity constraints (C) Relational integrity constraints (D) Business-critical integrity constraints

(B) Integrity constraints

Which type of business model is Amazon using?

Pure-play

The speed of transmission of a network is determined by the speed of its smallest ________. (A) Unit of time (B) Number of computers (C) Amount of bandwidth (D) Number of customers

(C) Amount of bandwidth

Which of the following is not considered an epolicy? (A) Acceptable use policy (B) Internet use policy (C) Ethical computer use policy (D) Anti-hacker use policy

(D) Anti-hacker use policy

What is a widely held but difficult to achieve standard of availability for a system? (A) "Five 9s" availability (B) "1%" minimum availability (C) The "five's accessibility" code (D) "Five 10s" availability

(A) "Five 9s" availability

What is the success rate for a project using the waterfall methodology? (A) 1 in 10 (B) 2 in 10 (C) 4 in 10 (D) 8 in 10

(A) 1 in 10

What is information security? (A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization (B) A special class of adverse that collects data about the user and transmits it over the internet without the user's knowledge or permission (C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network (D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows internet advertising to display advertisements without the consent of the computer user

(A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

What is information security? (A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization (B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission (C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network (D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

(A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

What is a primary key? (A) A field (or group of fields) that uniquely identifies a given entity in a table (B) A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables (C) Characteristics or properties or an entity (D) A field (or group of fields) that uniquely identifies a given attribute in a table

(A) A field (or group of fields) that uniquely identifies a given entity in a table

Which of the following delivers electricity using two-way digital technology? (A) A smart grid (B) A systematic grid (C) A collective grid (D) An interactive grid

(A) A smart grid

What is a project? (A) A temporary activity undertaken to create a unique product, service, or result (B) The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project (C) Any measurable, tangible, verifiable outcome, result, or time that is produced to complete a project or part of a project (D) Represent key dates when a certain group of activities must be performed

(A) A temporary activity undertaken to create a unique product, service, or result

Which of the following provides an accurate definition of systems thinking? (A) A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part. (B) A way of monitoring individual components including an input, the process, and an output, while continuously gathering feedback on the entire system. (C) A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on the entire system. (D) A way of monitoring singular parts of a system by viewing a single input that is processed or transformed to produce an entire system that is continuously monitored to gather feedback on each individual part.

(A) A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet? (A) Acceptable use policy (B) Social media policy (C) Information privacy policy (D) Email privacy policy

(A) Acceptable use policy

What are the seven characteristics of an agile MIS infrastructure? (A) Accessibility, availability, maintainability, probability, reliability, scalability, and usability (B) Accessibility, affordability, mobility, portability, reliability, scalability, and usability (C) Accessibility, availability, mobility, penetrability, responsibility, sensibility, and usability (D) Accessibility, affordability, functionality, changeability, constancy, sources, and understanding

(A) Accessibility, availability, maintainability, probability, reliability, scalability, and usability

Which of the following are examples of transactional information? (A) Airline tickets, sales receipts, and packing slips (B) Trends and statistics (C) Product sales results, grocery receipts, and growth projections (D) Airline tickets and sales growth spreadsheets

(A) Airline tickets, sales receipts, and packing slips

When analyzing the book store industry, some of today's businesses compete with different business strategies and cost strategies. Which of the following is using a broad market competitive scope along with a low cost strategy? (A) Amazon.com (B) Any local independent book store that specializes in antique books (C) Barnes & Noble (D) Your college bookstore

(A) Amazon.com

What are the crucial steps companies perform to achieve their goals and objectives and implement their strategies? (A) Critical success factors (B) Crucial success factors (C) Key performance indicators (D) Key performance factors

(A) Critical success factors

Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month. Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information. He suspects that this may be the cause of an internal employee. He needs to clarify and establish what type of plan to help reduce further problems? (A) An information security plan (B) An ethical information policy (C) An anti-virus plan (D) None of the other answers is correct

(A) An information security plan

Which of the below defines the relationship between variables along with the nature and frequency of the relationship? (A) Association detection (B) Masking detection tool (C) Cluster grouping (D) Blocking barriers

(A) Association detection

Review the below list of key terms and determine which one typically occurs during operational business process improvement. (A) Automation (B) Streamlining (C) Reengineering (D) Improvement

(A) Automation

Changing business processes with MIS outlines how to improve the three levels of business processes which include operational, managerial, and strategic. From operational to strategic, what are the three major improvement strategies that the author describes? (A) Automation-streaming-reengineering (B) Artificial intelligence-streamlining-reengineering (C) Automation-workflow-reinvention (D) Automation-consolidation-restructing

(A) Automation-streaming-reengineering

Which of the following represents businesses buying from and selling to each other over the Internet? (A) B2B (B) B2C (C) C2B (D) C2C

(A) B2B

Which of the below metrics represents an unfilled customer order for a product that is out of stock? (A) Back order (B) Inventory cycle time (C) Customer order cycle time (D) Inventory turnover

(A) Back order

Which of the below represents the primary elements in an information MIS infrastructure? (A) Backup, recovery, disaster recovery, and business continuity planning (B) Backup, accessibility, and usability (C) Backup, cloud computing, and virtualization (D) Grid computing, cloud computing, and virtualization

(A) Backup, recovery, disaster recovery, and business continuity planning

What is the process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance? (A) Benchmarking (B) Bottlenecking (C) Consolidation (D) Cycle time

(A) Benchmarking

Which of the following terms refers to the smallest element of data and has a value of either 0 or 1? (A) Bit (B) Bandwidth (C) Modem (D) Internet protocol

(A) Bit

Which of the following is the correct list of the six different types of hackers listed in your text? (A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers (B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers (C) Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers (D) None of the other answers is correct

(A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers

What is it called when distorted product-demand information ripples from one partner to the next throughout the supply chain? (A) Bullwhip effect (B) Demand planning systems (C) Supply chain planning systems (D) Supply chain execution systems

(A) Bullwhip effect

How are the majority of companies today typically organized? (A) By departments or functional areas. (B) By departments or financial areas. (C) By degree of financial areas. (D) All of the above.

(A) By departments or functional areas.

What is the business model which applies to customers offering goods and services to each other over the Internet? (A) C2C (B) C2B (C) B2B (D) B2C

(A) C2C

What is the ebusiness model which applies to customers offering goods and services to each other over the Internet? (A) C2C (B) C2B (C) B2B (D) B2C

(A) C2C

Which application's primary business benefits includes sales forecasts, sales strategies, and marketing campaigns? (A) CRM (B) SCM (C) ERP (D) All of these are correct

(A) CRM

What helps an organization identity its customers across applications? (A) CRM reporting technologies (B) CRM analyzing technologies (C) CRM processing technologies (D) CRM predicting technologies

(A) CRM reporting technologies

CFS's and KPI's are the two core metrics used within a business to track progress or success. What is the relationship between CSF's and KPI's? (A) CSF's are business strategy elements where KPI's measure the progress of the CSF's (B) CSF's build the business environment where KPI's explain how to build the CSF's (C) KPI's are used first where CSF's are applied after (D) KPI's promote employees on their performance where CSF's demote employees based on their performance level

(A) CSF's are business strategy elements where KPI's measure the progress of the CSF's

What guides users through marketing campaigning performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis? (A) Campaign management system (B) Cross-selling (C) Up-selling (D) List generator

(A) Campaign management system

What guides users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis? (A) Campaign management system (B) Cross-selling (C) Up-selling (D) List generator

(A) Campaign management system

Which of the below is a customer-facing process? (A) Communicating with customers (B) Strategic goal setting (C) Providing performance feedback and rewards (D) Purchasing new materials

(A) Communicating with customers

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information? (A) Content filtering, encryption, and firewalls (B) Calculating, locking, and firewalls (C) Content prohibiting, and cookies (D) None of the above

(A) Content filtering, encryption, and firewalls

Which of the below processes would be found in the operations management department? (A) Creating production schedules (B) Communicating marketing campaigns (C) Hiring employees (D) Processing sales

(A) Creating production schedules

What type of process includes order processing, customer service processing, sales processing, customer billing processing, and order shipping processing? (A) Customer-facing processes (B) Business-facing processes (C) Industry-specific customer facing processes (D) All of the other answers are correct

(A) Customer-facing processes

What is the type of mediation that refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?

(A) Cybermediation

What is a logical data structure that details the relationship among data elements using graphics or pictures? (A) Data model (B) Data element (C) Data mining tool (D) Data mart tool

(A) Data model

What is it called when a manager has so much data and information that they cannot make a decision? (A) Data rich, information poor (B) Data rich, content poor (C) Data rich, communication poor (D) Data rich, intelligence

(A) Data rich, information poor

Which of the following represents the different information granularities? (A) Detail, summary, aggregate (B) Document, presentation, spreadsheet, database (C) Individual, department, enterprise (D) None of the above

(A) Detail, summary, aggregate

A disaster recovery plan contains a _______ that outlines the cost to support the plan. (A) Disaster organization cost analysis (B) Disaster recovery improvements (C) Disaster financial costs (D) Disaster recovery cost curve

(A) Disaster organization cost analysis

What type of metrics measure throughput, transaction speed, and system availability? (A) Efficiency MIS metrics (B) Effectiveness MIS metrics (C) ROt (D) Benchmarks

(A) Efficiency MIS metrics

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system? (A) Elevation of privilege (B) Packet tampering (C) Spoofing (D) Spyware

(A) Elevation of privilege

In the relational database model, what is a person, place, thing, transaction, or event about which information is stored? (A) Entity (B) Relationships (C) Attribute (D) Foreign Key

(A) Entity

Which of the following stores information about a person, place, thing, transaction, or event, and is usually referred to as a table? (A) Entity (B) Extraction (C) Attribute (D) Foreign key

(A) Entity

What occurs when a redundant storage serve offers an exact replica of the real-time data, and if the primary serve crashes, the users are automatically directed to a secondary server?

(A) Failover

Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby's tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby gathering? (A) Feedback (B) Processing (C) Output management (D) Sales processing

(A) Feedback

What takes information entered into a given system and sends it automatically to all downstream systems and processes? (A) Forward integration (B) Forward data interchange (C) Backward integration (D) Backward data interchange

(A) Forward integration

What are areas around access points where users can connect to the Internet via Wi-Fi?

(A) Hotspots

What is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems? (A) In-sourcing (B) Outsourcing (C) Business process outsourcing (D) Offshore outsourcing

(A) In-sourcing

Which of the below is an example of a critical success factor?

(A) Increase customer satisfaction

Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing individual and departmental goals, and generating financial analyses across departments and the enterprise as a whole for the executive team to review. Ben's duties provide value-added benefit to his company and would be categorized as occurring at the different __________. (A) Information levels (B) Information formats (C) Information granularities (D) Information focus

(A) Information levels

Which policy contains general principles regarding information privacy? (A) Information privacy policy (B) Acceptable use policy (C) Internet use policy (D) Anti-Spam policy

(A) Information privacy policy

What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video? (A) Information richness (B) Information age (C) Information reach (D) Information browser

(A) Information richness

Feedback is information that returns to its original transmitter and modifies the transmitter's action. What would the original transmitter include?

(A) Input, Transform, Output.

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it Janie is creating the potential for which type of information security breach to occur? (A) Insiders to hack into the college system (B) Dumpster diving to find usernames and passwords (C) Viruses and worms to spread through the college system (D) All of these are correct

(A) Insiders to hack into the college system

Which of the following would NOT be considered part of the timely characteristic of high-quality information? (A) Is the zip code missing in the address? (B) Is the information current with respect to business needs? (C) Is the customer address current? (D) Is the information updated weekly or hourly?

(A) Is the zip code missing in the address?

What is the role of a foreign key?

(A) It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

What sends massive amounts of emails to a specific person or system that user's server to stop functioning? (A) Mail bomb (B) Spam (C) Intellectual spam (D) Junk mail

(A) Mail bomb

What is another term for information cleansing? (A) Information mining (B) Information scrubbing (C) Information scrapping (D) Information marts

(B) Information scrubbing

Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environment changes? (A) Maintainability (B) Scalability (C) Capacity planning (D) Portability

(A) Maintainability

What includes a variety of threats such as viruses, worms, and Trojan horses? (A) Malicious code (B) Hoaxes (C) Spoofing (D) Sniffer

(A) Malicious code

Jenny Welch, works at a retail store selling sports equipment. Her daily tasks include operating the store, creating the work schedules, processing payment, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Jenny? (A) Managerial (B) Operational (C) Strategic (D) Owner

(A) Managerial

What is a large computer network usually spanning a city or a specific infrastructure like a college? (A) Metropolitan area network (MAN) (B) Local area network (LAN) (C) Wide area network (WAN) (D) Secure area network (SAN)

(A) Metropolitan area network (MAN)

Which of the following represents a business process you would find in the operations management department? (A) Ordering inventory (B) Processing sales (C) Promoting discounts (D) Paying of accounts payable

(A) Ordering inventory

A company should be able to calculate the cost of downtime by which of the following? (A) Per hour, per day, and per week (B) Per employee, per computer, and per company (C) Per stock, per stockholder, and per investment capital (D) None of the other answers are correct

(A) Per hour, per day, and per week

Imagine you accidentally the URL for your bank and you are redirected to a fake website that collects your information. What type of identity theft were you just a victim of? (A) Pharming (B) Worm holes (C) Phishing (D) Insider hacking

(A) Pharming

Which of the following is considered data? (A) Quantity sold (B) Best customer by month (C) Best selling item by month (D) Worst selling item by month

(A) Quantity sold

Which of the following is an example of an emergency notification system? (A) Radio stations' occasional tests of the national alert system (B) Useless alerts for promotional discounts (C) Text messages from your local cell phone provider (D) All of the above

(A) Radio stations' occasional tests of the national alert system

Which business application uses electronic tags and labels to identify objects wirelessly over short distances? (A) Radio-frequency identification (B) Global positioning systems (C) Geographic information systems (D) Location-based services

(A) Radio-frequency identification

Callie Crystal owns and operates one of the most successful local coffer shops in Denver, called The Edgewater Cafe. Each time a customer purchases their 100th cup of coffee at The Edgewater Cafe they receive a free pound of coffee of their choice. What is Callie attempting to create with her unique "Free Pound of Coffee" marking program? (A) Reducing buyer power with a loyalty program. (B) Increasing buyer power with a loyalty program. (C) Decreasing supplier power with a differentiated product. (D) Creating a substitute product.

(A) Reducing buyer power with a loyalty program.

What type of integrity constraint does NOT allow someone to create an order for a nonexistent customer?

(A) Relational integrity constraint

What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server? (A) Secure hypertext transfer protocol (SHTTP) (B) Secure sockets layer (SSL) (C) SSL certificate (D) SHTTP certificate

(A) Secure hypertext transfer protocol (SHTTP)

Your boss has asked you to analyze the airline industry using Porter's three generic strategies. Which of the following companies are using a cost leadership strategy? (A) Southwest, Horizon, Frontier, JetBlue; (B) British Airways, Singapore Airlines, Virgin Atlantic; (C) Sky Taxi-a rent by the hour personal place service; (D) All of the above.

(A) Southwest, Horizon, Frontier, JetBlue.

What is another term for data that is already contained in a database or a spreadsheet?

(A) Structured data

Michael Porter defined the Five Forces Model and the potential pressures that can hurt sales. Which of the following is not one of the potential pressures that can hurt sales. Which of the following is not one of the potential pressures that can hurt sales? (A) Suppliers can drive down profits by changing more for suppliers. (B) New market entrants can steal potential investment capital. (C) Substitute products can steal customers. (D) Competition can steal customers.

(A) Suppliers can drive down profits by changing more for suppliers.

What is the overall process for developing information systems from planning and analysis through implementation and maintenance? (A) Systems development life cycle (B) Project management (C) Systems management (D) Project development life cycle

(A) Systems development life cycle

How do TCP and IP differ? (A) TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address (B) TCP verifies the information is reliable, and IP verifies that the data is sent (C) IP verifies the correct delivery of data in case it is corrupted, TCP verifies the data are sent to the correct IP address (D) IP verifies connectivity, and TCP verifies the rate at which the data is sent

(A) TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address

Which of the following is the primary reason why companies outsource? (A) Tap outside sources of expertise (B) Concentrate resources on core business (C) Reduce headcount and related expenses (D) Better manage the costs of internal processes

(A) Tap outside sources of expertise

What is the difference between the As-Is process model and the To-Be process model? (A) The As-Is process model begins with the process problem is, and the To-Be process model displays how the problem will be solved (B) The process models are not related (C) Both process models determine when to solve the problem (D) The As-Is process model begins with where to implement the solution, and the To-Be process model displays why the problem needs to be fixed

(A) The As-Is process model begins with the process problem is, and the To-Be process model displays how the problem will be solved

If you were thinking about a home theater system which of the following represents the inputs? (A) The DVD player, DVD movies, speakers, TV, and electricity. (B) Playing the movie including the audio through the speakers and the video on the TV. (C) A message stating that the disk is dirty and cannot be played. (D) Spinning the disk to play, pause, and rewind, or fast forward.

(A) The DVD player, DVD movies, speakers, TV, and electricity.

Which of the choices below represents the definition of information compliance? (A) The act of conforming, acquiescing, or yielding information (B) The ability to comply with software (C) The understanding of technology (D) The verbalization of information government in a company's policies and procedures

(A) The act of conforming, acquiescing, or yielding information

Which of the following describes confidentiality? (A) The assurance that messages and information are available only to those who are authorized to view them (B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment (C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent (D) The principles and standards that guide our behavior toward other people

(A) The assurance that messages and information are available only to those who are authorized to view them

A system is a collection of parts that link to achieve a common purposes. Systems thinking is a way of monitoring ______. (A) The entire system (B) A division within the sales role (C) The executive team (D) The company's competitors

(A) The entire system

When evaluating the six-step decision making process, what occurs during the solution implementation step? (A) The process will begin again if the decision made were incorrect (B) Definition of the problem as clearly and precisely as possible (C) Details of every solution possible including ideas that seem far fetched (D) The solution that best solves the problem is selected

(A) The process will begin again if the decision made were incorrect

What is usability? (A) The system is easy to learn and efficient and satisfying to use (B) The system functions correctly and provides accurate information (C) The system allows varying levels of access (D) The system quickly transforms to support environmental changes

(A) The system is easy to learn and efficient and satisfying to use

Which of the following is a tool a manager can use to analyze competitive intelligence and identify competitive advantages? (A) The three generic strategies. (B) The threat of substitute buyer power. (C) Differentiated costs. (D) Supplier loyalty.

(A) The three generic strategies.

Which of the following is a tool a manager can use to analyze competitive intelligence and identify competitive advantages? (A) the three generic strategies; (B) the threat of substitute buyer power; (C) differentiated costs; (D) supplier loyalty

(A) The three generic strategies.

If you were thinking about an oven as a system which of the following represents the input? (A) The uncooked food (B) The cooked food (C) A light including that the oven has reached the preheated temperature (D) The oven running at 350 degrees for 20 minutes

(A) The uncooked food

Which one of Porter's five forces is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market? (A) Threat of new entrants (B) Threat of substitute products or services (C) Threat of buyer power (D) Supply chain competition

(A) Threat of new entrants.

What are the three primary types of management information systems available to support decision making across the company levels? (A) Transaction Processing Systems, Decision Support Systems, Executive Information Systems (B) Analytical Information, Decision Support System, Executive Information Systems (C) Transaction Processing Systems, Drill-Down Systems, Expert Systems (D) What-If Analysis, Sensitivity Analysis, Goal-Seeking Analysis

(A) Transaction Processing Systems, Decision Support Systems, Executive Information Systems

What would managers use to make structural decisions at the operational level? (A) Transactional information (B) Analytical informatoin (C) An EIS system (D) Intelligent system

(A) Transactional information

In a Gantt chart tasks are listed ________ and the project's time frame is listed ________. (A) Vertically, horizontally (B) Horizontally, vertically (C) Vertically, vertically (D) Horizontally, horizontally

(A) Vertically, horizontally

What enables computers to run multiple operating systems and multiple software application at the same time and creates multiple virtual machines all on a single computing device? (A) Virtualization (B) Innovation (C) Availability (D) Viral computing

(A) Virtualization

The optimal disaster recovery plan in terms of cost and time is where on the disaster recovery cost curve? (A) Where the two cost effects intersect (B) When the cost to the company of unavailability of information and technology is high (C) When the cost to the company of recovering from a disaster over time is high (D) When the two cost effects are further apart

(A) Where the two cost effects intersect

Which of the following is the example of consumer-to-government (C2G) highlighted in the figures extended business models? (A) eGov.com (B) consent.com (C) Google.org (D) export.gov

(A) eGov.com

Anne-Marie Cole runs the sales division for a local auto insurance firm. One of her key duties is to ensure the company has 10 percent market share by the end of the year. When evaluating the current sales numbers she determines that her sales division has total sales of $3 million and the entire industry has total sales of $50 million. What additional sales must Anne-Marie's division meet to ensure they have 10 percent of the market by the end of the year? (A) $1 million (B) $2 million (C) $5 million (D) $10 million

(B) $2 million

The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as _________, for carrying out wireless local area network communication. (A) Bits (B) 802.11 (C) 80118091 (D) 91210

(B) 802.11

Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents? (A) Confidentiality (B) Digital information (C) Privacy policies (D) Information ethics

(B) Digital information

What is a VPN? (A) A direct network provider using a company server (B) A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server (C) A direct URL that creates a private tunnel for a company (D) A direct P2P that creates an open access community for a company

(B) A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication? (A) An internet workplace policy (B) A social media policy (C) A technology information policy (D) A YouTube policy

(B) A social media policy

Which term refers to the varying levels that define what a user can access, view, or perform when operating a system? (A) Availability (B) Accessibility (C) Usability (D) Responsibility

(B) Accessibility

Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements? (A) RAD methodology (B) Agile methodology (C) Waterfall methodology (D) Extreme programming

(B) Agile methodology

Angela works for an identify protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches? (A) A social engineer (B) An insider (C) A spammer (D) A dumpster diver

(B) An insider

Which phase of the SDLC gathers business requirements? (A) Plan (B) Analysis (C) Test (D) Design

(B) Analysis

What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks? (A) Transactional information (B) Analytical informatoin (C) Timeliness (D) Quality

(B) Analytical informatoin

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information? (A) Script kiddies (B) Black-hat hacker (C) White-hat hacker (D) Cracker

(B) Black-hat hacker

Your boss has asked you to analyze the airline industry using Porter's three generic strategies. Which of the following companies are using a differentiation strategy? (A) Southwest, Horizon, Frontier, JetBlue; (B) British Airways, Singapore Airlines, Virgin Atlantic; (C) Sky Taxi-a rent by the hour personal place service; (D) All of the above.

(B) British Airways, Singapore Airlines, Virgin Atlantic.

The accounting and finance department performs processes such as creating financial statements, paying accounts payables, and collecting accounts receivables. What form of processes do these represent? (A) Customer-facing processes (B) Business-facing processes (C) Industry-specific customer facing processes (D) All of these are correct

(B) Business-facing processes

What determines future environmental infrastructure requirements that ensure high-quality system performance? (A) Capacity system (B) Capacity planning (C) Capacity function (D) Performance indicators

(B) Capacity planning

Which of the following forms of data mining assigns records to one of a predefined set of classes? (A) Clustering (B) Classification (C) Estimation (D) Affinity grouping

(B) Classification

What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible? (A) Statistical detection (B) Cluster analysis (C) Association detection (D) None of the above

(B) Cluster analysis

Within the sites that support disaster recovery, _____ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. (A) Hot site (B) Cold site (C) Warm site (D) Disaster site

(B) Cold site

Which of the following occurs when organizations use the software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information? (A) Antivirus software (B) Content filtering (C) Encryption (D) Firewalls

(B) Content filtering

What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer? (A) Usability (B) Customer satisfaction (C) Financial (D) Conversion rates

(B) Customer satisfaction

What is the difference between customer-facing processes and business-facing processes? (A) Business-facing processes are front-office processes, customer-facing processes are back-office processes (B) Customer-facing processes are front-office processes, business-facing processes are back-office processes (C) Customer-facing processes are back-office processes, and industry-specific customer-facing process are back-office processes (D) Customer-facing processes are back-office processes, and industry-specific customer-facing processes are front-office processes

(B) Customer-facing processes are front-office processes, business-facing processes are back-office processes

What is a facility used to house management information systems and associated components. such as telecommunications and storage systems? (A) Call center (B) Data center (C) Delivery base (D) Central center

(B) Data center

Which of the following occurs when a system produces incorrect, inconsistent, or duplicate data? (A) Data inconsistency issue (B) Data integrity issue (C) Data control issue (D) Data mining issue

(B) Data integrity issue

What determines the accuracy and completeness of organizational data? (A) Data quantity audit (B) Data quality audit (C) Data intelligence audit (D) All of the above

(B) Data quality audit

When evaluating the six-step decision making process, what occurs during the problem identification step? (A) The process will begin again if the decisions made were incorrect (B) Definition of the problem as clearly and precisely as possible (C) Details of every solution possible including ideas that seem far fetched (D) The solution that best solves the problem is selected

(B) Definition of the problem as clearly and precisely as possible

Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents? (A) Confidentiality (B) Digital information (C) Privacy policies (D) Information ethics

(B) Digital information

What are the two most prevalent types of broadband access? (A) Data subscriber and cable connection (B) Digital subscriber line and cable connection (C) Digital line and client line (D) Digital serve and client server

(B) Digital subscriber line and cable connection

What occurs when a business sells directly to the customer online and cuts out the middle man? (A) Intermediaries (B) Disintermediation (C) Reintermediation (D) Cybermediation

(B) Disintermediation

Market share measures a firm's external performance relative to that of its competitors. Which of the following represents how a firm measures market share? (A) Multiplying the firm's sales by the industries total sales (B) Dividing the firm's sales by the total market sales of the entire industry (C) Subtracting your competitors sales from you total sales (D) Subtracting your industries total sales from the firm's total sales

(B) Dividing the firm's sales by the total market sales of the entire industry

Which of the following is NOT included as a common stipulation an organization would follow when creating an employee monitoring policy? (A) Be as specific as possible stating when and what will be monitored (B) Do not state the consequences of violating the policy (C) Always enforce the policy the same for everyone (D) Expressly communicate that the company reserves the right to monitor all employees

(B) Do not state the consequences of violating the policy

What is a plan that details how a company creates, delivers, and generates revenues on the Internet? (A) Ebusiness (B) Ebusiness model (C) Ecommerce (D) Ecommerce model

(B) Ebusiness model

What is the difference between ecommerce and ebusiness? (A) Ecommerce includes internet network effects; ebusiness includes commerce and all activities related to internal and external business operations (B) Ecommerce is buying and selling of goods or services online; ebusiness includes ecommerce and all activities related to internal and external business operations (C) Ecommerce includes ecommerce and all activities related to internal and external business operations; ebusiness includes all of the knowledge management systems (D) Ebusiness is buying and selling of goods or services online; ecommerce includes ecommerce and all activities related to internal and external business operations

(B) Ecommerce is buying and selling of goods or services online; ebusiness includes ecommerce and all activities related to internal and external business operations

Drew Savage in an MIS manager for an intentional consulting firm. Drew travels to different European countries where he implements news response tracking systems. Some of the metrics he uses to track the performance of his system include tracking the response time it takes to respond to Twitter posts mentioning the new station, as well as the speed and accuracy of content posted on numerous websites and social media sites. What type of metrics is Drew using to measure his system? (A) Customer satisfaction metrics (B) Efficiency metrics (C) Effectiveness metrics (D) Benchmarking metrics

(B) Efficiency metrics

What connects the plans, methods, and tools aimed at integrating separate enterprise systems? (A) Enterprise systems (B) Enterprise application integration (C) Middleware (D) Enterprise application integration middleware

(B) Enterprise application integration

Which of the following illustrates the primary concepts of the relational database model? (A) Ethics, applications, keys, and relationships (B) Entities, attributes, keys, and relationships (C) Endeavor, aspire, control, and regulate (D) Early, after, before, and future

(B) Entities, attributes, keys, and relationships

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment? (A) Information systems policy (B) Epolicies (C) Technology applied policy (D) Emastery

(B) Epolicies

What type of measurement uses market share as a KPI? (A) Fuzzy logic measurement (B) External measurement (C) Neural network measurement (D) Internal measurement

(B) External measurement

Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem? (A) Cloud computing (B) Grid computing (C) Virtualized computing (D) Database computing

(B) Grid computing

Which activities do production and materials management components perform? (A) Track employee information including payroll, benefits, compensation, performance assessment, and assumes compliance with the legal requirements of multiple jurisdictions and tax authorities (B) Handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control. (C) Manage accounting data and financial processes within he enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management (D) None of these are correct

(B) Handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control.

As a manager for your company some of your responsibilities include measuring metrics and overseeing company strategies. You observe some critical success factors and see large increases in productivity. What would you suspect would be the primary reason for the large increases in productivity? (A) Decreases in effectiveness (B) Increases in effectiveness (C) Increases in executive roles (D) Decreases in efficiency

(B) Increases in effectiveness

Jessica Ulta words as an employee for City Service Credit Union and is responsible for consulting on loans, talking clients through the loan process, and providing loans to members. What type of processes does Jessica primarily work with? (A) Business-facing processes (B) Industry-specific customer facing processes (C) Customer-facing process (D) Industry-specific business-facing processes

(B) Industry-specific customer facing processes

What is data converted into a meaningful and useful context? (A) Competitive intelligence (B) Information (C) Buyer power (D) First-mover advantage

(B) Information

What is the analysis phase in the SDLC? (A) Involves establishing a high-level plan of the intended project and determining project goals (B) Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system (C) Involves describing the desired features and operations of the system (D) Involves placing the system into production so users can begin to perform actual business operations with the system

(B) Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system

Which of the following includes the three primary network types/protocols? (A) LAN, WAN, SAN (B) LAN, WAN, MAN (C) LAN, SAN, XAN (D) LAN, WAN, XAN

(B) LAN, WAN, MAN

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ______ and _____. (A) Legal and confidential (B) Legal and ethical (C) Legal and technical (D) Confidential and open

(B) Legal and ethical

What connects a group of computers in close proximity, such as in a school or office setting? (A) Metropolitan area network (MAN) (B) Local area network (LAN) (C) Wide area network (WAN) (D) Secure area network (SAN)

(B) Local area network (LAN)

Which of the below would create transactional information? (A) Projecting future sales growth (B) Making an airline reservation (C) A semistructured decision to hire more employee (D) Generating payroll reports

(B) Making an airline reservation

Which of the following departments is primarily responsible for promoting discounts, attracting customers, and communicating marketing campaigns? (A) Accounting and Finance (B) Marketing and Sales (C) Operations Management (D) Human Resources

(B) Marketing and Sales

What is the ability to purchase goods and services through a wireless Internet-enabled device? (A) Ecommerce (B) Mcommerce (C) Meconomics (D) Ebusiness model

(B) Mcommerce

What are measurements that evaluate results to determine whether a project in meeting its goals? (A) Models (B) Metrics (C) Benchmarks (D) Genetic algorithms

(B) Metrics

Jennifer Bloom is writing a paper and she must determine which of Porter's three generic strategies The Museum Company has implemented. Jennifer finds out that The Museum Company offers specialty products found only in museums around the world to affluent customers. What would Jennifer determine The Museum Company is using as its generic strategy? (A) Broad market, low cost (B) Narrow market, high cost (C) Broad market, high cost (D) Narrow market, low cost

(B) Narrow market, high cost

The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include _________. (A) New system provider (NSP), Current system provider (CSP), and Order entry system provider (OSP) (B) National service provider (NSP), Regional service provider (RSP), and internet service provider (ISP) (C) Net server point (NSP), Radio server point (RSP), and Internet server point (ISP) (D) None of these are correct

(B) National service provider (NSP), Regional service provider (RSP), and internet service provider (ISP)

Users would agree to all of the following in a typical acceptable use policy EXCEPT ________. (A) Not using the service as part of violating any law (B) Not posting commercial messages to groups where the employee has received user consent (C) Not performing any nonrepudiation (D) Not attempting to break the security of any computer network

(B) Not posting commercial messages to groups where the employee has received user consent

What is one of the guidelines an organization can following when creating information privacy policy? (A) Adoption and implementation of an anti-spam policy (B) Notice and disclosure (C) Choice and quality (D) None of the above

(B) Notice and disclosure

Greg works for Geneva Steel Corporation. Greg's duties include managing the overall processes for the company and transforming the steel resources into goods. Which department would Greg most likely work in? (A) Accounting Manager. (B) Operations Manager. (C) Marketing Manager. (D) CIO.

(B) Operations Manager.

What types of chart typically displays the critical path? (A) Gantt chart (B) PERT chart (C) All of the above (D) None of the other answers is correct

(B) PERT chart

Which of the following is NOT considered a form of biometrics? (A) Iris scan (B) Password (C) Fingerprint (D) Handwriting

(B) Password

Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ___________. (A) Counterfeit software (B) Pirated software (C) Ethical software (D) Governance software

(B) Pirated software

If you were thinking about a home theater system which of the following represents the outputs? (A) the DVD player, DVD movie, speakers, TV, and electricity; (B) playing the movie including the audio through the speakers and video on the TV; (C) a message stating the disk is dirty and cannot be played; (D) spinning the disk to play, pause, rewind, or fast forward

(B) Playing the movie including the audio through the speakers and the video on the TV.

Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems? (A) Reliability (B) Portability (C) Maintainability (D) Usability

(B) Portability

If you were thinking about a home theater system which of the following represents the feedback? (A) The DVD player, DVD movies, speakers, TV, and electricity. (B) Playing the movie including the audio through the speakers and the video on the TV. (C) A message stating that the disk is dirty and cannot be played. (D) Spinning the disk to play, pause, and rewind, or fast forward.

(C) A message stating that the disk is dirty and cannot be played.

Which of the following is not an example of unplanned downtime? (A) Power outage (B) Tornados (C) A system upgrade (D) Network failure

(C) A system upgrade

What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup? (A) Failure tolerance (B) Recovery (C) Reliability (D) Capacity planning

(B) Recovery

What is a challenge for cloud computing that could cause employee performance to decrease? (A) Limited internet features (B) Required Internet connectivity (C) Decreased dynamic scaling (D) Decrease job stability

(B) Required Internet connectivity

Some industries' competition is much more intense than others. Retail grocery stores such as Kroger, Safeway, and Albertson's in the United States experience fierce competition and offer similar campaigns to compete. What is this an example of in terms of Porter's Five Forces? (A) Rivalry among new entrants. (B) Rivalry among existing competitors. (C) Threat of substitute products or services. (D) Buyer power.

(B) Rivalry among existing competitors.

Which of the following is NOT a primary form of agile methodology? (A) RAD (B) SDLC (C) RUP (D) SCRUM

(B) SDLC

The department within a company that performs the functions of selling goods or services is called _______. (A) Marketing (B) Sales (C) Finance (D) Operations Management

(B) Sales

Chuck Biggs has been hired to oversee all of the plans that the city of Denver has created to expand its train transportation system by adding six more lines to the metro area. Chuck will be responsible for planning the project, managing the processes, and finalizing each new line as it is completed. How would you categorize the majority of the decisions Chuck will have to make to complete his job? (A) Unstructured decisions (B) Semistructured decisions (C) Structural decisions (D) Strategic decisions

(B) Semistructured decisions

Which of the below is an example of P2P? (A) GoDaddy (B) Skype (C) Federal Communication Commission (FCC) (D) Facebook

(B) Skype

To find out your computer policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the __________. (A) Internet use policy (B) Social media policy (C) Information use policy (D) Employee monitoring policy

(B) Social media policy

Which of the following is NOT included in the decision-making process? (A) Data Collection (B) Solution Benchmarking (C) Solution Generation (D) Solution Test

(B) Solution Benchmarking

What is unsolicited email that plagues employees at all levels and clogs email systems? (A) Spyware (B) Spam (C) Adware (D) None of these are correct

(B) Spam

What is a special class of adware that collects data about the use and transmits it over the Internet without the user's knowledge or permission? (A) Sniffer (B) Spyware (C) Spoofware (D) Splog

(B) Spyware

If you were thinking about a washing machine as a system which of the following represents the output? (A) The dirty clothes, water, and detergent (B) The clean clothes (C) The wash and rinse cycle (D) The light indicating that the washer is off balance and has stopped

(B) The clean clothes

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by __________. (A) The individual user (B) The company (C) The human resources department (D) The individual user's department

(B) The company

Imagine you are creating a new product to sell in an up-and-coming market. Which of the below statements indicates that it would be difficult for you to enter this new market? (A) The threat of new entrants force is high in the up-and-coming market. (B) The threat of new entrants force is low in the up-and-coming market. (C) The threat of new entrants force is high during the summer months in the up-and-coming market. (D) All of the above depending on the time of year.

(B) The threat of new entrants force is low in the up-and-coming market.

What are the two main objectives associated with data mining? (A) Uncovering tactics and plans (B) Uncovering trends and patterns (C) Uncovering intelligence and unstructured data issues (D) Uncovering competitors and market advantages

(B) Uncovering trends and patterns

What is the integration of communication channels into a single service? (A) Instant communication (B) Unified communication (C) Peer-to-peer communication (D) Voice over communication

(B) Unified communication

Which question below represents a CRM analyzing technology question? (A) Why did sales not meet forecasts? (B) What customers are at risk of leaving? (C) What is the total revenue by customer? (D) All of these are correct

(B) What customers are at risk of leaving?

What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves? (A) Bluetooth (B) Wireless fidelity (Wi-Fi) (C) Wide area network (WAN) (D) Wireless data centers

(B) Wireless fidelity (Wi-Fi)

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data? (A) Interconnected data software (IDS) (B) Intrusion detection software (IDS) (C) Security information system (SIS) (D) Internet detection scanner (IDS)

(B) intrusion detection software (IDS)

If you were thinking about an oven as a system which of the following represents the feedback? (A) The uncooked food (B) The cooked food (C) A light indicating that the oven has reached the preheated temperature (D) The oven running at 350 degrees for 20 minutes

(C) A light indicating that the oven has reached the preheated temperature

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the teller closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem? (A) An information privacy policy (B) An email privacy policy (C) An Internet use policy (D) A workplace monitoring policy

(C) An Internet use policy

Which of the following is not a type of organizational information system? (A) Executive information system (B) Decisions support system (C) Analysis processing system (D) Transactional processing system

(C) Analysis processing system

What are project deliverables? (A) A temporary endeavor undertaken to create a unique product or service (B) The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectation from a project (C) Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project (D) Represent key dates when a certain group of activities must be performed

(C) Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

Which of the following is a common customer service CRM metric? (A) Number of new prospective customers (B) Number of marketing campaigns (C) Average time to resolution (D) Revenue generated by marketing campaigns

(C) Average time to resolution

Which of the following represents the categories for business models? (A) Email, instant messaging, podcasting, content management systems, and video and Web conferencing (B) Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers (C) B2B, B2C, C2C, C2B (D) Advertising fees, license fees, subscription fees, transaction fees, value-added services fees

(C) B2B, B2C, C2C, C2B

Carfax is an example who sells its products or services directly to its consumers online. Which ebusiness model is Carfax using? (A) C2B (B) C2C (C) B2C (D) B2B

(C) B2C

What is the difference between a B2C and C2B? (A) B2C focuses on companies as customers and C2B focuses on consumers as customers (B) B2C focuses on collaboration and C2B on consumers (C) B2C focuses on business to consumers and C2B focuses on consumers to business (D) B2C focuses on consumers as customers and C2B focuses on companies as customers

(C) B2C focuses on business to consumers and C2B focuses on consumers to business

Which of the following are all common forms of viruses? (A) Packet tampering, worms, cakes, and Trojan viruses (B) Polymorphic, sniffer, slogs, and Denial-of-service viruses (C) Backdoor program, worm, Trojan-horse viruses (D) All of the above

(C) Backdoor program, worm, Trojan-horse viruses

What takes information entered into a given system and sends it automatically to all upstream systems and processes? (A) Forward integration (B) Forward data interchange (C) Backward integration (D) Backward data interchange

(C) Backward integration

The best and most effective way to manage authentication is through _________. (A) Smart technology card (B) Tokens (C) Biometrics (D) Passwords

(C) Biometrics

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting? (A) Smart card (B) Token (C) Biometrics (D) Content filtering

(C) Biometrics

Which of the following identifies Business 2.0 communication and collaboration tools? (A) Microblogs, Tweets, RSS (B) API, RSS, tacit knowledge (C) Blogs, wikis, mashup (D) Tags, Web logs, RSS

(C) Blogs, wikis, mashup

What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps? (A) Analog (B) Dial up (C) Broadband (D) None of the above

(C) Broadband

Which of the following is NOT one of the three most common core ERP components focusing on internal operations? (A) Accounting and finance (B) Production and materials management (C) Business intelligence (D) Human resources

(C) Business intelligence

Which of the below processes attempts to understand and measure the current process and make improvements? (A) Business process mapping (B) Business process reengineering (C) Business process improvement (D) Business process model

(C) Business process improvement

In the center of Porter's Five Forces model is competition. Which of the following represents the four outer boxes? (A) Buyer power, systems power, threat of false entrants, and threat of substitute products or services (B) Buyer power, systems power, threat of new entrants, and threat of substitute products or services (C) Buyer power, supplier power, threat of new entrants, and threat of substitute products or services (D) Business power, supplier power, threat of new entrants, and threat of powerful services

(C) Buyer power, supplier power, threat of new entrants, and threat of substitute products or services

Joh and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline where they are allowed to set their own price they are willing to pay for the airline tickets. What form of business model are John and Jenny using? (A) CBC (B) B2B (C) C2B (D) C2C

(C) C2B

Which type of business model best describes Apple? (A) Pure-play (B) Brick-and-mortar (C) Click-and-mortar (D) Virtual

(C) Click-and-mortar

Which of the following fall in the category of external databases in the data warehouse model? (A) Marketing, sales, inventory, and billing (B) Data mart 1, data mart 2, and data mart 3 (C) Competitor and industry information, mailing lists, and stock market analysis (D) Marketing information, sales information, and stock market analysis

(C) Competitor and industry information, mailing lists, and stock market analysis

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them? (A) Contentment (B) Ethical standard (C) Confidentiality (D) Firewall security

(C) Confidentiality

Which of the following tracks the number of customers an organization touches for the first time and persuades to purchase its products or services? (A) Customer satisfaction (B) Usability (C) Conversion rates (D) Financial

(C) Conversion rates

Which of the following uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making? (A) Data analysis tools (B) Electronic analysis tools (C) Data-mining tools (D) Data integrity tools

(C) Data-mining tools

In which of the five basic supply chain activities do you plan for the transportation of goods to customers? (A) Plan (B) Source (C) Deliver (D) Return

(C) Deliver

The sales department needs to rely on information from operations to understand ____________. (A) Inventory (B) Customer orders (C) Demand forecasts (D) All of these are correct

(C) Demand forecasts

What is the logical relationship that exists between the project tasks, or between a project task and a milestone? (A) Resource (B) Task (C) Dependency (D) Activity

(C) Dependency

Which of the following represents the bullwhip effect? (A) Organizations know about employee events triggered downstream in the supply chain (B) Customers receive distorted product demand information regarding sales information (C) Distorted product-demand information ripples from one partner to the next throughout the supply chain (D) The ability to view all areas up and down the supply chain

(C) Distorted product-demand information ripples from one partner to the next throughout the supply chain

What are two of the primary features of e-business components? (A) E-procurement (B) E-logistics (C) E-procurement and e-logistics (D) None of theses are correct

(C) E-procurement and e-logistics

Which of the following represents the top-down (executive to analysis) organizational levels of information technology systems? (A) TPS, DSS, EIS (B) DSS, TPS, EIS (C) EIS, DSS, TPS (D) None of the above, it varies from organization to organization

(C) EIS, DSS, TPS

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry? (A) Eauthorization (B) Emanagement (C) Ediscovery (D) Epolicies

(C) Ediscovery

Many industries have taken an active role in online business including the government. Which of the following is the term that describes the use of strategies and technologies to transform government by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all the branches of government? (A) Ecommerce (B) Information richness (C) Egovernment (D) Tacit knowledge

(C) Egovernment

Which of the following is not an example of explicit knowledge? (A) Patents (B) Trademark (C) Employee opinion (D) Marketing research

(C) Employee opinion

Which of the following contained general principles to guide computer user behavior? (A) Information technology code (B) Techie policy (C) Ethical computer use policy (D) Information systems

(C) Ethical computer use policy

Broad differentiation, broad cost leadership, and _________ create the three generic strategies identified by Porter. (A) Narrow market leadership (B) High cost versus low cost (C) Focused strategy (D) None of the above

(C) Focused strategy

Which of the following are examples of analytical information? (A) Airline ticket, sales receipts, and packing slips (B) Hotel reservation, sales receipts, and packing slips (C) Future growth analysis, sales projections, and product statistics (D) Packing slips, grocery receipt, and competitor information

(C) Future growth analysis, sales projections, and product statistics

Executives of a company deals less with details of the operational activities and deal more with the higher meaningful aggregations of information of "coarser" information. What refers to the level of detail in the model? (A) Drill-down (B) Visualization (C) Granularity (D) Consolidation

(C) Granularity

What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge known as? (A) Elevation of privilege (B) Virus (C) Hacker (D) Worm

(C) Hacker

Which of the following is TRUE in regards to the elimination of redundant data? (A) Uses additional hard disk space (B) Makes performing information updates harder (C) Improves information quality (D) All of these are correct

(C) Improves information quality

Where would you categorize a cloud computing benefit that allows a customer to store fewer applications on a client computer, which frees up the memory allowing for increases in performance? (A) Internet features (B) Increased costs (C) Increased performance (D) Increased software updates

(C) Increased performance

Which of the following represents the different information levels? (A) Detail, summary, aggregate (B) Document, presentation, spreadsheet, database (C) Individual, department, enterprise (D) None of the above

(C) Individual, department, enterprise

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function, and grow effectively? (A) Information code (B) Information technology (C) Information management (D) Information governance

(C) Information management

What is a restricted network that relies on Internet technologies to provide an internet-like environment within the company for information sharing, communications, collaboration, and web publishing? (A) National ISP (B) Regional ISP (C) Intranet (D) Extranet

(C) Intranet

What offers a pay-per-use revenue model similar to a metered service such as gas or electricity? (A) Grid computing (B) Smart phones (C) Utility computing (D) Computing services

(C) Utility computing

What is the design phase in the SDLC? (A) Involves establishing a high-level plan of the intended project and determining project goals (B) involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system (C) Involves describing the designed features and operations of the system (D) Involves placing the system into production so users can begin to perform actual business operations with the system

(C) Involves describing the designed features and operations of the system

What is one of the biggest pitfalls associated with real-time information? (A) It is only available to high-level executives due to the expense (B) It is only available in aggregate levels of granularity (C) It continually changes (D) It rarely changes

(C) It continually changes

Which of the following is NOT an example of an advantage to using the Web to access organizational databases? (A) Web browsers are much easier to use than a computer based database (B) The Web interface requires few or no changes to the database model (C) It is cleaner and virus-free (D) It costs less

(C) It is cleaner and virus-free

Which of the following operational CRM technologies does the marketing department typically use? (A) Contact center, web-based self-service, call scripting (B) Contact center, cross-selling and up-selling, web-based self-service (C) List generator, opportunity management, cross-selling and up-selling (D) List generator, campaign management, cross-selling and up-selling

(C) List generator, opportunity management, cross-selling and up-selling

Which activities do accounting and finance components perform? (A) Track employee information including payroll, benefits, compensation, performance assessment, and assumes compliance with the legal requirements of multiple jurisdiction and tax authorities (B) Handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control (C) Manage accounting data and finance processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management (D) None of these are correct

(C) Manage accounting data and finance processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management

What is a common association detection analysis technique where you analyze certain items to detect customers' buying behavior and predict future behavior? (A) Clustering factors (B) Mashup technology (C) Market basket analysis (D) Drill-down basket analysis

(C) Market basket analysis

What is information reach? (A) A global public network of computer networks that pass information from one to another using common computer protocols (B) Refers to the depth and breadth of information transferred between customers and businesses (C) Measures the number of people a firm can communicate with all over the world (D) Occurs when those with access to technology have great advantages over those without access to technology

(C) Measures the number of people a firm can communicate with all over the world

When applying Porter's three generic strategies, Tiffany & Co. has a competitive scope and cost strategy that is ______. (A) Broad market-high cost strategy (B) Narrow market-low cost strategy (C) Narrow market-high cost strategy (D) Broad market-low cost strategy

(C) Narrow market-high cost strategy

Which of the following is similar to focused strategy verses broad strategy? (A) Large market versus leadership. (B) Large market versus uniqueness. (C) Niche market versus large market. (D) Niche market versus generic.

(C) Niche market versus large market.

What is the outsourcing option that includes the most remote location and indirect customer control? (A) Onshore outsourcing (B) Nearshore outsourcing (C) Offshore outsourcing (D) None of the other answers is correct

(C) Offshore outsourcing

Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses? (A) Fiscal responsibility (B) Damaged reputation (C) Other expenses (D) Regeneration quadrant

(C) Other expenses

What is the difference between phishing and pharming? (A) Phishing is not illegal, pharming is illegal (B) Phishing is the right of the company, pharming is the right of the individual (C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites (D) All of these are correct

(C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites

Which of the following represents the phases in the SDLC in order? (A) Plan, analysis, design, test, maintain, develop, implement (B) Analysis, plan, design, test, develop, maintain, implement (C) Plan, analysis, design, develop, test, implement, maintain (D) Analysis, plan, develop, design, test, implement, maintain

(C) Plan, analysis, design, develop, test, implement, maintain

Which of the following changes its form as it propagates? (A) Backdoor programs (B) Strikers (C) Polymorphic viruses and worms (D) Splogs

(C) Polymorphic viruses and worms

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent? (A) Safety (B) Ethical standard (C) Privacy (D) Proper

(C) Privacy

What is the standard that specifies the format of data as well as the rules to be followed during transmission? (A) Bandwidth (B) Bit rate (C) Protocol (D) Transmission record

(C) Protocol

Which of the following refers to immediate, up-to-date information (A) Daily information (B) Strategic information (C) Real-time information (D) Crisis information

(C) Real-time information

To create an SSL, connection, a Web server requires a ________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company. (A) DSL Degree (B) SSL Degree (C) SSL Certificate (D) DSL Certificate

(C) SSL Certificate

Within the sites that support disaster recovery, _________ is a separate facility with computer equipment that requires installation and configuration. (A) Hot site (B) Cold site (C) Warm site (D) Disaster site

(C) Warm site

Your boss has asked you to analyze the airline industry using Porter's three generic strategies. Which of the following companies are using a focused strategy? (A) Southwest, Horizon, Frontier, JetBlue (B) British Airways, Singapore Airlines, Virgin Atlantic (C) Sky Taxi - a rent by the hour personal plane service (D) All of the above

(C) Sky Taxi - a rent by the hour personal plane service

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing? (A) Token (B) Password (C) Smart card (D) Biometrics

(C) Smart card

What is an SNA? (A) Strong network application (B) Social needs analysis (C) Social networking analysis (D) Steady network areas

(C) Social networking analysis

What is the flow that a systems thinking approach using a TPS would follow? (A) Streamlining (Input)-CRUD, Calculate (Process)-Reports (Output) (B) Source Documents (Input)-Optimization Analysis (Process)-(Feedback)-(Output) (C) Source Documents (Input)-CRUD, Calculate (Process)-Reports (Output)-(Feedback) (D) Selling Documents (Input)-Cycle Time (Process)-Reports (Output)-(Feedback)

(C) Source Documents (Input)-CRUD, Calculate (Process)-Reports (Output)-(Feedback)

Gender can be referred to in many ways (Male, Female, M/F, 1/0) in a data warehouse. Ensuring generic is referenced in the same way is an example of _______. (A) Information scaling (B) Streamlining data points (C) Standardizing information (D) Standardizing protocols

(C) Standardizing information

Which of the following represents a business-facing process? (A) Loan processing (B) Order processing (C) Strategic planning (D) Customer billing

(C) Strategic planning

Business process modeling or mapping, is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a _________ sequence. (A) Unstructured (B) Semistructured (C) Structured (D) Unilateral

(C) Structured

What is the ability to view all areas up and down the supply chain in real time? (A) Bullwhip effect (B) Demand planning software (C) Supply chain visibility (D) Supply chain execution software

(C) Supply chain visibility

What is the type of knowledge that is contained in people's heads? (A) Explicit knowledge (B) Virtual knowledge (C) Tacit knowledge (D) Pure knowledge

(C) Tacit knowledge

What is dynamic scaling? (A) The ability for the system to cut back on expenses when needed (B) The infrastructure that is fixed and there are no surprises (C) The MIS infrastructure can by automatically scaled up or down based on needed requirements (D) The flexibility to charge more or less depending on the market

(C) The MIS infrastructure can by automatically scaled up or down based on needed requirements

Which of the following describes privacy? (A) The assurance that messages and data are available only to those who are authorized to view them (B) Policies and procedures that address the ethical use of computers and internet usage in the business environment (C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent (D) The principles and standards that guide our behavior toward other people

(C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent

Some of the serious business consequences that occur due to using low-quality information to make decisions are all of the following EXCEPT: (A) Inability to accurately track customers (B) Inability to identify selling opportunities (C) The success of the organization depends on appreciating and leveraging the low-quality information (D) Lost revenue opportunities from marketing to nonexistent customers

(C) The success of the organization depends on appreciating and leveraging the low-quality information

What does reliability ensure? (A) The system has the ability to operate in many different operating systems (B) The system is easy to learn and efficient and satisfying to use (C) The system is functioning correctly and providing accurate information (D) The time frames when the system is operational

(C) The system is functioning correctly and providing accurate information

If you were thinking about a washing machine as a system which of the following represents the process? (A) The dirty clothes, water, and detergent (B) The clean clothes (C) The wash and rinse cycle (D) The light indicating that the washer is off balance and has stopped

(C) The wash and rinse cycle

What are the three primary variables (or triple constraints) in any project? (A) Time, cost, expense (B) Time, expense, requirements (C) Time, cost, scope (D) Time, cost, quality

(C) Time, cost, scope

Which of the following explains why a company would implement a BPR strategy? (A) To encourage competition (B) To decrease customers (C) To create value for the customer (D) All of the other answers are correct

(C) To create value for the customer

What is the difference between unavailable and high availability? (A) High availability is when the system is not operating and can't be used, where unavailable is when a system is continuously operating at all time (B) Unavailable only refers to clients, where high availability refers to servers (C) Unavailable is when the system is not operating and can't be used, where high availability is when a system is continuously operating at all times (D) High availability only refers to clients, where unavailable refers to servers

(C) Unavailable is when the system is not operating and can't be used, where high availability is when a system is continuously operating at all times

Which of the following is a type of effectiveness MIS metric? (A) Transaction speed (B) System availability (C) Usability (D) Throughput

(C) Usability

What is one of the most common ways a company can decrease supplier power? (A) Charge lower prices (B) Charge higher prices (C) Use MIS to find and create alternative products. (D) Companies cannot impact supplier power

(C) Use MIS to find and create alternative products.

What is one of the major problems with email? (A) Intellectual property (B) Nonrepudiation (C) User's expectation of privacy (D) None of the other answers is correct

(C) User's expectation of privacy

Which of the below statements is NOT accurate in reference to mobile and wireless computing? (A) Mobile technology can travel with the user (B) Wireless technology is any type of operation accomplished without the use of a hard-wired connection (C) Wireless technology is any type of operation accomplished with the use of a hard-wired connection (D) Mobile technology allows a user to download software to a laptop or cell phone for portable reading or reference

(C) Wireless technology is any type of operation accomplished with the use of a hard-wired connection

Which of the below would NOT be found in a digital dashboard for a manufacturing team? (A) a graph of stock market prices (B) a running line graph of planned versus actual production for the past 24 hours (C) an excel spreadsheet with cost analysis data (D) a hot list of key performance indicators, refreshed every 15 minutes

(C) an excel spreadsheet with cost analysis data

Enterprise architects require _________ so they can perform such functions as resetting passwords or deleting accounts. (A) Functional access (B) Infrastructure access (C) Restricted access (D) Administrator access

(D) Administrator access

A smart card is a device, the size of a credit card that contains embedded technology that stores information and small amounts of software, and can act as ________. (A) Identification instruments (B) A form of digital cash (C) A data storage device (D) All of the above

(D) All of the above

Which of the following does a project manager perform? (A) Defines and develops the project plan (B) Tracks the plan to ensure all key project milestones are complete on time (C) Expert in project planning and management (D) All of the above

(D) All of the above

A database maintains information on _________. (A) Inventory (B) Transactions (C) Employees (D) All of the other answers are correct

(D) All of the other answers are correct

Which of the below is offered by a digital dashboard? (A) Consolidation (B) Drill-down (C) Slice-and-Dice (D) All of the other answers are correct

(D) All of the other answers are correct

Which of the below questions can be answered using business intelligence? (A) Where has the business been? (B) Where is the business now? (C) Where is the business going? (D) All of the other answers are correct

(D) All of the other answers are correct

Which of the following describes ETL? (A) A process that extracts information from internal and external databases (B) A process that transforms information using a common set of enterprise definitions (C) A process that loads information into a data warehouse (D) All of the other answers are correct

(D) All of the other answers are correct

Which of the following is a benefit an organization can receive from outsourcing? (A) Financial savings (B) Increase technical abilities (C) Market agility (D) All of the other answers are correct

(D) All of the other answers are correct

Which of the following is a characteristic of a successful project? (A) Delivered on time (B) Delivered within budget (C) Meets the business' requirements (D) All of the other answers are correct

(D) All of the other answers are correct

Which of the following is an outsourcing challenge caused by contract length? (A) Difficulties in getting out of a contract (B) Problems in foreseeing future issues (C) Problems in reforming an internal IT department (D) All of the other answers are correct

(D) All of the other answers are correct

Which of the following represents a reason for low-quality information? (A) Online customers intentionally enter inaccurate information to protect the privacy (B) Different systems have different information entry standards and formats (C) Third-party and external information contains inaccuracies and errors (D) All of the other answers are correct

(D) All of the other answers are correct

Why were data warehouses created? (A) Number and types of operational databases increased as businesses grew (B) Many companies had information scattered across multiple systems with different formats (C) Completing reporting requests from numerous operational systems took days or weeks (D) All of the other answers are correct

(D) All of the other answers are correct

What does BPR assume about the current process in the extreme? (A) Current process is irrelevant. (B) Current process is broken. (C) Current process must be overhauled from scratch. (D) All of the other answer are correct.

(D) All of the other answers are correct.

Each year businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures? (A) Back and recovery plans (B) Fault tolerance (C) Failover (D) All of these are correct

(D) All of these are correct

Efficiency MIS metrics focus on the extent to which a firm is an optional way while effectiveness MIS metrics focus on __________. (A) Understanding how successful a firm is at achieving its goals and objectives; (B) Analyzing if a firm is doing the right things; (C) Setting the right goals and ensuring they are accomplished (D) All of these are correct

(D) All of these are correct

How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking? (A) Mobile business (B) Mbusiness (C) Mcommerce (D) All of these are correct

(D) All of these are correct

One of the primary goals of a database is to eliminate data redundancy by recording each peice of data in only one place in the database. What does the elimination of data redundancy do for a database? (A) Reduces disk space requirements (B) Makes updating information easier (C) Improves information quality (D) All of these are correct

(D) All of these are correct

Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company? (A) Building a strong brand identity (B) Protecting the company reputation through counter-damage control (C) Engaging directly with customers and prospective customers (D) All of these are correct

(D) All of these are correct

What are encryption technology perform? (A) Switch the order of characters (B) Replace characters with other characters (C) Insert or remove characters (D) All of these are correct

(D) All of these are correct

What are the different options where an emergency notification service can be deployed? (A) Through the firm's own infrastructure (B) By an outside service provider on company premises (C) By an outside service provider hosted remotely (D) All of these are correct

(D) All of these are correct

What is cloud computing services changing? (A) The way people access information (B) The way people deliver information (C) The way people use information (D) All of these are correct

(D) All of these are correct

What is the key word in ERP? (A) Enterprise (B) Resource (C) Planning (D) All of these are correct

(D) All of these are correct

What is the role of mashup editor? (A) WYSIWYG's (B) Often it allows the user to drag and drop data points into a Web application (C) To provide a visual interface to build up a mashup (D) All of these are correct

(D) All of these are correct

When viewing systems thinking, source documents are the original transaction records. What would the source documents for a medical doctor's payroll system include? (A) Employee time sheets (B) Employee benefits reports (C) Employee wage rates (D) All of these are correct

(D) All of these are correct

Which of the below allows a user to access the internet? (A) Dial-up connection (B) Cable (C) T1 line (D) All of these are correct

(D) All of these are correct

Which of the below should be included in a company email privacy policy? (A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization (B) Discourages sending junk email or spam to anyone who doesn't want to receive it (C) Informs users that the organization has no control over email once it has been transmitted outside the organization (D) All of these are correct

(D) All of these are correct

Which of the below uses both GIS and GPS? (A) Navigation (B) Wireless advertising (C) Vehicle location (D) All of these are correct

(D) All of these are correct

Which of the below would you include as decisions and responsibilities typically found at the managerial level of a company? (A) Monthly Plans (B) Monthly Budgets (C) Weekly Schedule (D) All of these are correct

(D) All of these are correct

Which of the choice below is experiencing rapid growth due to wireless technology? (A) RFID (B) GPS (C) GIS (D) All of these are correct

(D) All of these are correct

Which of the choices below offers an example of a WAN? (A) The Internet (B) Microsoft's main campus in Washington (C) The city of Denver's court and police departments (D) All of these are correct

(D) All of these are correct

Which of the following describes workplace MIS monitoring? (A) Tracking people's activities by such measures as number of keystrokes (B) Tracking people's activities by such measures as error rate (C) Tracking people's activities by such measures as number of transactions processed (D) All of these are correct

(D) All of these are correct

Which of the following is an effect a company experience because of a disaster such as a fire, flood, or hurricane? (A) Disrupting communications (B) Damaging physical infrastructure (C) Halting transportation (D) All of these are correct

(D) All of these are correct

Which of the following is an example of a way to maintain information security that a company should include in their information security policies? (A) Requiring computer users to log off before leaving for lunch (B) Never sharing user or password information with anyone (C) Changing passwords every 30-60 days (D) All of these are correct

(D) All of these are correct

Which of the following is included in the four quadrants of ethical and legal behavior? (A) Legal behavior and ethical behavior (B) Illegal behavior and ethical behavior (C) Legal behavior and unethical behavior (D) All of these are correct

(D) All of these are correct

Which of the following occurs when everyone involved in sourcing, producing, and delivering the company's product works with the same information (in an ERP System for example)? (A) Eliminate redundancies (B) Cuts down wasted time (C) Removes misinformation (D) All of these are correct

(D) All of these are correct

Which of the following represents a form of disruptive technology? (A) Enter the marketplace at the low end (B) A new way of doing things that initially doesn't meet the needs of existing customers (C) Tend to open new markets and destroy old ones (D) All of these are correct

(D) All of these are correct

Why is estimating future growth a challenge for most companies? (A) Growth can occur because the company acquires new markets (B) Growth can occur because the company acquires new customers (C) Growth can occur because the company acquires new products (D) All of these are correct

(D) All of these are correct

Data is useful for understanding individual sales, but to gain deeper insight into a business data needs to be turned into information. Which of the following offers an example of turning data into information? (A) Who are my best customers? (B) What is my best-selling product? (C) What is my worst-selling product? (D) All of these are correct.

(D) All of these are correct.

What is the primary difference between an entity and an attribute? (A) An attribute is a table, an entity is a column from the attribute table (B) An entity is specific, where as an attribute is not data at all but brainstorming ideas that take place before the entity is created (C) An attribute refers to application, and an entity refers to executives (D) An entity is a table that stores information about people, places, or events, whereas an attribute is a column or specific filed of the data elements associated with an entity

(D) An entity is a table that stores information about people, places, or events, whereas an attribute is a column or specific filed of the data elements associated with an entity

What is a project manager? (A) The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations form a project (B) Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project (C) Represent key dates when a certain group of activities must be performed (D) An individual who is an expert in project planning and management

(D) An individual who is an expert in project planning and management

Which of the below is NOT included as part of a benchmark? (A) Benchmarks help assess how an MIS project performs over time (B) When measured against MIS projects, benchmarks can provide feedback so managers can control the system (C) Benchmarks help to establish baseline values the system seeks to attain (D) Benchmarks perform all of the above

(D) Benchmarks perform all of the above

Cheryl Steffan is the operations manager for Nature's Bread Company, which specialized in providing natural products for health conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of the type of information Cheryl would be using to successfully perform her job? (A) Craig Newmark is customer number 15467. (B) Compare the costs of supplies including energy over the last five years to determine the best-selling product by month. (C) Best-selling product by day. (D) Best-selling product changes when Tony the best baker is working.

(D) Best-selling product changes when Tony the best baker is working.

Which of the following is the least common reason why companies outsource? (A) Tap outside sources of expertise (B) Concentrate resources on core business (C) Reduce headcount and related expenses (D) Better manage the cost of internal processes

(D) Better manage the cost of internal processes

What measures bandwidth in terms of numbers transferred or received per unit of time? (A) Connection time (B) Broadband (C) Protocol (D) Bit rate

(D) Bit rate

What is the ebusiness model that represents 80% of all online businesses and are typically more complex requiring greater security needs? (A) Consumer-to-consumer (B) Business-to-consumer (C) Consumer-to-consumer (D) Business-to-business

(D) Business-to-business

What is an organization performing when it asks questions such as "which customers are at risk of leaving"? (A) CRM reporting technologies (B) CRM analyzing technologies (C) CRM processing technologies (D) CRM predicting technologies

(D) CRM predicting technologies

Which of the below does NOT represent a company that requires up-to-the-second information? (A) 911 response (B) Stock traders (C) Banks (D) Construction companies

(D) Construction companies

What is the legal protection afforded an expression of an idea, such as a song, book, or video game? (A) Privacy (B) Confidentiality (C) Intellectual property (D) Copyright

(D) Copyright

Which of the following occurs when the same data element has different values? (A) Data modeling issue (B) Data mining issue (C) Data governance issue (D) Data inconsistency issue

(D) Data inconsistency issue

What is the ultimate outcome of a data warehouse? (A) Data goals (B) Data relationships (C) Data marketing (D) Data marts

(D) Data marts

The Victory Wireless store in Denver is currently offering a fabulous marketing strategy for potential new iPhone customers. Victory Wireless offers customers who purchase an iPhone with a 2 year subscription a free Otter phone case, car charger, ear phones, and speakers. In terms of Porter's Five Forces what is Victory Wireless attempting to achieve with this marketing strategy? (A) increase buyer power (B) increase substitute products (C) decrease supplier power (D) decrease buyer power.

(D) Decrease buyer power.

Which of the following is not a technique for choosing strategic projects? (A) Categorize projects (B) Perform a financial analysis (C) Focus on organizational goals (D) Develop a project plan

(D) Develop a project plan

A DDoS stands for one of the common forms of viruses, that attacks multiple computers to flood a website until it slows or crashes. What does DDoS stand for? (A) Data distribution of systems attack (B) Data denial-of-software attack (C) Distributed data online systems attack (D) Distributed denial-of-service attack

(D) Distributed denial-of-service attack

Which of the following is NOT a current CRM trend? (A) Partner relationship management (B) Supplier relationship management (C) Employee relationship management (D) Distributor relationship management

(D) Distributor relationship management

Which of the following is NOT a primary use of GIS? (A) Finding what is nearby from a specific location (B) Mapping densities (C) Routing information (D) Ensuring safety equipment is on an airplane before a flight

(D) Ensuring safety equipment is on an airplane before a flight

If an organization implemented only one policy, which one would it want to implement? (A) Information privacy policy (B) Acceptable use policy (C) Internet use policy (D) Ethical computer use policy

(D) Ethical computer use policy

The website that was the primary catalyst for growing electronic government, and is the official U.S. gateway to all government information? (A) Government.gov (B) TheUnitedStatesofAmerica.org (C) TheWhiteHouse.com (D) FirstGov.gov

(D) FirstGov.gov

What is an internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard? (A) Spyware (B) Web log (C) Adware (D) Hardware key logger

(D) Hardware key logger

Which of the below is not included as an information cleansing activity? (A) Identifies redundant records (B) Identifies inaccurate or incomplete data (C) Identifies missing records or attributes (D) Identifies sales trends

(D) Identifies sales trends

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information? (A) Ethical information (B) Information technology (C) Information policies (D) Information ethics

(D) Information ethics

When evaluating the business value of disintermediation the more ______ that are cut from the distribution chain, the lower the product price. (A) Technology (B) Customers (C) Data stream (D) Intermediation

(D) Intermediation

Which of the following would NOT be considered part of the "accurate" characteristic of high-quality information? (A) Is the name spelled correctly? (B) Is the email address invalid? (C) Does the name and the phone values have the exact same information? (D) Is aggregate information is agreement with detailed information?

(D) Is aggregate information is agreement with detailed information?

Which of the following is not a type of wireless network? (A) PAN (B) WLAN (C) WWAN (D) MAN

(D) MAN

In which of the five basic supply chain activities do you manufacture products and create production schedules? (A) Plan (B) Source (C) Deliver (D) Make

(D) Make

The department with a company that supports the sales by planning, pricing, and promoting goods or services is called _______. (A) Sales (B) Operations Management (C) Accounting (D) Marketing

(D) Marketing

What is a website or Web application that uses content from more than one source to create a completely new product or service? (A) Social tagging (B) Mashup blog (C) Social media (D) Mashup

(D) Mashup

Which of the following is an example of acting ethically? (A) Individuals copy, use, and distribute software. (B) Employees search organizational databases for sensitive corporate and personal information. (C) Individuals hack into computer systems to steal proprietary information. (D) None of the other answers offers an example of acting ethically.

(D) None of the other answers offers an example of acting ethically.

Which of the following offers an example of a company operating in a narrow focused-marketing operating as the low-cost provider? (A) Walmart (B) Tiffany & Co. (C) Neiman Marcus (D) Payless Shoes

(D) Payless Shoes

What are the first two lines of defense a company should take when addressing security risks? (A) Technology first, customers second (B) Technology first, people second (C) Innovation first, technology second (D) People first, technology second

(D) People first, technology second

Most business processes are cross-functional or cross-departmental processes that span the entire organization. Which of the below does NOT represent a cross-functional business process? (A) Order-to-delivery process (B) Loan processing (C) Taking a product from concept to market (D) Processing payroll

(D) Processing payroll

Which of the following is NOT a primary trait of information? (A) Transactional (B) Analytical (C) Timeliness (D) Quantity

(D) Quantity

What are rules that enforce basic and fundamental information-based constraints? (A) Information integrity (B) Integrity constraint (C) Business-critical integrity constraint (D) Relational integrity constraint

(D) Relational integrity constraint

Which of the below represents an internal KPI that indicates the earning power of a project? (A) Market share (B) Return on intelligent (C) Sensitivity analysis (D) Return on investment

(D) Return on investment

What maps group contacts identifying who knows each other and who works together? (A) Social network effects (B) Mashup networking analysis (C) Web network effects (D) Social networking analysis

(D) Social networking analysis

If you were thinking about a home theater system which of the following represents the process? (A) the DVD player, DVD movie, speakers, TV, and electricity; (B) playing the movie including the audio through the speakers and video on the TV; (C) a message stating the disk is dirty and cannot be played; (D) spinning the disk to play, pause, rewind, or fast forward

(D) Spinning the disk to play, pause, rewind, or fast forward.

If you were thinking about an oven as a system which of the following represents the process? (A) The uncooked food (B) The cooked food (C) A light indicating that the oven has reached the preheated temperature (D) The oven running at 350 degrees for 20 minutes

(D) The oven running at 350 degrees for 20 minutes

Which of the following implies that information is current with respect to the business requirements? (A) Uniqueness (B) Accuracy (C) Consistency (D) Timeliness

(D) Timeliness

What is the primary employee of using As-Is and To-Be process models? (A) To determine employee specific errors (B) To determine measurement metrics (C) To determine the best way to solve a problem (D) To determine what the problem is and then how to solve the problem

(D) To determine what the problem is and then how to solve the problem

What types of business decisions would an EIS use AI for? (A) Semistructured decisions (B) Multi-structured decisions (C) Structured decisions (D) Unstructured decisions

(D) Unstructured decisions

Which network uses signal to transmit and receive data over distances of a few hundred feet? (A) WMAN (B) WWAN (C) PAN (D) WLAN

(D) WLAN

Which of the following is a type of efficiency MIS metric? (A) Customer satisfaction (B) Conversion rates (C) Financial transactions (D) Web traffic

(D) Web traffic

Which of the following is an example of information? (A) Who is customer number 12345XX? (B) What is product number 12345XX? (C) What customer number is Bob Smith? (D) What is my worst-selling product?

(D) What is my worst-selling product?

Apple understood the importance of usability when it designed the (A) PowerPoint software (B) Antivirus software (C) Fault tolerance system (D) iPod and iTunes system

(D) iPod and iTunes system

All of the following are challenges to outsourcing, EXCEPT: (A) contract length (B) competitive edge (C) confidentiality (D) reduced frustration and express related to hiring and retaining employees in an exceptionally tight job market

(D) reduced frustration and express related to hiring and retaining employees in an exceptionally tight job market

What are the primary business benefits of an ERP system?

Forecasting, planning, purchasing, material management, warehousing, inventory, & distribution

Ben works at a top accounting firm in Salt Lake City and his responsibilities include writing letters, memos, and emails along with generating reports for financial analysis and marketing materials for products. Ben's duties provide value-added benefit to his company and would be categorized as occurring at the different _______. (A) Information levels (B) Information formats (C) Information granularities (D) Information focus

NOT (A)

Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing reports for each salesperson, product, and part as well as departmental-wide sales reports by salesperson, product, and part. Ben's duties provide value-added benefit to his company and would be categorized as occurring at the difference ________. (A) Information levels (B) Information formats (C) Information granularities (D) Information focus

NOT (D)


Conjuntos de estudio relacionados

Legal and ethical issues in counseling

View Set

Chapter 14: Fraud Against Organizations

View Set

AP Psychology Practice Test I (without explanations)

View Set

ECON201 Final Learning Objectives

View Set

Surgery/Perfusion Techniques to Know

View Set

Cirrus, Cumulus, and Stratus Clouds

View Set

Tongue Twisters: Words That Begin With 'H'

View Set