MIS 309-- Chapters 5-8

¡Supera tus tareas y exámenes ahora con Quizwiz!

With Google's ________ software, vendors pay a certain amount for particular search words. A) AdWords B) Chrome C) Android D) AdSense

A) AdWords

Which of the following is a nonrelational data store developed by Facebook? A) Cassandra B) Dynamo C) Bigtable D) SharePoint

A) Cassandra

________ is the dynamic social media process of employing users to participate in product design or product redesign. A) Crowdsourcing B) Microblogging C) Publishing D) Tweeting

A) Crowdsourcing

Which of the following is true of DSL modems? A) DSL modem signals do not interfere with telephone signals. B) DSL modems use the same protocols as cable modems for data transmission. C) DSL modem signals replace phone signals and are sent to the ISP. D) DSL data transmission and telephone conversations cannot occur simultaneously.

A) DSL modem signals do not interfere with telephone signals.

________ is the process of converting a data model into tables, relationships, and data constraints. A) Database design B) Database querying C) Data mining D) Database aggregation

A) Database design

________ is the application of social media to facilitate the cooperative work of people inside organizations. A) Enterprise 2.0 B) Enterprise resource planning C) Enterprise application integration D) Enterprise architecture

A) Enterprise 2.0

________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. A) Enterprise resource planning B) Customer relationship management C) Enterprise application integration D) Business process reengineering

A) Enterprise resource planning

Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites? A) FTP B) IP C) HTTPS D) HTTP

A) FTP

Who pioneered Web 2.0 advertising? A) Google B) eBay C) Amazon D) Yahoo

A) Google

________ is the most common language for defining the structure and layout of Web pages. A) HTML B) XML C) URL D) DSL

A) HTML

A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages. A) HTML tag B) IP address C) domain D) hyperlink

A) HTML tag

Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture? A) HTTP B) IEEE 802.3 C) IEEE 802.11 D) IP

A) HTTP

The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________. A) IP B) SMTP C) HTTP D) TCP

A) IP

Which of the following is the most common format for IP addresses? A) IPv4 B) TCP C) IPv6 D) HTTP

A) IPv4

_______ are predesigned procedures for using software products. A) Inherent processes B) Triggers C) Modules D) Service descriptions

A) Inherent processes

Which of the following is true about a VPN? A) It encrypts messages to ensure secure transmissions. B) It does not provide users with remote access. C) It utilizes private networks instead of the public network. D) It appears as a secure connection, though it is not.

A) It encrypts messages to ensure secure transmissions.

Which of the following statements about a structured interenterprise information system is true? A) Its procedures are formalized and the problem solutions affect multiple organizations. B) It is flexible and easily adaptable to organizational changes. C) It minimizes data duplication among departments. D) It does not require users to have any formal training.

A) Its procedures are formalized and the problem solutions affect multiple organizations.

From among the following, identify the open source DBMS product. A) MySQL B) DB2 C) Access D) Oracle Database

A) MySQL

________ typically have transmission speeds less than 56 Kbps. A) Narrowband lines B) Digital subscriber lines C) Cable modems D) WAN wireless connections

A) Narrowband lines

Which of the following best represents the value of social capital? A) Number of Relationships * Relationship Strength * Entity Resources B) Entity Resources -(Number of Relationships + Relationship Strength) C) Number of Relationships - Relationship Strength - Entity Resources D) (Number of Relationships * Relationship Strength) / Entity Resources

A) Number of Relationships * Relationship Strength * Entity Resources

Which ERP vendor acquired PeopleSoft and Siebel? A) Oracle B) Infor C) Epicor D) SAP

A) Oracle

________ are the companies that operate the SM sites. A) SM application providers B) SM sponsors C) SM client servers D) SM consultants

A) SM application providers

________ is an add-on to browsers that was developed by Microsoft and provides animation, movies, and other advanced graphics inside a browser. A) Silverlight B) Flash C) HTML 5.0 D) SharePoint

A) Silverlight

________ is the use of information technology to support the sharing of content among networks of users. A) Social media B) Content publishing C) Networking D) Programming

A) Social media

________ processes span an organization and support activities in multiple departments. A) Structured enterprise B) Structured interenterprise C) Structured strategic D) Structured reactive

A) Structured enterprise

In SOA terminology, what does it mean if the production of a service is said to be encapsulated? A) The methodology and location of the service is private. B) The users of the service need to know how and where the service is performed. C) The service description is documented in a short or concise form. D) The description of how to use the service is published using a standardized language.

A) The methodology and location of the service is private.

Which of the following is a characteristic of dynamic processes? A) They are adaptive processes that change structure rapidly and readily. B) They are usually formally defined and documented. C) They support operational and managerial decisions and activities. D) They are standardized processes.

A) They are adaptive processes that change structure rapidly and readily.

When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page. A) URL B) IP address C) protocol D) e-mail ID

A) URL

________ is the essence of SM relationships. A) User-generated content B) Social capital C) Human capital D) Cultural values

A) User-generated content

A(n) ________ uses the Internet to create the appearance of private point-to-point connections. A) VPN B) ISP C) router D) DSL

A) VPN

Computers that reside in different geographic locations are connected using a(n) ________. A) WAN B) LAN C) URL D) IP address

A) WAN

________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients. A) Web servers B) Web browsers C) Web sites D) Web farms

A) Web servers

Enterprise application integration is ________. A) a suite of software applications that links existing systems by providing layers of software that connect applications together B) a strategy that uses business process management to radically enhance the customer service experience from any customer touchpoint C) a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform D) a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service

A) a suite of software applications that links existing systems by providing layers of software that connect applications together

Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch? A) access point B) packet C) server D) router

A) access point

A(n) ________ is a person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium. A) active lurker B) key user C) nonkey user D) SM sponsor

A) active lurker

When using the relational model to represent data, one must ________. A) add a foreign key to one of the tables B) have more than ten tables in the model C) establish only N:M relationships between tables D) use metadata instead of foreign keys

A) add a foreign key to one of the tables

The Web 2.0 business model relies on ________. A) advertising B) software license fees C) venture capital D) controlled, fixed interface

A) advertising

Communications speeds are expressed in ________. A) bits B) bytes C) hertz D) packets

A) bits

Which of the following is a developmental task of database administration? A) creating and staffing the DBA function B) monitoring backup procedures C) conducting training for users D) managing configuration changes in systems

A) creating and staffing the DBA function

In a database, when data items disagree with one another, this leads to a(n) ________. A) data integrity problem B) crow's-foot paradigm C) adaptation conflict D) lost-update problem

A) data integrity problem

A ________ is a collection of forms, reports, queries, and programs that process a database. A) database application B) database design C) data field D) data model

A) database application

A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community. A) defenders-of-belief B) seekers-of-the-truth C) heterogeneous D) cloud

A) defenders-of-belief

When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is ________. A) developing committees and steering groups B) reinforcing employees' sense of self-efficacy C) establishing clear and absolute contractual guidelines D) communicating the need for change to the employees

A) developing committees and steering groups

Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system. A) development B) adaptation C) recovery D) operation

A) development

The two dimensions of process quality are ________. A) efficiency and effectiveness B) performance and reliability C) conformance and durability D) perception and serviceability

A) efficiency and effectiveness

Which of the following data elements is placed higher than records in the data hierarchy? A) file B) field C) character D) byte

A) file

Relational databases represent relationships using ________. A) foreign keys B) file systems C) metadata D) unique identifiers

A) foreign keys

The attribute for a hyperlink is ________, whose value indicates which Web page is to be displayed when a user clicks on a link. A) href B) IPv4 C) IaaS D) IPv6

A) href

A student invests money and time in taking a business administration course. In this example, the student invests in ________. A) human capital B) social capital C) functional capital D) mechanical capital

A) human capital

To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n) ________ is used. A) layered protocol B) virtual private network C) three-tier system D) remote access system

A) layered protocol

Which of the following business processes is related to sales and marketing? A) lead tracking B) order management C) customer support D) accounts receivable

A) lead tracking

If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________. A) leave it B) edit it C) delete it D) rewrite it

A) leave it

A data model is a ________. A) logical representation of database data B) repository of unprocessed data C) collection of isolated databases D) set of programs to retrieve data

A) logical representation of database data

The primary risk of peer-to-peer support is ________. A) loss of control B) loss of credibility C) lack of privacy D) increase in expenses

A) loss of control

In which phase of the customer life cycle do processes categorize customers according to value and attempt to win back high-value customers? A) loss/churn B) customer acquisition C) relationship management D) marketing

A) loss/churn

Which of the following refers to the problem that exists in database applications when two users update the same data item, but only one of those changes is recorded? A) lost-update problem B) crow's-foot paradigm C) bullwhip effect D) update query problem

A) lost-update problem

Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________. A) primary key B) identifier C) foreign key D) primary record

A) primary key

The rows in a database are called ________. A) records B) tables C) files D) fields

A) records

A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol. A) router B) modem C) narrowband D) access point

A) router

According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of ________. A) signals B) search C) links D) authoring

A) signals

Which of the following is the distinguishing feature of a LAN as compared to a WAN? A) single location B) number of users C) bandwidth D) hardware requirements

A) single location

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement? A) social capital B) human capital C) industrial capital D) mechanical capital

A) social capital

Being linked to a network of highly regarded contacts is a form of ________. A) social credential B) viral marketing C) crowdsourcing D) human capital

A) social credential

A social media policy is a statement ________. A) that delineates employees' rights and responsibilities B) that lists a firm's products and services C) that lists the social and environmental effects of a company's economic actions D) that defines the type of medium and channel that must be used for social media

A) that delineates employees' rights and responsibilities

Which of the following describes the meaning of 'sense' activity, in the SEAMS dynamic process? A) the communities which are important to a person B) connecting communities to one's internal value chains and processes C) one's success in terms of social capital D) publicizing community successes

A) the communities which are important to a person

In-house hosting, delivered via Web service standards that can be configured dynamically, is referred to as ________. A) the private cloud B) a virtual private network C) a wide area network D) the tunnel

A) the private cloud

ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers, in training sessions called ________. A) train the trainer B) top-down training C) on-the-job training D) vestibule training

A) train the trainer

The ________ tier of three-tier architecture consists of computers, phones, and other devices that have browsers that request and process Web pages. A) user B) server C) database D) data link

A) user

With ________, Google searches an organization's Web site and inserts ads that match content on that site. When users click those ads, Google pays the organization a fee. A) AdWords B) AdSense C) Chrome D) Android

B) AdSense

________ is the activity of altering and designing business processes to take advantage of new information systems. A) Business process modeling B) Business process reengineering C) Business process outsourcing D) Enterprise resource planning

B) Business process reengineering

Which of the following is true about the database development process? A) The database structure cannot be changed during the data modeling stage. B) Changing a relationship from 1:N to N:M is simply a matter of changing the notations. C) User review of the data model is avoided as it is not helpful in data modeling. D) A database is a model of how the developers view their business world.

B) Changing a relationship from 1:N to N:M is simply a matter of changing the notations.

________ is data and responses to data that are contributed by users and SM sponsors. A) Networking data B) Content data C) Connection data D) User-generated data

B) Content data

________ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. A) Business process reengineering B) Customer relationship management C) Enterprise resource planning D) Customer lifecycle management

B) Customer relationship management

A(n) ________ is a program used to create, process, and administer a database. A) operating system B) DBMS C) KMS D) data mart

B) DBMS

________ forms are used to read, insert, modify, and delete data. A) Reporting B) Data entry C) Query D) Request

B) Data entry

_______ are flexible, informal, and adaptive processes that normally involve strategic and less specific managerial decisions and activities. A) Operational processes B) Dynamic processes C) Inherent processes D) Structured processes

B) Dynamic processes

Which of the following is a nonrelational data store developed by Amazon? A) Cassandra B) Dynamo C) SharePoint D) Bigtable

B) Dynamo

The IEEE 802.3 protocol standard is also known as ________. A) Bluetooth B) Ethernet C) Intranet D) Internet

B) Ethernet

________ is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser. A) Silverlight B) Flash C) XML D) Acrobat

B) Flash

A(n) ________ is a number that identifies a particular device. A) domain B) IP address C) hyperlink D) href

B) IP address

Which of the following statements is true of enterprise application integration? A) It leads to data duplication because each application has its own database. B) It connects system "islands" via a new layer of software. C) It leverages existing systems, and enhances the capabilities of functional applications. D) It prevents existing applications from communicating and sharing data.

B) It connects system "islands" via a new layer of software.

Which of the following observations is true about a hyper-social organization? A) It uses social media in an organization-centric manner. B) It creates relationships in which both parties perceive and gain value. C) It is an organization that has made a transformation of thinking from tribes to market segments. D) It is an organization that has made a transition from a dynamic process to a structured one.

B) It creates relationships in which both parties perceive and gain value.

Which of the following is a valid observation of MySQL? A) It is offered by Oracle. B) It is license-free for most applications. C) It is a closed-source database product. D) It is yet to be widely adopted.

B) It is license-free for most applications.

Which of the following is a function of an ISP? A) It transmits data over short distances, replacing cables. B) It serves as a gateway to the Internet. C) It describes how messages must be processed for wired transmission. D) It connects computers within a LAN.

B) It serves as a gateway to the Internet.

Which of the following major companies is a traditional software vendor? A) Google B) Microsoft C) Amazon D) eBay

B) Microsoft

Which of the following observations is true? A) A huge network of relationships to people who have few resources is of greater value than a smaller network with people with substantial resources. B) Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships. C) Social capital depreciates and such depreciation cannot be ameliorated by adding something of value to the interaction. D) The value of social capital is best expressed as the summation of the number of relationships in a social network and the resources controlled by those related.

B) Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships.

________ is the process of converting a poorly- structured table into two or more well-structured tables. A) Optimization B) Normalization C) Refactoring D) Standardization

B) Normalization

Who are the top two ERP vendors? A) Epicor and Oracle B) Oracle and SAP C) Microsoft Dynamics and Infor D) Microsoft Dynamics and SAP

B) Oracle and SAP

A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services? A) SaaS B) PaaS C) IaaS D) VPN

B) PaaS

________ is a measure of the ratio of process outputs to inputs. A) Process effectiveness B) Process efficiency C) Process conformance D) Process reliability

B) Process efficiency

________ is an example of an interenterprise information system. A) CRM B) SCM C) ERP D) EAI

B) SCM

A(n) ________ is an IS that supports the sharing of content among networks of users. A) DSS B) SMIS C) ERP D) TPS

B) SMIS

Which of the following is an example of an enterprise DBMS? A) Access B) SQL Server C) Paradox D) FoxPro

B) SQL Server

Which of the following would be a consequence of teleaction? A) The need for local support staff would decrease. B) The value of robotics would increase. C) The requirement for high-skill employees would decrease. D) Only high-value industries would be able to properly utilize it.

B) The value of robotics would increase.

Most LAN connections are made using ________. A) Sc/TP cable B) UTP cable C) STP cable D) F/TP cable

B) UTP cable

An ERP solution does not include ________. A) a database design B) a company's operational data C) initial configuration data D) stored procedures

B) a company's operational data

Which of the following business processes is related to customer service? A) assessment B) account tracking C) sales forecasting D) accounts payable

B) account tracking

A primary key used in a database is a ________. A) group of rows that are formed to identify a unique table or file B) column or group of columns that identifies a unique row in a table C) character or byte that represents fields or columns D) group of tables or files formed to identify a unique field or row

B) column or group of columns that identifies a unique row in a table

A data integrity problem will occur only if ________. A) there are multiple administrators B) data are duplicated C) the database is very large D) there are complex relationships

B) data are duplicated

A(n) ________ is a self-describing collection of integrated records. A) cloud B) database C) storage folder D) application software

B) database

A ________ is a worldwide-unique name that is affiliated with a public IP address. A) URL B) domain name C) tag D) trademark

B) domain name

The tables that appear in a database are known as ________. A) records B) files C) fields D) applications

B) files

Columns that belong to a different table than the one in which they reside are called ________. A) attributes B) foreign keys C) primary keys D) internal records

B) foreign keys

A(n) ________ organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities. A) social capitalistic B) hyper-social C) employee-centric D) commercial media

B) hyper-social

Each entity in a database has a unique attribute called a(n) ________. A) public key B) identifier C) foreign key D) index field

B) identifier

To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________. A) service descriptions B) industry-specific solutions C) inherent processes D) DIY modules

B) industry-specific solutions

A private internet that is used exclusively within an organization is called a(n) ________. A) ethernet B) intranet C) cloud D) server

B) intranet

Information silos are also referred to as ________. A) blind spots B) islands of automation C) errors of omission D) bottlenecks

B) islands of automation

In McAfee's SLATES Enterprise 2.0 model, "L" is for ________. A) LAN B) links C) language D) leader

B) links

Web 2.0 encourages ________, which occur(s) when the output from two or more Web sites is combined into a single user experience. A) viral hooks B) mashups C) crowdsourcing D) fixed interfaces

B) mashups

Compared to in-house hosting, cloud-based hosting ________. A) provides better disaster preparedness capabilities B) minimizes the risk of investing in technology than will soon become obsolete C) provides greater control over the location of data D) requires a significant amount of capital

B) minimizes the risk of investing in technology than will soon become obsolete

Constraints on the number of entities in a relationship are called ________ cardinalities. A) specific B) minimum C) primary D) critical

B) minimum

Which of the following activities would seekers of the truth facilitate? A) human resources B) operations C) marketing D) sales

B) operations

A(n) ________ is a piece of a message that is handled by programs that implement IP. A) e-mail B) packet C) tag D) attribute

B) packet

Which of the following is a design philosophy in which activities are organized into modules of functionality that are requested and delivered over the Internet using standards? A) business process modeling notation B) service-oriented architecture C) enterprise application integration D) cloud computing

B) service-oriented architecture

Every table in a normalized database has a(n) ________. A) duplicated data model B) single theme C) maximum cardinality D) specialized query format

B) single theme

Traditional software vendors depend on ________. A) viral marketing B) software license fees C) user participation D) venture capital

B) software license fees

Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites. A) application providers B) sponsors C) blogs D) users

B) sponsors

ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category? A) obtaining top-level management support B) steps for using the ERP applications to accomplish the activities in processes C) dealing with employee resistance to the new system D) preparing the organization for change

B) steps for using the ERP applications to accomplish the activities in processes

To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization. A) principle of reciprocity B) strength of a relationship C) business process margin D) customer lifetime value

B) strength of a relationship

According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related. A) strength of a viral hook B) value of social capital C) curse of dimensionality D) social media policy

B) value of social capital

In an E-R diagram, a(n) ________ on a line means that at least one entity type of that type is required. A) small oval B) vertical bar C) arrow D) triangular block

B) vertical bar

A ________ is an inducement for passing the message along through the tiers. A) motif B) viral hook C) folksonomy D) protocol

B) viral hook

________ is a wireless protocol designed for transmitting data over short distances, replacing cables. A) IPv6 B) PaaS C) Bluetooth D) Silverlight

C) Bluetooth

________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines. A) DSL B) Dial-up C) Cable D) ADSL

C) Cable

________ differentiates SMIS from Web site applications. A) Networking data B) Content data C) Connection data D) User-generated data

C) Connection data

Which of the following statements is true of social CRM? A) Customers that are likely to generate the most business get the most attention and have the most impact on the organization. B) The relationships between organizations and customers emerge in a structured process as only the organization creates and processes content. C) Each customer crafts his or her own relationship with the company. D) Though relationships emerge from joint activity, companies have a lot more control than the customers.

C) Each customer crafts his or her own relationship with the company.

________ is a major task when implementing enterprise systems. A) Virtualization B) Encapsulation C) Gap identification D) Data duplication

C) Gap identification

Which of the following protocols guarantees secure data transmission? A) HTTP B) FTP C) HTTPS D) SMTP

C) HTTPS

The organization responsible for assigning public IP addresses is called ________. A) CERN B) IEEE C) ICANN D) ISO

C) ICANN

Amazon S3 (Simple Storage Service) is an example of ________. A) SaaS B) PaaS C) IaaS D) VPN

C) IaaS

Which of the following is the most basic cloud offering? A) SaaS B) PaaS C) IaaS D) VPN

C) IaaS

Which of the following statements is true about IEEE 802.3? A) It is the protocol for wireless LAN connections. B) It is the protocol for Bluetooth. C) It is the protocol for wired LAN connections. D) It is the universal standard protocol for WNICs.

C) It is the protocol for wired LAN connections.

The four major ERP products of ________ are AX, Nav, GP, and Solomon. A) Oracle B) SAP C) Microsoft Dynamics D) Epicor

C) Microsoft Dynamics

A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship. A) 1:N B) 1:1 C) N:M D) M:1

C) N:M

Which of the following is an example of a PaaS? A) Apple iCloud B) Amazon EC2 C) Oracle on Demand D) Office 365

C) Oracle on Demand

Which of the following TCP/IP application-layer protocols is used for e-mail transmission? A) FTP B) HTTPS C) SMTP D) IP

C) SMTP

Which of the following is an international standard language for processing a database? A) Paradox B) DB2 C) SQL D) MS Access

C) SQL

________ refers to a person's belief that he or she can be successful at his or her job. A) Self-appraisal B) Self-actualization C) Self-efficacy D) Self-aggrandizement

C) Self-efficacy

________ are formally defined, standardized processes that involve day-to-day operations. A) Dynamic processes B) Unstructured processes C) Structured processes D) Kinetic processes

C) Structured processes

Which of the following statements about enterprise information systems is true? A) Their procedures are not documented, but are understood within the group. B) They do not require users to have any formal training. C) They are very difficult to change. D) They support 10 to 100 users.

C) They are very difficult to change.

Which of the following is true about cable modems? A) They provide high-speed data transmission using telephone cables. B) They offer consistent performance, irrespective of the number of users sending and receiving data. C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission. D) They provide faster download speeds than DSL modems.

C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.

________ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A) Administrators B) Developers C) Users D) Designers

C) Users

For a printer or laptop to connect to a wireless LAN, it must have a(n) ________. A) hyperlink B) UTP cable C) WNIC D) DSL

C) WNIC

A(n) ________ is an encapsulated software service provided over the Internet using standard protocols. A) ISP B) Web browser C) Web service D) Web server software

C) Web service

Most SM applications earn revenue through ________. A) selling license to their applications B) merchandising C) a type of advertising model D) viral marketing

C) a type of advertising model

Social capital depreciates, but such depreciation can be ameliorated by ________. A) dropping older relationships B) reducing the level of investment in relationships C) adding something of value to the interaction D) increasing one's human capital

C) adding something of value to the interaction

The top layer of TCP/IP Protocol architecture is related to ________. A) internets B) transport C) applications D) data links

C) applications

Which of the following business processes is related to human resources? A) lead tracking B) customer support C) assessment D) order management

C) assessment

In McAfee's SLATES Enterprise 2.0 model, "A" is for ________. A) avatar B) Ajax C) authoring D) affiliation

C) authoring

Which of the following is the smallest data element in a database? A) field B) record C) byte D) file

C) byte

A stored procedure is a ________. A) program stored in a database that keeps the database consistent when certain conditions arise B) history of actions executed by a database management system C) computer program stored in a database that is used to enforce business rules D) data structure that improves the speed of data retrieval operations in a database

C) computer program stored in a database that is used to enforce business rules

A line on an E-R diagram that indicates a 1:N relationship between two entities is referred to as ________. A) Kerberos B) maximum cardinality C) crow's feet D) minimum cardinality

C) crow's feet

A ________ describes the data and relationships that will be stored in a database. A) data aggregator B) query model C) data model D) data application

C) data model

An administrator should create a(n) ________ before developing a database design. A) data aggregator B) query model C) data model D) data application

C) data model

Metadata are ________. A) data stored on the main server B) error logs of databases C) data that describe data D) encrypted data transmissions

C) data that describe data

Process ________ is a measure of how well a process achieves organizational strategy. A) efficiency B) conformance C) effectiveness D) reliability

C) effectiveness

In a data model, a(n) ________ is something that a user wants to track. A) record B) byte C) entity D) primary key

C) entity

Which of the following business processes is related to operations? A) account tracking B) sales forecasting C) finished-goods inventory management D) treasury management

C) finished-goods inventory management

A ________ is content structure that has emerged from the processing of many user tags. A) mashup B) taxonomy C) folksonomy D) microblogging

C) folksonomy

A database design team transforms entities into tables and expresses relationships by defining ________. A) cardinalities B) attributes C) foreign keys D) departments

C) foreign keys

SM communities differ from communities in the past because they are ________. A) formed based on family relationships B) limited by geographic location C) formed based on mutual interests D) limited by organizational boundaries

C) formed based on mutual interests

Which of the following is a benefit of in-house hosting? A) superior flexibility and adaptability to growing or fluctuating demand B) lower capital requirements C) greater visibility of security and disaster preparedness D) fewer training requirements

C) greater visibility of security and disaster preparedness

Which of the following conditions exists when data are isolated in separated information systems? A) information overload B) encapsulation C) information silo D) data segregation

C) information silo

The primary purpose of an ERP system is ________. A) customization B) duplication C) integration D) customer acquisition

C) integration

The information system that a restaurant uses to order supplies and ingredients from its suppliers is an example of a(n) ________. A) enterprise information system B) personal information system C) interenterprise information system D) departmental information system

C) interenterprise information system

Which of the following is a significant risk of using social media for inbound and outbound logistics? A) loss of control B) loss of credibility C) loss of privacy D) loss of effectiveness

C) loss of privacy

In which phase of the customer life cycle are messages sent to the target market to attract customer prospects? A) relationship management B) loss/churn C) marketing D) customer acquisition

C) marketing

A(n) ________ converts an analog signal to a digital one during data transmission. A) switch B) access point C) modem D) ISP

C) modem

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. A) database B) application C) network D) server

C) network

An organization buys a proprietary database application to be used by a small workgroup of five people. This is an example of a(n) ________ DBMS. A) enterprise B) interenterprise C) personal D) open source

C) personal

Which of the following types of DBMS products is designed for smaller and simpler database applications? A) object-oriented DBMS B) strategic DBMS C) personal DBMS D) enterprise DBMS

C) personal DBMS

Which of the following is an example of a structured process? A) deciding on the location of a new store B) solving the problem of excessive product returns C) purchasing the right amount of raw materials D) using social media to create buzz about a new product

C) purchasing the right amount of raw materials

A ________ is a request for data from a database. A) data entry B) reporting C) query D) command

C) query

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product? A) marketing B) customer acquisition C) relationship management D) loss/churn

C) relationship management

When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital. A) human B) technical C) social D) mechanical

C) social

A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN. A) codec B) modem C) switch D) port

C) switch

Which of the following is defined as the elastic leasing of pooled computer resources over the Internet? A) broadband B) wiki C) the cloud D) Bluetooth

C) the cloud

A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise. A) stored procedure B) index C) trigger D) transaction

C) trigger

The connection between a VPN client and a VPN server is called a(n) ________. A) data highway B) hyperlink C) tunnel D) access point

C) tunnel

What are the three tiers in three-tier architecture? A) TCP, IP, and HTTP B) HTML, XML, and SGML C) user, server, and database D) router, switch, and access point

C) user, server, and database

In the Web 2.0 world, new features are released and vendors wait for users to spread the news to one another in a process called ________. A) expansion B) guerilla marketing C) viral marketing D) grapevine

C) viral marketing

Which one of the following characteristics is true for companies such as Google, Amazon.com, and eBay that exemplify Web 2.0? A) infrequent, controlled releases B) fixed product value C) viral marketing D) controlled, fixed interface

C) viral marketing

A characteristic of Web 2.0 is that the value of a Web site increases ________. A) over time B) in a linear fashion C) with users and use D) as the amount of capital invested in it increases

C) with users and use

Which of the following is an example of a database management system? A) MS Excel B) Unix C) Ubuntu D) Access

D) Access

________ is an example of a personal DBMS. A) SQL Server B) DB2 C) Oracle Database D) Access

D) Access

Which of the following is an example of IaaS? A) Apple iCloud B) Microsoft Azure C) Office 365 D) Amazon EC2

D) Amazon EC2

ERP vendor Infor acquired which of the following ERP products? A) Solomon B) GP C) Epicore 9 D) Baan

D) Baan

Which of the following is a nonrelational data store developed by Google? A) Cassandra B) Dynamo C) SharePoint D) Bigtable

D) Bigtable

Which of the following is true of the model of social media developed by Gossieaux and Moran? A) It is an economic perspective on social media, rather than a sociological one. B) It states that using social media to send messages that attempt to manage, influence, and control customers, employees, and partners is effective. C) It advocates the use of social media in an old-style, organization-centric manner. D) It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.

D) It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.

Which of the following statements is true about the IEEE 802.11 protocol? A) It is also known as Ethernet. B) It is used for wired LAN connections. C) It cannot be processed by access points. D) It allows speeds of up to 600 Mbps.

D) It allows speeds of up to 600 Mbps.

Which of the following is an SM application provider? A) Oracle B) SAP C) McAfee D) LinkedIn

D) LinkedIn

Which of the following is the device that connects a computer's or printer's circuitry to network wires? A) port B) switch C) router D) NIC

D) NIC

Which of the following is an example of a dynamic process? A) Samsung accepts a return of a defective television from its dealer. B) Starbucks places an order for coffee beans from its local supplier. C) Amazon.com hires customer service respresentatives to help customers with their online orders. D) Nike uses Facebook and Twitter to generate buzz about its new line of running shoes.

D) Nike uses Facebook and Twitter to generate buzz about its new line of running shoes.

The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture. A) FTP B) VOIP C) ICANN D) TCP/IP

D) TCP/IP

Which of the following is true of N:M relationships? A) The number of entities on each side must be equal. B) They are common examples of minimum cardinalities. C) They are also called one-to-many relationships. D) They can have more than one entity on each side of the relationship.

D) They can have more than one entity on each side of the relationship.

Which of the following statements is true of defenders-of-belief communities? A) They are open to changing their belief when confronted with contrary evidence. B) They are very effective for activities that involve innovation or problem solving. C) They are useful in customer service activities. D) They seek conformity and want to convince others of the wisdom of their belief.

D) They seek conformity and want to convince others of the wisdom of their belief.

Which of the following statements is true regarding departmental information systems? A) They are easy to change. B) They minimize data duplication among departments. C) They can be operated without training. D) They support 10 to 100 users.

D) They support 10 to 100 users.

A service provider creates a service description, which documents how to use a service, and publishes that description using a standardized language called ________. A) SGML B) XML C) HTML D) WSDL

D) WSDL

________ is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web. A) SGML B) IPv4 C) IPv6 D) XML

D) XML

Web 2.0 companies provide software ________. A) as a licensed product with hefty fees B) with controlled releases C) as a non-installable product D) as a free service

D) as a free service

Entities in a data model have ________ that describe the characteristics of the entity. A) characters B) primary keys C) codes D) attributes

D) attributes

Information systems improve process quality by ________. A) duplicating data B) entirely replacing human activity C) changing the work culture D) controlling process flow

D) controlling process flow

Identify the first step in transforming a data model into a relational database design. A) representing the data relationships B) normalizing the data and files C) creating foreign keys D) creating a table for each entity

D) creating a table for each entity

Emergence in the context of management means loss of control of ________. A) finances B) customers C) sales D) employees

D) employees

The major benefit of enterprise application integration is that it ________. A) minimizes the requirement for formalized procedures B) acts as a cost effective alternative to ERP, with greater capabilities C) utilizes a centralized database D) enables organizations to use existing applications

D) enables organizations to use existing applications

A(n) ________ DBMS is designed to process large organizational and workgroup databases. A) operational B) process C) personal D) enterprise

D) enterprise

Which of the following information systems minimizes data duplication among departments? A) interenterprise information systems B) departmental information systems C) personal information systems D) enterprise information systems

D) enterprise information systems

Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________. A) identifiers B) records C) primary keys D) entities

D) entities

Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________. A) links B) authoring C) signals D) extensions

D) extensions

The columns in a database are called ________. A) records B) tables C) files D) fields

D) fields

A(n) ________ contains the URL of the Web page to find when a user clicks on it. A) access point B) IP address C) Web server D) hyperlink

D) hyperlink

Which of the following database administration tasks is related to adaptation? A) monitoring backup procedures B) conducting training for users C) monitoring database performance D) managing configuration changes in systems

D) managing configuration changes in systems

The database administrator of an organization constantly manages the processing rights and responsibilities of employees. This is an example of a(n) ________ task. A) development B) recovery C) adaptation D) operational

D) operational

In cloud computing, resources are said to be "pooled" because ________. A) organizations use the public Internet to create the appearance of a private connection B) organizations use open source standards which enable users to modify a program's source code C) organizations offer their services to each other free of charge, in a give-and-take arrangement D) organizations share the same physical hardware through virtualization

D) organizations share the same physical hardware through virtualization

Which of the following business processes is related to manufacturing? A) order entry and tracking B) finished-goods inventory management C) product and brand management D) planning and scheduling

D) planning and scheduling

Which of the following is a risk associated with human resources using social media to form conclusions about employees? A) loss of privacy B) loss of control C) decrease in efficiency D) possibility of error

D) possibility of error

The inherent processes defined in an ERP solution are known as ________. A) database transactions B) stored procedures C) transaction logs D) process blueprints

D) process blueprints

When you modify or delete data present in a database, you are ________. A) creating a new database B) forming a data model C) simplifying the data structure D) processing the database

D) processing the database

A ________ is a set of rules that programs on two communicating devices follow. A) codec B) URL C) packet D) protocol

D) protocol

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants. A) report B) reference C) data entry D) query

D) query

In an E-R diagram, a line between two entities represents a(n) ________. A) attribute B) identifier C) cardinality D) relationship

D) relationship

Minimum cardinalities in an E-R diagram refer to the minimum number of entities required in a(n) ________. A) department B) database C) attribute D) relationship

D) relationship

Defenders-of-belief communities facilitate activities like ________. A) customer service B) manufacturing and operations C) inbound logistics D) sales and marketing

D) sales and marketing

According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen. A) defenders of belief B) advocates of philosophy C) supporters of fidelity D) seekers of the truth

D) seekers of the truth

Which of the following formations on a line in an E-R diagram means that the relationship need not have an entity of that type? A) vertical bar B) arrow C) double line D) small oval

D) small oval

The first step that any hyper-organization should take is to develop and publicize a(n) ________ policy. A) foreign B) insurance C) corporate responsibility D) social media

D) social media

Deleting problematic content on social networking sites is best reserved for when ________. A) the content has grammatical errors B) the content is contributed by a layperson C) the content is legitimate, but negative D) the content is obscene and inappropriate

D) the content is obscene and inappropriate

Responding to problematic content on social networking sites is best reserved for when ________. A) the problematic content is truthful and legitimate B) the problematic content is obscene and contributed by crackpots C) the problematic content represents reasonable criticism of the organization's products or services D) the problematic content has caused the organization to do something positive as a result

D) the problematic content has caused the organization to do something positive as a result

Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems? A) giving employees ultimatums and deadlines B) paying employees straight out for transitioning to the new system C) coercing employees to learn the new system D) training employees on the successful use of the new system

D) training employees on the successful use of the new system

Information silos are not a problem until they begin to ________. A) rely on service-oriented architecture B) integrate data C) revise business processes D) use and store data about the same entities

D) use and store data about the same entities


Conjuntos de estudio relacionados

CHEMLEC: Atomic Symbol, Atomic Mass and Isotopes

View Set

Chapter 17: Industrial Supremacy

View Set

Practice Exams 11, 12, 14 - Anatomy Midterm

View Set

Erikson's 8 stages of psychosocial development

View Set

California Real Estate Principals Ch. 4

View Set