Information Systems Final (Ch 1-12)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Social media SM providers host the SM presence using ________ in the cloud. A) elastic servers B) proxy servers C) vanity metrics D) viral hooks

A

Source code is computer code ________. A) that is written by humans B) that is not understandable by humans C) that is represented as bits and bytes D) that cannot be modified

A

Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________. A) created an entry barrier B) introduced product differentiation C) locked in its suppliers D) reduced the cost of operations

A

Which of the following is a characteristic of in-house hosting? A) In-depth visibility of disaster preparedness B) Small capital requirements C) Industry-wide economies of scale D) Known cost structure

A

Which of the following terms refers to the investment of resources for future profit? A) Capital B) Interest C) Loan D) Cash Flow

A

Which phase of the customer life cycle categorizes customers according to value and attempt to win back high-value customers? A) loss/churn B) customer acquisition C) relationship management D) marketing

A

________ skills determine the ability to conceive information from data. A) Cognitive B) Abstract reasoning C) Symbolic thinking D) Experimentation

A

A private internet that is used exclusively within an organization is called a(n) ________. A) Ethernet B) Intranet C) Cloud D) Server

B

Which of the following is an example of a low-tech information system? A) an inventory tracking system that that stores millions of records and produces reports every 24. hours B) a file of email addresses stored in an email program C) a customer support system that keeps track of product issues D) a decision support system that analyzes multiple variables

B

Which of the following is classified as a technical safeguard? A) cookies B) firewalls C) key escrow D) passwords

B

Which of the following techniques determine sales patterns? A) regression analysis B) market-basket analysis C) neural networks D) cluster analysis

B

Which of the following types of skills is most likely to be outsourced to the lowest bidder? A) ability to experiment B) accounting skills C) ability to collaborate D) abstract reasoning skills

B

______ requires the user to request business intelligence results. A) push publishing B) pull publishing C) desktop publishing D) accessible publishing

B

________ decisions are those that support broad-scope, organizational issues. A) Operational B) Strategic C) Unstructured D) Managerial

B

________ is a measure of the ratio of process outputs to inputs. A) Process effectiveness B) Process efficiency C) Process conformance D) Process reliability

B

________ is the process of converting a poorly-structured table into two or more well-structured tables. A) Optimization B) Normalization C) Refactoring D) Standardization

B

________ refers to data delivered to the user at the precise moment it is needed. A) synchronous data B) Just-in-time data C) Source code D) Payload

B

In business process management (BPM), once the as-is model is created, the very next step that a team must take is to _______. A) obtain feedback about implementation B) assess the results of the changes C) look for improvement opportunities D) implement changes in the organization

C

Problematic operational data is termed as ________. A) metadata B) rough data C) dirty data D) granular data

C

Which of the following is a common description of information? A) collection of unprocessed data B) unbiased, unrelated data C) knowledge derived from data D) list of recorded facts or figures

C

Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so? A) inbound logistics B) operations C) sales and marketing D) outbound logistics

C

Adobe's Acrobat, Photoshop, and PageMaker are examples of ________. A) vertical-market application software B) operating systems C) firmware D) horizontal-market application software

D

The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture. A) ftp B) smtp C) http D) TCP/IP

D

When an individual buys a program for his or her personal computer, he or she is actually buying a software ________. A) Copyright B) Trademark C) Patent D) License

D

Which of the following is an effective and acceptable technique to overcome employee resistance while implementing new enterprise systems? A) giving employees ultimatums and deadlines B) paying employees straight-out for transitioning to the new system C) coercing employees to learn the new system D) conducting contests with cash prizes among employees

D

True or False: A BYOD (bring your own device) policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business.

True

True or False: Native applications are programs that are written to use a particular operating system.

True

A ________ examines each part of a message and determines whether to let that part pass. A) packet-filtering firewall B) private key C) mail server D) wardriver

A

A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies. A) business analyst B) business application programmer C) business administrator D) business supervisor

A

A ________ is a type of virus that self-propagates using the Internet or other computer network. A) worm B) sniffer C) trojan horse D) phisher

A

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A) Internet of things (IoT) B) 3D printing C) self-driving cars D) automated guided vehicles

A

Which of the following is a primary activity in the value chain? A) receiving and distributing inputs to the product B) negotiating prices with vendors C) finding suitable vendors to supply raw materials D) setting up contractual arrangements with various suppliers

A

Which of the following revenue models offers advertisers to display ads to potential customers for free and pay only when the customer clicks? A) pay-per-click model B) freemium model C) data model D) click-free model

A

Bruce Tuckman's stages of group development are, in order of occurrence: A) Forming, storming, norming, performing B) Storming, norming, forming, performing C) Forming, norming, storming, performing D) Performing, norming, storming, forming

A

In the context of malware protection, the program code that causes the unwanted actions is called the ________. A) payload B) kernel C) bot herder D) key escrow

A

Linux is an example of a(n) ________. A) Open-source operating system B) Mobile operating system C) User community D) Workstation client

A

Relational databases represent relationships using ________. A) foreign keys B) file systems C) metadata D) primary keys

A

The two dimensions of process quality are ________. A) efficiency and effectiveness B) performance and reliability C) conformance and durability D) perception and serviceability

A

Which of the following is considered a support activity in the value chain of a business? A) operations B) customer service C) contract negotiation D) marketing

C

According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________. A) scrums B) points C) grades D) tallies

B

Which of the following protocols guarantees secure data transmission? A) http B) ftp C) https D) smtp

C

Which of the following refers to the three tiers in the three-tier architecture A) TCP, IP, and http B) html, XML, and JSON C) User, server, and database D) tunnel, switch, and access point

C

The traditional process for developing information systems is ________. A) the software testing life cycle B) the systems development life cycle C) the software defect life cycle D) product life cycle

B

To an organization, the ______ is the likelihood that an entity in a relationship will do something that benefits the organization. A) metric of a relationship B) strength of a relationship C) value of human capital D) customer lifetime value

B

Which of the following principles of competitive advantage is associated with product implementations? A) locking in customers B) differentiating service offerings C) locking in suppliers D) establishing alliances

B

________ is a wireless protocol designed for transmitting data over short distances, replacing cables. A) IPv6 B) PaaS C) Bluetooth D) IPv4

C

________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser. A) Pay-per-click B) Conversion rate C) Folksonomy D) Enterprise 2.0

B

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business. A) parallel B) phased C) pilot D) plunge

C

A ________ involves balancing three critical factors: requirements, cost, and time. A) work breakdown structure (WBS) B) trade-off C) test plan D) critical path

B

A ________ is equivalent to 1,024 bytes. A) gigabyte B) kilobyte C) terabyte D) megabyte

B

A(n) ________ is a number that identifies a particular device. A) Domain B) IP address C) Hyperlink D) Href

B

BI servers use ________ to determine what results to send to which users and on which schedule. A) expert systems B) metadata C) RSS feeds D) neural networks

B

Compared to in-house hosting, cloud-based hosting ________. A) Provides better visibility of security and disaster preparedness capabilities B) minimizes the risk of investing in technology that will soon become obsolete C) Provides greater control over the location of data D) Requires a significant amount of capital

B

In a Business Process Modeling Notation (BPMN) diagram, a _______ represents an activity. A) dotted arrow B) rectangle C) diamond D) solid arrow

B

In a business process, an inventory or a database is an example of a ________. A) decision tree B) repository C) botnet D) cookie

B

In the context of knowledge management systems, ________ are rule-based systems that encode human knowledge in the form of If/ Then rules. A) expert networks B) expert systems C) intelligent systems D) decision-making systems

B

In the five-component model of information systems, which of the following components is considered as an actor? A) software B) hardware C) data D) procedure

B

Thin-client applications are typically limited by the capabilities of the ________. A) programming language B) browser C) hardware D) operating system

B

Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________. A) links B) authoring C) signals D) extensions

D

Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product. A) procurement B) outbound logistics C) operations D) inbound logistics

D

________ are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities. A) Operational processes B) Dynamic processes C) Inherent processes D) Structured processes

B

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data entry B) Data acquisition C) Data mining D) Data encryption

B

In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. A) confidence B) support C) granularity D) lift

D

The term _____ means the more people use a site, the more value it has, and the more people will visit. A) par value B) vendor's value C) enterprise use value D) use increases value

D

Which of the following is categorized as a nonroutine cognitive skill? A) symbolic thinking B) marketing knowledge C) tax accounting D) systems thinking

D

Which of the following statements is true about unsupervised data mining? A) Analysts do not create a model or hypothesis before running the analysis. B) Neural networks are a popular unsupervised data mining application. C) Unsupervised data mining requires tools such as regression analysis. D) Data miners develop a model prior to the analysis and apply statistical techniques to

A

With ________, the sender and receiver transmit a message using different keys. A) asymmetric encryption B) a block cipher C) symmetric encryption D) a stream cipher

A

_______ communication occurs within a team when all team members meet at the same time. A) Synchronous B) Asynchronous C) Virtual D) Unidirectional

A

________ are small files that enables a browser to access Web sites without having to sign in every time. A) Cookies B) Botnets C) Payloads D) Public keys

A

________ is a broad category of software that includes viruses, spyware, and adware. A) Malware B) Cookie C) Firewall D) Spam

A

________ is the dynamic social media process of employing users to participate in product design or product redesign. A) Crowdsourcing B) Outsourcing C) Homesourcing D) Showrooming

A

________ refers to data collections that are characterized by huge volume, rapid velocity, and great variety. A) BigData B) NoSQL C) Dynamo D) Hadoop

A

Which of the following is a right of users of information systems? A) right to install programs and applications of their choice B) right to make hardware modifications when desired C) right to receive effective training D) right to obtain the configuration of their choice

C

Which of the following is an example of outsourcing an entire business function? A) acquiring licensed security software instead of developing it in-house B) making customizations to licensed software C) outsourcing the function of arranging employee travel D) acquiring virtualization technologies

C

Which of the following is the smallest element in a database? A) field B) record C) byte D) metadata

C

Organizations can lock in suppliers either by making it difficult to switch to another organization or by ________. A) making it easy for the customers to switch products B) reducing investments in their supply chain C) making it easy to work with the organization D) reducing the bargaining power of consumers

C

Reduction in production cost results in ________. A) better customer service B) lower shareholder value C) increased profitability D) increased competition

C

Reduction in production cost results in _________. A) better customer service B) lower shareholder value C) increased profitability D) increased competition

C

The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________. A) inaccurate B) not timely C) irrelevant D) too expensive

C

The fundamental purpose of the starting phase of a project is ________. A) accomplishing the project tasks effectively B) determining tasks and dependencies C) managing tasks and budgets of the project D) setting the ground rules for the project and team

D

True or False: Experimentation involves making a reasoned analysis of an opportunity and developing the most promising solutions, consistent with the resources one has.

True

True or False: Good information is derived from accurate, correct, and complete data.

True

True or False: The speed of a CPU is expressed in cycles called hertz.

True

A ________ is a cloud that is owned and operated by an organization for its own benefit. A) Private Cloud B) Virtual private network C) Wide area network D) Service as a cloud

A

A social media policy used by an organization is a statement that ________. A) delineates employees' rights and responsibilities B) lists a firm's products and services that are advertised on social media C) lists the social and environmental effects of a company's economic actions D) defines the type of medium and channel an organization uses on a social media site

A

A student invests money and time in a business administration course. In this example, the student invests in ________. A) human capital B) social capital C) structural capital D) process capital

A

A(n) ________ is a software platform that uses social media to facilitate co-operative work of people within an organization. A) enterprise social network (ESN) B) net-application (ONAP) C) Webapp D) virtual private network (VPN)

A

A(n) ________ uses the Internet to create the appearance of private, secure connections. A) VPN B) ISP C) URL D) DSL

A

According to Porter's five forces model, in which of the following situations would a supplier have the highest bargaining power? A) a Houston-based vendor is the only supplier of a patented material for many smartphone manufacturers B) a fashion brand's outlet catering to a niche market C) a restaurant that serves only army veterans D) a large retailer buying finished goods from many small suppliers

A

________ is the investment in social relations with the expectation of returns in the marketplace. A) Social capital B) Social stock C) Market stock D) Media capital

A

________ is the process of converting a data model into tables, relationships, and data constraints. A) Database design B) Database querying C) Data mining D) Database aggregation

A

Which of the following is a key difference between strategic decisions and managerial decisions? A) Strategic decisions deal with the utilization of resources, whereas managerial decisions deal with day-to-day activities. B) Managerial decisions concern organizational issues, whereas strategic decisions concern external issues. C) Managerial decisions concern allocation and utilization of resources, whereas strategic decisions concern broad organizational issues. D) Strategic decisions involve financial issues, whereas managerial decisions do not involve financial issues.

C

Which of the following best describes data? A) information presented in a meaningful context B) processed information C) recorded facts or figures D) knowledge derived from facts or figures

C

Which of the following is a characteristic of cloud-based hosting? A) Unknown cost structure B) Full control of data location C) No obsolescence D) In-depth visibility of security

C

Which of the following is a characteristic of smart devices? A) require microprocessors and new protocols B) have lower bandwidth C) consume less energy D) have less processing power

C

Which of the following is the most basic cloud offering? A) SaaS B) PaaS C) IaaS D) VPN

C

Which of the following pairs of components constitutes the human side of information systems? A) software and procedures B) software and people C) people and procedures D) hardware and people

C

Which of the following statements about enterprise information systems is true? A) The procedures are understood within the group but not documented. B) They do not require users to have any formal training. C) They are very difficult to change. D) They support 10 to 100 users.

C

Which of the following statements is true about data marts? A) A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. B) Data mart users possess the data management expertise that data warehouse employees have. C) Data marts address only a particular component or functional area of a business. D) Data marts are larger than data warehouses.

C

Which of the following statements is true about operational data? A) It is always better to have data with too coarse a granularity than with too fine a granularity. B) If the data granularity is too coarse, the data can be made finer by summing and combining. C) Purchased operational data often contains missing elements. D) Problematic operational data are termed rough data.

C

Which of the following terms is used as a synonym for data mining? A) regression analysis B) data warehousing C) knowledge discovery in databases KDD D) parallel processing in databases PPD

C

Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects? A) relationship management B) loss/churn C) marketing D) customer acquisition

C

Who is most likely to use asynchronous communication? A) a group of directors who periodically meet for board meetings B) managers who work in the same office C) members of a team who work in different time zones D) employees who work in an assembly line

C

______ protect databases and other organizational data. A) cookies B) payloads C) data safeguards D) data strings

C

________ applications are programs that are written to use a particular operating system. A) Web B) Thin-client C) Native D) Browser

C

________ are viruses that masquerade as useful programs or files. A) Adware programs B) Spyware programs C) Trojan horses D) Worms

C

________ refers to a person's belief that he or she can be successful at his or her job. A) Self-appraisal B) Self-actualization C) Self-efficacy D) Self-aggrandizement

C

__________ is defined as information containing patterns, relationships, and trends of various forms of data. A) process mining B) business process management C) business intelligence D) spatial intelligence

C

A ________ is a worldwide-unique term that is affiliated with a public IP address. A) URL B) Domain name C) Packet D) Hyperlink

B

A ________ is an information system that supports the sharing of content among networks of users. A) human resource information system HRIS. B) social media information system SMIS. C) database management system DBMS. D) transaction processing system TPS.

B

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________. A) stop SQL injection attacks B) prevent email spoofing C) prevent brute force attacks D) provide physical security

D

The data in a database are modified and deleted. These operations of DBMS are known as ________. A) statistical operations B) analytical operations C) administrative operations D) processing operations

D

The first step that any organization should take to manage the risk of employee communication is to develop and publicize a(n) ________ policy. A) human resource B) insurance C) corporate social responsibility D) social media

D

The major benefit of enterprise application integration is that it ________. A) minimizes the requirement for formalized procedures B) acts as a cost effective alternative to ERP, with greater capabilities C) utilizes a centralized database D) enables organizations to use existing applications

D

The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use. A) Portable B) Pooled C) Programmatic D) Elastic

D

Which of the following is a sniffing technique? A) IP spoofing B) caches C) denial of service D) adware

D

Which of the following is a social media (SM) application provider? A) Oracle B) SAP C) McAfee D) LinkedIn

D

Which of the following is an example of a database management system? A) MS Excel B) BigData C) NoSQL D) Access

D

Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data? A) public key B) asymmetric encryption C) key escrow D) SQL injection

D

Which of the following is true of N:M relationships? A) They are the same as N:N relationships. B) They represent minimum cardinalities in a relationship. C) They are also called one-to-many relationships. D) They can have more than one entity on each side of the relationship.

D

Which of the following is true of online ad revenue? A) Mobile ad clicks are more effective, on average, than PC clicks. B) Advertisers can find out who responds to ads but not how strongly. C) One of the principal means of attracting viewers is to provide low-cost content. D) Most ads on social media generate revenue only when customers click on them.

D

Which of the following pairs of components constitutes the computer side of information systems? A) software and data B) data and hardware C) people and procedures D) hardware and software

D

Which of the following phases of the systems development life cycle (SDLC) includes identifying what is to be produced, how frequently, and how fast? A) requirements analysis B) system implementation C) component design D) system definition

D

Which of the following statements is true about data administration? A) It is a line function to the chief information officer. B) It merely involves developing data policies. C) It applies to individuals and not to the entire organization. D) It is involved in establishing data safeguards.

D

Which of the following statements is true about information systems (IS) planning functions? A) The chief operating officer (COO) is the sole representative for IS and IT issues within the executive staff. B) The steering committee represents the IS department exclusively in high-level discussions. C) The information systems (IS) department's priorities are developed by the chief executive officer (CEO). D) The chief executive officer (CEO) and other executive staff decide the membership of the steering committee.

D

Which of the following workgroup processes is related to manufacturing? A) order entry and tracking B) finished goods inventory management C) product and brand management D) capacity planning and scheduling

D

Which of these is a force within bargaining power of buyers? A) economies of scale B) employee solidarity C) high levels of rivalry D) buyer concentration to firm concentration ratio

D

________ analysis is a way of analyzing and ranking customers according to their purchasing patterns. A) Regression B) CRM C) Market-basket D) RFM

D

List the four non-routine cognitive skills that are key to a successful career today

Experimentation, abstract reasoning, collaboration, and systems thinking

Name three general sources of security threats

Computer crime, human errors/mistakes, and natural disasters

True or False: A person who is good at collaboration will avoid giving critical feedback to others.

False

True or False: Bluetooth is a common wired protocol designed to transmit data over long distances.

False

True or False: Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.

False

True or False: Control flow refers to the movement of data among activities and repositories.

False

True or False: Information technology and information systems are synonymous terms.

False

True or False: RFM analysis considers how recently (R) a customer ordered, how fast (F) the order was delivered, and how much margin (M) the company made on the order.

False

What three things can determine when an agile development project is complete?

Out of time, out of money, customer says we're done

________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. A) Enterprise resource planning B) Customer relationship management C) Enterprise application integration D) Business process reengineering

A

According to J. Richard Hackman, which of the following is a primary criterion for judging team success? A) successful outcome B) experience in collaborating C) ability to be dynamic D) availability of external help

A

In market-basket terminology, ________ describes the probability that two items will be purchased together. A) support B) confidence C) lift D) dimension

A

What is the difference between synchronous and asynchronous communications?

Synchronous: working together at the same time Asynchronous: relay of information with a time lag

Name the five forces that determine industry structure.

Threat of new entrants, threat of substitutes, industry rivalry, bargaining power of suppliers, and bargaining power of buyers

True or False: A Web application is designed to run within computer browsers such as Firefox and Internet Explorer.

True

True or False: According to Moore's Law, the number of transistors per square inch on an integrated chip doubles every 18. months.

True

True or False: Internet of Things (IoT) allows objects to connect to the Internet so they can interact with other devices, applications, or services.

True

True or False: SQL is an international standard language for processing a database.

True

A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise. A) stored procedure B) index C) trigger D) transaction

C

Main memory is also known as ________. A) cache memory B) random access memory C) read-only memory D) optical memory

B

Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________. A) product standards B) value differentiation C) switching costs D) entry barriers

C

Which of the following is key to successful systems development life cycle (SDLC) projects? A) critical path template B) work breakdown structure C) scatter plot D) control chart

B

Which of the following is used for biometric authentication? A) smart cards B) facial features C) passwords D) personal identification numbers

B

________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. A) Fragmentation B) Collaboration C) Distribution D) Experimentation

C

List Bruce Tuckman's four Stages of Group Development (worth four points; five if they're in order)

forming, storming, norming, performing

List the five primary activities in a generic value chain.

inbound logistics, operations/manufacturing, customer service, outbound logistics, and sales and marketing

List five characteristics of good data.

Worth its cost, accurate: correct and complete, just sufficent with no extraneous data, relevant to context and subject, and timely: available in time for its intended use

True or False: A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.

True

True or False: A database management system (DBMS) is a program used to create, process, and administer a database.

True

True or False: A spreadsheet can be used to store data if the structure of a list is simple.

True

The speed of a CPU is expressed in cycles called ________. A) hertz B) knot C) Mach D) rev

A

Which of the following characteristics is a disadvantage of cloud-based hosting? A) It involves high dependency on the vendor. B) It involves a significant requirement of capital. C) It involves high annual maintenance costs. D) It involves high ongoing support costs.

A

An ERP solution does not include ________. A) a database design B) the company's operational data C) initial configuration data D) stored procedures

B

An organization defines the rules that govern a project and the responsibilities of the project team. The project is in the ________ phase of project management. A) doing B) starting C) planning D) finalizing

B

I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." The competitor made significant in-roads into this market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 implementing? A) cost leadership B) product differentiation C) cost differentiation in the segment D) service focus

B

Identify the least important characteristic for an effective collaborator. A) willingness to enter difficult conversation B) having experience as a collaborator C) showing the ability to receive negative feedback D) being skillful at giving negative feedback

B

Identify the least important characteristic for an effective collaborator. A) willingness to enter difficult conversations B) having experience as a collaborator C) showing the ability to receive negative feedback D) being skillful at giving negative feedback

B

Which of the following is performed by enterprise application integration? A) It duplicates the data because each application has its own database. B) It connects system "islands" via a new layer of software. C) It prevents a gradual move to ERP D) It prevents existing applications from communicating and sharing data.

B

List three problems associated with information silos

Isolated data, increased cost, and inefficency

What does ACID stand for?

Atomic, Consistent, Isolated, Durable

Name the three cloud services offered by vendors

IaaS, PaaS, and SaaS

Describe the principle of net neutrality

Giving everyone the access the internet at a fair and low cost.

Which of the following is an example of a mobile device? A) a smartphone B) an Xbox C) a desktop computer D) a mainframe

A

Which of the following is an example of an application program? A) Microsoft Word B) Unix C) Linux D) Windows

A

What is a virus?

A virus is a computer program that replicates itself

Name the two dimensions of process quality

Efficiency and effectiveness

Name two of the three types of product implementation

Enhance products or services, differentiate products or services, and create a new product or service

Name the four DBMS operations

Read, insert, modify, and delete

Which of the following is a responsibility of a chief information officer (CIO)? A) serving as the principal manager of the IS department B) heading the technology group C) evaluating new technologies that are relevant to the organization D) developing processes and information systems (IS) that implement business strategy

A

Which of the following is an advantage to an organization if its BYOD (bring your own device) policy offers wireless network to mobile devices? A) The organization can sniff employees' mobile traffic. B) Employees gain public access from any device, not just mobile devices. C) The policy appears to be permissive without actually being so. D) Employees resist turning over the management of their own hardware to the organization.

A

Which of the following is an example of computer hardware? A) a monitor B) a browser C) a spreadsheet D) an operating system

A

Which of the following is an example of nonvolatile memory? A) optical disk B) main memory C) cache memory D) static random access memory (SRAM)

A

Which of the following is an example of vertical-market application software? A) inventory tracking software for an automobile manufacturer B) Tally software that is used to maintain business and personal accounts C) Adobe suite, used by graphic designers D) Microsoft PowerPoint, used to create presentations

A

Which of the following is considered a threat caused by human error? A) an employee inadvertently installing an old database on top of the current one B) an employee intentionally destroying data and system components C) a virus and worm writer infecting computer systems D) a hacker breaking into a system to steal for financial gain

A

Which of the following is true about the database development process? A) The database structure is easy to change during the data modeling stage. B) Changing a relationship from 1:N to N:M in an existing database is a complex and lengthy process. C) User review of the data model is avoided as it is not helpful in data modeling. D) Databases are easier to develop than spreadsheets.

A

Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another? A) USB flash drive B) projector C) mouse D) barcode scanner

A

Which of the following refers to the problem that exists in database applications when two users modify the same data item, but only one of those changes is recorded? A) Lost-update problem B) Crow's-foot paradigm C) Bullwhip effect D) Update query problem

A

Which of the following statements is true about native applications? A) They only run on the operating system for which they are programmed. B) The cost of native applications is low. C) They can be developed by less skilled, lesser-paid employees. D) The limits on native applications are usually technological, not budgetary.

A

Which of the following statements is true about the quality of information? A) Information should be just barely sufficient for its purpose. B) Data that arrives after a prolonged period of time is of the highest quality. C) Information needs to be relevant to the subject, not necessarily to the context. D) Freely available data is always accurate and timely.

A

A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. A) hacker B) phisher C) safeguard D) sniffer

B

A ________ shows the tasks, dates, and dependencies for the tasks of a project. A) fusion chart B) Gantt chart C) Pareto chart D) control chart

B

A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second. A) Megabytes B) Megabits C) Kilobytes D) Kilobites

B

A data integrity problem will occur only if ________. A) a database has multiple administrators B) data are duplicated in a database C) the database is very complex D) there are complex relationships between entities in a database

B

A primary key in a database is a ________. A) group of rows that identifies a unique table or file B) column or group of columns that identifies a unique row in a table C) group of fields or columns that represent metadata D) group of tables or files formed to identify a unique field or row

B

A sales report that is current at the time the user accessed it on a Web server, is an example of a(n) ________. A) static report B) dynamic report C) expert system D) hybrid market report

B

A student group that is working on a project is considered to be a collaboration if the ________. A) members work on different sections by themselves B) members provide feedback on each other's work C) group uses Google Drive to share files D) group uses a file server to share files

B

A(n) ________ has a microchip in it to hold data. A) ATM card B) smart card C) cookie D) key escrow

B

A(n) ________ is a number that identifies a particular device on the Internet. A) domain B) IP address C) hyperlink D) href

B

A(n) ________ is a program used to create, process, and administer a database. A) operating system B) database management system C) information system D) database system

B

A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media. A) network motif B) viral hook C) folksonomy D) internet site

B

A(n)________ system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. A) business process reengineering B) customer relationship management C) enterprise resource planning D) customer lifecycle management

B

Abstract reasoning is the ability to ________. A) develop ideas and plans with others when performing tasks B) make and manipulate models C) act quickly on a problem D) provide and receive critical feedback

B

According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the meaningful and satisfying experience criterion? A) documenting definitions B) rewarding accomplishment C) managing many versions of content D) managing tasks

B

An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process. A) organizational B) structured C) corporate D) strategic

B

Bits are used for computer data because they ________. A) are represented exclusively as letters of the alphabet B) are easy to represent physically C) represent the orientation of a nonoptical media D) can have more than two values at a time

B

Cloud resources are ________ because many different organizations use the same physical hardware. A) Elastic B) Pooled C) Programmatic D) Portable

B

Collaboration is defined as a group of people ________. A) coming together to perform tasks that are different B) working together to achieve a common goal C) performing independent tasks that are important D) working without having to critically analyze each other's work

B

Columns that are keys to different tables than the ones in which they reside are called ________. A) attributes B) foreign keys C) primary keys D) internal records

B

Deleting problematic content on social networking sites is best reserved for content that is ________. A) grammatically incorrect B) obscene and inappropriate C) legitimate but negative D) contributed by a layperson

B

DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________. A) Horizontal-market application software B) Vertical-market application software C) Firmware D) Adware

B

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. A) human resources B) information systems C) marketing D) manufacturing

B

Dynotrix Motors is a large car-manufacturing company. The company purchases raw materials from many small-sized sellers across the globe. In this case, Dynotrix Motors is characterized by ________. A) very low threat of substitute products B) high bargaining power over its suppliers C) very low threat of new entrants in the market D) very high bargaining power over its customers

B

Each entity in a database has a unique attribute called a(n) ________. A) Public key B) Identifier C) Foreign key D) Index field

B

How should a sales team respond to a customer who has an RFM score of 545? A) The sales team should contact this customer immediately. B) The sales team should let go of this customer; the loss will be minimal. C) The sales team should attempt to up-sell more expensive goods to this customer. D) The sales team should spend more time with this customer.

B

Which of the following is a function of an ISP? A) It transmits data over short distances, replacing cables. B) It serves as a user's gateway to the Internet. C) It describes how messages must be processed for wired transmission. D) It connects computers within a LAN.

B

Which of the following observations about RFM and OLAP reports is true? A) RFM is more generic than OLAP. B) OLAP reports are more dynamic than RFM reports. C) RFM reports have measures and dimensions. D) RFM reports can drill down into the data

B

Which of the following observations about the relationship between decision type and decision process is true? A) Managerial decisions tend to be highly structured, whereas operational decisions are unstructured. B) Decisions at the operational level tend to be structured, whereas decisions at the strategic level tend to be unstructured. C) Higher-level organizational decisions should be highly structured. D) Need for collaboration is highly significant for lower-level, structured decisions.

B

Which of the following services is being offered by a cloud vendor who provides hosted computers, an operating system, and possibly a DBMS? A) SaaS B) PaaS C) IaaS D) VPN

B

Which of the following statements is true about a data administration staff function? A) The chief technology officer (CTO) heads the data administration staff function. B) The group establishes standards to protect information assets. C) This group includes system and network administrators exclusively. D) This group manages the process of creating new information systems.

B

Which of the following statements is true about firmware? A) The software is not coded like other software. B) Users do not need to load firmware into a device's memory. C) Firmware is the same as cache memory. D) Firmware cannot be changed or upgraded.

B

Which of the following statements is true about human safeguards for employees? A) Security screening in an organization is a one-time process and applies only to new employees. B) User accounts should be defined to give users the least possible privilege needed to perform their jobs. C) Companies should provide user accounts and passwords to employees prior to their security training. D) System administrators should retain user accounts after an employee has been terminated.

B

Which of the following statements is true about outsourcing? A) It increases budgetary instability due to the level of risk involved. B) It saves both direct and indirect management time. C) It invariably leads to diseconomies of scale. D) It guarantees a higher level of quality than that provided in-house.

B

Which of the following statements is true about the Secure Sockets Layer (SSL)? A) It uses asymmetric encryption exclusively. B) It is used to send sensitive data such as credit card numbers. C) It uses one set of encryption keys for multiple sessions. D) It is a stronger version of https.

B

Which of the following statements is true of information systems? A) Information systems include all business process activities. B) Every information system has at least one application. C) Information systems should be bought entirely off-the-shelf. D) Every business process should include at least one information system.

B

Which of the following statements is true of managing tasks? A) When a single person is made responsible for accomplishing a task, it means that he/she should do the task. B) No benefit will come from the task list unless every task has a date by which it is to be completed. C) Accountability and follow-up are seldom required for task management. D) For team members to utilize a task list effectively, they need to keep it confidential.

B

Which of the following statements is true of the swim-lane layout used for modeling business processes? A) It complicates the process diagrams. B) It draws attention to the interactions among components of the diagram. C) Each role in the business process has to share the swim-lane with other roles. D) All activities for a given role are repeated in all the swim-lanes.

B

Which of the following terms refers to a collection of servers? A) server database B) server farm C) firmware D) shareware

B

Which of the following usually happens in a malicious denial-of-service attack? A) a hacker monitoring and intercepts wireless traffic at will B) a hacker floods a Web server with millions of bogus service requests C) an intruder using another site's IP address to masquerade as that other site D) a phisher pretending to be a legitimate company and requesting confidential data

B

Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value? A) inbound logistics B) customer service C) operations D) outbound logistics

B

______ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. A) unauthorized data disclosure B) incorrect data modification C) denial of service D) loss of infrastructure

B

________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system. A) pretexting B) hardening C) phishing D) spoofing

B

________ are information system (IS) professionals who understand both business and information technology. A) Development analysts B) Systems analysts C) Network administrators D) Database designers

B

________ is a technique for harnessing the power of thousands of computers working in parallel. A) RFM analysis B) MapReduce C) Granularity D) Reposition

B

________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. A) Abstract reasoning B) Systems thinking C) Collaboration D) Experimentation

B

________ is the activity of altering existing and designing new business processes to take advantage of new information systems. A) Business process modeling B) Business process reengineering C) Business process outsourcing D) Enterprise resource planning

B

________ is the application of social media and related applications for the management and delivery of organizational knowledge resources. A) Business intelligence server management B) Hyper-social knowledge management C) Knowledge management protocol D) Online analytical processing

B

________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. A) Intellectual property protection B) Knowledge management C) Business process reengineering D) Repository management

B

________ is the process of hiring another organization to perform a service. A) merging B) outsourcing C) headhunting D) diversifying

B

________ present(s) the largest risk for an organization's infrastructure loss. A) Employees' dissatisfaction B) Natural disasters C) Hackers D) Competitors

B

According to Moore's Law, the ________. A) price of an integrated chip reduces once in 18 months B) performance of an integrated chip doubles every year C) number of transistors per square inch on an integrated chip doubles every 18 months D) density of a transistor decreases every year

C

According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________. A) monetary benefit B) popularity C) influence D) security

C

According to Porter's model of business activities, interactions across value activities are called ________. A) support activities B) triggers C) linkages D) cross-functionalities

C

An OLAP report has measures and dimensions. Which of the following is an example of a dimension? A) total sales B) average sales C) sales region D) average cost

C

An administrator should create a ________ before developing the database design. A) data aggregator B) query model C) data model D) data application

C

Asynchronous communication occurs when team members ________. A) cannot arrive at consensus after discussions B) engage in conflicting discussions C) do not meet at the same time D) communicate in a sequential manner

C

Bits are grouped into 8-bit chunks called ________. A) switches B) strings C) bytes D) kilobytes

C

If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. A) programmers and development personnel B) PQA test engineers C) business and systems analysts D) technical writers

C

In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing. A) network B) software C) business function D) application

C

In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. A) cluster analysis B) unsupervised data mining C) supervised data mining D) click streaming

C

In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process. A) dotted arrows B) diamonds C) solid arrows D) circles

C

In a manufacturing business, which of the following transforms finished goods into cash? A) inbound operation B) manufacturing process C) sales process D) inbound logistics

C

In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization's BI data. A) OLAP cube B) neural network C) data warehouse D) Web server

C

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. A) pilot B) phased C) parallel D) plunge

C

Metadata are ________. A) codes used for server-side processing B) error logs of databases C) data that describe data D) data that are encrypted

C

One of the procedures of a collaboration project is documenting and reporting progress. This is performed in the ________ phase of the project. A) starting B) planning C) doing D) scheduling

C

Outsourcing is done to ________. A) diversify the business portfolio B) increase costs for outsourcing vendors C) cap an organization's financial exposure D) enhance management's focus on nonessential functions

C

Process ________ is a measure of how well a process achieves organizational strategy. A) efficiency B) conformance C) effectiveness D) reliability

C

Rapid application development, the unified process, extreme programming, and scrum have led to ________. A) joint application development B) dynamic systems development model C) agile development D) systems development life cycle (SDLC)

C

Since the features and functions of complex products like CRM or ERP are not easy to identify, ________ is a major task when implementing enterprise systems. A) virtualization B) encapsulation C) gap identification D) data duplication

C

Social media (SM) communities differ from communities in the past because SM communities are ________. A) formed based on family relationships B) limited by geographical location C) formed based on mutual interests D) limited by organizational boundaries

C

The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side. A) software B) procedure C) data D) hardware

C

The ________ is a sequence of activities that determine the earliest date by which a project can be completed. A) exit path B) cycle route C) critical path D) scatter route

C

The ________ phase of the systems development life cycle (SDLC) involves determining hardware and program specifications, designing the database and procedures, and creating job definitions. A) requirements analysis B) system implementation C) component design D) system definition

C

The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter's five forces model, this statement illustrates ________. A) low threat of substitutions B) high bargaining power of suppliers C) high levels of rivalry D) low bargaining power of customers

C

The connection between a VPN client and a VPN server is called a(n) ________. A) Data highway B) Hyperlink C) Tunnel D) Access point

C

The final phase of the systems development life cycle (SDLC) is ________. A) implementing the system B) determining the requirements C) maintaining the system D) designing system components

C

The forked lines on the lines representing relationship between two related entities are referred to as ________. A) identifiers B) foreign keys C) crow's feet D) entities

C

The more technical an organization, the ________ the social policies. A) less important B) more stringent C) more lenient D) less open

C

The need for collaboration is greatest for ________ decisions. A) operational B) procedural C) strategic D) managerial

C

The primary purpose of an ERP system is ________. A) customization B) duplication C) integration D) customer acquisition

C

The process of hardening a Web site is a ________ safeguard. A) political B) financial C) technical D) physical

C

The storage of ________ differentiates social media information systems SMIS from Web site applications. A) secondary data B) content data C) connection data D) continuous data

C

The total number of points of work a team can accomplish in each scrum period is called ________. A) score B) speed C) velocity D) degree

C

Virtualization is the process by which ________. A) a single server is used to host the operations of a workstation B) many computers are used to control a server C) one physical computer hosts many different virtual computers within it D) a single operating system is licensed for multiple computers

C

Which of the following are the dimensions of feasibility? A) planning, process, technical, and schedule feasibility B) operational, strategic, technical, and tactical feasibility C) cost, schedule, technical, and organizational feasibility D) schedule, process, technical, and competitive feasibility

C

Which of the following characteristics is a disadvantage of in-house hosting? A) dependency on vendor B) loss of control over data location C) cost uncertainties D) lack of visibility into security details

C

Which of the following conditions exists when data are isolated in separated information systems? A) information overload B) encapsulation C) information silo D) data segregation

C

Which of the following factors makes cloud-based hosting advantageous today? A) expensive processors B) expensive data storage C) advent of virtualization D) advent of private IP addressing

C

Which of the following is a benefit of in-house hosting? A) Superior flexibility and adaptability to growing or fluctuating demand B) Lower capital requirements C) In-depth visibility of security and disaster preparedness D) Fewer training requirements

C

Which of the following is a component of an information system, but not of information technology? A) hardware B) data C) people D) software

C

Which of the following is a critical security function that should be addressed by the senior management of an organization? A) sharing the private key with all systems connected to the network B) creating IS security software programs C) establishing the security policy D) avoiding the use of perimeter firewalls

C

Which of the following is a risk of outsourcing information systems (IS)/ information technology (IT) functions? A) It is easier to end an agreement between a vendor and an organization that hired the vendor. B) It provides the hiring organization with too many choices. C) It involves the potential loss of intellectual capital. D) It invariably results in diseconomies of scale.

C

Which of the following is a risk of outsourcing information systems (IS)/information technology (IT) functions? A) It is easier to end an agreement between a vendor and an organization that hired the vendor. B) It provides the hiring organization with too many choices. C) It involves the potential loss of intellectual capital. D) It invariably results in diseconomies of scale.

C

Which of the following is an international standard language for processing a database? A) Cassandra B) DB2 C) SQL D) MS Access

C

Which of the following is defined as the elastic leasing of pooled computer resources over the Internet? A) broadband B) wiki C) the cloud D) Bluetooth

C

Which of the following is most likely to be a result of hacking? A) certain Web sites being censored for hurting sentiments B) small amounts of spam in a user's inbox C) an unauthorized transaction from a user's credit card D) pop-up ads appearing frequently

C

Which of the following is the most important trait that an effective collaborator should have? A) avoiding unpopular ideas B) persuasive presentation skills C) skillfulness at giving/receiving negative feedback D) previous experience as a collaborator

C

Which of the following principles of competitive advantage is related to process implementations? A) creating new products B) enhancing services C) locking in suppliers D) differentiating products

C

Which of the following statements is a characteristic of outsourcing? A) Management should have expertise on a subject before it can decide to outsource. B) An outsource vendor transfers the responsibility of risk management to the development group. C) To achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff. D) Outsourcing leads to increased financial risk.

C

Which of the following statements is consistent with the central idea of business process design? A) Technology should be used to supplement the existing value chain. B) Business processes should focus on improving individual functional systems. C) Organizations should create new business processes rather than improve existing systems. D) Technology should be used to modify and improve standard business processes.

C

Which of the following statements is true about social CRM? A) Customers likely to generate the most business get the most attention from the organization. B) All the customer relationship processes in social CRM are structured and controlled. C) Each customer crafts his or her own relationship with the company. D) Though relationships emerge from joint activity, companies control the customers.

C

Which of the following statements is true about the maintenance group of information systems (IS)? A) It is undertaken by the business analysts. B) It is overseen by the chief technology officer. C) It involves adapting existing systems to support new features. D) It comprises developing test plans and designing automated test scripts.

C

Which of the following statements is true about users of information systems? A) They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. B) They can avoid security and backup procedures. C) They should learn standard techniques and procedures for the applications they use. D) They should learn to install hardware and software on their own.

C

_______ involve the people and procedure components of information systems. A) firewalls B) technical safeguards C) human safeguards D) payloads

C

________ % of communications is a result of words. A) 50 B) 24 C) 7 D) 86

C

________ are false targets for computer criminals to attack. A) Botnets B) Hot sites C) Honeypots D) Web beacons

C

________ are formally defined, standardized processes that involve day-to-day operations. A) Dynamic processes B) Unstructured processes C) Structured processes D) Kinetic processes

C

________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. A) Decision Support Systems (DSS) B) Online Analytical Processing (OLAP) systems C) Content Management Systems (CMS) D) Data Transfer Protocols (DTP)

C

________ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A) Administrators B) Developers C) Users D) Designers

C

________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access. A) Private keys B) User names C) Passwords D) Personal identification numbers

C

________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. A) Pretexting B) Phishing C) Hacking D) Spoofing

C

________ is a form of outsourcing. A) Buying off-the-shelf software B) Customizing information systems C) Acquiring licensed software D) Updating data standards

C

________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks. A) Spoofing B) Phishing C) Sniffing D) Pretexting

C

________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Process mining B) Business process management C) Business intelligence D) Spatial intelligence

C

________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. A) Vertical-market software B) Application software C) Firmware D) Spyware

C

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data optimization B) Database normalization C) Data mining D) Data warehousing

C

__________ metrics keep track of goals achieved by an organization. A) success B) vanity C) performance D) scalar

C

An outsource vendor changes its strategic direction. Under which of the following outsourcing risks can this be associated? A) de facto sole source B) superfluous chief information officer (CIO) C) diseconomies of scale D) loss of control

D

Browser-based applications ________. A) need to be preinstalled on the users' computers B) run within a corporate network that is protected from the Internet C) eliminate the need to check for data consistency D) are more vulnerable to security threats than are traditional applications

D

Entities in a data model have ________ that describe the characteristics of the entity. A) characters B) primary keys C) codes D) attributes

D

Identify the first step in transforming a data model into a relational database design. A) representing the entity relationships B) normalizing the data and files C) creating foreign keys D) creating a table for each entity

D

In a business process, a role refers to ________. A) a physical repository B) the movement of data C) a collection of data D) a collection of activities

D

In an E-R diagram, a line between two entities represents a(n) ________. A) attribute B) identifier C) cardinality D) relationship

D

In cloud computing, resources are said to be "pooled" because organizations ________. A) Use the public Internet to create the appearance of a private connection B) Use open-source standards that enable users to modify a program's source code C) Offer their services to each other free of charge, in a give-and-take arrangement D) Share the same physical hardware through virtualization

D

In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________. A) reports B) resources C) components D) deliverables

D

In the context of system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced. A) pilot B) phased C) parallel D) plunge

D

In the five-component model, the process of automation is a process of moving work from ________. A) processes to procedures B) procedures to people C) instructions to actors D) the human side to the computer side

D

Information is considered to be inefficient if ________. A) it is just barely sufficient B) it is availed ahead of time C) its level of accuracy is too high D) it is irrelevant to the subject

D

Information systems improve process quality by ________. A) duplicating data B) entirely replacing human activity C) changing the work culture D) controlling process flow

D

It is generally more difficult to make changes to the ________ of an information system than to the database itself. A) software B) hardware C) programs D) procedures

D

July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing? A) Enhancing the product B) Standardizing the product C) Differentiating the product D) Locking in customers

D

Knowledge management (KM) benefits organizations because it ________. A) allows distributors to work within the company premises B) allows suppliers to work according to the organizational policies C) enables employees to solve problems and rectify mistakes later D) improves process quality and increases team strength

D

Responding to problematic content on social networking sites is best reserved for when the problematic content ________. A) is obscene and inappropriate B) does not affect the site where the content has been posted C) represents reasonable criticism of an organization's products or services D) has caused an organization to do something positive as a result

D

Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. A) system definition B) component design C) system maintenance D) system implementation

D

The hardware components of an information system will act as a(n) ________. A) bridge between the computer side and the human side B) actor on the human side C) instruction on the computer side D) actor on the computer side

D

The term ________ means the more people use a site, the more value it has, and the more people will visit. A) par value B) vendor's value C) enterprise use value D) use increases value

D

The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the systems development life cycle (SDLC) project's resources. A) swim-lane layout B) trade-off C) transmission control protocol D) configuration control

D

Traditional database applications programs are ________. A) browser-based and display dynamic content B) written in languages such as html5 and JavaScript C) entirely dependent on the database server for application logic D) thick applications that need to be installed on users' computers

D

When an employee is terminated, IS administrators should receive advance notice so that they can ________. A) destroy the employee's records B) plan the recruitment of their positions. C) disseminate information D) remove the user account and password

D

Which of the following are the steps in the business process management (BPM) cycle? A) model processes; implement processes; assess results; create components B) create components; model processes; implement processes; assess results C) implement processes; create components; model processes; assess results D) model processes; create components; implement processes; assess results

D

Which of the following information systems eliminates data duplication and carefully manages changes to duplicated data to maintain consistency? A) departmental information systems B) workgroup information systems C) personal information systems D) enterprise information systems

D

Which of the following is a basic operation used by reporting applications to produce business intelligence? A) coalescing B) transposing C) dispersing D) calculating

D

Which of the following is a characteristic of volatile memory? A) processor heats up during the operation B) files are stored permanently C) processing of data is very slow D) contents are lost when power is off

D

Which of the following is a function of the steering committee for the information systems (IS) department? A) writing program code B) imparting training C) adapting software D) setting IS priorities

D

Which of the following is a key difference between collaboration and cooperation? A) Unlike cooperation, collaboration occurs when a job has to be accomplished. B) Cooperation requires people to have a common goal, whereas collaboration occurs even without a common goal. C) People should work together to cooperate, whereas they need not work together to collaborate. D) Unlike cooperation, collaboration emphasizes iteration and feedback.

D

Which of the following is a major implication of Moore's Law? A) Data processing activities have become complex and time-consuming. B) Costs of computing and processing have increased. C) The size of integrated chips has increased. D) Costs of communications and storage have become very low.

D

Which of the following is a risk associated with using social media in human resources to form conclusions about employees? A) loss of privacy of the employees B) loss of control over the employees C) decrease in efficiency of the evaluation process D) possibility of error on the site

D

Which of the following is true of single-user databases? A) They are displayed and processed using html5, css3, and JavaScript. B) They use JavaScript for user-side processing. C) The Internet is used to access the DBMS server computer. D) The application, the DBMS, and the database all reside on the user's computer.

D

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? A) inbound logistics B) operations C) customer service D) outbound logistics

D

________ involves accomplishing job tasks during failure. A) Authentication B) Hardening C) Usurpation D) Recovery

D

________ is defined as making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. A) Systems thinking B) Abstract reasoning C) Problem-solving D) Experimentation

D

________ is the activity of two or more people working together to achieve a common goal, result, or work product. A) Abstract reasoning B) Systems thinking C) Experimentation D) Collaboration

D

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications. A) Encryption B) Spoofing C) Phishing D) Usurpation

D

________ occurs when someone deceives by pretending to be someone else. A) Hacking B) Usurping C) Sniffing D) Pretexting

D

True or False: A logical representation of database data, called the data model, is constructed by developers after building a database.

False

What two characteristics are essential to turn cooperation into collaboration?

Feedback and iteration

List three symptoms of spyware/adware infection

Slow system startup, sluggish performance, many pop-up advertisements

Name an advantage of allowing personal mobile devices at work.

Sniff out employee's mobile traffic

How does Porter define value?

The amount of money that a customer is willing to pay

True or False: A central processing unit (CPU) is also called "the brain" of a computer.

True

True or False: A key is a column or group of columns that identifies a unique row in a table.

True

True or False: An Internet Service Provider serves as a user's gateway to the Internet.

True

True or False: An intranet is a private internet that is used exclusively within an organization.

True

True or False: An operating system is a program that controls a computer's resources.

True

True or False: An organization responds to the structure of its industry by choosing a competitive strategy.

True

True or False: Data becomes information when it is presented in a meaningful context.

True

True or False: Data is worth its cost when an appropriate relationship exists between the cost of data and its value.

True

True or False: If an organization's BYOD policy dictates that an employee is responsible for damage, the advantage to the organization is that it appears to be permissive without actually being so.

True

True or False: In a closed source program, such as Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors.

True

True or False: Information systems exist to help people who work in an organization to achieve the strategies of that business.

True

True or False: The business process management cycle begins by creating a model of the existing business processes.

True

True or False: The general goal of normalization is to construct tables such that every table has a single topic or theme.

True

True or False: The goal of information systems security is to find the appropriate trade-off between risk of loss and cost implementing safeguards and prevent loss.

True

True or False: The owner of a domain name can change the affiliated IP addresses at its discretion.

True

True or False: Users are the final judges as to what data the database should contain and how the records in that database should be related to one another.

True

True or False: Users should take an active role in system development to create an information system that meets their needs.

True

True or False: Virtualization is the process by which one physical computer hosts many different virtual computers within it.

True

True or False: A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand

True

True or False: A foreign key is essential in relational databases to represent the relationship between two tables.

True

What does VPN stand for?

Virtual Private Network

What is it called when you pay a fee to install software product on all company computers or all computers at a specific site?

site license

The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data mining D) data communication

A

The situation that occurs when the addition of resources creates inefficiencies is known as ________. A) diseconomies of scale B) marginal utility C) marginal returns D) break-even

A

The systems development life cycle (SDLC) process follows a linear sequence from requirements to design to implementation. Therefore, the systems development life cycle (SDLC) process is also known as the ________. A) waterfall method B) swim-lane method C) scrum process D) agile development method

A

To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used. A) Layered protocol B) Virtual private network C) Three-tier system D) Remote access system

A

Users in motion, mobile devices, wireless connectivity, and a cloud-based resource are the elements in a ________. A) mobile system B) nonmobile system C) client operating system D) native application

A

Users should not bother the information systems (IS) personnel for trivial issues, instead they should fulfill their responsibilities by ________. A) learning basic computer skills B) sharing their passwords with others to use their help in solving those trivial issues C) installing security programs by themselves D) making hardware modifications

A

Which of the following accurately defines a dimension in an OLAP report? A) It is a characteristic of a measure. B) It is an item that is processed in the OLAP report. C) It is a data item of interest. D) It is referred to a decision tree.

A

Which of the following best represents the value of social capital? A) Number of Relationships × Relationship Strength × Entity Resources B) Entity Resources - number of Relationships + Relationship Strength. C) Number of Relationships - Relationship Strength - Entity Resources D) Number of Relationships × Relationship Strength. / Entity Resources

A

Which of the following components constitute the computer side of information systems? A) hardware and software B) data and hardware C) software and data D) people and procedures

A

Which of the following data elements is placed higher than records in the database hierarchy? A) file B) field C) character D) byte

A

Which of the following factors determines the structure, features, and functions of an information system used in a company? A) the competitive strategy B) the value of its brands C) the size of the company D) the technology used by competitors

A

Which of the following features distinguishes a LAN from a WAN? A) A LAN connects computers in a single location. B) A WAN has a limit on the number of users. C) A WAN has low bandwidth. D) A LAN has stringent hardware requirements.

A

Which of the following is a characteristic of an inter-enterprise information system? A) Its problem solutions affect multiple organizations. B) It is flexible and easily adaptable to organizational changes. C) It increases data duplication among departments. D) It does not require users to have any formal training.

A

Which of the following is a characteristic of dynamic processes? A) They support strategic and less structured managerial decisions and activities. B) They are usually formally defined and documented. C) They support operational and managerial decisions and activities. D) They are standardized processes.

A

Which of the following is a developmental task of database administration? A) evaluating an application design B) monitoring backup procedures C) conducting training for users D) managing configuration changes in systems

A

Which of the following is a limitation of aligning information systems (IS) with organizational strategy? A) Adapting the IS to new versions of business processes is complex and time-consuming. B) Aligning the IS direction with the organizational strategy occurs only when organizations merge. C) Aligning the IS direction with the organizational strategy occurs only when the divisions are sold. D) The steering committee provides a forum for the IS department to voice its complaints about the users.

A

The primary risk of peer-to-peer support in the context of social media and customer service is ________. A) loss of control B) loss of credibility C) lack of privacy D) lack of investment

A

A(n) ________ is a request for data from a database. A) form B) report C) query D) application

C

A(n)________ is an example of storage hardware in computers. A) overhead projector B) keyboard C) magnetic disk D) barcode scanner

C

Every information systems (IS) user has the right to a secure computing environment. This means that the ________. A) organization should protect his/her computer and its files B) user should solely be in charge of protecting the organization's computers and files C) user should inform the IS about software upgrades D) user will never face a network problem

A

According to Brooks' Law, adding more people to a late project will ________. A) guarantee efficiencies B) speed up the project C) make it later D) reduce the need for coordination

C

Focused differentiation occurs when ________. A) a better product is provided within an industry segment B) there is limited competition in an industry C) the customers are highly price-sensitive D) product quality improves across an entire industry

A

For communications equipment, k stands for ________. A) 1000 B) 1024 C) 100 D) 1042

A

Identify a characteristic that is a disadvantage of cloud-based hosting. A) Loss of control over data location B) Ongoing support costs C) Increased management requirements D) Significant development effort

A

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A) database application B) database design C) data field D) data model

A

A ________ is a number used to encrypt data. A) key B) honeypot C) cookie D) cache

A

A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. A) mart B) mine C) cube D) model

A

A data model is a ________. A) Logical representation of database data B) Repository of unprocessed data C) Collection of isolated databases D) Set of programs used to retrieve data

A

A database is an example of a ________. A) repository B) procedure C) linkage D) value chain

A

A(n) ________ is a network of activities that generate value by transforming inputs into outputs. A) business process B) competitive strategy C) linkage D) information system

A

Being linked to a network of highly regarded contacts is a form of ________. A) social credential B) viral marketing C) crowdsourcing D) human capital

A

Carla, a restaurateur who is new to the field, meets a veteran chef and restaurateur, Giovanni. Carla wishes to analyze the purchasing pattern of her customer base. Which of the following is most likely to be a piece of sound advice that Giovanni would offer to Carla? A) Carla should use her restaurant's distributed systems to know more about her customers' purchasing patterns. B) Carla should avoid using the restaurant's integrated system to analyze her customers' purchasing patterns. C) Carla should support strategic and less structured managerial decisions to ensure that standardization occurs. D) Carla should support less specific and fluid managerial decisions to ensure that standardization occurs.

A

ERP vendors sometimes train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________. A) train the trainer B) top-down training C) on-the-job training D) employ the employer

A

Enterprise application integration is a ________. A) suite of software applications that consolidates existing systems by providing layers of software that connect applications together B) strategy that uses business process management to radically enhance customer service experience from any customer base C) suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform D) suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service

A

Identify a key difference between managerial decisions and operational decisions. A) Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities. B) Managerial decisions are corporate decisions, whereas operational decisions concern the utilization of resources. C) Managerial decisions deal with the allocation of resources, whereas operational decisions concern broad-scope, organizational issues. D) Operational decisions have broad scope, whereas the scope of managerial decisions is limited to day-to-day activities.

A

Identify a statement that differentiates information technology from information systems. A) One can buy information technology, but not information systems. B) People are an important component of information technology, but not of information systems. C) Information systems are a subset of information technology. D) Unlike information system, information technology is an assembly of hardware, software, data, procedures, and people.

A

If the content posted on a social networking site represents reasonable criticism of an organization's products or services, the best response would most likely be to ________. A) leave it B) edit it C) delete it D) report it

A

In a Business Process Modeling Notation (BPMN) diagram, ________ represent decisions and usually contain a question that is answered with yes or no. A) diamonds B) circles C) rectangles D) squares

A

In a business process, resources are _____. A) people or computer applications that are assigned to roles B) collections of procedures and activities C) the total number or points of work that can be accomplished in each scrum period D) collections of related tasks that receive inputs and produce outputs

A

In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. A) data integrity problem B) crow's-foot paradigm C) adaptation conflict D) security problem

A

In an information systems (IS) department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media. A) operations B) technology C) development D) maintenance

A

In business process management (BPM) an as-is model ________. A) documents the existing business process B) contrasts the former and current states of a business process C) represents the desired state of a business process D) represents the ideal state of a business process

A

In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y" or "If they're buying Y, sell them X." A) cross-selling B) value added selling C) break-even D) double-sales

A

In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works. A) phased B) pilot C) parallel D) plunge

A

Managerial decisions are decisions about ________. A) the utilization of resources B) broad organizational issues C) the day-to-day activities D) strategic decision making

A

Most social media companies rely on ________ for revenue. A) advertising B) software license fees C) venture capital D) controlled, fixed interfaces

A

OLAP stands for ________. A) online analytical processing B) object-based lead analysis procedure C) object-oriented analytical protocol D) organizational lead analysis process

A

Porter defined value as the ________. A) amount of money that a customer is willing to pay for an offering B) extent of after-sale service provided to customers C) perceived satisfaction of the customers and sellers after a transaction D) actual money exchanged in return of a product/service

A

Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function? A) finalizing B) planning C) doing D) starting

A

Push publishing delivers business intelligence ________. A) according to a schedule or as a result of an event or particular data condition B) through reporting, data mining, and knowledge management C) by obtaining, cleaning, organizing, relating, and cataloging source data D) in response to requests from users

A

RFM analysis is used to analyze and rank customers according to their ________. A) purchasing patterns B) propensity to respond to a marketing stimulus C) socio-economic status D) motivation and needs

A

Success metrics are also known as ________. A) key performance indicators KPI. B) performance scale identifiers PSI. C) vanity metrics D) conversion rates

A

Team roles, responsibilities, and authorities are established during the ________ phase of a project. A) starting B) planning C) doing D) evaluating

A

The ________ revenue model offers users a basic service for free, and then charges a premium for upgrades or advanced features. A) freemium B) pay-per-click C) licensing D) premium

A

The address bar reads "http://www.baron-olufsen.com/" when one visits the Web page of the luxury brand Baron & Olufsen. This information in the address bar is the ________ of the Web page. A) URL B) IP address C) Protocol D) Email ID

A

The cost of the business process is the sum of the cost of the inputs and the ________. A) cost of the activities B) cost of the outputs C) value of the outputs D) value of the products

A

The first phase of the systems development life cycle (SDLC) is ________. A) defining the system B) implementing the system C) determining the requirements D) maintaining the system

A

The first step in developing a social media information system (SMIS) is to ________. A) define the goals of the organization B) identify the metrics C) identify the target audience D) define the value of the organization

A

The first step in developing a social media information system SMIS. is to ________. A) define the goals of the organization B) identify the metrics C) identify the target audience D) define the value of the organization

A

Which of the following statements is true about the relationship between business processes and information systems? A) A business process need not relate to any information system, but an information system relates to at least one business process. B) Information systems incorporate all business process activities and hence, should be developed before business processes. C) The relationship between business processes and information systems is one-to-one. D) Developing information systems before business processes ensures that all activities are considered in the development process.

A

Which of the following statements is true of business process designs? A) Most process designs require people to work in new ways. B) Business process designs do not involve the need to follow different procedures. C) Business process designs should be accompanied by a change in management. D) Process designs very rarely attract employee resistance.

A

Which of the following value chain activities involves transforming raw materials into a finished product or service? A) operations B) inbound logistics C) marketing D) maintenance

A

Who among the following are most likely to use asynchronous communication? A) members of a team who work in different time zones B) managers who work in the same office C) employees who work in an assembly line D) a group of directors who regularly meet for board meetings

A

_______ decisions are concerned with day-to-day activities A) Operational B) Strategic C) Managerial D) Tactical

A

________ activities are supported by structured process. A) Operations and manufacturing B) Sales and marketing C) Media and human resource D) Media and customer service

A

________ are predesigned procedures for using software products. A) Inherent processes B) Triggers C) Modules D) Service descriptions

A

________ is a term that refers to the level of detail represented by the data. A) Granularity B) Intricacy C) Interoperability D) Complexity

A

________ is the use of information technology to support the sharing of content among networks of users. A) Social media B) Content publishing C) Multimedia D) Programming

A

________ metrics keep track of goals achieved by an organization. A) Success B) Vanity C) Performance D) Scalar

A

________ processes span an organization and support activities in multiple departments. A) Enterprise B) Inter-enterprise C) Strategic D) Reactive

A

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships. A) User-generated content B) Folksonomy C) Secondary data D) Continuous data

A

Identify a key difference between managerial decisions and operational decisions. A) Managerial decisions are corporate decisions, whereas operational decisions concern the utilization of resources. B) Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities. C) Managerial decisions deal with the allocation of resources, whereas operational decisions deal with the utilization of resources. D) Operational decisions have broad scope, whereas the scope of managerial decisions is limited to day-to-day activities.

B

Identify a primary purpose of collaboration. A) eliminating individual tasks B) making decisions C) evaluating coworkers D) performing routine tasks

B

Identify a task that should be performed during the planning phase of project management. A) reporting project progress B) determining the schedule C) performing project tasks D) preparing archival documents

B

Identify the top two ERP vendors. A) Epicor and Oracle B) SAP and Oracle C) Microsoft Dynamics and Infor D) Microsoft Dynamics and SAP

B

If a defined project is determined to be feasible in the systems development life cycle (SDLC), the next step is to ________. A) create and test components B) form the project team C) maintain the system D) assess process results

B

In ________, statistical techniques can identify groups of entities that have similar characteristics. A) regression analysis B) cluster analysis C) supervised data mining D) neural networks

B

In a Business Process Modeling Notation (BPMN) diagram, a dotted arrow depicts the flow of ________ in the process. A) resources B) messages and data C) tasks and activities D) control

B

In the context of information systems, which of the following statements is true of data characteristics? A) Data generated should be in excess of what is required. B) An appropriate relationship should exist between the cost of data and its value. C) Data should be relevant to the context, not necessarily to the subject. D) Freely available data is always accurate and timely.

B

In the context of knowledge management systems, ________ are rule-based systems that encode human knowledge in the form of If/Then rules. A) expert networks B) expert systems C) intelligent systems D) decision-making systems

B

Key escrow is a(n) ________. A) protocol used to secure communication over the internet B) safety procedure that allows a trusted party to have a copy of the encryption key C) device that prevents unauthorized network access D) encryption algorithm that uses both public and private keys

B

Machine code ________. A) is understandable by humans B) cannot be modified by humans C) is written by humans D) cannot be processed by computers

B

Porter's five forces model is used to assess ________. A) lifecycles of products B) industry structures C) market share D) internal competition

B

Project metadata is data that is ________. A) summarized after the completion of the project B) utilized to manage the project C) developed to design new offerings D) used in documents to describe recommended solutions

B

The CPU stores the results of computations in ________. A) floppy disks B) main memory C) secondary memory D) network cards

B

The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision A) managerial B) strategic C) operational D) procedural

B

The term open source means that the source code of the program is ________. A) less stable and platform dependent B) available to the public C) highly protected and obtained only by having a license D) available only to carefully vetted contractors

B

The work done during ________ phase is either to fix the system so that it works correctly or to adapt it to changes in requirements. A) implementation B) maintenance C) requirements analysis D) component design

B

To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization. A) metric of a relationship B) strength of a relationship C) value of human capital D) customer lifetime value

B

To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________. A) service descriptions B) industry-specific solutions C) inherent processes D) DIY modules

B

Version management systems ________. A) lack the features needed to track changes to shared documents B) provide features and functions to accommodate concurrent C) prevent more than one user from checking out the same D) provide version control to limit and direct user activity

B

Version-management systems ________. A) lack the features needed to track changes to shared documents B) provide features and functions to accommodate concurrent work C) prevent more than one user from checking out the same document D) provide version control to limit and direct user activity

B

When an organization has inconsistent duplicated data, it is said to have a(n) ________. A) information silo B) data integrity problem C) error of omission D) data segregation problem

B

When presenting an idea to his colleagues, Marcus failed to consider others' views and got defensive when people asked him questions. This situation indicates that Marcus lacks ________ skills. A) systems thinking B) collaboration C) abstract reasoning D) experimentation

B

Which of the following is a critical characteristic of good information? A) ease of creation B) accuracy C) low cost D) abundance of details

B

Which of the following is a form of outsourcing hardware infrastructure in the cloud? A) acquiring licensed products B) Infrastructure as a service (IaaS) cloud hosting C) Software as a Service (SaaS) D) Platform as a Service (PaaS)

B

According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems. A) software B) data C) hardware D) procedure

D

According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the growth in team capability criterion? A) rewarding accomplishment B) managing many versions of content C) supporting intra-team training D) building team spirit

C

A ________ detects the speed that a given device can handle and communicates with it at that speed. A) Codec B) Modem C) Switch D) Port

C

A ________ is a hierarchical arrangement of criteria that predict a classification or a value. A) value chain B) cluster analysis C) decision tree D) neural network

C

A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function. A) business stature B) business analysis C) business process D) business policy

C

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow

C

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves. A) data link layer B) data mine C) data warehouse D) data model

C

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. A) Database B) Application C) Network D) Server

C

A database is used instead of a spreadsheet when ________. A) lists of data involve a single theme B) structures of data lists are simple C) lists involve data with multiple themes D) users do not want to store all data in one place

C

A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________. A) enhancing the products B) differentiating the industry C) establishing alliances D) locking in customers

C

A group of shoe manufacturing firms purchases raw materials collectively from a single supplier to obtain better deals. This is an example of obtaining competitive advantage by ________. A) differentiating the industry B) locking in customers C) establishing alliances D) enhancing the products

C

A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________. A) 311 B) 555 C) 113 D) 545

C

A stored procedure is a ________. A) program stored in a database that keeps the database consistent when certain conditions arise B) history of actions executed by a database management system C) computer program stored in a database that is used to enforce business rules D) data structure that improves the speed of data-retrieval operations in a database

C

A database administrator of an organization constantly manages the processing rights and responsibilities of employees. This is an example of a(n) ________ task. A) development B) recovery C) adaptation D) operational

D

Name three ways that information systems can improve both dimensions of process quality

Change structure, change process, or change both

Name three disadvantages of in-house hosting vs cloud hosting.

Cost and demand uncertainties/obsolescence, Personnel and management requirements, Significant capital, significant development, and Maintenance costs, support costs

A ________ is a set of rules that programs on two communicating devices follow. A) Codec B) Cloud C) Packet D) protocol

D

A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access. A) PC B) mainframe computer C) server D) mobile device

D

A ________ is also called "the brain" of the computer. A) network card B) motherboard C) thumb drive D) central processing unit

D

A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials. A) system analyst B) consultant C) programmer D) technical writer

D

A client-server application that requires nothing more than a browser is called ________. A) a native application B) adware C) firmware D) a thin-client application

D

Name the five components of an information system.

Hardware, software, data, procedures, people

How does IT differ from IS?

IT can be bought, people are involved in IS (therefore, can't be bought)

Name four of the five types of process implementation.

Lock in customers and buyers, lock in suppliers, reduce costs, establish alliances, and raise barriers to market entry

What is a message broken into in order to move across the Internet?

Packets


Conjuntos de estudio relacionados

Science Chapter 19.1 & 19.2 Quiz

View Set

ATI Dosage Calculation: Pediatric Medications

View Set

review questions Safety, security, and Emergency Preparedness

View Set

Chapter 9: Vitamin Overview and Fat-Soluble Vitamins

View Set

Trigonometry Sine and Cosine Values

View Set

Chapter 11&12 Practice Test Taxation II

View Set

ACCT 4000 Exam 3 (Ch. 9, 10, 11)

View Set