MIS 513 - Midterm (Quizzes), MIS Midterm Chapter 1, Quiz 1, TRUE MIS 3302 UHD Exam 2 (Ch.5-8) Review, UHD M.I.S. 3302 Final (ALL CHAPTERS), MIS FINAL EXAM, IS Chapter 3, IS Chapter 4, MIS 304 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a basic concept associated with Web 2.0?

-Airbnb -Uber -YouTube

example of business-to-business electronic commerce

-Allyspareparts.com selling glass for windshields and rearview mirrors to automobile manufacturers. -Blueberrypie4u.com selling pastries, candies, and chocolate bars to supermarkets

Examples of Asynchronous Communication:

-Discussion boards -Texting -Emailing

Which of the following is a core activity on according to the value chain model?

-Inbound Logistics -Operations and Manufacturing -Outbound Logistics -Marketing and Sales -Customer Service

In the procure-to-pay process, the negotiation of price and terms is followed by __________.

-Issuing of the purchase order -Receiving the goods -Receiving and paying the invoice.

Which of the following characterized the fourth generation of computing, which began in the 1990s?

-It was the beginning of the interpersonal computing era. -The end of the personal computer era

click-and-mortar business strategy example

-JCPenney has an online store as well as physical stores. -Walmart has an online store as well as physical stores. -Best Buy has an online store as well as physical stores.

Which of the following types of communication is asynchronous?

-Messages posted on Facebook -Email -Microblog -Webcast -A slideshare presentation posted on the Web These are not coordinated in time.

example of government-to-business electronic commerce

-The U.S. government buying office supplies using an online procurement Web site. -Juanita signing up for city water and sewer services and paying her bill for the services online

Cloud computing

-dependent on a vendor -does not give complete control over data -provides little visibility into true security and disaster preparedness capabilities

The managerial (or tactical) level of decision making

-functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization. - focus on specific business functions. -is referred to as semistructured decision making because solutions and problems are not clear-cut and often require judgment and expertise.

Big Data

-is a method of gaining business intelligence and making better business decisions. -a megatrend of the Information Age.

examples of synchronous communication

-virtual meeting -chatting online -A phone call

A USB port, short for universal serial bus port, can connect up to 127 different peripheral devices together with a single connector.

...

A computer keeps data, instructions and information on a register media.

...

A light-sensing input device that coverts printing text and images into a form the computer can process is which of the following?

...

A storage device records (writes) and/or retrieves (reads) items to and from storage media.

...

A website is a collection of related webpages and associated items, such as documents and pictures, stored on a web server.

...

An IP address is a sequence of number and letters that uniquely identifies each computer or device connected to the Internet.

...

Any hardware component that conveys information from a computer or mobile device to one or more people is known as a(n) ____________________.

...

E-mail is a utility program.

...

FTP is an acronym that stands for "First Transfer Protocol".

...

In which gesture do you move two fingers apart?

...

In which gesture do you move two fingers together?

...

In which gesture do you press and hold one finger on an object and then move the finger to the new location?

...

It certifications can do which of the following for the certified employee?

...

Memory consists of electronic components that store instructions waiting to be executed and the data needed by those instructions

...

Software that enables users with an Internet connection to access and view webpages on a computer or mobile device is known as which of the following?

...

Software, also called a(n) ____________________, tells the computer what tasks to perform and how to perform them.

...

The DNS in "DNS server" stands for which of the following?

...

The Internet has its roots in a network that became functional in 1969, linking scientific and academic researchers across the United States. What was the name of that network?

...

The applied science devoted to incorporating comfort, efficiency and safety into he design of items in the workplace is known as which of the following?

...

What is a program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the collected information to some outside source while the user is online known as?

...

What is a security tool that detects and protects a computer and its data from unauthorized intrusions?

...

What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks

...

What translates domain names, the text-based name that corresponds to an IP address, to its associated IP address?

...

Which kind of device is hardware capable of transferring items from computers and devices to transmission media and vice versa?

...

Which of the following allows users to create and manipulate documents?

...

Which of the following conveys meaning and is useful to users?

...

Which of the following enables users to speak to other users over the Internet?

...

Which of the following facilitates the transfer of files from one computer to another over the Internet?

...

Which of the following is NOT an example of malware?

...

Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media?

...

Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video?

...

Which of the following is a computer dedicated to providing one or more services to other computers or devices on a network?

...

Which of the following is a popular Cisco certification?

...

Which of the following is a program that extends the capability of a web browser?

...

Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?

...

Which of the following is a set of programs that coordinates all the activities among a computer or mobile device's hardware?

...

Which of the following is a special purpose computer that functions as a component in a larger product?

...

Which of the following is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals?

...

Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?

...

Which of the following is an electronic version of a printed book, readable on computers and other digital devices?

...

Which of the following is an example of an operating system?

...

Which of the following is equal to approximately one million characters?

...

Which of the following represents the amount of data that travels over a network?

...

Which of the following software allows users to organize data in rows and columns and performs calculations?

...

Which software allows users to create, access and manage data?

...

Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?

...

You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as?

...

3 types of Globalization

1. Economic Changes 2. Cultural Changes 3. Technological Changes

An IP address is a _______

32-bit number

How many bits in a byte?

8

A recent trend in display advertising has been ________ advertising, where the ads placed on a page are in some way related to the content of that page. A) contextual B) buzz C) viral D) affiliate E) stealth

A

Ben buys a camera from Xenthix which starts malfunctioning, as the camera fell down from his hand and broke its lens. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage is of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce? A) Ben sells the camera to Balvinder Singh on Iora.com. B) Ben files an online suit against Xenthix. C) Ben files a complaint on Xenthix's Web site asking for a refund. D) Ben buys another camera from Xenthix's online store. E) Ben sells the camera to the world's largest used camera dealer Koenister.com.

A

Doug, a frequent visitor of online auction sites, uses two different accounts-one to place a low bid and the other to place a very high bid on the desired item. This leads to other bidders dropping out of the auction. He then retracts the high bid and wins the item at the low bid. This form of e-auction fraud is known as ________. A) shill bidding B) bid luring C) rafter bidding D) mystery bidding E) bid skimming

A

E-filing is an example of a ________ tool. A) government-to-citizen B) consumer-to-consumer C) government-to-government D) consumer-to-business E) business-to-business

A

Hatso, a famous hat retailer chain, opens a new store in Kentucky and chooses to operate solely in the traditional physical markets. It approaches business activities in a traditional manner by operating physical locations such as retail stores and not offering their products or services online. Which of the following business strategies does Hatso follow? A) brick-and-mortar B) click-only C) organizational D) low-cost leadership E) differentiation

A

How do comparison shopping sites generate revenue? A) by charging a commission on transactions B) by selling their products in physical stores as well C) by charging a virtual shelf space fee to manufacturers D) by increasing the click count on their sites E) by charging distribution fees to consumers

A

How is structural firmness of a Web site achieved? A) by providing understandable messages if anything goes wrong B) by redirecting Web pages to different sites if any link fails C) by using technical jargons to define a problem D) by developing a mirror site E) by implementing a complicated source code

A

Identify a characteristic of the Web that influences a Web site's security and performance. A) structural firmness B) functional convenience C) cost compliance D) representational delight E) disintermediation capacity

A

Identify a key driver for m-commerce. A) location-based services B) economic conditions C) Web-based applications D) crowdsourcing E) offshoring

A

Identify a true statement about reintermediation with reference to e-tailing. A) It refers to the design of business models that reintroduce middlemen. B) It refers to the design of business models that eliminate middlemen. C) It provides ways for clients and firms to conduct business online without human assistance. D) It provides ways for clients and firms to conduct business activities in a traditional manner by operating physical locations. E) It enables access to Web sites linked to corporate databases in order to provide real-time access to personalized information.

A

Identify a true statement about the Internet of things. A) It enables companies to offer various innovative products and services that go beyond the initial purchase. B) It defines a set of reachable and exploitable vulnerabilities present in a business model. C) It contains rules and guidelines that describe how security is to be enforced during system operation. D) It identifies the tasks that are critical within a business model and builds a network that depicts their interdependencies. E) It is defined as the percentage of visitors who leave the Web site after viewing that page.

A

Identify a true statement about the function of Google's Ad Words. A) It ensures high-quality leads when a search is conducted online. B) It presents a view of short-term technology integration. C) It presents a view of long-term technology integration. D) It redirects Web pages to different sites if the link fails. E) It provides immediate communication to and receives feedback from customers.

A

If a company's Web site is in the sponsored list of a search engine, the search engine receives revenue on a ________ basis. A) pay-per-click B) pay-per-sale C) click-through D) pay-per-conversion E) click-per-visit

A

In the context of GPS-enabled location-based services, the ability to determine the basic geographic position of a cell phone is an example of ________ service. A) location B) mapping C) navigation D) tracking E) reintegration

A

When shoppers come into a store to evaluate the look and feel of a product, just to then purchase it online or at a competitor's store is known as ________. A) showrooming B) a rafter bid C) freecycling D) a forward auction E) crowdsourcing

A

Which of the following occurs in a reverse pricing model? A) Customers specify the product they are looking for and how much they are willing to pay for it. B) Companies set the prices that customers pay for products. C) Companies conduct an online auction for all products available for sale. D) Customers specify the product they are looking for and the company provides the product with a price. E) Companies negotiate special volume discounts with local businesses and offer them to their customers.

A

Which of the following statements explain mass customization? A) Firms tailor their products and services to meet a customer's particular needs on a large scale. B) Firms immediately provide communication to and receive feedback from customers. C) Firms provide ways for clients to conduct business online without human assistance. D) Firms market their products and services over vast distances. E) Firms link Web sites to corporate databases to provide real-time access to personalized information.

A

Which of the following statements is true about electronic commerce? A) Business-to-business electronic commerce is by far the largest form of electronic commerce in terms of revenues. B) Electronic commerce is limited to transactions between businesses and consumers. C) Electronic commerce between businesses and their employees is impossible. D) All forms of electronic commerce involve business firms. E) Consumer-to-consumer electronic commerce is a complete reversal of the traditional business-to-consumer electronic commerce.

A

Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. The introduction of middlemen in business models is an example of ________. A) reintermediation B) remutualization C) gentrification D) disintermediation E) defalcation

A

________ is the largest e-auction site. A) eBay B) Asos C) Zappos D) ePier E) Fitiquette

A

payment service

A __________ allows customers to purchase goods without providing private information.

value proposition

A __________ is what a business provides to a customer and what the customer is willing to pay for that product or service.

Microsoft SharePoint is an example of what type of technology?

A content management system

Porsche, Nordstrom, and IBM are examples of companies that pursue which type of strategy?

A differentiation strategy. These companies try to provide better products or services than their competitors.

social bookmarking

A group of employees is tasked with collecting information related to eSports to identify the potential for a venture. The employees are entirely dependent on information they find on the Internet and tag content using defined keywords to aid collaboration. Which of the following terms is most closely linked to the task the employees are performing?

collaboration

A group of people working together to achieve a common goal

intranet

A private network that is used exclusively within an organization is sometimes called a(n)

Which of the following is a difference between a server and a workstation?

A workstation is typically used by one user at a time

protocol

A(n) __________ is a set of rules that programs on two communicating devices follow.

34) Which of the following occurs if only one computer needs to use the network in a packet-switching system?

A) Data is sent continuously.

70) Which of the following differentiates grid computing from cloud computing?

A) Grid computing uses a large number of computers.

40) Web servers process user requests for pages using the ________.

A) Hypertext Transfer Protocol

3) ________ deliver information to you in a usable format.

A) Output technologies

31) ________ is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the Internet concurrently.

A) Packet switching

61) Which of the following statements is true about the software as a service model?

A) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

63) Which of the following statements is true about the infrastructure as a service model?

A) The customer has to manage the licenses for the operating systems being used.

22) Which of the following statements is true about servers?

A) They are used to provide services to users within large organizations or to Web users.

35) Internet protocol or the protocol used by the Internet is called the ________.

A) Transmission Control Protocol (TCP)

15) The customer relationship management system and personal productivity software are examples of ________.

A) application software

56) Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.

A) collocation facilities

69) ImmuneEarth, a research and development company, has a motto to "eradicate all diseases." It has numerous departments that research the cure of various diseases. One of its largest departments include the AIDS department where more than 500 scientists are researching the cure for AIDS. ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose. Recently, one of its computers was updated because it had low performance which had slowed the entire system. Which of the following is ImmuneEarth using to research the cure for AIDS?,

A) grid computing

49) Which of the following is the host name in the URL "labs.google.co.in/jack carver?"

A) labs

28) In ________ networks, servers and clients have defined roles.

A) server-centric

17) A ________ is the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems.

A) supercomputer

11) The operating system of a computer is an example of a(n) ________ software.

A) systems

46) Which of the following is likely to have the suffix ".org" after the domain name in its URL?

A) the Red Cross Society

7) The primary storage is also known as ________.

A) volatile memory

Which of the following is an example of software theft?

ALL OF THEM b. Intentionally erasing programs c. Illegally register and/or activate a program d. Illegally copying a program

Which of the following is the main objective of information systems that focuses on improving supply chains?

Accelerate product development and innovation and to reduce costs. (Supply chain management systems - SCM)

The amount of time it takes the processor to read from memory, and which is measured in nanoseconds is known as which of the following?

Access Time

Which of the following is an example of an HTML editor?

Adobe Dreamweaver

Which of the following is a signal that is continuous and varies in strength and quality and has an infinite number of values?

Analog

Organizations that effectively utilize __________ can more easily customize marketing campaigns from the segment level to even the individual customer.

Analytical CRM

Which of the following explains Web analytics?

Analyzing Web surfers' behavior in order to improve Web site performance

Which of the following statements is true about peer production?

Anyone can help in producing or improving the final outcome.

Managerial

At the __________ level of decision making, functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization.

________ use(s) information systems to enhance a person's perception of reality by providing relevant information about the user's surroundings with the use of special glasses or other devices.

Augmented Reality

Click-through rate reflects ________. A) the ratio of surfers who visit a Web site divided by the number of surfers who clicked on an ad B) the ratio of surfers who click on an ad divided by the number of times it was displayed C) the percentage of visitors who actually perform the marketer's desired action D) the ratio of surfers who click on an ad divided by the number of people who make a purchase E) the ratio of surfers who visit a Web site divided by the number of people who make a purchase

B

Companies use ________ in an attempt to move up their Web sites in the organic search engine results. A) search engine image protection B) search engine optimization C) search engine keyword insertion D) search-oriented architecture E) domain stacking

B

Companies using a ________ business strategy are also called virtual companies. A) click-and-flip B) click-only C) brick-and-mortar D) bricks-and-clicks E) click-and-mortar

B

EZBiz, the brainchild of three college friends, is a startup venture that plans to produce and market sports gear. The venture is still stuck in the planning phase as they have not been able to decide the suitable business strategy to opt for. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy? A) The company has limited access to funds and is looking to keep its costs low. B) The public is wary of sharing confidential information after a recent spate of credit card scandals. C) A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain. D) Several companies who have switched from a brick-and-mortar strategy to a click-only strategy are experiencing severe channel conflicts. E) Some click-only companies have been unable to achieve economies of scale and are subsequently unable to offer lower prices.

B

In the context of GPS-enabled location-based services, capturing specific locations to be viewed on the phone is an example of ________ service. A) location B) mapping C) navigation D) tracking E) disintegration

B

The auction site eBay.com is an example of ________ electronic commerce. A) business-to-business B) consumer-to-consumer C) business-to-consumer D) consumer-to-business E) government-to-business

B

Timothy was reading tournament results of the football World Cup matches on Infogoalistic.com. As he was going through the results, an advertisement of new football studs popped up. This is an example of ________ advertising. A) covert B) contextual C) surrogate D) niche E) user-generated

B

When a Web site ensures privacy and security of the consumer's data, ________ can be achieved. A) reintermediation B) structural firmness C) disintermediation D) functional convenience E) representational delight

B

Which of the following is a disadvantage of e-tailing? A) It is limited by physical store and shelf space restrictions. B) It requires additional time for products to be delivered. C) It complicates the process of comparison shopping. D) It restricts companies from effectively competing on prices. E) It reduces a company's inventory turnover time.

B

Which of the following statements is true about firms pursuing a brick-and-mortar business strategy? A) These firms avoid indulgence in physical store locations. B) These firms avoid indulgence in electronic commerce. C) These firms are only involved in export business activities. D) These firms indulge in rafter bidding activities. E) These firms operate in both physical and virtual arenas.

B

Which of the following statements is true about firms pursuing a click-and-mortar business strategy? A) These firms are only involved in export business activities. B) These firms operate in both physical and virtual arenas. C) These firms are involved in rafter bidding activities. D) These firms conduct business only electronically in cyberspace. E) These firms avoid indulgence in physical store locations.

B

With respect to the online consumer's hierarchy of needs, identify the most critical characteristic of a Web site. A) functional convenience B) structural firmness C) representational delight D) descriptive link text E) cross-platform compatibility

B

________ are two-dimensional barcodes with a high storage capacity that are typically used to point the consumer to a particular Web page when he or she scans the barcode with a mobile device's camera. A) Viral codes B) QR codes C) MSI barcodes D) MaxiCodes E) CPC Binary Barcodes

B

________ is a three-digit code located on the back of a credit or debit card that is used for authorization by the card-issuing bank to combat fraud in online purchases. A) Competitive Fraud Detector B) Card Verification Value C) Online Purchase Processor D) Card Detection Value E) Purchase Processing Value

B

________ is defined as the percentage of visitors who leave the Web site after viewing that page. A) Bounce rate B) Exit rates C) Link rate D) Web analytics E) Domain analytics

B

32) Which of the following is mandatory for packet switching to work?

B) Each packet being sent across a network must be labeled with a header.

68) ________ is used to transmit voice and video communication over the Internet.

B) IP convergence

64) Which of the following statements is true about a public cloud?

B) It can be used by any interested party on a pay-per-use basis.

43) Which of the following statements is true about a uniform resource locator?

B) It is used to identify and locate a particular Web page.

8) Which of the following statements is true about secondary storage?

B) It retains the data when the power to the computer is shut off.

65) EasyQuery is a knowledge management company that is contemplating a partnership with Kasko, a cloud service provider. The management of EasyQuery is particularly concerned about Kasko's viability and will start a partnership only when it is sure that Kasko meets this criteria. Assume that viability is the only criteria that a cloud service provider needs to meet. If EasyQuery enters into a partnership with Kasko, it means that ________.

B) Kasko has long-term sustainability

54) Which of the following occurred in the 1990s-2000 generation of computing?

B) The personal computer era ended and interpersonal computing began.

5) The ________ is responsible for performing all the operations of the computer.

B) central processing unit

26) A ________ is any computer on the network, or any software application that uses only the services provided by the server.

B) client

48) In a URL, the ________ is the particular Web server or group of Web servers (if it is a larger Web site) that will respond to the Web request.

B) host name

38) Prior to the invention of the Web, content posted on the Internet could be accessed through the Internet tool Gopher. The Web took Gopher one step further by introducing ________.

B) hypertext

21) A ________ is used for personal computing and small business computing.

B) microcomputer

19) A ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network.

B) server

14) Which of the following tasks is performed by the application software?

B) writing a business letter

Entering a large number of separate forms or documents into a computer system and manipulating these data at a single time is referred to as ________.

Batch processing

Which of the following is a megatrend of the Information Age?

Big data

example of consumer-to-consumer electronic commerce.

BooksForAll.com allowing consumers to sell their books to other consumers for a fixed price

How is business process management similar to quality improvement approaches such as total quality management?

Both intended to be cross-functional approaches to improve an organization.

________ are a set of activities an organization performs in order to reach their business goals.

Business processes

Which of the following statements is true about electronic commerce?

Business-to-business electronic commerce is by far the largest form of electronic commerce in terms of revenues.

How do key performance indicators help functional managers to enhance business processes?

By assessing the organization's progress toward a certain goal

How can green computing be implemented in an organization?

By using virtualization to replace hundreds of individual servers with just a few powerful mainframe computers

Bookseller Barnes & Noble is an example of a ________ company. A) flip-only B) click-only C) click-and-mortar D) click-and-flip E) brick-and-mortar

C

In ________ pricing, companies set the prices that consumers pay for products. A) viral B) top-up C) menu-driven D) reverse E) rafter bid

C

In the context of GPS-enabled location-based services, the ability to give route directions from one point to another is an example of ________ service. A) mapping B) disintegration C) navigation D) reintegration E) tracking

C

In the context of pay-per-click models, inflating the revenue to a host or increasing costs for the advertiser by repeatedly clicking on a link is called ________ fraud. A) link B) affiliate C) click D) conversion E) disintermediation

C

The form of electronic commerce that is used by organizations to conduct business with business partners without involving the end consumer is known as ________ electronic commerce. A) business-to-consumer B) peer-to-peer C) business-to-business D) business-to-intermediary E) business-to-supplier

C

The online sales of goods and services are known as ________. A) e-information B) e-integration C) e-tailing D) e-collaboration E) e-filing

C

Under the ________ pricing model, the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement. A) pay-per-refresh B) pay-per-sale C) pay-per-click D) pay-per-conversion E) click-per-visit

C

Walmart.com is an example of a ________ retailer. A) brick-and-mortar B) click-only C) bricks-and-clicks D) click-and-flip E) brick-and-flip

C

Which of the following characteristics of the Web deals with stimulating a consumer's senses? A) functional convenience B) cost compliance C) representational delight D) structural firmness E) disintermediation capacity

C

Which of the following is an example of reintermediation? A) The diamond card of the Futilery Centriono, is issued by invitation only to customers who spend more than $250,000 a year on their shopping card. B) Nanny Duke, a baby products manufacturing company, acquires a list of parents-to-be and showers them with samples of diapers and other baby products to capture a share of their future purchases. C) Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations. D) Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers. E) Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute meals in order to provide competition to the other food chains in the area.

C

Which of the following statements is true about companies pursuing a click-only business strategy? A) These companies approach business activities by operating in physical locations. B) These companies operate in both physical and virtual arenas. C) These companies conduct business electronically in cyberspace. D) These companies are only involved in export business activities. E) These companies choose to operate their business activities solely in the traditional manner.

C

24) ________ is the transmission capacity of a computer or communications channel.

C) Bandwidth

67) ________ is used to increase Web application performance.

C) Edge computing

72) ________ has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs.

C) IP convergence

1) ________ are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse.

C) Input technologies

42) Which of the following is true about the graphical Web browser Mosaic?

C) It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox.

41) Which of the following statements is true about the Information Infrastructure Act?

C) It opened the Web for commercial purposes.

45) Which of the following is likely to have the suffix ".com" after the domain name in its URL?

C) Microsoft

52) The first CPU had 2,200 transistors, whereas the newest models have broken the 2-billion-transistor mark. Take for example, the Intel Core i7 Extreme CPU which can complete hundreds of millions of operations every second. Which of the following is the most similar to this scenario?

C) New generation digital cameras have a higher number and size of pixels than older digital camera models.

23) ________ define the procedures that different computers follow when they transmit and receive data.

C) Protocols

10) ________ is the collection of programs that control the basic operations of computer hardware.

C) Systems software

62) Which of the following statements is true about the platform as a service model?

C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.

53) Which of the following occurred in the 1964-1990s generation of computing?

C) The mainframe era ended and the personal computer era began.

12) Operating systems are often written in ________, a very low level computer programming language that allows the computer to operate quickly and efficiently.

C) assembly language

30) The Internet relies on ________ technology to deliver data and information across networks.

C) packet-switching

27) A ________ is any computer that requests and provides services.

C) peer

36) A ________ is a device used to connect two or more individual networks.

C) router

55) Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________.

C) the product is designed to last only for a certain life span

20) Designed for medical, engineering, or animation and graphics design uses, ________ are optimized for visualization and rendering of three-dimensional models.

C) workstations

eBay is an example of which type of e-commerce site?

C2C

________ is a three-digit code located on the back of a credit or debit card that is used for authorization by the card-issuing bank to combat fraud in online purchases

Card Verification Value

Which of the following is an example of green computing?

Changing the power-saving setting on all of an organization's computers. It prevents energy from being wasted while computers are idling or left on overnight.

Which of the following is NOT a typical revenue model in the digital world?

Channel marketing

Which of the following is a valid way to protect yourself when shopping on a Web site?

Check the site's privacy policy

What does the first wave of change consist of?

Civilization based on Agriculture and handwork; Relatively Primitive Stage; Luddites opposed technology

Which of the following is a recording of a user's path through a website?

Clickstream Data

Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users access through the Internet?

Cloud

The various services offered by Google, such as Gmail (e-mail), Google Drive (word processing), or Google Calendar, all of which are accessed via a Web browser, freeing users from the task of installing or updating traditional desktop applications or worrying about storing or backing up data, are good examples of ________.

Cloud Computing

Dropbox is an example of a __________ collaboration tool.

Cloud based

Which type of information systems enables people to communicate, team up, and coordinate with each other?

Collaborative System

The ".com" suffix in a Uniform Resource Locator is reserved for ________.

Commercial organizations

Which of the following is a challenge for organizations when it comes to sustaining a competitive advantage?

Competitors can copy strategic systems. Smart rivals are quick to duplicate or improve on a successful system.

The ability to independently learn new technologies as they emerge and assess their impact on your work and life is called ________.

Computer Fluency

Which of the following occurs during wiki wars?

Contributors continuously edit or delete each other's posts

The component of the processor that direct and coordinates most of the operation in the computer is known as which of the following?

Control Unit

Knowledge workers are professionals who

Create, modify, and/or synthesize knowledge as a fundamental part of their jobs

________ is the securing of business financing from individuals in the marketplace.

Crowdfunding

________ is used in consumer-to-business e-commerce to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people.

Crowdsourcing

A ________ is a form of e-auction which allows businesses to buy seized and surplus government equipment. A) reverse auction B) mystery auction C) top-up D) forward auction E) rafter bid

D

A click-and-mortar business strategy is also referred to as a ________ business strategy. A) click-and-flip B) brick-and-mortar C) click-only D) bricks-and-clicks E) brick-and-flip

D

A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of ________ electronic commerce. A) business-to-consumer B) government-to-citizen C) government-to-business D) government-to-government E) business-to-business

D

A way to ensure that a company's site is on the first page users see when looking for a specific term is using ________ advertising. A) stealth B) viral C) buzz D) search E) affiliate

D

Bid shielding is sometimes called ________. A) bid skimming B) bid luring C) reverse bidding D) shill bidding E) rafter bidding

D

Identify a true statement about a nanotube-based computer. A) It operates with just two bytes of information, and can only count to 16. B) It operates with just one bit of information, and can only count to 64. C) It operates with just one bit of information, and can only count to 8. D) It operates with just one bit of information, and can only count to 32. E) It operates with just two bytes of information, and can only count to 32.

D

In electronic commerce, ________ is defined as the percentage of single-page visits. A) exit rate B) showrooming C) freecycling D) bounce rate E) value chain analysis

D

Online retailer Amazon.com is an example of a ________ company. A) click-and-mortar B) click-and-flip C) bricks-and-clicks D) click-only E) brick-and-mortar

D

Which of the following explains Web analytics? A) conducting online marketing research to improve product quality B) analyzing Web sites in order to find the best one in a category C) tracking all online purchasers to try and increase their frequency of visit to a particular Web site D) analyzing Web surfers' behavior in order to improve Web site performance E) analyzing Web sites in order to find the best online business practices

D

Which of the following is an example of business-to-consumer electronic commerce? A) Brenda files her income tax online. B) Canchi, a shoe manufacturer, conducts business over the Web with its retailers. C) Juan buys Kevin's guitar on Monsung.com. D) Reuben buys a pair of shoes on Mysticshoes.com. E) Neal places a bid for a mobile phone on the online auction site Feliciate.com.

D

Which of the following is an example of disintermediation? A) Anister, a car-manufacturing company, markets most of its four-wheel drives in high altitude regions where vehicles require more power. B) Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute meals in order to provide competition to the other food chains in the area. C) Aubrey Thirst Quencher is a market leader in sports drinks. It expands its market by providing its drinks to working women in urban areas. D) Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers. E) A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment.

D

________ is used in consumer-to-business e-commerce in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people. A) Nearshoring B) Insourcing C) Offshoring D) Crowdsourcing E) Homesourcing

D

66) ________ is used to solve large-scale computing problems.

D) Grid computing

47) Which of the following is likely to have the suffix ".edu" after the domain name in its URL?

D) Harvard Business School

37) Datagram routing and delivery are possible because every computer and router connected to the Internet is assigned an ________.

D) IP address

50) Which of the following statements is true about an IP address?

D) It can be used to navigate to particular Web addresses.

29) ________ networks enable any computer or device on the network to provide and request services. All members of the network have equivalent capabilities and responsibilities.

D) Peer-to-peer

33) Which of the following statements is true about packet-switching systems?

D) These systems adapt instantly to changes in network traffic.

2) Which of the following statements is true about processing technologies?

D) They transform inputs into outputs.

25) Bandwidth is measured in ________.

D) bits per second

71) In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A ________ can help overcome these problems.

D) dedicated grid

18) A ________ is used primarily as the main, central computing system for major corporations.

D) mainframe

13) Which of the following tasks is performed by the systems software?

D) printing documents

59) The ability to adapt to increases or decreases in demand for processing or data storage is known as ________.

D) scalability

6) Any input your computer receives is digitized and then is processed by the CPU. Which of the following explains the meaning of the word "digitized" in the preceding sentence?

D) translated into binary code

57) Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.

D) utility computing

Which of the following allows for storage and management of a company's documents, such as word processing documents, presentations and spreadsheets?

DMS (Document management system)

Which of the following identifies the quality of data in a database?

Data Integrity

A collection of data organized in a manner that allows access, retrieval and use of that data is known as which of the following?

Database

Which of the following allows users to add, modify and delete data?

Database management system

Which of the following allow organizations to easily store, retrieve, and analyze data?

Database management systems

With respect to the types of information systems used in organizations, a product demand forecasting system is an example of a(n) ________ system.

Decision Support

With respect to the types of information systems used in organizations, a product demand forecasting system is an example of a(n) ________ system.

Decision support

Which of the following is an implication for firms that have a threat of new entrants into their market?

Decreased market share

Information about one's identity and place of living is an example of

Demographic Data

Which of the following statements is true about Collaboration?

Describes a group of people working together to achieve a common goal.

Employees at Z-Gadgets, a global organization, often participate in online meetings with their colleagues who are located in different countries. To participate in such meetings, the employees use their own computers and headsets with microphones to interact with one another. Identify the collaboration technology used by the employees of Z-Gadgets.

Desktop Video conferencing

What is a cultural challenge of operating in the digital world?

Differences in Power distance and uncertainty avoidance

Which of the following is a geoeconomic challenge of operating in the digital world?

Differences in network infrastructures

An event or action that could cause a loss of or damage to a computer or mobile device hardware, software,data, information or processing capability is known as which of the following?

Digital Security Risk

________ are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market.

Disruptive innovations

________ computing is a computing model in which multiple types of computers are networked together to share data and services.

Distributed

Disintermediation

Diva is a fashion apparel manufacturer in Texas. Diva recently closed all its physical retail stores and moved all its operations online. The store also let go of all of its distributors and started dealing directly with its consumers. With respect to the given scenario, Diva has carried out the process of __________.

example of business-to-consumer electronic commerce

DivaLikeYou.com selling women's clothing, shoes, and fashion jewelry to individual customers

Companies following a ________ business strategy choose to operate solely in the traditional physical markets approaching business activities in a traditional manner. A) click-only B) high-cost leadership C) low-cost leadership D) click-and-flip E) brick-and-mortar

E

How can the effectiveness of e-mail advertising campaigns be measured directly? A) by reflecting the percentage of visitors who actually perform the marketer's desired action B) by reflecting the number of surfers who click on an ad divided by the number of times it was displayed C) by creating use cases and business models to determine the ratio of the opened mails to the sent mails D) by conducting online polls, starting online forums, and collecting user feedbacks E) by including special links in the e-mail that allow tracking which e-mails the customers have opened or reacted to

E

In e-business terminology, ________ companies are sometimes called "pure play companies." A) bricks-and-clicks B) click-and-mortar C) brick-and-mortar D) click-and-flip E) click-only

E

In the context of GPS-enabled location-based services, the ability to see another person's location is an example of ________ service. A) reintegration B) navigation C) mapping D) disintegration E) tracking

E

Some search engines offer to elevate a page's position in the organic results after paying a fee. This is known as ________. A) paid analysis B) e-reintermediation C) e-subscription D) e-information E) paid inclusion

E

The concept of the Long Tail refers to a focus on ________. A) brand evangelism B) broad markets C) generic brands D) brand dilution E) niche markets

E

The performance of a pay-per-click advertising model can be assessed by ________, which reflects the percentage of visitors who actually perform the marketer's desired action such as making a purchase. A) click fraud rate B) contextual search rate C) pop-up rate D) click-through rate E) conversion rate

E

The phenomenon of cutting out the "middleman" and reaching customers more directly and efficiently is known as ________. A) gentrification B) demutualization C) defalcation D) dissemination E) disintermediation

E

The technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution is known as ________ management. A) digital analytics B) digital signature C) digital marketing D) digital radiography E) digital rights

E

Which of the following characteristics of the Web deals with making the interaction with a Web site easier or more convenient? A) representational delight B) cost compliance C) structural firmness D) disintermediation capacity E) functional convenience

E

Which of the following is a mechanism for consumer-to-consumer transactions? A) e-tailing B) e-integration C) e-filing D) e-tendering E) e-auctions

E

Which of the following is an example of consumer-to-consumer electronic commerce? A) Niobi makes an online deposit of $5,000 into her friend's account. B) Heath buys a gift for Vanessa on Aniocride.com. C) Blanco, a manufacturer, conducts business over the Web with its retailers. D) Ashley buys a new pair of shoes on Fequette.com. E) Marty buys Lobsang's mountaineering equipment on Chieoke.com.

E

With respect to e-tailing, ________ can initiate certain actions, such as making a phone call to a sales representative, or sending a text message to a pre-specified number. A) MaxiCodes B) CPC Binary Barcodes C) viral codes D) MSI barcodes E) QR codes

E

39) The standard method of specifying the format of Web pages is called ________.

E) Hypertext Markup Language (HTML)

51) The prediction that the number of transistors on a chip would double about every two years is known as ________.

E) Moore's law

16) Which of the following statements is true about open source software?

E) These programs' source code is freely available for use and/or modification.

4) A(n) ________ is also referred to as the computer's brain.

E) microprocessor or CPU

44) The suffix ".org" is reserved for ________.

E) nonprofit organizations

58) Utility computing offers tremendous benefits in terms of ________ for companies operating in the digital world.

E) scalability

9) The CPU interacts with ________ for permanently storing data.

E) secondary storage

60) Using ________, multiple machines located at different locations and each with its own applications can be configured to run on one single computer, enabling the IT service providers to better utilize their resources.

E) virtualization

Which of the following types of information systems enables customers to buy goods and services from a firm's Web site? a. Electronic Commerce System b. Geographic Information System c. Customer Relationship Management System d. Supply Chain Management System e. Collaborative System

Electronic Commerce System

The ________ Act of 1986 made it much more difficult for anyone, including the government, to eavesdrop on phone conversations.

Electronic Communications Privacy

An electronic __________ is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting.

Electronic meeting system

The purpose of an intelligent system is to ________.

Emulate or enhance human capabilities

In ________, data and behavior of a class are hidden from other classes and are thus protected from unexpected changes.

Encapsulation

Which of the following conditions is essential for successful Enterprise 2.0 implementation?

Enterprise 2.0 should be driven by a specific usage context

Identify a key factor of globalization.

Evolution of technology

At the ________ level of an organization, managers focus on long-term strategic questions facing the organization, such as which products to produce, which countries to compete in, and what organizational strategy to follow.

Executive

To assist ________ decision making, information systems are used to obtain aggregate summaries of trends and projections of the future.

Executive-level

________ decisions are referred to as unstructured decisions because the problems are relatively complex and non-routine.

Executive-level

________ decisions deal with complex problems with broad and long-term ramifications for an organization.

Executive-level

A data mart contains data about each file in a database and each field within a file

FALSE

In a Microsoft Access database a column is equal to a record and a row is equal to a field within that record.

FALSE

Non-volatile memory loses its contents when the power is interrupted.

FALSE

Unauthorized access is the use of a computer or its data for unapproved or possibly illegal activities.

FALSE

A public cloud is internal to an organization and can help the organization to balance demand and supply of computing resources within the organization.

False

A work flow automation system is an example of a synchronous groupware tool.

False

Amazon.com is an example of a brick-and-mortar company.

False

Cache is non-volatile memory source

False

Companies pursuing a click-and-mortar business strategy have no physical store locations, allowing them to focus purely on electronic commerce.

False

Companies pursuing a click-only business strategy approach business activities in a traditional manner by operating physical locations.

False

Countries such as India remain popular for offshore outsourcing because of rising salaries.

False

E-mail is an example of synchronous communication

False

Electronic commerce is limited to transactions between businesses and consumers, which is known as business-to-consumer (B2C) EC.

False

Email is an example of synchronous communication.

False

Google Talk is an enterprise-level collaboration tool that allows users to create group Web sites and share team information.

False

Government-to-business (G2B) EC does not involve businesses' relationships with all levels of government.

False

IS personnel with service mentality put up roadblocks to customers' new systems ideas and give reasons that the new ideas cannot, or will not, work.

False

Little or no documentation, training, or support for system complexities or problems is a risk for information technology.

False

One of the challenges for brick-and-mortars involve increasing IS complexity.

False

Risk tolerance for people within the organization should be low for the deployment of innovative information systems.

False

Shill bidding is also known as freecycling.

False

Structured Data is typically captured in a data model.

False

THe only drawback of Extensible Markup Language (XML) is that it is not customizable.

False

The Electronic Communications Privacy Act (ECPA) offered far stronger support for e-mail communications than it did for voice mail.

False

The development of low-cost computing platforms and communication technologies is an economic change brought about by globalization enabled by information technology.

False

The development of low-cost computing platforms and communication technologies is an economic change brought about by the globalization enabled by information technology.

False

The greatest impact of the Web-based EC revolution has occurred in companies adopting the brick-and-mortar approach.

False

The menu-driven pricing scheme transcends the reverse pricing system.

False

The name "Internet" is derived from the concept of wireless networking.

False

The network effect refers to the notion that the value of a network is based on the number of networks being used.

False

The purpose of a knowledge management system is to create, store, analyze, and manage spatial data.

False

The structural firmness for the login page of an online banking site need not be emphasized to the user.

False

The technical area of competency of an IS professional is the easiest to maintain in the digital world because of the huge popularity of individual technologies.

False

Transaction processing systems are used by a narrow range of organizations only to process customer transactions more efficiently.

False

Unstructured decisions can be programmed directly into operational information systems so that they can be made with little or no human intervention.

False

VoIP is an acronym that stands for Voice over Infrastructure Procedures

False

With respect to the organizational decision making levels, top-level managers typically focus on problems within a specific business function, such as marketing or finance.

False

According to the network effect, if some users of a network lack knowledge, the network has little or no value.

False.

Data Mining Agents are also known as Shopping Bots.

False. Buyer Agents are aka Shopping Bots.

Business Analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes.

False. Advanced Analytics do.

One major problem affecting supply chains are ripple effects referred to as the multiplier effect.

False. Bullwhip Effect.

A combination of one or more related characters in a database is known as which of the following?

Field

________ refers to technologies that support activities in the financial sector.

Fintech

Which of the following statements explain mass customization?

Firms tailor their products and services to meet a customer's particular needs on a large scale.

The term given to a company that is first to enter a market thus creating a competitive advantage is ________.

First-mover advantage

Social bookmarking allows users to share internet bookmarks and to create categorization systems. These categorization systems are referred to as __________

Folksonomies / Folksonomy

Different types of data can travel on Ethernets by being enclosed in another set of headers to form packets called Ethernet ________.

Frames

The Game, Inc. company is offering a new game that can expand exponentially to new users. The company is offering the very basic game for free allowing the user to upgrade to several levels of a paid subscription model. Choose the selection below that best exemplifies this revenue model.

Freemium

Which of the following is a typical revenue model in the digital world?

Freemium, Affiliate marketing, Licensing, Subscriptions

__________ allows using approximations or subjective values to handle situations where information about a problem is incomplete.

Fuzzy Logic

________ is an example of an online office suite comprised of a spreadsheet application, a word processor, and a presentation application.

Google Docs

Reducing the electricity and environmental waste while using computers, mobile devices and related technologies is known as which of the following?

Green Computing

What involves reducing the electricity consumed and environmental waste generated when using a computer?

Green Computing

________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard.

Hardware

key performance indicators

Help functional managers assess the organization's progress toward a certain goal. These metrics are deemed most critical for business processes, for which functional managers are responsible.

Wide Area Network (WAN)

Henry works for Orion Inc., an IT company in Texas. His supervisor is visiting China for business. Henry has to send his supervisor a few important documents for an upcoming event. Which of the following networks will allow Henry to connect to his supervisor in China?

"Backward looking" budgets are typically based on __________.

Historical Data rather than being based on a clear understanding of current conditions and forecasts of future trends.

Web servers process user requests for pages using the ________.

Hypertext Transfer Protocol

________ is used to transmit voice and video communication over the Internet.

IP convergence

Which of the following statements is true about information systems (IS) and information technology (IT)?

IT programs are more technical than IS programs

knowledge

In order to use information you need. Knowledge is the ability to understand information, form opinions, and make decisions or predictions based on the information.

The convergence of information technology and operations technology, offering the potential for tremendous improvements in efficiency, product quality, agility, and flexibility, allowing companies to mass-produce customized products and better monitor supply chains, refers to which term below?

Industrial Internet of Things

What does the second wave of change consist of?

Industrial Revolution

Processed data that is organized in a meaningful and useful way is known as which of the following?

Information

What does the third wave of change consist of?

Information Age; Information becomes the currency

________ is concerned with what information an individual should have to reveal to others in the workplace or through other transactions, such as online shopping. a. Information Accuracy b. Information Asymmetry c. Information Privacy d. information Piracy e. Information accessibility

Information Privacy

Which of the following occurred when Alvin Toffler's "third wave" gained speed? a. Occupations changed to accommodate the mechanized society. b. Society moved from a predominantly agrarian culture to the urbanized machine age. c. The ability to perform repetitive tasks became a quality to be instilled and valued. d. Individuals shifted from handicrafting items for sale to working in factories. e. Information became the currency of the realm.

Information became the currency of the realm

Which of the following portrays the improved integration benefit of a customer relationship management (CRM) system?

Information from the CRM can be integrated with other systems to streamline business processes and gain business intelligence as well as make other cross-functional systems more efficient and effective.

Both Sony's PlayStation Network and FedEx's systems were developed and are continuously updated to help the companies ________. Choose the option that best fits.

Information privacy

TZA Solutions Corp. is considering opening a new call center in Mumbai, India. Which of the following infrastructure plans should it consider implementing?

Installing its own generators because of frequent power outages

Which of the following speech recognition-based technologies is used for telephone surveys, and to guide customers through the various menu options when calling a company's customer service line?

Interactive voice response

Which of the following entities is responsible for managing global and country code top-level domains, as well as global Internet Protocol (IP) number space assignments?

Internet assigned numbers authority

Connecting host computers and their networks together to form even larger networks is called ________.

Internetworking

Disintermediation

Involves cutting out the middleman and reaching customers more directly and efficiently

Which of the following statements is true about an IP address?

It can be used to navigate to particular Web addresses

Which of the following is true of metadata?

It describes data in terms of who, where, when, and why

Which of the following is an advantage of cloud-based hosting over in-house hosting?

It doesn't require much capital and can be easily developed.

Identify a true statement about the Internet of things.

It enables companies to offer various innovative products and services that go beyond the initial purchase.

Identify a true statement about the function of Google's Ad Words.

It ensures high-quality leads when a search is conducted online.

TCP/IP stands for Transmission Control Protocol/Internet Protocol

It facilitates the transmission of Web pages and other information.

_______, the use of the Internet protocol (IP) for transporting voice, video, fax, and data traffic, has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs.

It has no meaning in and of itself

Which of the following best describes mass customization?

It helps firms tailor their products and services to meet a customer's particular needs on a large scale. For example, Dell Computer Corporation allows customers to customize their computers based on their specific performance needs.

Which of the following statements is true about information?

It is a representation of reality

Which of the following statements is true about information?

It is a representation of reality.

Which of the following is true about association discovery?

It is a technique used to find associations or correlations among sets of items. (Data mining)

Which of the following statements is true about knowledge? a. It is raw material—recorded, unformatted words and numbers. b. It has little value in comparison with raw data. c. It has no meaning in and of itself. d. It is the ability to understand information. e. It assists in converting information into raw data.

It is the ability to understand information

Best description of computer ethics

It is used to describe moral issues and standards of conduct as they pertain to the use of information systems.

Which of the following best describes social cataloging?

It occurs when contributors organize online information regarding specific topics such as academic citations, wireless networks, books, and music.

Which of the following actions of a firm suggests that it uses the freemium approach for applying freeconomics?

It offers basic services for free, but charges a premium for special features.

Which of the following best describes the network effect?

It refers to the notion that the value of a network increases with the number of users

Which of the following best describes the network effect?

It refers to the notion that the value of a network increases with the number of users.

Which of the following is a disadvantage of e-tailing?

It requires additional time for products to be delivered.

Which of the following is an example of reintermediation?

Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations.

Identify a key driver for m-commerce

Location-based services

In the __________ process, goods are produced based on forecasts and are stocked in a warehouse (i.e., a push-based approach); customers' orders are then fulfilled from inventory.

Make-to-stock

Which of the following is the role of a client computer in client-server computing?

Making requests for services

Which of the following is an example of consumer-to-consumer electronic commerce?

Marty buys Lobsang's mountaineering equipment on Chieoke.com

In online analytic processing systems, __________ are the values or numbers the user wants to analyze.

Measures (or sometimes called facts)

________ is a cooperative social media application making use of the network effect.

Media sharing

Electronic components that store instructions waiting to be executed by the processor, data needed by those instructions and the results of processing the data are known as which of the following?

Memory

________ is an example of an electronic communication tool.

Microsoft Outlook

Which of the following can be cited as an example of outsourcing?

Microsoft hands over its customer service function to Convergys, located in India.

________ transmission uses high-frequency radio signals that are sent through the air using either terrestrial (earth-based) or satellite systems.

Microwave

Mike is at Jim's house and admires his digital music collection. He then downloads the entire collection for his own personal use.

Mike commits an ethical intellectual property violation

According to ________, the number of transistors that could be squeezed onto a silicon chip would double every 18 months.

Moore's Law

Worldwide banking group HSBC moving its back-office operations to China and India is an example of ________.

Offshoring

________ refers to the process of integrating external stakeholders into the innovation process.

Open innovation

At the ________ level of a firm, the routine, day-to-day business processes and interactions with customers occur.

Operational

Information systems at the ________ level of an organization often help in automating repetitive activities.

Operational

Inventory management is an application that is part of the ________ functional area.

Operations

________ is used by text recognition software to convert typed, printed, or handwritten text into the computer-based characters that form the original letters and words.

Optical character recognition

__________ software are applications written by third-party vendors that are used by many different users and organizations.

Packaged

managerial level

People at the ________ make semistructured decisions.

operational

People at the __________ level make structured decisions.

tactical or managerial level

People at the __________ make semistructured decisions.

executive or strategic level

People at the __________ make unstructured decisions.

Business analytics augments business intelligence by using __________ to help identify trends or predict business outcomes.

Predictive Analysis (Predictive Models)

Which of the following best describes dynamic pricing?

Priceline uses dynamic pricing with its Name Your Own Price strategy

The several processes associated with the acquiring of goods from external vendors are collectively referred to as the __________ process.

Procure-to-Pay

efficiency

Purchasing a new system to help reduce costs by automating repetitive tasks is called operational ______

What is the term for a square-shaped coded graphic that corresponds to a web address or other information?

QR Code

With respect to e-tailing, ________ can initiate certain actions, such as making a phone call to a sales representative or sending a text message to a pre-specified number.

QR Codes

Which of the following database models represent entities as two-dimensional tables, with records as rows, and attributes as columns?

Relational database model

________ reflect(s) the organization's specific assets that are utilized to achieve cost or product differentiation from its competitors.

Resources

Which of the following is an example of business-to-consumer electronic commerce?

Reuben buys a pair of shoes on Mysticshoes.com

Which of the following is an example of business-to-consumer electronic commerce?

Reuben buys a pair of shoes on Mysticshoes.com.

What should you be sure to do if you shop online?

Review your monthly credit card and bank statements.

example of government-to-citizen electronic commerce.

Richard filing his income tax using an online tax payment Web site

Which of the following is an example of disintermediation?

Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experience a dip in sales due to channel conflicts between retailers.

Which of the following is a popular query language that allows users to manage, update and retrieve data?

SQL

Which of the following is true SSDs (solid state disks) compared to traditional hard disks?

SSDs have faster transfer rates

The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles that will allow computers to be able to better index Web sites, topics, and subjects.

Semantic

With respect to organizational decision-making levels, for ________ decisions, some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made.

Semistructured

The Internet of Things and the massive amounts of data generated enabled the creation of service-oriented business models. Identify this model.

Servitization

Rapid Technology Inc. is planning on expanding into Nairobi, Kenya. Which of the following infrastructure plans should the firm consider implementing?

Setting up its own satellite links to be independent from the local, unreliable communications networks

Which of the following is NOT an example of a digital security risk?

Slacker

________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.

Social Networking

________ attempts to increase the relevance of search results by including content from blogs and microblogging services.

Social Search

__________ attempts to increase the relevance of search results by including content from blogs and microblogging services.

Social Search

Which of the following types of information systems facilitates collaboration and knowledge sharing? a. Visualization System b. Electronic Commerce System c. Word Processor d. Social Software e. Intelligent System

Social Software

________ refer(s) to a program or set of programs that tell the computer to perform certain tasks.

Software

Which of the following is a collection of individual programs sold as a unit?

Software Suite

global

Sony has a central office in Japan, with many subsidiaries located worldwide. The central office makes most of the strategic decisions. This type of business strategy is known as a __________ business strategy.

The emergence of a highly successfully business that is technology based with potential for growth and scalability is often referred to as a(an) ________.

Startup

When senior managers at the executive level of the organization conduct ________, they form a vision of where the organization needs to head.

Strategic planning

Which type of innovation is best described as using the company's talent and assets in innovative ways?

Structure innovation

Which of the following types of information systems supports the coordination of suppliers, product or service production, and distribution? a. collaborative system b. electronic commerce system c. supply chain management system d. geographic information system e. intelligent system

Supply Chain Management System

The process of connecting separate information systems and data to improve business processes and decision making is known as ________.

Systems integration

A videoconference is a meeting between two or more geographically separated people and can save companies time and money

TRUE

Cache is a temporary memory source.

TRUE

Digital signals are in one of two states: on or off.

TRUE

In a Microsoft Access database a row is equal to a record and a column is equal to a field within that record.

TRUE

Malware, short for malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices.

TRUE

Non-volatile memory does not lose its contents when the power source is interrupted

TRUE

The arithmetic logic unit(ALU), part of a computer processor, performs arithmetic, comparison, and other operations.

TRUE

Volatile memory loses its programming when the power is interrupted

TRUE

The binary system uses how many unique digits, and what are those digits?

TWO (0 and 1)

Which of the following is not an example of a pointing devices?

Tablet

________ can be used to visualize user-generated content on a site.

Tag clouds

Which area of competency is considered the most difficult for the IS professional to maintain?

Technical because of the rapid pace of technological innovation in the digital world.

Which of the following core competencies is part of an IS personnel's business knowledge and skills?

Technological communication and presentation

Internet Tax Freedom

The ________________ Act requires Internet sales to be treated in the same way as mail-order sales (e.g., collect sales tax from customers residing in same state as business).

Which of the following is true of the advantage of using information technology?

The competitive advantage of using new technologies generally has a fleeting effect. Competitors eventually do the same thing, eliminating the advantage.

Which of the following occurred in the 1964-1990 generation of computing?

The mainframe era ended and the personal computer era began.

Which of the following occurred in the 1958-1964 generation of computing?

The mainframe era expanded.

What does a Web site's conversion rate reflect?

The percentage of visitors who actually perform the marketer's desired action, such as making a purchase

Which of the following is an issue associated with managing IS infrastructure?

The planned obsolescence of computer hardware carries a high price tag for the environment in terms of resources needed.

EZBiz, the brainchild of three college friends, is a startup venture that plans to produce and market sports gear. The venture is still stuck in the planning phase as they have not been able to decide the suitable business strategy to opt for. They are currently trying to decide between a bricks-and-clicks strategy or a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?

The public is wary of sharing confidential information after a recent spate of credit card scandals.

Which of the following statements is true about the e-business innovation cycle?

The vertical dimension of the cycle shows the extent to which an organization derives value from a particular information technology and the horizontal dimension shows time.

Which of the following statements is true about companies pursing a click-only business strategy?

These companies conduct business electronically in cyberspace.

Which of the following statements is true about companies pursuing a click-only business strategy?

These companies conduct business electronically in cyberspace.

Which of the following statements is true about firms pursuing a brick-and-mortar business strategy?

These firms avoid indulgence in electronic commerce.

Which of the following statement is true about firms pursuing a click-and-mortar business strategy?

These firms operate in both physical and virtual arenas.

Which of the following statements is true of operational-level decisions?

They are highly structured and recurring. Planning typically has a time frame of a few hours or a few days.

Over time, which of the following is true of thermal printers?

They are inexpensive, but the print quality is low and images tend to fade

Under which conditions do online retailers have to legally collect sales taxes from their customers?

They are legally required to collect sales taxes only from customers residing in a state where the business has a substantial presence.

Which of the following is NOT one of Porter's five primary forces?

Threat of flooding the industry with excellent products

Why are information systems typically used at the operational level?

To increase efficiency

The protocol used by the Internet is called the ________.

Transmission Control Protocol (TCP)

A click-and-mortar business strategy approach is also referred to as the bricks-and-clicks business strategy.

True

A record is a group of related field in a database.

True

Advances in cloud computing (think Gmail, Evernote, or DropBox) allow for accessing e-mails, files, notes, and the like from different devices, enhancing portability and mobility in computing

True

Advances in cloud computing (think Gmail, Evernote, or DropBox) allow for accessing e-mails, files, notes, and the like from different devices, enhancing portability and mobility in computing.

True

An intelligent agent is also referred to as a bot.

True

An organization's IS infrastructure has a broad and flexible set of capabilities that can be utilized in a variety of ways.

True

CRM allows organizations to focus on driving revenue as well as on reducing costs as opposed to emphasizing only cost cutting.

True

Click-only companies can often compete more effectively on price since they do not need to support the physical aspects of the click-and-mortar approach.

True

E-tailers can focus on the Long Tails.

True

Electronic commerce can involve the events leading up to the purchase of a product as well as customer service after the sale.

True

For Web sites to be successful, structural firmness is a must.

True

For unstructured organizational decisions, few or no procedures to follow for a given situation can be specified in advance.

True

Hashtags are used to add metadata to messages posted on social media applications, allowing users to search for content related to a certain topic.

True

IS personnel with service mentality believe that the customers own the technology and the information and that the technology and information are there for the customers, not for the systems personnel.

True

Knowledge is the ability to understand information, form opinions, and make decisions or predictions based on the information.

True

Knowledge portals can be customized to meet the unique needs of their intended users.

True

M-commerce is defined as any electronic transaction or information interaction conducted using a wireless mobile device and mobile networks that leads to the transfer of real or perceived value in exchange for information, services, or goods.

True

M-commerce is defined as any electronic transaction or information interaction conducted using a wireless, mobile device and mobile networks that leads to the transfer of real or perceived value in exchange for information, services, or goods.

True

Most organizations have three general decision-making levels: operational, managerial, and executive.

True

One drawback of pay-per-click models is the possibility of abuse by repeatedly clicking on a link to inflate revenue to the host or increase the costs for the advertiser.

True

Sir John Maddox, a physicist, was quoted in Scientific American in 1999 saying, "The most important discoveries of the next 50 years are likely to be ones of which we cannot now even conceive."

True

Social Media is a classification of Web 2.0 applications.

True

Social software can enhance communication within organizations as well as between an organization and its stakeholders.

True

Someone with an automating perspective thinks of technology as a way to help complete a task.

True

The easiest way to understand computer networking is through the human communication model.

True

The use of information systems has become one of the primary ways that organizations improve their value chains.

True

Transmission media refers to the physical pathway used to carry network information.

True

Using a utility computing model, cloud computing helps to transform IT infrastructure costs from a capital expenditure to an operational expenditure.

True

Web sites can offer a virtually unlimited number and variety of products because e-tailing is not limited by physical store and shelf space restrictions.

True

Web technologies allow for integration of information via Web sites that can be linked to corporate databases to provide real-time access to personalized information.

True

When Web pages are designed using semantic principles, computers will be able to read the pages, and search engines will be able to give richer and more accurate answers.

True

When organizations undergo disintermediation, they have to take on those activities previously performed by the middleman.

True

Structured Query Language is the most common language used to interface with relational database management systems (RDBMSs).

True.

Which of the following differentiates a blog from a wiki?

Unlike a wiki, a blog does not allow visitors to edit the original posted material.

________ is the process of analyzing an organization's activities to determine where value is added to products and/or services and what costs are incurred for doing so.

Value chain analysis

IP convergence has led to which of the following?

Video Conferencing over IP

__________ are comprised of members from different geographic areas and assembled as needed to collaborate on a certain project.

Virtual Teams

Which of the following steps should be taken by a person to ensure his or her privacy online?

Visit Web sites anonymously.

__________ refers to the display of complex data relationships using a variety of graphical methods.

Visualization

Which of the following is an example of IP convergence?

Voice over IP

Dynamic Web applications are often referred to as ________ applications.

Web 2.0

Which of the following versions of the Web allows people to collaborate and share information online?

Web 2.0

Some people see ________ as the "contextual Web," where the immense amounts of content available to users will be filtered by contextual factors such as time, location, social activities, and so on.

Web 3.0

__________ is used by organizations to determine patterns in customers' usage data.

Web Usage Mining

__________ refers to extracting textual information from online documents.

Web content mining

Which of the following is a reason for the development of the semantic Web?

Web pages were designed to be understood by people, but not by comptuers

________ is the distribution of digital media, such as audio or video files, via syndication feeds for on-demand playback on digital media players.

Webcasting

WorldTravel (www.worldtravel.com) is a travel Web site that provides detailed information about the different places that tourists can visit across the globe. Additionally, it also helps visitors to book tickets and hotels in these destinations. Which of the following, if true, would most assure the customers of their online privacy?

When collecting personal information, WorldTravel explicitly states the purpose of the information and that it will not be used for anything else.

M-commerce

Which type of commerce involves consumers using a wireless mobile device and mobile networks?

a differentiation strategy

Which type of strategy would a company pursue if it wanted to try to provide better products or services than its competitors?

organizational strategy

a firm's plans of how to accomplish its mission and goals and gain or sustain an advantage over its rivals.

An extranet

a private network that allows two or more firms to use the Internet to do business together

value chain

a set of activities that adds value throughout the organization. Employees look to add more value to a process by acquiring cheaper resources, improving products, or selling more products.

business model

a summary of a business's strategic direction, outlining how the objectives will be achieved; a business model specifies how a company will create, deliver, and capture value.

Cloud-based collaboration tools ________.

allow for easy transferability of documents from one person to another

Microblogs like twitter

allow for short messages and replies, but do not allow visitors to change content

blogs

allow visitors to add comments to the original content, but they do not allow visitors to change the original posted material.

local area network

allows people within a building to share data and other resources.

content management system

allows users to publish, edit, version track, and retrieve digital content.

Which of the following explains Web analytics?

analyzing Web surfers' behavior in order to improve Website performance.

Which of the following storage methods is used for storing long-term copies of organizational data?

archival

wikis

are collaborative Web sites where visitors can add, delete, or modify content on the site, including the work of previous authors

Information Systems

are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data.

business processes

are the activities that organizations perform in order to reach their business goals.

Operating systems are often written in ________, a very low-level computer programming language that allows the computer to operate quickly and efficiently.

assembly language

At the operational level of decision making of a firm, information systems are designed to

automate repetitive activities. It is the routine, day-to-day business processes and interactions with customers that occur here.

________ is the transmission capacity of a computer or communications channel, which represents how much binary data can be reliably transmitted over the medium in one second.

bandwidth

The base 2 numerical system is known as which of the following?

binary

Companies following a ________ business strategy choose to operate solely in the traditional physical markets approaching business activities in a traditional manner.

brick-and-mortar

With respect to the types of information systems used in organizations, an Online Analytical Processing (OLAP) system is an example of a(n) ________ system.

business intelligence

wide area network

can allow people in buildings, cities, and the world to share data and other resources.

public clouds

can be used by anyone on a pay-per-use basis. They are useful when a company has insufficient capital or other resources to build or expand an IT infrastructure. Also offer rapid scalability.

Which of the following is the highest-ranking IS personnel responsible for strategic planning and IS use throughout a firm?

chief information officer

Shawna is concerned about how much of her private information is available on the Internet. What is one step Shawna can take to maintain her privacy online?

choose Web sites that are monitored by independent organizations. Several independent organizations, such as TRUSTee, monitor the privacy and business practices of Web sites

In the context of pay-per-click models, inflating the revenue to a host or increasing costs for the advertiser by repeatedly clicking on a link is called ________ fraud.

click

Bookseller Barnes & Noble is an example of a ________ company.

click-and-mortar

Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system.

collaborative system

Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.

collocation facilities

Which of the following entails having the knowledge and understanding of computers, mobile devices, the Internet, and related technologies?

computer literacy

grid computing

consists of remote computers connected in a single network to create a virtual supercomputer.

A(n) ________ system allows users to publish, edit, version track, and retrieve digital content, such as documents, images, audio files, videos, or anything else that can be digitized.

content management

A recent trend in display advertising has been ________ advertising, where the ads placed on a page are in some way related to the content of that page.

contextual

Ultimately, companies want to improve their __________ rates, which reflect the percentage of visitors who actually perform the marketer's desired action, such as making a purchase.

conversion

Intellectual property is best defined as

creations of the mind that have commercial value

_________ is used in computer-to-business e-commerce to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people.

crowdsourcing

Which of the following scenarios exemplifies an electronic commerce activity?

crystal Maze, an online jewelry store selling jewelry through the store's official Web site

For a firm, reduced prices, need for increased quality, and demand for more services would result due to ________.

customer's bargaining power

reverse pricing model

customers specify the product they want and how much they are willing to pay, and the Web site matches the customers' bids with offers from companies.

Processed Data

data that has been converted to information.

transnational business strategy

decides which aspects of the organization should be under central control and which should be decentralized.

The base 10 numerical system is known as which of the following?

decimal

Digital world

demonstrates the importance of information and related technologies. previous.

An attach that disrupts computer access to internet services and often results in entire networks being knocked offline is known as which of the following?

denial of service (DoS)

Identify the focus of managers at the tactical level of an organization.

deploying organizational resources to achieve the strategic objectives of the organization

The discovery, collection and analysis of evidence found on computers and networks is known as which of the following?

digital forensics

The technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution is known as ________ management.

digital rights

Which of the following models does Priceline use with its Name Your Own Price strategy?

dynamic pricing

Which online business uses a click-only business strategy?

e-Bay

The online sales of goods and services are known as ________.

e-tailing

The extent to which goals are accomplished faster, at lower cost, or with relatively little time and effort is called ________.

efficiency

The purpose of an intelligent system is to ________.

emulate or enhance human capabilities

Human Resource Activities __________.

encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management.

The process of converting data that is readable by humans into encoded characters to prevent unauthorized access is known as which of the following?

encryption

the third generation of computing

end of the mainframe era

With respect to the types of information systems used in organizations, financial, operations, and human resource management is an example of a(n) ________ system.

enterprise resource planning

The engineering principles that incorporate comfort, efficiency and safety into the design of the workplace thus reducing employee injury is known as which of the following?

ergonomics

Identify a key factor of globalization.

evolution of technology

REVIEW QUESTION REVIEWING 26 OF 33 Roshanda, who works for a major retailer located in Seattle, wants to check the availability of some merchandise with one of her company's suppliers in New York. Roshanda also wants to verify the total amount of inventory she has ordered this month from the supplier. Which network will Roshanda most likely use to access this information using the Internet infrastructure?

extranet

Amazon.com is an example of a brick-and-mortar company.

false

Volatile memory does not lose its contents when power is removed

false

A company's ________ secures proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users.

firewall

Hardware and/or software that protects a network's resources from intrustion is known as which of the following?

firewall

A ________ is a form of e-auction which allows businesses to buy seized and surplus government equipment.

forward auction

E-filing is an example of a ________ tool.

government-to-citizen

A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of __________ electronic commerce.

government-to-government

Unformatted Data

has no meaning and has little value until it is processed. In information systems, raw symbols such as words and numbers are simply referred to as data.

The ___ is the particular web server or group of servers that will respond to the Web request.

host name

Which of the following features of the Web contains not only information, but also references or links to other documents?

hypertext

Which of the following goods are produced using the make-to-order approach?

i.e. Amazon's Kindle E-Book Reader Raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until an order is received (a pull-based approach); in extreme cases, even design and engineering start only when an order is received.

Which of the following is a governmental challenge of operating in the digital world?

import and export regulations

Any data and instructions entered into the memory of a computer or mobile device is known as what?

input

utility computing

involves renting resources such as processing, data storage, or networking from an external provider on an as-needed basis.

social networking

involves social online communities where individuals with a broad and diverse set of interests meet and collaborate.

System competency

involves understanding how to build and integrate systems and how to solve problems. Those strong in systems competency will ultimately manage large, complex systems.

Business competency

involves understanding not only the technical aspects of the job but also the nature of the business.

client

is a computer that uses the services provided by a server.

HTML

is a page description language for specifying how text, graphics, video, and sound are placed on a Web page. It stands for Hypertext Markup Language. -It regulates how servers process user requests for Web pages.

geotagging

is adding geospatial metadata (such as latitude, longitude, or altitude) to media

server

is any computer on a network that makes services available to users of the network.

Which of the following is true of information?

is data that has been formatted and processed. Information is best described as formatted and processed data. Information is useful whereas data is of little value until processed.

exit rate

is defined as the percentage of visitors who leave a Web site after viewing a particular page; in other words, it is the last page that users view before moving on to a different site, or closing their browser windows.

Supply chain execution __________.

is the execution of supply chain planning. (Puts planning into motion and reflects the processes involved in improving the collaboration of all members of the supply chain)

Information technology

is the hardware, software, and network components of an information system.

click through rate

is the number of surfers who click on an ad divided by the number of times it was displayed.

bounce rate

is the percentage of users for whom a particular page is the only page visited on the Web site during a session.

E-information

is the stage of business in which an organization provides electronic brochures and other types of information for customers.

Social enterprise

is the use of social media within a company's boundaries or between a company and its customers or stakeholders.

URL stands for Uniform Resource Locator

is used to identify and locate a particular Web page

A metric deemed most critical to accessing progress toward a certain goal is referred to as a(an) ________.

key performance indicator

computer literacy

knowing how to properly use a computer

The business intelligence information that executives need to make strategic decisions is __________.

less structured than the other levels of decision making

In the context of GPS-enabled location-based services, the ability to determine the basic geographic position of a cell phone is an example of ________ service.

location

Identify a key driver for m-commerce.

location-based services

Catering to niche markets in addition to (or instead of) purely selling mainstream products is known as the __________ model.

long tail

With respect to the five general classes of computers, ________ are typically used for mission critical applications, such as transaction processing.

mainframes

Web 1.0

maintained a relatively strict distinction between content creators and content consumers.

Computer viruses,worm, Trojan horses, and rootkits are classified as which of the following, or programs that act without a user's knowledge and deliberately alter the computer's operations?

malware

The executive (or strategic) level of decision making

managers focus on long-term strategic questions facing the organization, such as which products to produce, in which countries to compete, and what organizational strategy to follow.

Social Network Analysis is a technique that attempts to __________.

map people's contacts to discover connections or missing links (sometimes called structural holes) within the organization.

According to basic economics within a competitive marketplace, the price of a product is set by its ________.

marginal cost

In an e-business innovation cycle, after an organization scans the environment for new emerging and enabling technologies, the next step is to ________.

match the most promising new technologies with current economic opportunities

Which of the following is the domain name for www.mayo.edu/research?

mayo.edu

In ________ pricing, companies set the prices that consumers pay for products.

menu-driven

The main circuit board of the computer is known as which of the following?

motherboard

When an organization offers the customer both a retail store and Internet shopping experience, it is referred to as ________.

multi-channel retailing

When an organization offers the customer both a retail store and Internet shopping experience, it is referred to as ________.

multichannel retailing

In the context of GPS-enabled location-based services, the ability to give route directions from one point to another is an example of ________ service.

navigation

What is the term that represents the principle that all Internet data should be treated the same?

net neutrality

The concept of the Long Tail refers to a focus on _____________.

niche markets

At the executive level of decision making, information systems are used to __________.

obtain aggregate summaries of trends and projections of the future

value creation

occurs when an organization can provide products at a lower cost or with superior benefits to the customer.

E-tailing

occurs when businesses sell products to consumers online.

With respect to the types of information systems used in organizations, a word processor is an example of a(n) ________ system.

office automation

Potential pitfalls of social media and the enterprise include

online product reviews, microblogging, and bad vibes going viral

Which of the following best explains the process of moving business processes or tasks to another company?

outsourcing

In addition to being used for communication and collaboration, organizational intranets are widely used for enabling employee self-service for administering benefits, managing retirement plans, or other human resources-based applications through employee ________.

portal

menu driven pricing

pricing is the traditional model in which companies set the prices that consumers pay for products.

A field that uniquely identifies each record in a database is known as which of the following?

primary key

Peter Drucker stated that a knowledge society would emerge in the future that meant ________.

processing knowledge would be as important as processing land, labor, or capital.

The central processing unit(CPU), which interprets and carries out the basic instructions that operate a computer is part of which computer component below?

processor

Which of the following can be cited as an example of a supply chain management system?

procurement planning

Which of the following ethical issues has become a greater concern because of the rise of the Internet?

protection of personal privacy

Information systems at the operational level

provide data about actual customer transactions.

Value creation occurs when an organization can ________.

provide products at a lower cost or with superior benefits to the customer

cloud computing

provides convenient, on-demand network access to a shared pool of computing resources

Infrastructure as a Service (IaaS)

provides only the basic capabilities of processing, storage, and networking.

In information systems management, a systems consultant is responsible for ________.

providing information systems knowledge to external clients

The purpose of a Data Warehouse is to __________.

put key business information into the hands of more decision makers, and an organization that successfully deploys a data warehouse has committed to pulling together, integrating, and sharing critical corporate data throughout the firm.

The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________.

rapid elasticity

Inbound logistics involves business activities associated with __________.

receiving of supplies as well as handling reservations, and operations would include the day-to-day activities of checking guests in or out, cleaning rooms, preparing breakfast, and so on.

Reintermediation

refers to the design of business models that reintroduce middlemen in order to reduce the chaos brought on by disintermediation.

E-commerce

refers to the exchange of goods, services, and money among firms, between firms and their customers, and between customers, supported by communication technologies and, in particular, the Internet.

value creation

refers to the situation where organizations can sell products to customers at lower costs or with superior benefits.

web hosting

refers to the space provided for maintaining Web sites through Web servers.

Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. The introduction of middlemen in business models is an example of ________.

reintermediation

A light=sensing input device that reads printed text and graphics and then translates the results into a form the computer can process is known as which of the following?

scanner

A way to ensure that a company's site is on the first page users see when looking for a specific term is using ________ advertising.

search

Companies use ________ to move up their Web sites in the organic search engine results.

search engine optimization

Companies use ______ to move their Websites in the organic search engine results.

search engine optimization.

With respect to the general classes of computers, a ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network.

server

The Internet of Things and the massive amounts of data generated enabled the creation of service-oriented business models. Identify this model.

servitization

semi structured managerial-level decisions

some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made.

Identify a characteristic of the Web that influences a Web site's security and performance.

structural firmness

When a Web site ensures privacy and security of the consumer's data, ________ can be achieved

structural firmness

With respect to the general classes of computers, a ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network.

supercomputer

The managerial level of an organization is also known as the ________ level.

tactical

Which of the following core competencies is part of an IS personnel's business knowledge and skills?

technological communication and presentation

Computer fluency

the ability to independently learn new technologies and assess their impact on your work and life.

To which of the following is Moore's Law related?

the number of transistors on a computer chip. It states that the number of transistors on a chip will double roughly every 2 years

-The end of the interpersonal era of computing -The beginning of the internetworking era of computing

the present, fifth generation of computing.

value chain analysis

the process of analyzing an organization's activities to determine where value is added to products and/or services and what costs are incurred for doing so.

Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________.

the product is designed to last only for a certain life span

Click-through rate reflects ________.

the ratio of surfers who click on an ad divided by the number of times it was displayed

Hypertext Markup Language

the standard method for specifying the format of Web pages.

Hypertext Transfer Protocol is

the standard that servers use to process user requests for Web pages

Identify the purpose of a transaction processing system used in organizations.

to handle day-to-day business event data at the operational level of the organization

Identify the purpose of an office automation system.

to support a wide range of predefined day-to-day activities of individuals and small groups

________ refers to anything that occurs as part of a daily business of which a record must be kept.

transaction

With respect to the types of information systems used in organizations, a grocery store checkout cash register with a connection to a network is an example of a(n) ________.

transaction processing system

low-cost leadership strategy

tries to offer the lowest prices in the industry for goods and services. Walmart is an example.

best-cost provider strategy

tries to provide good services at a reasonable cost. An example is Dell.

multidomestic business strategy

uses a loose federation of business units, each of which is rather independent in its strategic decisions.

Cloud computing

uses the Internet as the platform for applications and data and also allows users to access their data and programs from any Internet-connected computer.

Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.

utility computing

With respect to the components of a business model, ____ is the utility that the product/service must offer to customers

value proposition

With respect to the components of a business model, ________ is the utility that the product/service must offer to customers.

value proposition

The term ________ was coined by Harvard business professor Jeffrey Rayport to describe how good business techniques can be driven by word-of-mouth or person-to-person communication.

viral marketing

Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home.

virtual private

While using digital dashboards, pull reporting is conducted to __________.

visually present key performance indicators and other summary information used by managers and executives to make decisions.

YouTube is a unique _____________ application because it is largely based on user-generated content.

web 2.0


Conjuntos de estudio relacionados

Federal Fair Housing Laws & Protected Classes

View Set

Chapter 49: Disorders of Musculoskeletal Function: Developmental and Metabolic Disorders, Activity Intolerance, and Fatigue

View Set

Chapter 13 Central Nervous System

View Set