Midterm Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

33. Which of the following statements is true of retargeting? (Ch. 7)

"B) It employs personalized ads to direct shoppers back to a retailer's Website they previously

48. Which of the following statements is true of network-management software? (Ch. 6)

"B) With network-management software, a manager on a networked personal computer can scan for

50. Which of the following statements is true of product lifecycle management (PLM) software? (Ch. 8)

B) It provides documents required for FDA and environmental compliance.

41. is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results. (Ch. 6)

B) Search engine optimization

43. According to the classification of enterprise resource planning (ERP) vendors, vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations. (Ch. 8)

B) Tier II

37. consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes. (Ch. 6)

B) Web services

34. In terms of information systems, Wikipedia would be an example of . (Ch. 1)

B) a group IS

37. As an organization's purchasing systems generate purchase orders and the items ordered are received, information is sent to the system to manage the amounts owed by the organization. (Ch. 8)

B) accounts payable

48. Unlike B2C sites, some B2B sites . (Ch. 7)

B) allow price negotiations

28. The fiber-optic cables that span the globe over land and under sea make up the Internet . (Ch. 6)

B) backbone

43. In a __________ , all network devices are connected to a common backbone that serves as a shared communications medium. (Ch. 6)

B) bus network

29. Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only when . (Ch. 7)

B) buyers live in a state where the merchant has a physical presence

54. E-commerce sites are able to keep the amount of data entry errors to a minimum . (Ch. 7)

B) by having the buyers enter products information themselves

35. Which of the following is NOT one of the three basic components of a successful e-commerce model? capital commerce community content (Ch. 7)

B) capital

53. Suppose a business wishes to have access to servers, and storage devices, but does not want to buy them. What is their best choice? (Ch. 6)

B) cloud computing - infrastructure as a service

41. Information systems applications help sales and marketing professionals with all of the following EXCEPT . (Ch. 1)

B) computer-assisted manufacturing

43. The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization. (Ch. 5)

B) data administrator

54. At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________. (Ch. 5)

B) data lifecycle management

47. Starting from monthly sales data, if you wish to get weekly sales data, use the ___ feature. (Ch. 5)

B) drill down

30. A(n) is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business. (Ch. 8)

B) enterprise system

27. In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT: (Ch. 2)

B) finance and accounting

33. The value of information is directly linked to how it helps decision makers achieve their organization's . (Ch. 1)

B) goals

56. Calligraph Publishing Company has created a system for storing every piece of data about every one of its books, both those that have already published and those that are still in production. The production team can input and access information about each book's format, editors can specify which procedures are in use, salespeople can input and access information about each book's sales history and availability, and even some external partners are allowed to access some data. This is an example of a(n) . (Ch. 1)

B) knowledge management system

44. A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) . (Ch. 1)

B) management information system MIS)

48. Purchasing uses information from the to place purchase orders for raw materials with qualified suppliers. (Ch. 8)

B) materials requirement plan

56. Social journalism or citizen journalism . (Ch. 6)

B) may not be as reliable as mainstream media sources

36. A(n) ______ is an HTML code, not visible on a displayed Web page, that contains keywords representing the Website's content, which search engines use to build indexes pointing to the Website. (Ch. 7)

B) meta tag

49. In most large organizations, the IS department is divided into the following functions . (Ch. 2)

B) operations, development, and support

50. After entering data into a relational database, users can make all of the following basic data manipulations except: (Ch. 5)

B) organizing

40. All of the following are positive driving forces that influence chance according to Lewin's Theory of Force Field Analysis, EXCEPT: (Ch. 2)

B) past performance

33. In batch processing systems, data processing is done data capture. (Ch. 8)

B) some time later than

42. Which of the following is NOT one of the four main components in Leavitt's Diamond? (Ch. 2)

B) systems

46. Consumers prefer mobile commerce sites . (Ch. 7)

B) that are convenient and efficient to use

26. The ancestor of the Internet was . (Ch. 6)

B) the ARPANET

41. Which of the following is NOT one of the key website performance measures commonly used by online retailers? (Ch. 7)

B) total sales

52. Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database. In terms of the characteristics of big data, Haley is dealing with ________. (Ch. 5)

B) variety

51. To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties? (Ch. 5)

D) currency

51. To improve traffic to your e-commerce site, . (Ch. 7)

C) acquire links to your site on other sites

38. Java allows small programs, called , to be embedded with an Hypertext Markup Language (HTML) document. (Ch. 6)

C) applets

41. In the context of enterprise resource planning (ERP) systems, the most efficient and effective ways to complete a business process are called . (Ch. 8)

C) best practices

31. The smallest piece of data used by a computer is a(n) _____. (Ch. 5)

C) bit

52. Which of the following is NOT a task typically associated with the systems analyst role? (Ch. 2)

C) collaborating with others to build a software product from scratch

49. Suppose a new tech startup wants to define the data model. They would then ____. (Ch. 5)

C) create the entity-relationship model

58. Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are . (Ch. 1)

C) cybercriminals

42. A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database. (Ch. 5)

C) data definition language

48. A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making. (Ch. 5)

C) data mart

44. If you shop on Amazon.com, . (Ch. 7)

C) depending on which state you are in, you may or may not pay tax

. (Ch. 7)"

C) disintermediation

27. The elimination of organizations that operate between the producer and the consumer is called _____. (Ch. 7)

C) disintermediation

29. The performance levels of radically new 'high-tech' products usually improve with newer versions. Such types of products are known as (Ch. 2)

C) disruptive innovations

49. A customer relationship management (CRM) system helps a company in managing . (Ch. 8)

C) distribution and accounting

54. Suppose a small business is using the hosted model for its enterprise software. Which of the following will not be an issue they will he worried about? (Ch. 8)

C) employing full-time IT professionals to manage its resources

48. You might be an information systems worker if you . (Ch. 2)

C) enjoy learning new techniques and enjoy working with people

45. A(n) can replace many applications with one unified set of programs, making the system easier to use and more effective. (Ch. 1)

C) enterprise resource planning system

38. All of the following are potential drawbacks to outsourcing EXCEPT: (Ch. 2)

C) greater focus on core business

55. Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an online e-commerce site, Tom's has been able to enjoy the advantage of . (Ch. 7)

C) increasing accuracy

36. In the context of purchasing systems involved in the traditional transaction processing systems, when a(n) arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. (Ch. 8)

C) invoice

44. A key feature of an enterprise system is that . (Ch. 8)

C) it employs a database of key operational and planning data that can be shared by all

45. A satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles. (Ch. 6)

C) low earth orbit LEO)

34. A(n) _____ is a field or set of fields in a record that uniquely identifies the record. (Ch. 5)

C) primary key

37. The action of including only some columns for output while retrieving data is known as ____. (Ch. 5)

C) projecting

41. Suppose you wish to find what tables are in a database, what fields they have, and how they are related you would review the _____. (Ch. 5)

C) schema

59. All of the following are examples of ethical issues related to data and information systems EXCEPT . (Ch. 1)

C) the cost of system development

16. A telecommunications protocol is any material substance that carries an electronic signal to support communications between a sending and receiving device. (Ch. 6)

FALSE

17. A customer relationship management (CRM) system helps a company to plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. (Ch. 8)

FALSE

17. Smart card use is restricted to data associated with financial transactions. (Ch. 7)

FALSE

18. A designer would use computer aided manufacturing (CAM) to create, analyze, and modify the design of a component. (Ch. 8)

FALSE

19. "Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems. (Ch. 2)

FALSE

19. A personal area network (PAN) is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building. (Ch. 6)

FALSE

19. Product lifecycle management (PLM) typically includes customer relationship management (CRM) software. (Ch. 8)

FALSE

19. Smart cards are less protected from misuse that conventional credit, charge, and debit cards because the smart card information is not encrypted. (Ch. 7)

FALSE

2. An organization's structure is independent of its goals and approach to management. (Ch. 2)

FALSE

2. The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than that for a typical consumer-to-consumer (C2C) e-commerce. (Ch. 7)

FALSE

20. A procurement card is an attachment to an e-mail message or data embedded in a Web site that verifies the identity of a sender or a Web site. (Ch. 7)

FALSE

20. A wide area network (WAN) is a telecommunications network that connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits. (Ch. 6)

FALSE

20. One of the final steps in installing and using a large database involves "telling" the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user. (Ch. 5)

FALSE

16. The information systems operations group is responsible for the day-to-day running of IS hardware to process the organization's information systems workload. (Ch. 2)

TRUE

13. Consumers who have enrolled in mobile banking and downloaded the mobile application to their cell phones can check their credit card balances before making major purchases. (Ch. 7)

TRUE

13. Organizations invest heavily in information systems to improve customer service. (Ch. 1)

TRUE

15. In an organization, a transaction processing system (TPS) supports routine operations associated with its business processes. (Ch. 8)

TRUE

16. In the context of the relational database model, projecting involves eliminating columns in a table. (Ch. 5)

TRUE

16. Since the 1950s, computers have been used to perform common business applications. (Ch. 1)

TRUE

16. The bill of materials (BOM) serves as a recipe of ingredients needed to make each item an organization manufactures. (Ch. 8)

TRUE

1. A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market. (Ch. 7)

TRUE

1. A database, a database management system, and the application programs that use the data, make up a database environment. (Ch. 5)

TRUE

1. Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and knowledge management systems. (Ch. 8)

TRUE

1. While information systems were once primarily used to automate manual processes, they have transformed the nature of work and the shape of organizations themselves. (Ch. 2)

TRUE

10. A database must reflect the business processes of an organization. (Ch. 5)

TRUE

10. Large organizations were the first to take on the challenge of implementing enterprise resource planning (ERP). (Ch. 8)

TRUE

10. Perceived usefulness and ease of use of a system influence an individual's attitude toward the system. (Ch. 2)

TRUE

11. An integrated database for the entire organization makes it easier to share data among different business units. (Ch. 8)

TRUE

11. It is possible to restrict access to data depending on the database user's privileges. (Ch. 5)

TRUE

11. Video content can be placed on the Internet using the same approach as a blog. (Ch. 6)

TRUE

12. The diffusion of innovation theory can be useful in planning the rollout of a new information system. (Ch. 2)

TRUE

is a Visa-patented process that provides an instantaneous rating of a transaction's potential for fraud to the financial institution that issued the card. (Ch. 7)

Advanced Authorization

Specialized information systems include a wide range of artificial intelligence systems that can simulate intelligence processes. (Ch. 1)

human

Suppose we have a table that stores student data. In that table we have a field - Student ID - that uniquely identifies each student. This field is known as the ____. (Ch. 5)

primary key or key field

If you have classified your customers as 'college-grads', 'young parents', or 'singles,' you used a technique known as market . (Ch. 7)

segmentation

In business, SME stands for . (Ch. 8)

small and medium-sized enterprises

2. With an online transaction processing (OLTP) system, each transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions. (Ch. 8)

FALSE

43. Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system? (Ch. 1)

A) All of them

49. When you connect your computer to a printer using , the distance between them cannot be longer than 30 feet. (Ch. 6)

A) Bluetooth

to handle the business of registering domain names. (Ch. 6)"

B) accredited domain name registrars

36. is a markup language designed to transport and store data on the Web. (Ch. 6)

B) Extensible Markup Language XML)

33. is a visa program that allows skilled employees from foreign lands into the United States. (Ch. 2)

B) H-1B

. (Ch. 6)"

B) can use hosting services

39. A small business is currently using a paper-based system for billing, which is slow and error- prone. Which system upgrade will make the process faster and have fewer errors? (Ch. 8)

B) Source data automation

34. are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, and preparing input and output. (Ch. 2)

B) System operators

40. Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as . (Ch. 6)

B) Web browsers

. (Ch. 2)"

C) early majority

31. The process of defining relationships among data to create useful information requires . (Ch. 1)

C) knowledge

31. The information about invoices to customers is tracked by system. (Ch. 8)

C) transaction processing system

36. All of the following are functions of a knowledge management system EXCEPT: (Ch. 1)

D) designing information systems.

36. Each attribute in a relational database model can be constrained to a range of allowable values called a _____. (Ch. 5)

D) domain

47. When compared to traditional commerce . (Ch. 7)

D) e-commerce transactions can save money

35. Which of the following is NOT an organizational complement? (Ch. 1)

D) familiar processes

32. In a supply chain, involve the transformation, movement, and storage of supplies and raw materials. (Ch. 2)

D) physical flows

12. QuickBooks is an accounting application used by many large, multinational organizations. (Ch. 1)

FALSE

22. A management information system (MIS) is exactly the same as a transaction processing system (TPS); the two terms can be used interchangeably. (Ch. 1)

FALSE

22. It is safe to assume that personal information will be secure with businesses, because security breaches of information systems are not common. (Ch. 7)

FALSE

22. Network management software is a system software that controls the computer systems and devices on a network and allows them to communicate with each other. (Ch. 6)

FALSE

24. For someone to be a good CIO, technical ability is the most important characteristic. (Ch. 2)

FALSE

27. When a business finds that many of its business applications have to be updated or rewritten, it will be better if they replace them with an ERP system. (Ch. 1)

FALSE

3. A set of random or unrelated tasks performed to achieve a definite outcome is called a process. (Ch. 1)

FALSE

30. Cybercriminals are hackers who try to steal business information or government data related to a nation's infrastructure, all for personal gain. (Ch. 1)

FALSE

4. An attribute is a general class of people, places, or things for which data is collected, stored, and maintained. (Ch. 5)

FALSE

4. In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence. (Ch. 7)

FALSE

4. Reengineering and continuous improvement have the same definition. (Ch. 2)

FALSE

5. It is acceptable to for transaction processing systems to capture inaccurate data. (Ch. 8)

FALSE

5. Using a computer to forecast future sales and order more inventory before a shortage can occur is an example of information system feedback. (Ch. 1)

FALSE

6. A computer-based information system (CBIS) is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, and process data into information, but the CBIS does not include software. (Ch. 1)

FALSE

6. A sustaining innovation is one that initially provides a lower level of performance than the marketplace has grown to accept. (Ch. 2)

FALSE

is a popular programming language for client-side applications that enable a user to create interactive Web pages that respond to user actions. (Ch. 6)

JavaScript

is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision. (Ch. 1)

Knowledge

is a strategy by which an organization determinedly and systematically gathers, organizes, stores, analyzes, and shares its collective knowledge and experience. (Ch. 1)

Knowledge management

Sarah, as the head of a business division, wants to set up a network access account for a new employee. She should call the to get this done. (Ch. 2)

LAN administrator or

is a theory that proposes that every organizational system is made up of four components so that any change in one of these elements will necessitate a change in the other three elements. (Ch. 2)

Leavitt's diamond

Data defense is about __________. (What's Your Data Strategy )

Minimizing downside risk

Which company developed the hypertension digital medicine program given as example that helped 71% of participating patients lower their blood pressure to normal range within 90 days? (IT Transformation Health Care Needs)

Ochsner Health System

Optimizing data analytics, modeling, visualization, transformation, and enrichment are the core activities in the __________. (What's Your Data Strategy )

Offensive approach to data strategy

is a long-term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific function. (Ch. 2)

Outsourcing

is the process of tailoring Web pages to specifically target individual consumers. (Ch. 7)

Personalization

exchanges are owned and operated by a single company. (Ch. 7)

Private

convert a program design developed by a systems analyst or software developer using one of many computer languages. (Ch. 2)

Programmers

means the ability of a product or a service to meet or exceed customer expectations. (Ch. 2)

Quality

is the activity of building information systems to meet users' needs. (Ch. 1)

Systems development

13. The efficiency of processes for managing customer payments can vary; some processes are more efficient than others. (Ch. 8)

TRUE

14. A relational model splits the information up into many two dimensional data structures. (Ch. 5)

TRUE

14. Implementation of an enterprise resource planning (ERP) system provides an organization with an opportunity to also upgrade the information technology that it uses. (Ch. 8)

TRUE

14. Opportunities in information systems are available to people from different parts of the world. (Ch. 2)

TRUE

16. The three basic components of a successful e-commerce model include content, commerce, and community. (Ch. 7)

TRUE

17. One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically. (Ch. 5)

TRUE

18. 4G will deliver 3 to 20 times the speed of 3G networks for mobile devices. (Ch. 6)

TRUE

9. An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations. (Ch. 7)

TRUE

In the context of enterprise resource planning (ERP) system, a(n) is a set of coordinated and related activities that takes one or more types of input and creates an output of value to the customer of that process. (Ch. 8)

business process

Laptops are a good example of because they are gradually displacing desktop computers due to new and better performance characteristics. (Ch. 2)

disruptive innovation

Using , Web users can jump between Web pages stored on various Web servers, creating the illusion of interacting with one big computer. (Ch. 6)

hyperlinks

A(n) _____ is a database management system that stores the entire database in random access memorey (RAM). (Ch. 5)

in-memory database (IMDB)

Of the five categories of innovation adopters, are always the first to try new products and ideas. (Ch. 2)

innovators

Results from one TPS would become to other systems. (Ch. 8)

input

In any organization, such as raw materials, labor, facilities, equipment, and knowledge, are needed to transform them to outputs in a way that increases the input's value. (Ch. 2)

inputs

The technology used to create the Internet is also being applied within companies and organizations to create , which allow people within an organization to exchange information and work on projects. (Ch. 1)

intranets

Suppose a small business owner wishes to automate their reorder process. They will need to integrate the sales management system with their system. (Ch. 8)

inventory

Suppose a small business owner does not invest in implementing an expensive enterprise resource planning (ERP) systems, she can choose to use software and modify the code to suit her needs. (Ch. 8)

open source

The group of a typical information systems organization is responsible for the day-to-day running of IS hardware to process the organization's information systems workload. (Ch. 2)

operations

In a transaction processing system (TPS), the system is sometimes referred to as the lifeblood of an organization. (Ch. 8)

order processing

For each type of IS (personal, group, enterprise), there are that must be in place to ensure successful implementation and use of the system. (Ch. 1)

organizational complements

refers to organizational subunits and the way they relate to the overall organization. (Ch. 2)

organizational structure

A(n) _____ is a field or set of fields that uniquely identify a record. (Ch. 5)

primary key

A is a temporary endeavor undertaken to create a unique product, service, or result. (Ch. 1)

project

The is a credit card-sized device with an embedded microchip to provide electronic memory and processing capability. (Ch. 7)

smart card

In a transaction processing cycle, capturing data at its source and recording it accurately in a timely fashion with minimal manual effort and in an electronic or digital form so that it can be directly entered into the computer is known as . (Ch. 8)

source data automation

A(n) is a professional in a developmental group of an information systems department who assists in choosing and configuring hardware and software, matching technology to users' needs, monitoring and testing the system in operation, and troubleshooting problems (Ch. 2)

system analyst

Many organizations employ which capture and process the detailed data necessary to update records about the fundamental business operations of an organization. (Ch. 8)

transaction processing systems (TPSs)

While building a data warehouse, you are converting dates to months. This second step in the ETL process is known as ______. (Ch. 5)

transformation

. (Ch. 2)"

D) all of these

42. Payroll transactions and billing are typically done via . (Ch. 8)

D) batch processing

One zettabyte is exabytes of data. (Ch. 1)

1,000

. (Ch. 6)"

B) hot spot

47. In a manufacturing enterprise resource planning (ERP) system, demand management__________. (Ch. 8)

"D) refines a production plan by determining the amount of weekly or daily production needed to

All credit card customers are protected by law from paying more than __________ for fraudulent transactions. (Ch. 7)

$50

is an outsourcing arrangement where the organization providing the service is located in a country different from the firm obtaining the services.

(Ch. 2) Offshore outsourcing

In the technology acceptance model (TAM), is defined as the degree to which individuals believe that use of the system will improve their performance.

(Ch. 2) perceived usefulness

_______ is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets.

(Ch. 5) Hadoop

If an organization is taking a "store everything" approach to data, it will save all the data in its raw and unaltered form in a _____.

(Ch. 5) data lake

For m-commerce to work effectively, the interface must be so good that it is nearly as easy to make a purchase on a device as it is on a laptop or desktop computer.

(Ch. 7) mobile

Suppose two businesses (Alpha Inc. and Beta Inc.) are undertaking ERP implementation projects. Alpha Inc. has a host of other applications that need integration with the new ERP. Beta Inc. has users who are showing resistance to the new ERP system. Among these, the Inc. project is more likely to become a failure.

(Ch. 8) Alpha

Mobile commerce destinations, used to place orders and conduct business through mobile devices, are designated with a domain ending in . (Ch. 7)

.mobi

What is the labor productivity growth (%) in the healthcare industry according to the chart in the article? (IT Transformation Health Care Needs)

0.005

By using predictive analytics to identify high-risk patients and develop a proactive care-management program for them, Massachusetts General Hospital saw these patients' hospitalizations drop by __________. (IT Transformation Health Care Needs)

0.2

What is the average tenure of Chief Data Officers according to Gartner? (What's Your Data Strategy )

2.4 years

How much did the violation of privacy lower the interest in purchasing a product or service shown in the ad in the group exposed to unacceptable sharing than in the other groups? (Ads That Dont Overstep)

24%

The article refers to a study that found that less than __________ of an organization's structured data is actively used in making decisions (What's Your Data Strategy )

50%

32. Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites? (Ch. 7)

A) Business-to-business B2B) e-commerce

51. is the use of software to assist in the creation, analysis, and modification of the design of a component or product. (Ch. 8)

A) Computer-aided design

57. is a good site to develop your professional network. (Ch. 6)

A) LinkedIn

35. encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. (Ch. 2)

A) Supply chain management

30. consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. (Ch. 6)

A) The Web

39. Federal Express (FedEx) was one of the first large companies to empower customers to serve themselves at their convenience through the use of . (Ch. 1)

A) a corporate extranet

50. When you are looking for a 'hotspot', you are searching for . (Ch. 6)

A) a wireless access point

38. When the IS organization and its resources are focused on efforts that support the key objectives defined in the managers' strategic plan for the business, the organization is in . (Ch. 1)

A) alignment

51. Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of . (Ch. 1)

A) business analytics

55. Harrison works at a nationally known grocery store chain. He is analyzing sales data from the past five years to determine which low-selling products should be discontinued. Harrison is most likely a(n) . (Ch. 1)

A) data scientist

53. Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______. (Ch. 5)

A) data steward

31. Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization? (Ch. 2)

A) diffusion of innovation theory

39. A _____ is a simple database program whose records have no relationship to one another. (Ch. 5)

A) flat file

32. A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is . (Ch. 1)

A) flexible

58. The world-wide-web uses protocol for transmitting content. (Ch. 6)

A) hyper-text transfer

43. Conversion to an e-commerce or m-commerce system enables organizations to . (Ch. 7)

A) improve the level of customer service

47. A is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. (Ch. 6)

A) metropolitan area network MAN)

40. A _______ is a credit card issued to selected employees to streamline the traditional purchase order and invoice payment processes. (Ch. 7)

A) procurement card

33. A collection of fields all related to a single object, activity, or individual is a(n) _____. (Ch. 5)

A) record

47. Which of the following is NOT a potential drawback to downsizing? (Ch. 2)

A) reduced payroll costs

48. To keep information beyond reach of unauthorized users, is to keep the information . (Ch. 1)

A) secure

26. Providing value to a is the primary goal of any organization. (Ch. 2)

A) stakeholder

33. Domain names must always have at least parts, with each part separated by a dot (period). (Ch. 6)

A) two

38. A small and medium-sized enterprise (SME) is a legally independent enterprise with employees. (Ch. 8)

A) up to 500

44. You would use Query by Example, if _____. (Ch. 5)

A) you wish to use a visual approach to query building

What did a study related to the enforcement of the Dutch law requiring websites to inform visitors of covert tracking reveal? (Ads That Dont Overstep)

Advertisement click-through rates dropped.

37. Which of the following does not is NOT an application software? (Ch. 1)

B) Android

31. Which of the following is a markup language for defining the visual design of a Web page or group of pages? (Ch. 6)

B) Cascading Style Sheets CSS)

39. Suppose, you need to advise someone about getting a certification. Which of the following will be appropriate advice? (Ch. 2)

B) Certifications are vendor-specific

40. involves reentering data that was not typed or scanned correctly. (Ch. 8)

B) Data correction

45. With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet. (Ch. 5)

B) Database as a Service

35. _____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization. (Ch. 5)

B) Enterprise data modeling

is a subset of e-commerce where all the participants are organizations. (Ch. 7)

Business- to-business (B2B) e-commerce

is a form of e-commerce in which customers deal directly with an organization and avoid intermediaries. (Ch. 7)

Business-to-consumer (B2C) e-commerce

29. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses addresses to provide for many more devices. (Ch. 6)

C) 128-bit

46. _____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling. (Ch. 5)

C) Big data

53. Because of commerce sites, anyone can become a merchant online. (Ch. 7)

C) C2C

37. is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. (Ch. 7)

C) Explicit personalization technique

52. Which of these is an advantage of the hosted software model? (Ch. 8)

C) Faster system start-up

52. If your home air conditioner has an IP address, it is part of the . (Ch. 6)

C) Internet of Things

54. You wish to learn a programming language that can be used on any computer. What language would it be? (Ch. 6)

C) Java

31. divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics. (Ch. 7)

C) Market segmentation

42. _______ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards. (Ch. 6)

C) Near field communication NFC)

40. _____ is a special-purpose programming language for accessing and manipulating data stored in a relational database. (Ch. 5)

C) Structured Query Language SQL)

27. is a communication standard that enables computers to route communications traffic from one network to another as needed. (Ch. 6)

C) The Internet Protocol IP)

53. Suppose a business with annual sales revenue of $30 million wishes to use an ERP solution. Which ERP vendor will have the most appropriate solution for them? (Ch. 8)

C) Tier III vendors such as Abas or Bluebee software.

is a process for testing skills and knowledge, which results in a statement by the certifying authority that confirms an individual is capable of performing particular tasks. (Ch. 2)

Certification

Which organizational personnel have been historically responsible for the adoption and management of healthcare IT? (IT Transformation Health Care Needs)

Chief Information Officer

In the most successful e-commerce models, involves consumers and businesses paying to purchase physical goods, information, or services that are posted or advertised online. (Ch. 7)

Commerce

Which of the following technology is mentioned to have enabled passive data-collection systems to automatically identify customer purchases to the retail industry? (IT Transformation Health Care Needs)

Computer vision

is the use of software to analyze the robustness and performance of components and assemblies. (Ch. 8)

Computer-aided engineering (CAE)

is the use of software to control machine tools and related machinery in the manufacture of components and products. (Ch. 8)

Computer-aided manufacturing (CAM)

_____ is a method of dealing with a situation in which two or more users or applications need to access the same record at the same time. (Ch. 5)

Concurrency control

____________ electronic exchanges are run by a group of traditionally competing companies with common procurement needs. (Ch. 7)

Consortium-operated

is a set of major understandings and assumptions shared by a group, such as within an ethic group or country. (Ch. 2)

Culture

is used primarily by people in the sales, marketing, accounting, and service functions to capture and view data about customers and to improve communications. (Ch. 8)

Customer relationship management (CRM)

47. Ongoing research conducted by the Standish Group shows that % of very large, multimillion dollar software projects fail or are challenged. (Ch. 1)

D) 94

45. According to Lewin and Schein's 3-stage model of organizational change, which of the following tasks would be found in the 'unfreezing' stage? (Ch. 2)

D) Assign leaders and implementation team

26. Which of the following forms of e-commerce is more likely to offer a more customized product offering? (Ch. 7)

D) Business-to-consumer B2C) e-commerce

38. The is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards. (Ch. 7)

D) Card Verification Number

34. refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. (Ch. 6)

D) Cloud computing

28. is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. (Ch. 7)

D) Consumer-to-consumer C2C) e-commerce

30. involves reducing the number of employees to cut costs. (Ch. 2)

D) Downsizing

42. are people who work directly with information systems to get results. (Ch. 1)

D) End users

51. Which of the following systems can help identify your geolocation? (Ch. 6)

D) GPS

35. is the standard page description language for Web pages. (Ch. 6)

D) Hypertext Markup Language HTML)

30. Which of the following statements is true of a database? (Ch. 5)

D) It helps companies analyze information to open new market opportunities.

35. Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms? (Ch. 8)

D) Online transaction processing

39. is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant. (Ch. 7)

D) Payment Card Industry PCI)

40. is/are considered to be the most important element in computer-based information systems. (Ch. 1)

D) People

34. Which of the following transactions definitely require online transaction processing and cannot work on batch processing approach? (Ch. 8)

D) Stock investments

45. ________ includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers. (Ch. 8)

D) Supply chain management (SCM)

49. Suppose an oil exploration company wishes to collect, codify, and store knowledge that is used in the organization, they should use . (Ch. 1)

D) a knowledge management system

36. In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: . (Ch. 2)

D) all of these

44. Positive outcomes of continuous improvement include . (Ch. 2)

D) all of these

53. One method an IS professional might use to find a new job would be . (Ch. 2)

D) all of these

53. The Internet of Things connects wireless identifiable objects . (Ch. 1)

D) all of these

. (Ch. 1)"

D) all of these answers

45. Through e-government, . (Ch. 7)

D) any government unit, business or individual can interact with the government

32. With , business transactions are accumulated over a period of time for processing in a single unit. (Ch. 8)

D) batch processing systems

50. Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He . (Ch. 7)

D) can use a hosting service to set up the site

57. Authoritarian regimes sometimes limit citizens' access to certain Websites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals, which are all forms of . (Ch. 1)

D) censorship

42. Authentication technologies are used by many organizations to . (Ch. 7)

D) confirm the identity of a user requesting access to information or assets

28. The idea of is a form of innovation that constantly seeks ways to improve business processes and add value to products and services. (Ch. 2)

D) continuous improvement

46. Suppose a small manufacturing business wishes to have a system to manage all its vital business operations, they should go for a(n) . (Ch. 1)

D) enterprise resource planning ERP) system

32. A database is a collection of integrated and related _____. (Ch. 5)

D) files

37. Suppose you are assigned to manage a virtual team. Which of the following will you NOT do? (Ch. 2)

D) hold team meetings regularly - whether the team members like it or not

41. According to the diffusion innovation theory, are the risk takers, always the first to try new products and ideas. (Ch. 2)

D) innovators

52. The information necessary for personalizing web pages for individual customers . (Ch. 7)

D) is primarily gathered by analyzing users' past transactions on the website

38. For the ____ operation, it is required that the the two tables have a common attribute. (Ch. 5)

D) join

52. Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals to study, change, and improved it. Their software is an example of . (Ch. 1)

D) open source software

30. A reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a product. (Ch. 7)

D) personalized

46. Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with to develop an estimate of future customer demand. (Ch. 8)

D) sales forecasting

39. A is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. (Ch. 6)

D) search engine

46. A network is one in which all network devices are connected to one another through a single central device called the hub node. (Ch. 6)

D) star

49. If consumer data is stolen from a business's computers, . (Ch. 7)

D) the customers can file a class-action law suit agains the business

34. The number of mobile Websites worldwide is expected to grow rapidly because of . (Ch. 7)

D) the development of new and useful applications

51. In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is . (Ch. 2)

D) the information systems security analyst

15. The role of a systems analyst is narrowly defined and seldom involves communications with others. (Ch. 2)

FALSE

In a transaction processing cycle, involves updating one or more databases in an organization with new transactions. (Ch. 8)

Data storage

A(n) ______ is an individual responsible for defining and implementing consistent principles for a variety of data issues. (Ch. 5)

Database admin

Suppose your friend plans, designs, creates, operates, secures, monitors, and maintains databases. She must be a(n) ___________. (Ch. 5)

Database admin

design and set up databases to meet an organization's needs. (Ch. 2)

Database administrators

mySQL is a popular ____________. (Ch. 5)

Database management system, DBMS, database program, database software

is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. (Ch. 7)

E-government

Among ERP, PLM and CRM, is the most essential system a business should have. (Ch. 8)

ERP

Which industry has the highest employment growth according to the chart in the article? (IT Transformation Health Care Needs)

Education

50. Important functions of the chief information officer include (Ch. 2)

Employing an IS department's equipment and staff to help the organization reach its goals, monitoring the financial considerations of the IS department, such as return on investment, and ensuring the organization complies with laws and regulations

The use of social media in business is called . (Ch. 6)

Enterprise 2.0

is a set of integrated programs that manage a company's vital business operations for an entire organization; even a complex, multi-site, global organization. (Ch. 8)

Enterprise resource planning (ERP)

______ use basic graphical symbols to show an organization of and relationships between data. (Ch. 5)

Entity-relationship (ER) diagrams

1. Information is simply a collection of raw facts such as an employee number or the total hours worked in a week. (Ch. 1)

FALSE

1. The United States has high Internet penetration among its population constituting the majority of people online. (Ch. 6)

FALSE

10. A podcast is a video broadcast over the Internet. (Ch. 6)

FALSE

10. Either system software or application software, but not both, are needed for all types of computers. (Ch. 1)

FALSE

10. In the past, market segmentation has been easy for B2B marketers because firmographic data was easy to obtain. (Ch. 7)

FALSE

11. Application software, such as Microsoft Word, manages basic computer operations such as start- up. (Ch. 1)

FALSE

11. Consortium-operated exchanges are open to any set of buyers and sellers within a given market. (Ch. 7)

FALSE

11. The diffusion of innovation theory states that adoption of any innovation happens all at once for all members of the targeted population. (Ch. 2)

FALSE

12. An enterprise data model is created only for documentation, but is otherwise inconsequential. (Ch. 5)

FALSE

12. Enterprise systems use multiple databases aimed at different business units. (Ch. 8)

FALSE

12. In spite of the recent economic downturn, Website operators have shunned the idea of bartering for goods and services. (Ch. 7)

FALSE

12. There is no way a manufacturing firm would implement an Internet of Things because the risk of hacking is far too high. (Ch. 6)

FALSE

13. Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web browser. (Ch. 6)

FALSE

13. The activities that lead to getting the right product into the right consumer's hands in the right quantity at the right time at the right cost are known as value chain management. (Ch. 2)

FALSE

13. The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files. (Ch. 5)

FALSE

14. Bartering is a technique used by advertisers to recapture shoppers who abandoned a Website without making a purchase. (Ch. 7)

FALSE

14. The Internet is a hyperlink-based system that uses a client/server model. (Ch. 6)

FALSE

14. The World Wide Web (WWW) is a network of links on the Internet to documents containing text, graphics, video, and sound, but does not offer cloud computing capabilities. (Ch. 1)

FALSE

15. An intranet is a network based on Web technologies that allows selected outsiders, such as business partners and customers, to access authorized resources of a company's extranet. (Ch. 1)

FALSE

15. Implicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. (Ch. 7)

FALSE

15. In the context of the relational database model, selecting involves combining two or more tables. (Ch. 5)

FALSE

21. A database administrator (DBA) is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization. (Ch. 5)

FALSE

21. Suppose an organization wishes to change for the better. It can accomplish that just by changing people's roles, responsibilities, and lines of authorities. (Ch. 2)

FALSE

23. Systems development projects should always be outsourced in order to allow an organization to focus on what it does best. (Ch. 1)

FALSE

23. Today, many organizations can function and compete effectively without computer-based information systems. (Ch. 2)

FALSE

24. If you abandon an online shopping cart, the seller does not care what you were shopping for. (Ch. 7)

FALSE

24. Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system. (Ch. 5)

FALSE

24. The ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns is known as contact management. (Ch. 8)

FALSE

25. Using the hosted software model implies that a small business firm needs to employ a full-time IT person to maintain key business applications. (Ch. 8)

FALSE

26. Another name for the World Wide Web is the Internet of Things. (Ch. 1)

FALSE

26. Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal. (Ch. 5)

FALSE

27. Enterprise resource planning (ERP) systems work directly with manufacturing machines on the production floor. (Ch. 8)

FALSE

28. Legacy systems typically run on the latest hardware. (Ch. 8)

FALSE

29. Organizations can collect many types of data from a wide variety of sources, but typically they only collect structured data that fits neatly into traditional relational database management systems. (Ch. 5)

FALSE

3. A collection of data fields that are all related to one object, activity, or individual is called a file. (Ch. 5)

FALSE

3. Sensors that can monitor and report on data about traffic and parking conditions are part of a network of physical objects known as the Internet of Technology. (Ch. 6)

FALSE

4. The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet domain names. (Ch. 6)

FALSE

5. Organizations cannot have many value chains. (Ch. 2)

FALSE

6. Like other programs, Java software can run only on specific types of computers. (Ch. 6)

FALSE

6. The market for m-commerce in North America is maturing much earlier than in Western Europe and Japan. (Ch. 7)

FALSE

6. Two sets of fields can have a common primary key. (Ch. 5)

FALSE

7. Small and medium size organizations do not employ enterprise systems. (Ch. 8)

FALSE

7. The concept of a value chain is not significant to organizations unless they manufacture products. (Ch. 2)

FALSE

8. Increasingly, companies are no longer incorporating computer-based information systems into their products and services. (Ch. 1)

FALSE

8. Today, most organizations use the traditional approach to data management, where multiple information systems share a pool of related data. (Ch. 5)

FALSE

9. DBMSs are used primarily for modeling data. (Ch. 5)

FALSE

9. Over time, disruptive innovation tends to become less attractive to users in a new market. (Ch. 2)

FALSE

When companies adopt a SSOT-MVOT data architecture, teams across the organization store the data they use in siloed repositories. (What's Your Data Strategy )

FALSE

format the text or graphics that will be displayed. (Ch. 6)"

FALSE

Which healthcare companies are highlighted as examples of when IT systems were used in their strategy to improve quality, it also improved the financial performance? (IT Transformation Health Care Needs)

Geisinger Health System and NU Langone Health

electronic commerce applications support transactions between governments such as the federal government and state or local governments. (Ch. 7)

Government-to-government (G2G)

What is a key issue addressed by the framework for building a powerful data strategy by the authors? (What's Your Data Strategy )

Guide companies in strategic data management.

The is the primary method for interacting with the Internet. (Ch. 6)

Hypertext Transfer Protocol (HTTP)

occurs when someone steals a person's personal information and uses it without his or her permission; often to commit fraud or other crimes. (Ch. 7)

Identity theft

exchanges are open to any set of buyers and sellers within a given market and provide services and a common technology platform to their members. (Ch. 7)

Independent

__________ governs the processes and rules that convert data into useful information. (What's Your Data Strategy )

Information architecture

is online, real-time communication between two or more people who are connected to the Internet. (Ch. 6)

Instant messaging

Which healthcare organization do the authors name in the introduction to exemplify use of IT to improve quality and cut costs? (IT Transformation Health Care Needs)

Intermountain Healthcare

The is the world's largest computer network consisting of thousands of interconnected networks, all freely exchanging information. (Ch. 1)

Internet

is the control or suppression of the publishing or accessing of information on the Internet. (Ch. 6)

Internet censorship

The ARPANET was eventually broken into two networks, __________, which included all military sites, and a new, smaller ARPANET, which included all the nonmilitary sites. (Ch. 6)

MILNET

What does business-specific transformation of data into information, that is data permeated with relevance and purpose produce? (What's Your Data Strategy )

Multiple versions of truth

The radical redesign of business processes, organizational structures, information systems, and values of an organization to achieve a breakthrough in business results is known as (Ch. 2)

Reengineering

If you wish to develop expertise in database management, you must learn popular language known as ______. (Ch. 5)

SQL, Structured query language, system query language

is the term used to describe the information systems and solutions built and deployed by departments other than the information systems department. (Ch. 2)

Shadow IT

What is a logical repository that contains one authoritative copy of all crucial data, such as customer, supplier, and product details called in the article? (What's Your Data Strategy )

Single source of truth

What are web cookies? (Ads That Dont Overstep)

Small pieces of information websites store on computer when the computer visits the website

17. The Institute of Electrical and Electronics Engineers (IEEE) is a leading standards-setting organization whose IEEE network standards are the basis for many telecommunications devices and services. (Ch. 6)

TRUE

17. When an organization hires another firm in another country to perform a specific function on its behalf, it is known as offshoring. (Ch. 2)

TRUE

17. When you buy books from another consumer through an online auction site such as eBay.com, you are involved in e-commerce. (Ch. 1)

TRUE

18. Mobile commerce (m-commerce) is the use of mobile, wireless devices to place orders and conduct business. (Ch. 1)

TRUE

18. PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online. (Ch. 7)

TRUE

18. The relational database model is currently the most widely used. (Ch. 5)

TRUE

18. The successful implementation for change only happens when people accept the need for change and believe that it will improve factors such as productivity and/or customer satisfaction. (Ch. 2)

TRUE

19. A database is essential to the operation of a computer-based information system. (Ch. 1)

TRUE

19. A database management system (DBMS) serves as an interface between an application program and a database. (Ch. 5)

TRUE

2. A field is typically a name, number, or combination of characters that describes an aspect of a business object. (Ch. 5)

TRUE

2. Data represents real-world things including raw facts such as image and audio data. (Ch. 1)

TRUE

2. The Internet is the infrastructure on which the Web exists. (Ch. 6)

TRUE

20. According to Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job. (Ch. 2)

TRUE

20. Customer support, sales management, and contact management are key features of a customer relationship management (CRM) system. (Ch. 8)

TRUE

20. Electronic business (e-business) goes beyond e-commerce and e-procurement by using information systems and the Internet to perform business-related tasks and functions. (Ch. 1)

TRUE

21. A client is any computer on a network that sends messages requesting services from the servers on the network. (Ch. 6)

TRUE

21. External users of product lifecycle management (PLM) software include design partners and raw material suppliers. (Ch. 8)

TRUE

21. Smart cards can be used for a variety of purposes, including storing a user's financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending. (Ch. 7)

TRUE

21. When a customer buys products using the company's website, it results in transactions that are recorded for later use by management information systems. (Ch. 1)

TRUE

22. A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. (Ch. 5)

TRUE

22. Organizations frequently need to customize a vendor's enterprise resource planning (ERP) software to integrate other business systems. (Ch. 8)

TRUE

22. When organizational learning occurs, what is revealed can be small, incremental adjustments known as continuous improvement. (Ch. 2)

TRUE

23. A mobile advertiser can find how many people clicked on his ad and how many people bought his product or service. (Ch. 7)

TRUE

23. A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider. (Ch. 6)

TRUE

23. To successfully implement a supply chain management system, an organization must be able to integrate its systems with its suppliers. (Ch. 8)

TRUE

23. Unstructured data comes from sources such as word-processing documents and scientific research. (Ch. 5)

TRUE

24. Usability and user-interface design are key factors in delivering apps that business users will adopt and use. (Ch. 1)

TRUE

25. For each data item, a data dictionary usually contains information such as the name of the data item, the range of values that can be used, and the amount of storage needed for the item. (Ch. 5)

TRUE

25. In Kenya and Tanzania, it is not uncommon for citizens to carry out common financial transactions using mobile phones. (Ch. 7)

TRUE

25. One of the primary roles of a senior IS manager is to communicate with other areas of the organization to determine changing business needs. (Ch. 2)

TRUE

25. When an organization uses cloud computing, they do not have to buy and maintain expensive hardware. (Ch. 1)

TRUE

26. XYZ Inc. assigned a part-time mid-level manager to supervise the implementation of an enterprise resource planning (ERP) system. The project has a high risk of failure. (Ch. 8)

TRUE

27. Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database (Ch. 5)

TRUE

28. If a hotel wishes to determine where to spend resources on renovations - on interior decor or on curb appeal or on recreational facilities - they would use business intelligence to make the decision. (Ch. 1)

TRUE

28. Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing. (Ch. 5)

TRUE

29. Natural language processing involves the computer interacting in natural languages - like spoken English. (Ch. 1)

TRUE

29. Smaller lot sizes from vendors will help reduce the purchasing complexities for the consumer. (Ch. 8)

TRUE

3. An organization uses buy-side e-commerce to purchase goods and services from its suppliers. (Ch. 7)

TRUE

3. Suppose a retail business has an unwritten rule that "every sales person cooperates with others." This is an example of organizational culture. (Ch. 2)

TRUE

3. When there is a delay between an event and the eventual processing of the data, it is called batch processing. (Ch. 8)

TRUE

4. The main difference between batch processing and online transaction processing is in the timely update of data. (Ch. 8)

TRUE

4. The term data is used to label raw facts such as height and weight of a patient. (Ch. 1)

TRUE

5. Cascading Style Sheets (CSS) use special Hypertext Markup Language (HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a Web page. (Ch. 6)

TRUE

5. If "color" is an attribute, then "green" is a data item. (Ch. 5)

TRUE

5. The Asia-Pacific region has overtaken North America as the region with the largest B2C sales and now accounts for over one-third of total worldwide B2C sales. (Ch. 7)

TRUE

6. Entering textual data in place of numeric data will result in rejection of the transaction. (Ch. 8)

TRUE

7. Components of a computer-based information system include people such as the CIO (chief information officer) and end-users. (Ch. 1)

TRUE

7. Conversion to an e-commerce or m-commerce system enables organizations to increase the accuracy of order processing and order fulfillment. (Ch. 7)

TRUE

7. Organizations that are concerned about the security of their data should not use public cloud computing. (Ch. 6)

TRUE

7. The database approach to managing data is superior to the file-based approach. (Ch. 5)

TRUE

8. A traditional view of information systems holds that organizations use them to control and monitor processes and ensure effectiveness and efficiency. (Ch. 2)

TRUE

8. An enterprise system ensures that the information needed for a single business function and all levels of management within that function is isolated. (Ch. 8)

TRUE

8. JavaScript can be used to validate data entry in a Web form. (Ch. 6)

TRUE

8. Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online. (Ch. 7)

TRUE

9. An example of the concept of feedback is a factory information system that is programmed to alert the manager if there is any decrease in productivity so the manager can take corrective steps to improve productivity. (Ch. 1)

TRUE

9. If an organization is using several separate systems, they can be replaced with a single integrated set of applications for the entire enterprise. (Ch. 8)

TRUE

9. Twitter is a microblogging service. (Ch. 6)

TRUE

frequency. (Ch. 6)"

TRUE

network (LAN). (Ch. 6)"

TRUE

What incident backfired on Target stores when the retail chain started sending promotions to consumers based on individual shoppers' consumption data? (Ads That Dont Overstep)

Target sent coupons for maternity-related products to a teenager whose father was outraged.

In the relational database model, each row of a table represents a(n) _____. (Ch. 5)

entity or entity instance

How many treatment groups did the authors divide the participants into their research to find the effect of violating the privacy norms would have on ad performance? (Ads That Dont Overstep)

Three

Which researcher's work do the authors refer to in which personalized ads by a movie rental company were involved? (Ads That Dont Overstep)

Tiffany White

What is the primary challenge highlighted by the authors that will lead to a company's overall data strategy? (What's Your Data Strategy )

To establish the trade-offs between defense and offense to ensure the best balance.

is the process by which virtual private networks (VPNs) transfer information by encapsulating traffic in Internet Protocol (IP) packets over the Internet. (Ch. 6)

Tunneling

Which of the following is a technique of web marketers that consumers dislike? (Ads That Dont Overstep)

Using information obtained on a third-party website rather than the site on which the ad appears

The Web, as a computing platform that supports software applications and the sharing of information among users, is referred to as . (Ch. 6)

Web 2.0

Which is true regarding consumers' personal information changing hands? (Ads That Dont Overstep)

While people may be comfortable disclosing personal information directly, they may get upset when that information is shared without their knowledge.

In a transaction processing system (TPS), a(n) must track the flow of data related to all the cash flows that affect an organization. (Ch. 8)

accounting system

In the context of a database management system (DBMS), a(n) _____ interacts with other programs or applications and only indirectly interacts with people or users. (Ch. 5)

back-end application

With , transactions are accumulated for as long as necessary to meet the needs of the users of a system. (Ch. 8)

batch processing systems

Implementation of an enterprise resource planning (ERP) system ensures good work processes that are based on . (Ch. 8)

best practices

Process redesign, which is also known as , involves the radical redesign of business processes, organizational structures, information systems, and values. (Ch. 2)

business process reengineering

The authors contend that most healthcare organizations are using IT systems primarily to __________. (IT Transformation Health Care Needs)

capture transactions in billing, order entry, and such processes

A(n) _________ is responsible for guaranteeing that the people or organizations who are granted unique digital certificates are in fact who they claim to be. (Ch. 7)

certificate authority (CA)

According to Leavitt's theory, in one aspect of the information system element will necessitate changes in other elements also. (Ch. 2)

change

Usually measured in bits per second (bps), refers to the rate at which data is exchanged. (Ch. 6)

channel bandwidth

One of the main measures of success of a mobile ad is CTR, which stands for . (Ch. 7)

click through rate

The browsers are the in the worldwide web, whereas the web servers are the servers. (Ch. 6)

clients

With , a service provider organization owns and manages the hardware, software, networking, and storage devices, with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. (Ch. 1)

cloud computing

All of the hardware, software, databases, networks, people, and procedures that are configured to collect, manipulate, store, and process data into information is referred to as an organization's (Ch. 1)

computer-based information system (CBIS)

In a customer relationship management (CRM) system, the ability to track data on individual customers and sales leads and then access that data from any part of an organization is known as (Ch. 8)

contact management

"Kaizen" is the Japanese word for . (Ch. 2)

continuous improvement

_____ is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database. (Ch. 5)

data cleansing, data cleaning, or data scrubbing

A(n) _____ is a collection of instructions and commands used to define and describe data and relationships in a specific database. (Ch. 5)

data definition language (DDL)

A(n) _____ is a detailed description of all data used in a database. (Ch. 5)

data dictionary

The _____ is a specific language, provided with a database management system (DBMS) that allows users to access and modify the data, to make queries, and to generate reports. (Ch. 5)

data manipulation language (DML)

A(n) is an organized collection of facts and information, typically consisting of two or more related data files. (Ch. 1)

database

In enterprise resource planning (ERP) systems, retailers as well as manufacturers use to match production to consumer demand and to allocate products to stores. (Ch. 8)

demand forecasting

The theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. (Ch. 2)

diffusion of innovation

A(n) ________ is an attachment to an email message or data embedded in a Website that verifies the identity of a sender or Website. (Ch. 7)

digital certificate

The gulf between those who do and do not have access to modern information and communications technology is described as the . (Ch. 1)

digital divide

In a relational database model, the range of allowable values for a data attribute is called its ________. (Ch. 5)

domain

The Uniform Resource Locator (URL) www.cengage.com is an example of a(n) that identifies the Internet host site. (Ch. 6)

domain name

is the conducting of business activities electronically over computer networks. (Ch. 7)

e-commerce

Dylan was engaging in when he used his credit card to purchase a new snowboard from a website on the Internet. (Ch. 1)

electronic commerce (e-commerce)

Data modeling done at the level of an entire enterprise is called _____. (Ch. 5)

enterprise data modeling

A(n) is a set of integrated programs that manages the vital business operations for an entire multisite, global organization. (Ch. 1)

enterprise resource planning (ERP) system

George is in charge of ordering supplies for his employer, and he usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system so that he can see if they have what he needs without contacting the salesperson. George is using an . (Ch. 6)

extranet

is a network based on Web technologies that allows selected outsiders, such as business partners and customers, to access authorized resources of a company's intranet. (Ch. 1)

extranet

Together, bits, characters, fields, records, files, and databases form the ______. (Ch. 5)

hierarchy of data

According to the classification of product lifecycle management (PLM) software,

involves the production of products that are the result of a chemical process such as soda, laundry detergent, gasoline, and pharmaceutical drugs that cannot be easily decomposed back into its basic components. (Ch. 8) process manufacturing

A(n)

is a Website that people can create and use to write about their observations, experiences, and opinions on a wide range of topics. (Ch. 6) Web log

A(n)

is a company that acts as an intermediary between a Website and online merchants who have the products and retail expertise. (Ch. 7) storefront broker

A(n)

is an HTML code that tells the Web browser how to format text-such as a heading, as a list, or as body text-and whether images, sound, and other elements should be inserted. (Ch. 6) tag

In the context of product lifecycle management (PLM) software categories,

is the production of distinct items such as autos, airplanes, furniture, or toys that can be decomposed back into their basic components (Ch. 8) discrete manufacturing

In a relational database model, _____ involves combining two or more tables. (Ch. 5)

joining

Consumers may not object to information being used in a particular context, but they worry about their inability to have a say on how it will be used. This privacy related concern is __________. (Ads That Dont Overstep)

loss of control

The authors state that the billions of dollars healthcare organizations and the US government invested in information technology have produced productivity growth in the sector that is __________ than other industries. (IT Transformation Health Care Needs)

lower

A(n) is an organized collection of people, procedures, software, databases, and devices that provides routine information to managers and decision makers. (Ch. 1)

management information system (MIS)

The identification of specific markets to target them with tailored advertising messages is referred to as . (Ch. 7)

market segmentation

In supply chain management (SCM), the output of the demand management process is the , which is a production plan for all finished goods. (Ch. 8)

master production schedule

Enterprise resource planning (ERP) systems evolved from systems developed in the s. (Ch. 8)

materials requirement planning (MRP)

Online vendors use digital rights management to prevent illegal copying. (Ch. 6)

music

The process used to obtain the information system resources needed to provide the services necessary to meet a specific set of , no matter how broad or narrow, is known as system acquisition. (Ch. 1)

needs

is the principle that Internet service providers should be required to treat all Internet traffic running over their wired and wireless broadband networks the same, without favoring content from some sources and/or blocking or slowing content from others. (Ch. 1)

net neutrality

The computers and devices on a network are also known as . (Ch. 6)

network nodes

The ____ database is a newer model than the relational database model. (Ch. 5)

noSQL, in-memory database, IMDB, Hadoop

A local pizzeria that has been around for more than forty years, keeps adjusting to new conditions and altering their practices. Such behavior is known as . (Ch. 2)

organizational learning

An information system that improves the productivity of individual users in performing stand- alone tasks is called a(n) . (Ch. 1)

personal IS

Web such as Adobe Flash and Real Player, provide additional features to standard Web sites. (Ch. 6)

plug-ins

The author's research indicates that when the consumers highly trusted the website, disclosing that the ad shown has been tailored to the individual recipient's characteristics __________ click-through rates. (Ads That Dont Overstep)

raised

Oracle, IBM DB, Microsoft SQL Server, Microsoft Access, MySQL, and Sybas are databases based on the _____ model. (Ch. 5)

relational

The ____ model database makes it easy to develop queries that involve joining two tables. (Ch. 5)

relational

The _____ model has become the most popular database model. (Ch. 5)

relational

Messages on the Internet are typically sent through one or more _________ to reach their destination. (Ch. 6)

routers

In the context of supply chain management (SCM), the takes demand and current inventory levels into account and determines the specific product items that need to be produced as well as when to meet the forecast future demand. (Ch. 8)

sales and operations plan

In supply chain management (SCM), detailed is used to determine how long to make the production runs for each product. (Ch. 8)

scheduling

When engaging in e-commerce, consumers typically experience the sales life cycle, the first stage of which is _____ and identification. (Ch. 7)

search

The first stage of Lewin's change model, , means ceasing old habits and creating a climate that is receptive to change. (Ch. 2)

unfreezing

Most of the data that an organization must deal with is _____ data, meaning that it is not organized in any predefined manner. (Ch. 5)

unstructured

The attitude towards using an information system depends on its perceived ease-of-use and perceived . (Ch. 2)

usefulness

A manufacturing facility has a series of activities that converts the raw materials into valuable products. Such a series of activities make up the organization's chain. (Ch. 2)

value

Over time, decision support systems, executive information systems, online analytical processing, business intelligence, and business analytics have gained in capabilities and expanded in scope to add new functionality, but all have had the same goal of deriving the most from the data available (Ch. 1)

value

A business associate would complete a request for quotation to be submitted to a (Ch. 7)

vendor

A(n) is a group of individuals whose members are distributed geographically, but who collaborate and complete work through the use of information systems technology. (Ch. 2)

virtual team

A(n) is a telecommunications network that connects large geographic areas. (Ch. 6)

wide area


Conjuntos de estudio relacionados

Survey of American History I Chapter 5:

View Set

Introducción: Ya queda menos para la uni

View Set

Epidemic vs. Pandemic vs. Endemic

View Set

Life XV Federal Tax Considerations for Life Insurance and Annuities

View Set