MIS

¡Supera tus tareas y exámenes ahora con Quizwiz!

8. Which question below represents a CRM analyzing technology question?

Why did sales not meet forecasts?

B. What spans a large geographic area, such as a state, province, or country?

Wide Area Network

8. In which industry area will CRM remain a major strategic focus for years to come?

Product is difficult to differentiate

A2. You need to create a calculated field labeled "Profit" that calculates the difference between numeric fields "Revenue" and "Expenses". What would you enter on the "Field" line of the query grid?

Profit: [Revenue]-[Expenses]

B. What is network topology?

Refers to the geometric arrangement of the actual physical organization of the computers and other network devices in a network

9. What methodology ends each day or begins with a stand-up meeting to monitor and control the development effort?

SCRUM

7. What is the major challenge of networking or performing business in a connected world?

Security issues

B. What is TCP/IP's own messaging system for email?

Simple mail transfer protocol

B. What allows the management of networked nodes to be managed from a single point?

Simple network management protocol

9. What are primary form of agile methodology?

RAD, RUP, SCRUM, and Extreme Programming

7. A wireless MAN is a metropolitan area network that uses ______ to transmit and receive data.

Radio signals

7. What are the two main methods for encrypting network traffic on the Web?

SSL and SHTTP

A2. Access reports can display data from _____.

a query involving two or more related tables.

8. Which question below represents a CRM reporting technology example?

What is the total revenue by customer?

When a user enters or updates information in one ERP Module, it is immediately and automatically updated throughoutthe entire system.

True

________ is used to facilitate the secured transmission of proprietary information within an organization. A) Intranet B) Transnet C) Ethernet D) Extranet E) Telnet

) Intranet

Supporting operations: Information MIS infrastructure

- Backup and recover plan - Disaster recovery plan - Business continuity plan

SlamBook is a social networking site which currently has around 2,000,000 users. The company has always valued its users' privacy and has taken extensive measures to safeguard it. However, SlamBook has recently faced severe customer backlash regarding privacy issues associated with one of its applications. Which of the following statements would best explain the apparent discrepancy above? A) Recently, the government introduced stringent privacy regulations for Internet firms. B) The application did not have any provisions that restricted minors from using the application. C) MyPlace, SlamBook's closest competitor, had seen great success with a similar application and an opt-out system. D) Launching opt-out applications instead of opt-in applications is an industry trend. E) The application was an opt-out system, whereby all users were enrolled by default.

...

What type of Network is designed to connect a group of computers in close proximity to each other such as in an office building, a college campus or a home?

...

Which of the following is an example of an HTML editor? A) Microsoft Expression Web B) Adobe Acrobat Reader C) Apple Keynote D) OpenOffice Base E) Harvard Graphics

...

Platform as a Service (PaaS)

offers hardware, networking, and applications of a pay-per-use basis. Ex. Google application engine

9. What is the closest location with customer control?

onshore outsourcing

Fault Tolerance

a general concept that a system has the ability to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service.

Enterprise Architect

a person grounded in technology fluent in business, and able to provide the important bridge between MIS and the business.

Which of the following IS personnel is responsible for coding, testing, debugging, and installing programs? A) a programmer B) a systems consultant C) an IS manager D) a systems analyst E) an IS security manager

a programmer

Hot Site

a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

Cold Site

a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

Warm Site

a separate facility with computer equipment that requires installation and configuration.

Infrastructure as a Service (IaaS)

a service that delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model.

failover

a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real time data. Users are automatically directed to the secondary or backup server.

Failover

a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes the users are automatically directed to the secondary server or backup server.

8. Which extended ERP component collects information used throughout an organization, organizes it, and applies analytical tools to asset managers with decisions?

Business intelligence

What are the four main types of Ebusiness Models?

Business-to-Business, Business-to-Consumer, Consumer-to-Business, and Consumer-to-Consumer

Which of the following statements is true about electronic commerce? A) Business-to-business is by far the largest form of electronic commerce in terms of revenues. B) It is limited to transactions between businesses and consumers. C) Electronic commerce between businesses and their employees is not possible. D) All forms of electronic commerce involve business firms. E) Consumer-to-consumer electronic commerce is a complete reversal of the traditional business-to-consumer electronic commerce.

Business-to-business is by far the largest form of electronic commerce in terms of revenues.

If a Manager wanted to know: if an order got shipped to a particular customer, he would use a Data Warehouse or a Data Mart.

False

The primary difference between a Database and a Data Warehouse is that a Data Warehouse stores Transactional Information for a singe Application, whereas a Database stores Aggregate (Summary) Information from multipleApplications as well as External Information such as Industry Information.

False

A3. Which Access table field properties would you use to limit data entry to five (5) characters and ensure that an entry is made?

Field size and required

Hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings

Firewall

Which of the following is a result of global information dissemination? A) Firms link Web sites to corporate databases to provide real-time access to personalized information. B) Firms tailor their products and services to meet a customer's particular needs on a large scale. C) Firms market their products and services over vast distances. D) Firms provide immediate communication and feedback to and from customers. E) Firms provide ways for clients and firms to conduct business online without human assistance.

Firms market their products and services over vast distances.

Which of the following is likely to have the suffix ".edu" after the domain name in its URL? A) Yahoo! B) UNICEF C) the Federal Reserve D) Harvard Business School E) America Online

Harvard Business School

Serviceability

How quickly a third-party can change a system to ensure it meets user needs and the terms of any contract, including agreed levels of reliabiliy, maintainability, or availability.

The standard method of specifying the format of Web pages is called ________. A) Structured Query Language (SQL) B) Practical Extraction and Report Language (PERL) C) Extensible Markup Language (XML) D) Assembly Language (AL) E) Hypertext Markup Language (HTML)

Hypertext Markup Language (HTML)

Web servers process user requests for pages using the ________. A) Hypertext Transfer Protocol B) TOC protocol C) Address Resolution Protocol D) Dynamic Host Configuration Protocol E) Trivial File Transfer Protocol

Hypertext Transfer Protocol

B. What allows Web browsers and servers to send and receive Web pages?

Hypertext transfer protocol

Which of the following types of ports is used to connect digital disks and camcorders to computers? A) IEEE 1394 port B) Ethernet C) DVI port D) VGA port E) HDMI port

IEEE 1394 port

Datagram routing and delivery are possible because every computer and router connected to the Internet is assigned an ________. A) IP packet B) IP console C) IP router D) IP address E) IP port

IP address

8. What is enterprise resource planning?

Integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations

Business application that uses electronic tags and labels to identify objects wirelessly over short distances

Radio-frequency identification

________ is used to store programs and instructions that are automatically loaded when the computer is turned on. A) Random access memory B) Cache memory C) Read-only memory D) Flash memory E) Virtual memory

Read-only memory

What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?

Recovery

Sustainable data centers

Reduces carbon emissions Reduces required floor space Chooses Geograpich location

________ refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers. A) Reintermediation B) Demutualization C) Gentrification D) Disintermediation E) Mutualization

Reintermediation

________ deliver information to you in a usable format. A) Output technologies B) Computational technologies C) Storage technologies D) Input technologies E) Processing technologies

Output technologies

What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?

Project management

Which of the following is an operating system designed for mobile devices, jointly developed by Nokia, Ericsson, and Psion? A) Linux B) iOS C) Symbian OS D) Android E) Mac OS

Symbian OS

________ is the collection of programs that control the basic operations of computer hardware. A) Application software B) Transitory software C) Systems software D) Open source software E) Peripheral software

Systems software

7. How do TCP and IP differ?

TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address.

9. What is the primary reason companies outsource?

Tap outside sources of expertise

________ are temporary work groups with a finite task and life cycle. A) Intensive forces B) Cross functional teams C) Task forces D) Staff committees E) Self directed work teams

Task forces

B. Which of the following is not one of the differentiating factors of a network?

Telecommunication system

A1. The Access assignment requires the creation, running, and fully documenting of _____ queries.

Ten

Information Technology's primary role in Supply Chain Management is creating the integration and information linkages between functions within an organization - such as marketing, sales, finance, manufacturing, distribution, along with providing linkages between organizations, which allow the smooth, synchronized flow of information andproduct or services between customers, suppliers, and transportation across the Supply Chain.

True

Disaster Recovery Plan

a detailed process for recovering information or a system in the event of a catastrophic disaster such as fire or flood.

Disaster recovery plan

a detailed process for recovering information or a system in the event of a catastrophic disaster.

Data center

a facility used to house management information system and associated components, such as telecommunications and storage system

Data Center

a facility used to house management information systems and associated components, such as telecommunications and storage systems.

9. What is the most remote location and indirect customer control?

offshore outsourcing

9. What are project constraints?

specific factors that can limit options

The components of a sustainable MIS infrastructure

1. Grid computing 2. cloud computing 3. virtualized computing

What is the key word in ERP (Enterprise Resource Planning)?

Enterprise

What would a website be? Client or server?

Server that would respond to the client, or web browser.

9. What are the four gates of RUP?

Inception, elaboration, construction, transition

Connects a group of computers in close proximity

LAN

Incident

Unplanned interruption of a service

Software as a Service (SaaS)

offers applications on a pay-per-use basis. Ex. Salesforce.com. Tremendous cost savings

Information MIS Infrastructure primary elements

backup and recovery plan, disaster recovery plan, business continuity plan

Which type of eBusiness model is wal-mart

click and morter

Enables telecommunications or the exchange of information

computer networks

Software as a Service (SaaS)

delivers applications over the cloud using a pay-per-use revenue model.

reliability

or accuracy, ensues a system is functioning correctly and providing accurate information

Moore's Law

the computer chip performance per dollar doubles every 18 months.

Which of the following programming languages allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code? A) object-oriented languages B) Web development languages C) visual programming languages D) scripting languages E) prototype-based programming languages

visual programming languages

The primary storage is also known as ________. A) volatile memory B) permanent memory C) nonvolatile memory D) protocols E) long-term memory

volatile memory

Unavailable

when a system is not operating or can't be used.

Which of the following is as an example of nearshoring? A) British Airways moves customer relations and passenger revenue accounting to India. B) Parts of Airbus and Boeing airplanes are designed and engineered in Moscow, Russia. C) McKinsey sets up a global research division in India. D) Worldwide banking group HSBC moves back-office operations to India. E) T-Mobile moves part of its content development process from India to the Czech Republic.

...

Which of the following statements reflects the difference between Java and JavaScript most accurately? A) Java can be used across multiple platforms and operating systems, while JavaScript cannot be used similarly. B) JavaScript is used to check accuracy of user-entered information, which Java does not support. C) Java is used to supply interactive components to Web pages, while JavaScript is not. D) JavaScript can be used as a useful component tool for creating Web pages, while Java is not used to create Web pages. E) Java allows users to create or add applets that lend dynamic content to Web pages, while JavaScript does not.

...

What does PaaS offer without an upfront investment?

1. Access to information anywhere and anytime 2. Centralized information management 3. Easy collaboration with partners, suppliers, and customers 4. increased speed to market with significantly less cost 5. increased security

Agile MIS Infrastructure characteristics

1. Accessibility 2. Reliability 3. Maintainability 4. Portability 5. Availability 6. Usability 7. Scalability ARM PAUS

Information Infrastructure provides 3 primary elements

1. Backup and Recovery plan 2. Disaster recovery plan 3. business continuity plan

3 primary side effects of businesses' expanded use of technology

1. Increased electronic waste 2. increased energy consumption 3. increased carbon emissions

Disaster recovery plan can have what effects?

1. disrupting communications 2. damaging physical infrastructures 3. halting transportation 4. blocking utilities

Virtualization benefits in infrastructure

1. increases availability of applications 2. increases energy efficiency by requiring less hardware to run multiple systems or applications 3. increases hardware usability by running multiple operating systems on a single computer

Sustainable data centers do what?

1. reduce carbon emissions 2. reduces required floor space 3. consider water and electricity in geographical choice

A solid MIS infrastructure can...

1. reduce costs 2. improve productivity 3. optimize business operations 4. generate growth 5. increase profitability

3 primary areas where enterprise architects focus when maintaining a MIS infrastructure:

1.Supporting operations: Information MIS infrastructure 2. Support change: Agile MIS Infrastructure 3. Supporting the environment: Sustainable MIS infrastructure

widely held by difficult to achieve standard in availability is .....

99.999 percent availability

Which of the following HTML tags is used to create a hyperlink? A) <html> . . . </html> B) <head> . . . </head> C) <body> . . . </body> D) <object> . . . </object> E) <a href="URL"> . . . </a>

<a href="URL"> . . . </a>

Which of the following HTML tags sets off the visible portion of the HTML document? A) <html> . . . </html> B) <head> . . . </head> C) <body> . . . </body> D) <table> . . . </table> E) <link> . . . </link>

<body> . . . </body>

What is at the core of any ERP (Enterprise Resource Planning) system?

A Database

n the following scenario: StudentID in the ScheduleTable is _______? There is a Student table that contains demographis information about a student like StudentID, Name, Address, Phone.... EachStudentID only appears in one record in this table. There is a Schedule table that stores data about which students are enrolled in which courses. The StudentID would also be stored in the Schedule table and would be found in every record associated with a course that the Student enrolled in. a. A Primary Key b. A Foreign Key c. Both the Primary Key and the Foreign Key d. Neither a Primary Key nor Foreign Key

A Foreign Key

What is Failover?

A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is automatically assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.

What is Fault Tolerance?

A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service

B. What is a client?

A computer that is designed to request information from a server.

VPN

A direct private network that creates a "private tunnel" within the internet to connect to the corporate server

What is a Primary Key?

A field (or group of fields) that uniquely identifies a given record in a table. For example your CCBC Student ID

Cloud Computing

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with a minimal management effort or service provider interaction. refers to the use of resources and applications hosted remotely on the internet.

________ is a form of e-auction where buyers post a request for quote. A) A reverse auction B) Bartering C) An exchange D) A forward auction E) A request for proposal

A reverse auction

Vulnerability

A system wekness that can be exploited by a threat.

What is a Project?

A temporary activity undertaken to create a unique product, service, or result

Which of the following statements is true about online privacy? A) A vendor cannot track the Web pages you look at. B) A vendor cannot track what products you examine in detail. C) A vendor is not capable of knowing the method of payment you choose to use. D) A vendor is not required by law to respect your privacy. E) A vendor cannot know where you are having the product delivered.

A vendor is not required by law to respect your privacy.

Digital divide

A worldwide gap giving advantage to those with access to technology

Which of the following character encoding formats, based on the English alphabet, represents symbols in binary form? A) MIME B) ASCII C) UTF D) UCS E) MAC OS Roman

ASCII

Characteristics of an agile MIS Infrastructure

Accessibility Availability Maintainability Portability Reliability Scalability Usability

The digital divide is one of the major ethical challenges facing society today when you consider the strong linkage between computer literacy and a person's ability to compete in the information age. Which of the following statements, if true, would widen the digital divide? A) According to Moore's law, the cost of computing is expected to decrease drastically over the next few years. B) Companies like Microsoft and Berkshire Hathaway have invested billions of dollars in research on information technology. C) IT firms are concerned about and are conducting extensive research on the obsolescence of technology. D) The increase in the need for innovative technology has increased the cost of research, which has resulted in an increase in the cost of computing. E) Certain IT firms are conducting exclusive research to make the technology product life-cycle longer.

According to Moore's law, the cost of computing is expected to decrease drastically over the next few years.

What are the Core Components of an ERP (Enterprise Resource Planning) system? a. Sales, Marketing, Customer Service b. Accounting and Finance, Production and Materials Management, and Human Resources c. Forecasting d. eCommerce

Accounting and Finance, Production and Materials Management, and Human Resources

Five elements that are needed to create a connected world or network

Accuracy, completeness, consistency timeliness and uniqueness

Which of the following software tools allows developers to create animation and video that can be compressed small enough for fast download speeds? A) Adobe Flash B) MySQL C) PHP D) HTML E) XML

Adobe Flash

________ allows individual Web site owners to post companies' ads on their pages. A) Bum marketing B) Stealth marketing C) Viral marketing D) Buzz marketing E) Affiliate marketing

Affiliate marketing

Which Methodology for Systems Development aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements?

Agile methodology

Which of the following would efficiency MIS Metrics measure?a. Response Time b. System Availability c. Transaction Speed d. All of the Above

All of the Above

Which of the following is an issue related to the Waterfall methodology of system development? a. Difficult to accurately define and articulate the business problem b. Difficult to manage costs, resources, and time constraints c. Assumes users can specify all business requirements in advance d. All of the abov e

All of the above

Web accessibility

Allows people with disabilities to use the Web.

The speed of transmission of a network is determined by the speed of its smallest

Amount of bandwidth

According to Nicholas Carr, cloud computing may contribute to the decline in outsourcing. Which of the following justifies this statement? A) An IT outsourcer's business is built around managing complex internal systems. A shift to a simpler cloud-based IT infrastructure should reduce the need for outsourcers. B) Outsourcing is based on the availability of cheap labor; these workers will not be able to work on complex cloud-based IT infrastructures, thereby contributing to the decline in outsourcing. C) Cloud computing is customized in each country, thus making it impossible to outsource. D) Cloud computing is standardized in all countries, reducing the need for outsourcing. E) An IT outsourcer's business is built around managing simple internal systems. A shift to a complex cloud-based IT infrastructure would discourage outsourcing.

An IT outsourcer's business is built around managing simple internal systems. A shift to a complex cloud-based IT infrastructure would discourage outsourcing.

Backup

An exact copy of a systems information

9. What is a project manager?

An individual who is an expert in project planning and management

B. What is a router?

An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward its destination

9.What phase of the SDLC gathers business requirements?

Analysis

Which of the following is a NOT a type of Management Information System that supports decision making across the levels of an organization? a. Executive Information System b. Decisions Support System c. Analysis Processing System d. Transactional Processing System

Analysis Processing System

What encompasses all organizational Information and its primary purpose is to support the performing of Managerial analysis tasks?

Analytical information

Google's Linux-based operating system for mobile devices is known as ________. A) iOS B) Symbian C) Java D) Bada E) Android

Android

8. What is it called when distorted product-demand information ripples from one partner to the next throughout the supply chain?

Bullwhip Effect

B. What are the network topology?

Bus, Ring, Star, Hybrid, and Wireless

What is Information that people use to support their Decision-Making efforts?

Business Intelligence

What is the analysis and redesign of workflow within and between enterprises?

Business Process Reengineering (BPR)

B. What is a peer-to-peer network?

Any network without a central file server and in which all computers have access to the public files located on all other workstations.

Which of the following is an example of an open source Web server software that provides access to Web sites? A) Ubuntu Linux B) GRASS GIS C) Mozilla Firefox D) MySQL E) Apache

Apache

Which of the following is an example of presentation software? A) Mozilla Thunderbird B) Microsoft Excel C) Lotus Notes D) Apple Keynote E) ACT!

Apple Keynote

Which of the following represents the three ares where technology can aid in the defense against Information Security Attacks? a. Authentication and Authorization, Prevention and Resistance, Prevention and Response b. Authentication and Authorization, Prevention and Response, Detection and Response c. Analyzing and Authenticating, Prevention and Repositioning, Detection and Response d. Authentication and Authorization, Prevention and Resistance, Detection and Response

Authentication and Authorization, Prevention and Resistance, Detection and Response

The three areas where technology can aid in the defense against information security attacks

Authentication and authorization, prevention and resistance, detection and response

Method for confirming users' identities

Authentication

What area of Information Security focuses on preventing Identity Theft, Phishing, and Pharming scams? a. Prevention and Resistance b. Detection and Authorization c. Detection and Response d. Authentication and Authorization

Authentication and Authorization

The process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space

Authorization

business continuity plan

BCP is a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption

Measures the network performance by the maximum amount of data that can pass from one point to another in a unit of time

Bandwidth

What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time?

Bandwidth

________ is the transmission capacity of a computer or communications channel. A) Latency B) Throughput C) Bandwidth D) Jitter E) Codec

Bandwidth

Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage was of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce? A) Ben sells the Olympus E-PL2 to Balvinder Singh in India through eBay.com. B) Ben files an online suit against Sony. C) Ben files a complaint on Sony's Web site asking for an escalation. D) Ben buys a Canon G 12. E) Ben sells the Olympus E-PL2 to the world's largest used camera dealer KEH.com.

Ben sells the Olympus E-PL2 to Balvinder Singh in India through eBay.com.

Which of the following firms would most likely pursue the brick-and-mortar strategy? A) KEH.com is a used camera dealer that buys and sells cameras across the globe. B) Castro's is a watch manufacturing firm known for its effective mass customization. C) SmartInv is a brokerage firm that allows its customers to personalize their portfolios. D) BestBaker is a local bakery store in Bantam, Connecticut and caters exclusively to its residents. E) Nebo, a computer manufacturer, has pursued disintermediation and sells directly to customers.

BestBaker is a local bakery store in Bantam, Connecticut and caters exclusively to its residents.

Organizations typically place firewalls

Between the server and the internet

________ are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU) of a computer. A) Binary codes B) Morse codes C) Protocols D) Hexadecimal codes E) Octal codes

Binary codes

The identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice, or handwriting

Biometrics

Refers to the smallest element of data and has a value of 0 or 1

Bit

8. Which of the following is a component ERP vendors offer to differentiate themselves in the marketplace?

CRM

8. Why is CRM one of the most valuable assets a company can acquire?

CRM has proven to increase customer loyalty and retention and an organization's profitability

Why is CRM (Customer Relationship Management) one of the most valuable assets an organization can acquire?

CRM has proven to increase customer loyalty and retention and an organization's profitability

7. The potential for contracting viruses on mobile devices is increasing; what is it?

Cabir

What Customer Relationship Management technology, accesses organizational Databses that track similar issues orquestions and automatically generate the details to the Customer Service Representative who can then relay them to the Customer?

Call Scripting

Carbon emissions

Carbon dioxide and carbon monoxide produced by business processes and systems. When left on continuosly, a single desktop computer and monitor can consume at least 100 watts of power per hour.

7. What are the five elements that are needed to create a connected world or a network?

Categories, providers, access technologies, protocols, and convergence

Disaster recovery cost curve

Charts (1) the cost to the organization of the unavailabiliity of information and technology and (2) THE COST TO THE ORGANIZATION OF RECOVERING FROM A DISASTER OVER TIME

Uses a variety of techniques to find patters and relationships in large volumes of information that predict behavior and guide decision making

Data-mining tools

9. What are characteristics of a successful project?

Delivered on time, within budget, and meets the business' requirements

Which of the following represents the different Information Granularities?a. Detail, summary, aggregate b. Document, presentation, spreadsheet, database c. Individual, department, enterprise d. None of the above

Detail, summary, aggregate

f there is a Security Breach on your organizational Information Systems, which Information Security Area is best suited to handle the Breach?

Detection and response

________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers. A) Sourcing portals B) Reference portals C) Supplier portals D) Customer portals E) Procurement portals

Customer portals

7. Which of the following is a measure being considered to address privacy concerns with RFIDs and LBSs?

Clearly labeled RFID tags on products, kill codes, RSA blocker tags

What would a web browser be? Client or server?

Client

What uses resources and applications hosted remotely on the Internet?

Cloud Computing

TransCorp is a medium-sized IT firm that is looking to outsource its payroll processes. Which of the following statements, if true, would most strengthen the decision to outsource? A) Companies in other countries can do the same amount of work at a comparable cost. B) Outsourcing has become a trend among most firms in developed nations. C) Companies in other countries are more efficient in all aspects of work, along with lower cost. D) Firms across the globe are adopting cloud computing systems. E) The firm is enjoying good profit margins.

Companies in other countries are more efficient in all aspects of work, along with lower cost.

Which of the following statements accurately reflects a difference between compilers and interpreters? A) Interpreters translate assembly language to machine language, while compilers translate machine language to assembly language. B) Compilers convert a program's entire source code into an executable, while interpreters translate source code one statement at a time. C) Compiled programs run much slower than interpreted programs. D) Compiling programs is a slower process compared to their execution, while with interpreters, the translation and execution happens concurrently. E) Compared to interpreters, it is easier to quickly evaluate the effects of any changes made to a program's source code when using a compiler.

Compilers convert a program's entire source code into an executable, while interpreters translate source code one statement at a time.

________ are set up as B2B Web sites that provide custom-tailored offers or specific deals based on sales volume. A) Sourcing portals B) Customer portals C) Procurement portals D) Reference portals E) Supplier portals

Customer portals

8. What is the primary difference between contact management and opportunity management?

Contact management deals with existing customers, opportunity management deals with new customers

CSR

Corporate Social Responsibility -- companies acknowledged responsibility to society

Most important network differentiating dimensions

Cost and performance

8. Which of the following is a common marketing CRM metric?

Cost per interaction by marketing campaign

________ is used in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people. A) Nearshoring B) Insourcing C) Offshoring D) Crowdsourcing E) Homesourcing

Crowdsourcing

Which of the following occurs in a reverse pricing system? A) Customers specify the product they are looking for and how much they are willing to pay for it. B) Customers are provided with the product and its price. C) Customers are provided with a product and can decide how much they are willing to pay for it. D) Customers specify the product they are looking for and the company provides the product with a price. E) Customers cannot decide the product but they can decide the price of the products available.

Customers specify the product they are looking for and how much they are willing to pay for it.

TransCorp is a medium-sized IT firm that has outsourced its customer-service processes to the Philippines for the last two years. Which of the following statements, if true, would most weaken the decision to continue outsourcing? A) Most firms in the Philippines have been accused of poor working conditions. B) The firm's prime competitor recently withdrew its outsourcing process. C) Customers' complaints about the quality of service have risen dramatically over the past two years. D) According to a company survey, most employees feel that they require extensive training. E) The value of the company's stock recently fell by 5 percent in the New York Stock Exchange.

Customers' complaints about the quality of service have risen dramatically over the past two years.

Who are the primary users of Supply Chain Management systems? . Sales, Marketing, Customer Service b. Accounting, Finance, Logistics, and production c. Customers, Retailer (resellers), Partners, Suppliers, Manufacturers and Distributors d. All of the above

Customers, Retailer (resellers), Partners, Suppliers, Manufacturers and Distributors

Single-tenancy

Each customer or tenant must purchase and maintain an individual system

A MIS infrastructure is dynamic or static?

DYNAMIC! Continually changes

Which of the following uses a variety of techniques to find patterns and relationships in large volumes of information thatpredict future behavior and guide decision making?

Data Mining tools

What is it called when a manager has so much Data and Information that they cannot make a decision?

Data Rich, Information Poor

Which of the following occurs if only one computer needs to use the network in a packet-switching system? A) Data is sent continuously. B) The system waits for another computer to send data. C) Data is verified by the central server. D) Data blocks the network traffic and slows the system. E) Data is sent through the packet-switching technology.

Data is sent continuously

What is an interactive Website kept constantly updated and relevant to the needs of its customers through the use of a Database?

Data-driven Website

Allows a user to access the internet

Dial up Cable T1 Line

What is a common tool that is used to support Visualization and tracks Key Performance Indicators (KPIs) and Critcal Success Factors (CSFs) bycompiling information from multiple sources, tailoring the information to meet user needs?

Digital Dashboards

Which of the following statements accurately describes the difference between digital and film-based cameras? A) High-quality digital cameras are generally less expensive than film-based cameras. B) The storage capacity of film-based cameras depends on picture resolution, while digital cameras offer consistent storage capacity. C) Digital cameras record still images or short video clips in digital form on small, removable memory cards rather than on film. D) Film-based cameras offer video recording facilities, while digital cameras are specialized for still photography. E) Digital cameras must record images by using a scanner, while film-based cameras do not offer that functionality.

Digital cameras record still images or short video clips in digital form on small, removable memory cards rather than on film.

Which of the following is mandatory for packet switching to work? A) Each packet being sent across a network must go through a supercomputer. B) Each packet being sent across a network must be labeled with a header. C) Each packet being sent across a network must be thoroughly scanned. D) Each packet being sent across a network must be broken down into sub-packets. E) Each packet being sent across a network must pass through a mainframe computer.

Each packet being sent across a network must be labeled with a header.

________ is used to increase Web application performance. A) Trusted computing B) Distributed computing C) Edge computing D) IP convergence E) Green computing

Edge computing

The ________ Act of 1986 made it much more difficult for anyone, including the government, to eavesdrop on phone conversations. A) Electronic Communication Modernization B) Internet Privacy C) Sarbanes-Oxley D) Gramm-Leach-Bliley E) Electronic Communications Privacy

Electronic Communications Privacy

Prevention technique that scrambles information into an alternative form that requires a key or password to decrypt

Encryption

Who is a person who is grounded in technology, fluent in business, and able to provide the important bridge between the Management Information System and the Business?

Enterprise Architect

Illustrates the primary concepts of the relational database model

Entities, attributes, keys, relationships

In the Relational Database Model, each person, place, thing, transaction, or event about which Data is stored is referred to as a(n):

Entity

If an organization implemented only one Information Security Policy, which ONE would it want to implement?

Ethical computer use policy

Which Policy ensures that the users know the expected computer usage behavior at work and that the organization has a published standard through which to deal with user infractions (violations of the policies)? a. Information privacy policy b. Acceptable use policy c. Internet use policy d. Ethical computer use policy

Ethical computer use policy

Which of the following represents the two fundamental Building Blocks that protect Organizationl Information?

Ethics and Security

8. As the business world increasingly shifts from product focus to customer focus, why are most organizations treating existing customers better than in the past?

Existing customers are the best source of profitable and sustainable revenue growth

Which of the following is the most commonly used form of AI (Artificial Intelligence) in the business arena?

Expert system

What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?

Extreme programming

What is the number one reason that Information Technology Projects fail?

Failure to gather necessary business requirements.

Which of the following actions explains mass customization? A) Firms tailor their products and services to meet a customer's particular needs on a large scale. B) Firms provide immediate communication and feedback to and from customers. C) Firms provide ways for clients and firms to conduct business online without human assistance. D) Firms market their products and services over vast distances. E) Firms link Web sites to corporate databases to provide real-time access to personalized information.

Firms tailor their products and services to meet a customer's particular needs on a large scale.

What are the primary business benefits of an ERP (Enterprise Resource Planning) system?

Forecasting, planning, purchasing, materials management, warehousing, inventory management, and distribution

________ is a form of e-auction in which the highest bidder wins. A) Reverse auction B) Bartering C) Exchange D) Forward auction E) Request for quote

Forward auction

What must you do to antivirus software to make it protect effectively

Frequently update it to protect against viruses

________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard. A) Software B) Malware C) Data D) Hardware E) Telecommunication

Hardware

Business application that consists of hardware, software, and data that provide location information for display on a multidimensional map

Geographic information systems

In his book The World Is Flat, New York Times foreign affairs columnist Thomas L. Friedman characterized the evolution of globalization as having distinct phases. During this globalization phase, mainly European countries were globalizing, attempting to extend their territories into the New World. Identify this globalization phase. A) Globalization 1.0 B) Globalization 2.0 C) Globalization 3.0 D) Globalization 4.0 E) Globalization 5.0

Globalization 1.0

What finds the Inputs necessary to achieve a goal, such as a desired level of output?

Goal-seeking analysis

The components of a sustainable MIS infrastructure include

Grid Computing Virtualized competing Closed Compeating

________ is used to solve large-scale computing problems. A) Trusted computing B) Edge computing C) IP convergence D) Grid computing E) Distributed computingGrid computing

Grid computing

Which of the following differentiates grid computing from cloud computing? A) Grid computing uses a large number of computers. B) Grid computing is a natural evolution of the widespread adoption of virtualization and utility computing. C) Grid computing is applied to a single large problem. D) Grid computing involves over-the-Internet provision of dynamically scalable and often virtualized resources. E) Grid computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources.

Grid computing uses a large number of computers.

Which characteristics support a Sustainable MIS Infrastructure? a. Accessibility, availability, maintainability, portability, reliability, scalability, usability b. Backup and recovery plan, disaster recovery plan, business continuity plan c. Grid computing, Cloud Computing, and Virtualization d. All of the above

Grid computing, Cloud Computing, and Virtualization

In microcomputers, the processor's clock speed is measured in ________. A) hertz B) milliseconds C) angstrom D) amperes E) nanoseconds

HERTZ

Which of the following is the most widely used language for developing Web pages? A) C/C++ B) Java C) LISP D) HTML E) .NET

HTML

________ has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs. A) Grid computing B) Green computing C) IP convergence D) Edge computing E) Trusted computing

IP convergence

________ is used to transmit voice and video communication over the Internet. A) Edge computing B) IP convergence C) Distributed computing D) Green computing E) Trusted computing

IP convergence

Which is a FALSE statement about Internet Protocol TV (IPTV)? a. IPTV is the distribution of digital video content using Internet Protocols (IP) across the Internet and private IP Networks. Comcast uses this technology. b. IPTV uses low bandwidth, offers personalization; including interactivitiy with users c. IPTV supports multiple devices d. IPTV only supports one device

IPTV only supports one device

Which of the following statements is true about information systems (IS) and information technology (IT)? A) IS programs are more technical in nature than IT programs. B) IT programs have a stronger managerial focus than IS programs. C) Software and telecommunications are present in IS, but excluded from IT. D) The differences between IT and IS is increasing due to globalization. E) IT programs are more technical in nature, whereas IS programs have a stronger managerial focus.

IT programs are more technical in nature, whereas IS programs have a stronger managerial focus.`

Business Impact Analysis

Identifies all critical business functions and the effect that a specific disaster may have upon them

________ is concerned with what information an individual should have to reveal to others in the workplace or through other transactions. A) Information accessibility B) Information accuracy C) Information privacy D) Information asymmetry E) Information piracy

Information privacy

________ are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse. A) Processing technologies B) Storage technologies C) Input technologies D) Computational technologies E) Output technologies

Input technologies

Which of the following distinguishes an intranet from an extranet? A) An intranet looks and acts just like a publicly accessible Web site. B) An intranet uses the same hardware as a publicly accessible Web site. C) Users access their company's intranet using their Web browser. D) An intranet uses the same networking technologies as a publicly accessible Web site. E) In its simplest form, intranet communications do not travel across the Internet.

In its simplest form, intranet communications do not travel across the Internet.

Business Process Modeling (or Mapping) is the activity of creating a detailed Flow Chart or Process Map of a Work Process showing:

Inputs, tasks, and activities in a structured sequence

________ refers to the delegation of a company's logistics operations to a subcontractor that specializes in that operation. A) Outsourcing B) In-forming C) Offshoring D) In-sourcing E) Licensing

In-sourcing

Disadvantage of networking or performance business in connected world

Increase resources threats

Three primary side effects of businesses' expanded use of technology

Increased Eletronic Waste Increased Energy Consumption Increased Carbon Emissions

Which of the following represents the different Information Levels? a. Detail, summary, aggregate b. Document, presentation, spreadsheet, database c. Individual, department, enterprise d. None of the above

Individual, department, enterprise

According to Thomas L. Friedman, which of the following is true about Globalization 3.0? A) Industries changed slowly and change took generations. B) Continents were brought closer together, shrinking the world "from size medium to size small". C) Individuals and small groups from virtually every nation joined the globalization movement. D) Mainly Americans and Europeans were globalizing. E) People didn't notice how it affected their lives due to the slow pace of change.

Individuals and small groups from virtually every nation joined the globalization movement.

8. Which industries will want to keep using CRM as a major strategic focus in the future?

Industries whose products are difficult to differentiate

________ is concerned with ensuring the authenticity and fidelity of information as well as with identifying who is responsible for informational errors that harm people. A) Information privacy B) Information accuracy C) Information accessibility D) Information property E) Information protection

Information accuracy

4) Which of the following occurred when Alvin Toffler's "third wave" gained speed? A) Society moved from a predominantly agrarian culture to the urbanized machine age. B) Occupations changed to accommodate the mechanized society. C) The ability to perform repetitive tasks became a quality to be instilled and valued. D) Individuals shifted from handicrafting items for sale to working in factories. E) Information became the currency of the realm.

Information became the currency of the realm.

What are the rules that help ensure the quality of Information? For example a rule that an employee discount cannot be more than 20%

Integrity constraints

A restricted network that relies on internet technologies to provide and internet-like environment within the company for information sharing, communications, collaboration, and web publishing

Intranet

A database maintains information on

Inventory Transaction Employees

What is Consolidation?

Involves the aggregation (summarization) of information and features simple roll-ups to complex groupings of interrelated information; giving the user a summary of the information. Ex. Total Sales by Region

Which of the following statements is true about a public cloud? A) It gives the organization a high degree of customizability over their data and applications. B) It can be used by any interested party on a pay-per-use basis. C) It is internal to an organization. D) It does not free an organization from the issues associated with managing the cloud infrastructure. E) It gives the organization a high degree of control over their data and applications.

It can be used by any interested party on a pay-per-use basis.

Which of the following statements is true about an IP address? A) The format of an IP address is a 64-bit numeric address. B) It is written as eight numbers separated by periods. C) Each number separated by periods can have any number between 0 to 999. D) It can be used to navigate to particular Web addresses. E) It is written as one number with a period at the end of the number

It can be used to navigate to particular Web addresses.

Which of the following statements is true about the revenue model? A) It emphasizes the utility that the product/service has to offer to customers. B) It analyzes the existing players in the market and the nature of the competition. C) It describes the promotion plan of the product/service. D) It describes how the firm will produce a superior return on invested capital. E) It analyzes the background and experience of the company leadership.

It describes how the firm will produce a superior return on invested capital.

One of the benefits of groupware is its parallelism. Which of the following statements best explains this sentence? A) It keeps the group on track and helps avoid costly diversions. B) It can easily incorporate external electronic data and files. C) It enables members to collaborate from different places at different times. D) It automatically records member ideas, comments, and votes. E) It enables many people to speak and listen at the same time.

It enables many people to speak and listen at the same time.

Which of the following is an argument against digital rights management? A) It encourages unauthorized duplication. B) It enables publishers to infringe on existing consumer rights. C) It discourages publishers to control their digital media. D) It inhibits online transactions in the industry. E) It restricts copyright holders to minimize sales losses.

It enables publishers to infringe on existing consumer rights.

Which of the following statements is true about the extranet? A) It restricts the company's information from going "on the Web." B) It can be accessed only by employees within an organization. C) It contains company related information which all the employees of an organization can access. D) It enables two or more firms to use the Internet to do business together. E) It requires large expenditures to train users on the technologies.

It enables two or more firms to use the Internet to do business together.

Which of the following statements is true about data? A) It can be defined as a representation of reality. B) It is the ability to understand information. C) It has no meaning in and of itself. D) It is the ability to make decisions or predictions based on information. E) It organizes or manipulates information to make it suitable for a given task.

It has no meaning in and of itself.

Which of the following statements is true about information? A) It has no meaning in and of itself. B) It organizes or manipulates knowledge to make it suitable for a given task. C) It is raw material—recorded, unformatted words and numbers. D) It is a representation of reality. E) It is the ability to make predictions based on data.

It is a representation of reality.

Which of the following is a FALSE statement about Network Convergence? a. It is the weaving together of voice, data, and video within a single network. b. It is Multiple services offered from a single vendor issuing a single bill c. It is multiple devices support by one provider using one network d. It is multiple providers offering multiple services using multiple networks

It is multiple providers offering multiple services using multiple networks

Which of the following is true about the graphical Web browser Mosaic? A) It provided users with references or links to other documents. B) It initiated file sharing on the Web. C) It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox. D) It made the tracking of IP addresses possible. E) It allowed users to open and use more than one Web page simultaneously.

It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox.

Which of the following statements is true about a uniform resource locator? A) It is used to locate specific information in a Web page. B) It is used to identify and locate a particular Web page. C) It is a protocol that helps Web servers store Web pages. D) It is a standard method for specifying the format of Web pages. E) It is a software application used to display the features of a Web page.

It is used to identify and locate a particular Web page.

Which of the following statements is true about the Information Infrastructure Act? A) It allowed the use of the Web by education institutions such as universities. B) It allotted certain governmental agencies with the power to pick-and-scan any document on the Web for security reasons. C) It opened the Web for commercial purposes. D) It permitted the controlled use of pornography over the Internet. E) It allowed the use of peer-to-peer networks on the Web.

It opened the Web for commercial purposes.

Which of the following is a disadvantage of e-tailing? A) It is limited by physical store and shelf space restrictions. B) It requires additional time for products to be delivered. C) It complicates the process of comparison shopping. D) It restricts companies to effectively compete on price. E) It reduces a company's inventory turnover time.

It requires additional time for products to be delivered.

Which of the following statements is true about secondary storage? A) The instructions and work stored in secondary storage are lost when the computer is shut off. B) It retains the data when the power to the computer is shut off. C) It is a temporary storage place for data that is currently being processed. D) It is considerably faster than primary storage. E) The work stored in secondary storage is lost when new data is placed.

It retains the data when the power to the computer is shut off.

According to Thomas L. Friedman, which of the following is true about Globalization 2.0? A) During this stage, mainly European countries were globalizing. B) It brought continents closer together, shrinking the world "from size large to size medium." C) During this stage, virtually every nation joined the globalization movement. D) It was interrupted by the Great Depression and the two world wars. E) During this stage, people didn't notice how it affected their lives due to the slow pace of change.

It was interrupted by the Great Depression and the two world wars.

________, a programming language developed by Sun Microsystems in the early 1990s, is used to add dynamic content to Web pages. A) HTML B) Visual Basic C) Java D) XML E) PHP

Java

Which of the following is an example of reintermediation? A) The black Centurian card is issued by invitation only to customers who spend more than $250,000 a year on other American Express cards. B) P&G acquires the list of parents-to-be and showers them with samples of Pampers and other baby products to capture a share of their future purchases. C) Kambo, a fashion apparel company that deals directly with customers to sell its products, added retailers to its supply chain to cater to its target audience in remote geographic locations. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) Dunkin' Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, which consists of items like Dunkin' Dawgs, hot dogs wrapped in dough.

Kambo, a fashion apparel company that deals directly with customers to sell its products, added retailers to its supply chain to cater to its target audience in remote geographic locations.

EasyQuery is a knowledge management company that is contemplating a partnership with Kasko, a cloud service provider. The management of EasyQuery is particularly concerned about Kasko's viability and will start a partnership only when it is sure that Kasko meets this criteria. Assume that viability is the only criteria that a cloud service provider needs to meet. If EasyQuery enters into a partnership with Kasko, it means that ________. A) Kasko can meet EasyQuery's current and future business needs B) Kasko has long-term sustainability C) Kasko offers other services that EasyQuery would require in the future D) Kasko will protect the privacy of customers E) Kasko will provide sufficient bandwidth to access large amounts of data

Kasko has long-term sustainability

2) Which of the following predictions made by Peter Drucker is true? A) Knowledge workers have lesser bargaining power than workers in other industries. B) Knowledge workers do not possess valuable real-world skills. C) Knowledge workers are not reliant on formal education. D) Knowledge workers are continually learning how to do their jobs better. E) Knowledge workers are not paid as well as their prior industrial counterparts.

Knowledge workers are continually learning how to do their jobs better.

Three primary network types

LAN, WAN, MAN

Which of the following is a challenge facing an Ebusiness?

Managing consumer trust

________ is the use of locations closer to the home country in terms of geographical, political, linguistic, economic, or cultural distance. A) In-forming B) Nearshoring C) Onshoring D) In-sourcing E) Outsourcing

Nearshoring

Business application that uses location information to provide a service and is designed to give mobile users instant access to personalized local content

Location based services

Which of the following can be cited as an example of a digital divide? A) Unlike Joey, Ryan has access to more books and good advice because he studies in a better school. B) Unlike Ben, Claudia possesses superior analytical skills, which makes her better at mathematics. C) Kevin is more successful than Vincent because of his people skills. D) Lora has access to more information than Frank because she knows how to operate a computer. E) Trisha is wealthier than Neal because her father is a successful businessman.

Lora has access to more information than Frank because she knows how to operate a computer.

3) During the time of the industrial revolution, some individuals who felt threatened by the changes brought about by technology resorted to protesting against the technology. Identify these individuals. A) Luddites B) Utopists C) Millenarists D) Utilitarians E) Preterists

Luddites

Which of the following encoding formats is the standard coding for e-mail over the Internet? A) ACSII B) UTF C) MIME D) UCS E) MAC OS Roman

MIME

Which of the following operating systems was the first commercial graphical-based operating system, which made its debut in 1984? A) Mac OS B) Linux C) Windows D) Unix E) OS/390

Mac OS

While preparing a business model, a manager considers the question, "How do you plan to let your potential customers know about your product/service?" Which of the following components of the businessing model is he/she considering? A) Revenue model B) Management team C) Marketing strategy D) Value proposition E) Competitive environmeNT

Marketing strategy

Which of the following is an example of consumer-to-consumer electronic commerce? A) Niobi makes an online deposit of $5,000 into her friend Carla's account because she needs financial help. B) Heath buys a gift for Vannessa from Amazon.com. C) Blanco, a manufacturer, conducts business over the Web with its retailers. D) Ted files his income tax online. E) Marty buys Lobsang's mountaineering equipment from eBay.com

Marty buys Lobsang's mountaineering equipment from eBay.com

What is a Web Site or Web Application that uses content form more than one source to create a completely new service?

Mashup

What is the practice of sending brief posts 140-200 characters to a personal blog either publicly or to a private group of subsribers? Twitter is an example.

Microblog

Which of the following is likely to have the suffix ".com" after the domain name in its URL? A) UNICEF B) the Federal Reserve C) Microsoft D) the World Wide Fund for Nature E) Massachusetts Institute of Technology

Microsoft

Which of the following can be cited as an example of outsourcing? A) Microsoft hands over its customer service function to Convergys, located in India. B) Volkswagon acquires a steel manufacturing plant to reduce its overall production costs. C) Dell sources computer parts from suppliers located in Russia. D) Audi starts a manufacturing facility in China to take advantage of low labor costs. E) P&G acquires a retail outlet to reduce its distribution costs.

Microsoft hands over its customer service function to Convergys, located in India.

________ is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and devices. A) Adobe Dreamweaver B) Microsoft Expression Web C) HTML D) PHP E) Microsoft.NET

Microsoft.NET

Uses both GPS and GIS

Navigation Wireless advertising Vehicle location

The prediction that the number of transistors on a chip would double about every two years is known as ________. A) Megan's law B) Ashby's law C) Murphy's law D) Metcalfe's law E) Moore's law

Moore's law

Which of the following statements is true about B2B and B2C payments? A) Most B2B payments are made through credit cards. B) Most B2C payments are made by checks. C) Most B2B payments are made through electronic payment services. D) Most B2B payments are made by cash. E) Most B2B payments are made by checks.

Most B2C payments are made by checks.

In 1994, a company called ________ released the first mainstream Web browser thereby opening up the possibilities of the Internet for the general public. A) Netscape B) Microsoft C) Opera D) Internet Explorer E) Firefox

Netscape

The efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures

Network convergence

The first CPU had 2,200 transistors, whereas the newest models have broken the 2-billion-transistor mark. Take for example, the Intel Core i7 Extreme CPU which can complete hundreds of millions of operations every second. Which of the following is the most similar to this scenario? A) Advanced "cloud" applications can be used for grid computing, edge computing, and IP convergence. B) Apple has seen its sales volumes skyrocket by being able to come up with products that leverage existing technology. C) New generation digital cameras have a higher number and size of pixels than older digital camera models. D) The value of social networking sites increases as the number of users and membership increase. E) The greater the number of contributors to an open source software, the greater the "hidden costs" of running it.

New generation digital cameras have a higher number and size of pixels than older digital camera models.

8. Which of the following is a common sales CRM metric?

Number of new customers

Which of the following is an example disintermediation? A) Land Rover markets most of its four-wheel drives in high altitude regions where vehicles require more power. B) Dunkin' Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, which consists of items like Dunkin' Dawgs, hot dogs wrapped in dough. C) Gatorade Thirst Quencher is a market leader in sports drinks. It is now planning to market its drinks to working women in urban areas. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment.

OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers.

________ languages use common modules which combine properties and behaviors to define the relevant system components. A) Object-oriented B) Markup C) Structured query D) Metaprogramming E) Synchronous

Object-oriented

Technology failure

Occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage

Which of the following is an example of a word processing software? A) Microsoft Outlook B) Opera Presto C) Apple Keynote D) Lotus Notes E) OpenOffice Writer

OpenOffice Writer

What are the three Business Functions a MIS Infrastructure supports? a. Operations, Change and the Environment or Sustainability b. Operations, Customers, and E-Waste c. Operations, Clients and Servers d. Information, Change, and Busines Continuity Planning

Operations, Change and the Environment or Sustainability

________ is a scanning technology used to read and digitize typewritten, computer-printed, and even handwritten characters such as those on sales tags on department store merchandise, patient information in hospitals, or the address information on a piece of postal mail. A) Magnetic ink character recognition B) Optical mark recognition C) Biometric scanning D) Optical character recognition E) Batch processing

Optical character recognition

________ is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the Internet concurrently. A) Packet switching B) Store-and-forward C) Frame-relay D) Circuit-switching E) Packet-sniffing

Packet switching

________ networks enable any computer or device on the network to provide and request services. All members of the network have equivalent capabilities and responsibilities. A) Server-centric B) Server-to-peer C) Client-to-peer D) Peer-to-peer E) Client-centric

Peer-to-peer

Which of the following represents the biggest problem of Information Security Breaches? a. People misusing organizational information b. Technology failures c. Competitors accessing organizational systems d. None of the Above

People misusing organizational information

Which of the following represents the phases in the SDLC (System Development Life Cycle) used for developing Information Systems? a. Plan, analysis, design, test, maintain, develop, implement b. Analysis, plan, design, test, develop, maintain, implement c. Plan, analysis, design, develop, test, implement, maintain d. Analysis, plan, develop, design, test, implement, maintain

Plan, analysis, design, develop, test, implement, maintain

Foreign key

Primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among two tables

________ define the procedures that different computers follow when they transmit and receive data. A) Consoles B) Ports C) Protocols D) Hosts E) Domains

Protocols

Which of the following input technologies has been historically used for entering text and numbers on computers? A) graphics tablet B) QWERTY keyboard C) optical mouse D) scanner E) joystick

QWERTY keyboard

________ is a technology in which extra copies of data are stored on two or more hard drives to ensure that critical data is not lost. A) JBOD B) RAID C) SLED D) BIOS E) SPAN

RAID

________ are CASE tools that enable the integrated storage of specifications, diagrams, reports, and project management information. A) Repositories B) Analysis tools C) Code generators D) Diagramming tools E) Documentation generators

Repositories

EZBiz, the brainchild of three college friends, is a startup venture which plans to produce sports gear. They are currently trying to decide between a brick-and-click strategy and a click-only strategy. Which of the following, if true, would most support the decision to adopt a click-only strategy? A) E-commerce places firms on a global platform, in direct competition with the best in the business. B) Retailers have a preference for established brands that can pay good margins. C) Research suggests that some customers prefer online shopping because of the convenience it offers. D) Product trials and demonstrations are an essential part of the consumer buying process. E) Cyber laws are yet to reach the level of sophistication required to facilitate safe online transactions.

Retailers have a preference for established brands that can pay good margins.

Which of the following is an example of business-to-consumer electronic commerce? A) Brenda files her income tax online. B) A manufacturer conducts business over the Web with its retailers. C) Juan buys Kevin's guitar on eBay.com. D) Reuben buys a shoe on Yebhi.com. E) Sandra, an employee, uses the Web to make a change her health benefits.

Reuben buys a shoe on Yebhi.com.

7. Which benefits of a connected world makes all applications, equipment, and data available to anyone on the network, without regard to the physical location of the resource or the user?

Sharing resoures

Which of the following is an example of Peer-to-Peer (P2P)?

Skype

As the product manager for the eatery division at Whole Foods, Jerry is responsible for analyzing sales data to help him manage his team. Today Jerry is analyzing his data using many different perspectives to identify different ways to improve his division. Ex. Breakfast Foods Sales | Cereals Sales| Hot Cereals Sales but only looking at this data as a result of using ONE type of Sales Promotion; perhaps when they offered a coupon.

Slice and Dice

________ refer(s) to a program or set of programs that tell the computer to perform certain tasks. A) Software B) Telecommunication C) Hardware D) Data E) Networks

Software

Which of the following is a valid observation regarding the difference between solid state drives and hard disk-based drives? A) Hard disk drives are typically faster than solid state drives. B) Solid state drives have no moving parts, while hard disk drives have both electronic and mechanical parts. C) Solid state drives are louder and less reliable than hard disk drives. D) Hard disk drives are more expensive than solid state drives. E) Hard disk drives use microchips to store data, while solid state drives use magnetic disks.

Solid state drives have no moving parts, while hard disk drives have both electronic and mechanical parts.

The most secure procedures combine

Something the user knows Something the user has Something that is part of the user

________ automate the business processes involved in selling products from a single supplier to multiple buyers. A) Supplier portals B) Reference portals C) Customer portals D) Procurement portals E) Sourcing portals

Supplier portals

The business Benefits of a solid MIS infrastructure

Supporting operations - Information MIS infrastructure Supporting Change - Agile MIS infrastructure Supporting the environment - Sustainable MIS infrastructure

Which statement below is FALSE? a. The Semantic Web is about Social Media and user-generated Web Content b. The Semantic Web describes the relationships between things similar to a database c. The Semantic Web describes the properties of things d. The Semantic Web is not about links between Web pages

The Semantic Web is about Social Media and user-generated Web Content

Energy Consumption

The amount of energy consumed by business process and systems. Huge increases in technology use have greatly amplified energy consumption. The energy consumed bby a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide by an automobile

Multi-tenancy

The cloud means that a single instance of a system serves multiple customers

Which of the following statements is true about the platform as a service model? A) The customer is provided with the basic capabilities of processing, storage, and networking. B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) The customer uses an application provided via a cloud infrastructure. E) The customer has to manage the licenses for the operating systems being used.

The customer can run his or her own applications that are typically designed using tools provided by the service provider.

Which of the following statements is true about the software as a service model? A) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. B) The customer has to manage the licenses for the operating systems being used. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) The customer is provided with the basic capabilities of processing, storage, and networking. E) The user has control over the applications but has limited or no control over the underlying infrastructure.

The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

Which of the following statements is true about the infrastructure as a service model? A) The customer has to manage the licenses for the operating systems being used. B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) The customer uses an application provided via a cloud infrastructure. E) The user has control over the applications but has limited or no control over the underlying infrastructure.

The customer has to manage the licenses for the operating systems being used. `

What is the primary gpal of using As-is and To-Be process models?

To determine what the problem is and then how to solve the problem.

What is ERP (Enterprise Resource Planning)?

The integration of all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations.

Which of the following occurred in the 1964-1990s generation of computing? A) The mainframe era began. B) The personal computer era began and interpersonal computing began. C) The mainframe era ended and the personal computer era began. D) The interpersonal computing era ended and the Internetworking era began. E) The Internetworking era ended.

The mainframe era ended and the personal computer era began.

Which of the following occurred in the 1990s-2000 generation of computing? A) The mainframe era began. B) The personal computer era ended and interpersonal computing began. C) The mainframe era ended and the personal computer era began. D) The interpersonal computing era ended and the Internetworking era began. E) Internetworking era ended.

The personal computer era ended and interpersonal computing began.

Incident Management

The process responsible for managing how incidents are identified and corrected.

EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a brick-and-click strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy? A) The company has limited access to funds and is looking to keep its costs low. B) The public is wary of sharing confidential information after a recent spate of credit card scandals. C) A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain. D) Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts. E) Some click-only companies have been unable to achieve economies of scale and subsequently are unable to offer lower prices.

The public is wary of sharing confidential information after a recent spate of credit card scandals.

Cloud Fabric

The software that makes possible the benefits of cloud computing, such as multi-tenancy

Which of the following does NOT descrbe an ERP (Enterprise Resource Planning) system? a. ERP systems provide a foundation for collaboration and consistency between departments b. At the core of an ERP is a Database c. ERP systems have been widely adopted in large organization to store critical knowledge used to make the decisions that drive the organization's performance d. There is little complexity associated with an ERP system as it relates to planning, implementing andtraining. e. The three most common core ERP components that focus on internal operations are: Accounting andFinance, Production and Materials Management, and Human Resources f. Business Intelligence, eBusiness and Customer Relationship Management are typical extended ERP components.

There is little complexity associated with an ERP system as it relates to planning, implementing andtraining.

Which of the following statements is true about companies pursuing a click-only business strategy? A) These companies approach business activities in a traditional manner by operating physical locations. B) These companies operate in both physical and virtual arenas. C) These companies do not indulge in electronic commerce to conduct their businesses. D) These companies do not have physical store locations. E) These companies choose to operate solely in the traditional physical markets.

These companies do not have physical store locations.

Which of the following statements is true about firms pursuing a brick-and-mortar business strategy? A) These firms do not have physical store locations. B) These firms do not indulge in electronic commerce. C) These firms focus purely on electronic commerce to conduct business. D) These firms conduct business electronically in cyberspace. E) These firms operate in both physical and virtual arenas.

These firms do not indulge in electronic commerce.

Which of the following statements is true about firms pursuing a click-and-mortar business strategy? A) These firms learn how to fully maximize commercial opportunities in both domains. B) These firms can often compete more effectively on price. C) These firms tend to be highly adept with technology and can innovate very rapidly as new technologies become available. D) Customers of these firms find it difficult to return a product in case of damages. E) These firms can reduce prices to rock-bottom levels, although a relatively small firm may not sell enough products.

These firms learn how to fully maximize commercial opportunities in both domains

Which of the following statements is true about firms pursuing a click-and-mortar business strategy? A) These firms focus purely on electronic commerce to conduct businesses. B) These firms operate in both physical and virtual arenas. C) These firms do not indulge in electronic commerce. D) These firms only conduct business electronically in cyberspace. E) These firms do not have physical store locations.

These firms operate in both physical and virtual arenas.

Which of the following statements is true about open source software? A) These programs are used by a few professional users. B) These programs do not include systems software. C) They are back-up software used when a system is converting from systems to application software. D) These programs do not include application software. E) These programs' source code is freely available for use and/or modification.

These programs' source code is freely available for use and/or modification.

Which of the following statements is true about packet-switching systems? A) For this system to work, each packet being sent across a network must be verified. B) In this system, each computer attached to a network has the same network address. C) Packet switching is used when only one computer needs to use the network. D) These systems adapt instantly to changes in network traffic. E) Wide Area Networks and the Internet do not use these technologies.

These systems adapt instantly to changes in network traffic.

Which of the following statements is true about servers? A) They are used to provide services to users within large organizations or to Web users. B) They are primarily used as the main, central computing system for major corporations. C) They are used primarily to assist in solving massive scientific problems. D) They are optimized for visualization and rendering of three-dimensional models. E) They are used for personal computing and small business computing.

They are used to provide services to users within large organizations or to Web users.

Which of the following statements is true about today's service-oriented IS personnel? A) They modify systems at a moment's notice to meet customer needs quickly and effectively. B) They patiently wait for customers to come in with systems complaints. C) They believe that they own and control the computing resources. D) They give reasons why customers' ideas cannot or will not work. E) They believe they should tell users what they can and cannot do with the computing resources.

They modify systems at a moment's notice to meet customer needs quickly and effectively.

Which of the following statements is true about processing technologies? A) They are used to enter information into a computer. B) They deliver information in a usable format. C) They define the procedures that different computers follow when they transmit and receive data. D) They transform inputs into outputs. E) They move data storage away from a centralized location to the"edges" of a network.

They transform inputs into outputs.

Artificial Intelligence (AI) simulates human thinking and behavior, such as the ability to reason and learn. What is the ultimate goal of AI?

To build a system that can mimic human intelligence

Relational databases use primary keys and foreign keys

To create logical relationships

Why do Relational Databases use Foreign Keys? a. To create an entity b. To create physical relationships c. To create logical relationships between two entities based upon a common field that is contained in bothentities d. To create an attribute

To create logical relationships between two entities based upon a common field that is contained in bothentities

What encompasses all of the Information contained within a single Business Process or Unit of Work and its primary purpose is to support the performing of daily operational tasks?

Transactional information

What would managers use to make structured decisions at the operational level?

Transactional information

Internet protocol or the protocol used by the Internet is called the ________. A) Transmission Control Protocol (TCP) B) Dynamic Host Configuration Protocol (DHCP) C) Address Resolution Protocol (ARP) D) Trivial File Transfer Protocol (TFTP) E) TOC protocol

Transmission Control Protocol (TCP)

Supply Chain Management involves the management of information flows between and among the stages in a Supply Chain to maximize total supply chain effectiveness and profitability. For example managing the shipment of raw materials from suppliers or storing the finished goods in the warehouse, or shipping the finished goods to the retailer or the customer.

True

Which of the following encoding formats has become an industry standard that was designed to allow symbols from all languages, including Arabic and Chinese? A) ASCII B) MIME C) MAC OS Roman D) EBCDIC E) UTF

UTF

Which of the following is a multiuser, multitasking operating system that is available for a wide variety of computer platforms, and is commonly used because of its superior security? A) Android B) iOS C) Windows D) Unix E) OS/390

Unix

What is the difference between customer and supplier portals and business-to-business (B2B) marketplaces? A) Unlike customer and supplier portals, B2B marketplaces cannot be classified as extranets. B) Unlike customer and supplier portals, B2B marketplaces are secured by firewalls. C) Unlike customer and supplier portals, B2B marketplaces only serve vertical markets. D) Unlike customer and supplier portals, B2B marketplaces are associated with a particular buyer or supplier who deals with multiple business partners. E) Unlike customer and supplier portals, B2B marketplaces allow many buyers and many sellers to come together.

Unlike customer and supplier portals, B2B marketplaces allow many buyers and many sellers to come together.

Administrator access

Unrestricted access to the entire system

Which of the following is a type of effectiveness MIS Metric

Usability

Intranet

Used for business operations and management Used for communications and collaboration Used for web publishing

Which of the following is an example of a visual programming language? A) VB.NET B) Java C) HTML D) Microsoft.NET E) XML

VB.NET

Which of the following IS personnel is responsible for the maintenance of information systems? A) a systems analyst B) a database administrator C) a programmer D) an IS security manager E) a systems consultant

a database administrator

What enables computers to run multiple operating systems and multiple software applications at the same time; creating multiple "virtual" machines all on asingle computing device?

Virtualization

Which of the following steps should be taken to ensure ones privacy online? A) Avoid Web sites that are monitored by independent organizations. B) Visit Web sites anonymously. C) Adjust your Web browser settings to save cookies. D) Ensure you receive a confirmation e-mail whenever you buy products online. E) Maintain only one e-mail account and use it when making online purchases.

Visit Web sites anonymously.

What is a graphical display of patterns and complex relationships in large amounts of data?

Visualization

Which of the following questions cannot be answered using Business Intelligence? a. Where has the organization been? b. Where is the organization now? c. Where is the organization going? d. Was anything on Back Order for a specific order?

Was anything on Back Order for a specific order?

What is an activity-based process in which each phase in the SDLC (System Development Life Cycle) is performed sequentially fromplanning through implementation and maintenance?

Waterfall methodology

What is the Decision Support System (DDS) analysis that checks the impact of a change in a variable or assumption on the model?

What-If Analysis

What are three types of Decision Support Systems Analysis Techniques available to support decision making? a. Transaction Processing Systems, Decision Support Systems, Executive Information Systems b. Analytical Information Systems, Decision Support Systems, Executive Information Systems c. Transaction Processing Systems, Drill-Down Systems, Expert Systems d. What-If Analysis, Sensitivity Analysis, Goal-Seeking Analysis

What-If Analysis, Sensitivity Analysis, Goal-Seeking Analysis

Which of the following questions should a manager consider while analyzing the "value proposition" component of the business model? A) How much are you selling the product for? B) How fierce is the competition? C) How do you plan to let your potential customers know about your product/service? D) Can the leaders of the organization get the job done? E) Why do customers need your product/service?

Why do customers need your product/service?

What is a means by which portable devices can connect wireslessly to a Local Area Network (LAN), using access points thatsend and receive data via radio waves?

Wireless fidelity ( Wi-Fi)

WorldTravel (www.worldtravel.com) is a travel Web site that provides detailed information about the different places that tourists can visit across the globe. Additionally, it also helps visitors to book tickets and hotels in these destinations. Which of the following, if true, would most assure the customers about their online privacy? A) WorldTravel, when collecting personal information, explicitly states the purpose of the information and that it will not be used for anything else. B) WorldTravel informs its members that it is following the best practices in the industry. C) WorldTravel, when collecting personal information, explicitly tells all its customers that the information collected will be protected by a third party who specializes in this domain. D) WorldTravel decides not to send any spam mails to any of its members. E) WorldTravel, when collecting personal information, explicitly tells all its customers that the information collected is protected under the Electronic Communications Privacy Act.

WorldTravel, when collecting personal information, explicitly states the purpose of the information and that it will not be used for anything else.

Which of the following is used by Web services to support the interoperability between machines? A) XML B) PHP C) HTML D) MySQL E) Adobe Flash

XML

network

a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate.

Server

a computer dedicated to providing information in response to requests.

server

a computer dedicated to providing information in response to requests.

client

a computer designed to request information from a server

Client

a computer designed to request information from a server.

Grid Computing

a collection of computers, often geographically dispersed, that are coordinated to solve a common problem.

Grid computing

a collection of computers, often geographically dispersed, that are coordinated to solve a common problem. uses less than 25% of computing power, freeing up 75% for other tasks

Network

a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate.

Which is a false statement about the generations of the web? a. Web 2.0 is a simple static website without any interaction with its users b. Web 2.0 brings people closer together with information using machines c. Web 3.0 brings machines closer together using information d. Web 3.0 is a rich "intelligent" understanding and relationships among concept and topics

a. Web 2.0 is a simple static website without any interaction with its users

Characteristics of an Agile MIS Infrastructure

accessibility, availability, maintainability, portability, reliability, scalability, usability

Infrastructure as a Service (IaaS)

offers computer hardware and networking equipment on a pay-per-use basis. Ex. Amazon EC2

Paying businesses that bring or refer customers to another business is known as ________. A) affiliate marketing B) subscription marketing C) viral marketing D) stealth marketing E) buzz marketing

affiliate marketing

Supporting Change

agile MIS infrastructure

Online Transaction Processing (OLTP) and Online Analytical Processing (OLAP) are similar Management Information Systems strategies used to help with business decision making. What is the primary diffe rence betwwen OLTP and OLAP? a. OLTP is used at the operational level; OLAP is used at the managerial level b. OLTP is used to capture transactional and event data; OLAP is used to manipulate information c. OLTP is used to support structured decisions; OLAP is used to support semi-structured decisions d. A and B only e. All of the above

all of the above

Which of the following is part of an IS personnel's systems knowledge and skills? A) hardware platforms B) business processes C) alternative development methodologies D) cabling and network interface cards E) application software

alternative development methodologies

Backup

an exact copy of a system's information.

Emergency notification service

an infrastructure built for notifying people in the event of an emergency

Emergency Notification Services

an infrastructure built for notifying people in the event of an emergency.Which is a sudden unexpected event requiring immediate action

Which of the following explains Web analytics? A) conducting online marketing research to improve product quality B) analyzing Web sites in order to find the best one in its category C) tracking all online purchasers to try and increase their frequency of visit to a particular Web site D) analyzing Web surfers' behavior in order to improve Web site performance E) analyzing Web sites in order to find the best online business practices

analyzing Web surfers' behavior in order to improve Web site performance

The customer relationship management system and personal productivity software are examples of ________. A) application software B) peripheral software C) systems software D) transitory software E) open source software

application software

LISP is a programming language that finds application in ________. A) business B) scientific research C) artificial intelligence D) teaching structured programming E) developing Web pages

artificial intelligence

Operating systems are often written in ________, a very low level computer programming language that allows the computer to operate quickly and efficiently. A) structured query language B) hyper text markup language C) assembly language D) extensible markup language E) practical extraction and report language

assembly language

8. Which of the following is considered a feature in a contact center?

automatic call distribution, interactive voice response, predictive dialing

What is a Business Process?

b. A standardized set of activities that accomplish a specific task, such as processing a customer's order

What of these represents the three different levels of a company pyramid from the top to the bottom? a. Managerial-Strategic-Operational b. Strategic-Managerial-Operational c. Operational-Managerial-Strategic d. Strategic-Operational-Managerial

b. Strategic-Managerial-Operationa

What type of System Development consists of a series of tiny Projects? Answers: a. Waterfall methodology b. Iterative development c. Agile methodology d. All of the above

b. Iterative development

What do SMART criteria for successful objective creation for Projects include? a. Specific, metrics, agreed upon, real, time valued b. Specific, measurable, agreed upon, realistic, time framed c. Specific, measurable, accurate, real, time valued d. Specific, metrics, agreed upon, realistic, time framed

b. Specific, measurable, agreed upon, realistic, time framed

Which of the following types of computer software utilities is used to archive files from hard disks to tapes, flash drives, or other storage devices? A) data compression B) file defragmentation C) disk and data recovery D) backup E) device drivers

backup

Entering a large number of separate forms or documents into a computer system and manipulating this data at a single time is referred to as ________. A) cluster analysis B) data mining C) batch processing D) sequential coupling E) line coding

batch processing

Uploading enables individuals to ________. A) access sensitive information on the Internet B) be producers of information instead of mere consumers C) copyright information available on the Internet D) save information found on the Internet onto their personal computers E) permanently remove information available on the Internet

be producers of information instead of mere consumers

Which of the following specialized scanners is used to scan human body characteristics for identification and security purposes? A) biometric scanner B) optical scanner C) bar code scanner D) smart card scanner E) port scanner

biometric scanner

Bandwidth is measured in ________. A) moles per second B) joules per second C) parts per million D) bits per second E) relays per second

bits per second

Which of the following are business 2.0 communication and collaboration tools?

blogs wikis instant messaging web conferencing

Companies following a ________ business strategy choose to operate solely in the traditional physical markets. A) click-only B) click-and-mortar C) brick-and-click D) click-and-brick E) brick-and-mortar

brick-and-mortar

Which of the following purposes was XML designed to serve? A) adding dynamic content to Web pages B) building database queries C) developing applications in high-speed arcade graphics D) checking the accuracy of user-entered information on Web pages E) supplying interactive components to Web pages

building database queries `

1) Electronic commerce is used to conduct business with business partners such as suppliers and intermediaries. This form of EC is commonly referred to as ________ electronic commerce. A) business-to-consumer B) peer-to-peer C) business-to-business D) consumer-to-consumer E) business-to-employee

business-to-business

Organizations implement intranets to support ________ electronic commerce. A) business-to-business B) business-to-consumer C) business-to-government D) business-to-employee E) consumer-to-business

business-to-employee

As the product manager for the eatery division of Whole Foods, Jerry is responsible for analyzing sales data to thelp him manage his team. Today Jerry is analyzing his data by looking at details, and details of details of information. Ex. Breakfast Foods Sales | Cereals Sales| Hot Cereals Sales, compared to Cold Cereals Sales . Which of the following common Digital Dashboard capabilites is Jerry using to analyze his department's success a. Slice and Dice b. Competitive Tables c. Drill Down d. Consolidation

c. Drill Down

A ________ is a small block of memory used by processors to store those instructions most recently or most often used. A) random access memory B) BIOS C) cache D) read-only memory E) flash memory

cache

The ________ is responsible for performing all the operations of the computer. A) random-access memory B) central processing unit C) read-only memory D) application software E) operating system

central processing unit

Disaster Recovery Cost Curve

charts (1) the cost to the company of the unavailability of information and technology and (2) the cost to the company of recovering from a disaster over time.

Which of the following functions do scripting languages perform? A) creating animation and video that can be compressed small enough for fast download speeds B) developing applications in high-speed arcade graphics C) checking the accuracy of user-entered information on Web pages D) automating or supporting activities throughout the information systems development process E) laying out or formatting Web pages

checking the accuracy of user-entered information on Web pages

Which of the following object-oriented programming concepts uses modules that allow programmers to group properties and behavior together? A) encapsulation B) inheritance C) class D) polymorphism E) abstraction

class

A ________ is any computer on the network, or any software application that uses only the services provided by the server. A) peer B) client C) host D) console E) port

client

Most companies use a specific form of network infrastructure called a ____ and ___ ____

client, server network

Microsoft's Exchange/Outlook and Lotus Notes, provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system. These are examples of ________. A) collaboration systems B) office automation systems C) data mining and visualization systems D) functional area information systems E) transaction processing systems

collaboration systems

Data centers managed by a third party that rents out space to multiple organizational customers are known as ________. A) collocation facilities B) multi bay stations C) serial port facilities D) data ease facilities E) datahub stations

collocation facilities

Corporate Social Responsibility

companies' acknowledged responsibility to society.

MakeYourClick is an online ad agency that is known for its ability to create ads which lure customers to purchase. Brenda, an ex-employee of the firm, was fired from the agency on baseless grounds. An angry Brenda inflates MakeYourClick's online advertising cost by repeatedly clicking on the advertiser's link. Brenda has committed ________. A) competitive click fraud B) irate click fraud C) network click fraud D) shill click fraud E) dedicated click fraud

competitive click fraud

Which of the following is used to describe the issues and standards of conduct as they pertain to the use of information systems? A) virtual ethics B) social informatics C) cyber security D) computer etiquette E) computer ethics

computer ethics

The ability to independently learn new technologies as they emerge and assess their impact on your work and life is called ________. A) computer assisted learning B) computer adaptation C) computer fluency D) computer compatibility E) computer programming

computer fluency

Data stored on disks is easier and faster to locate than data on magnetic tapes because ________. A) the data on disks is stored in binary form B) disks have larger and more efficient storage capacities C) disks have both mechanical and electronic parts D) magnetic tapes store data in tiny magnetic spots E) computers do not have to scan an entire tape to find a specific data file

computers do not have to scan an entire tape to find a specific data file

Grid Computing

computers spread over a wide area to work together to solve a single goal.

hardware

consists of the physical devices associated with a computer system

Hardware

consists of the physical devices associated with a computer system.

8. Which of the following is where customer service representatives answer customer inquiries and respond to problems through a number of different customer touch points?

contact center

failback

occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

1) Knowledge workers are professionals who ________. A) use knowledge to perform their jobs, but do not create knowledge B) create, modify, and/or synthesize knowledge as a fundamental part of their jobs C) use their skills to help others gain knowledge D) modify knowledge created by others, but do not create knowledge themselves E) work in the education industry

create, modify, and/or synthesize knowledge as a fundamental part of their jobs

Virtualization

creates multiple "virtual" machines on a single computing device.

Virtualizations

creates multiple virtual machines on a single computing device

What is a FALSE statement about Project Management Software? a. A PERT Chart is a graphical network model that depicts a Project's Tasks and the relationships between those Tasks. b. A Gantt Chart is a simple Bar Chart that depicts Project Tasks against the Project Timeframe listed horizontally. c. The Critical Path of a Project can be depicted graphically. d. A Gantt Chart typically displays the Critical Path.

d. A Gantt Chart typically displays the Critical Path.

Which of the following types of computer software utilities allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data, allowing more data to be stored on a disk? A) file defragmentation B) data compression C) device drivers D) file conversion E) disk and data recovery

data compression

A logical data structure that details the relationship among data elements using graphics or pictures

data model

42) Microsoft Access is an example of ________. A) word processing software B) database management software C) presentation software D) calendar and contact management software E) Web browsers

database management software

Outsourcing has seen a huge increase because of the ________. A) increase in decentralization B) decrease in transportation costs C) increase in advertising costs D) decrease in telecommunication costs E) increase in the cost of raw materials

decrease in telecommunication costs

Cloud Computing Benefits

decreased maintenance issues, decreased labor costs, increased computing power, increased performance, increased information security, increased software updates, increased storage capacity

In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A ________ can help overcome these problems. A) trusted grid B) edged grid C) clustered grid D) dedicated grid E) parallel grid

dedicated grid

Information accessibility focuses on ________. A) defining what information a person or organization has the right to obtain about others B) identifying who is responsible for informational errors that harm people C) information that has been encrypted by the owner to make it unaccessible to others D) who owns information about individuals and how information can be sold and exchanged E) what information an individual should have to reveal to others in the workplace

defining what information a person or organization has the right to obtain about others

Smart Grid

delivers electricity using two-way digital technology.

smart grid

delivers electricity using two-way digital technology. Meant to solve the problem of the world's outdated electrical grid.

Information about "who am I, and where do I live?" is an example of ________. A) behavioral data B) geographic data C) psychographic data D) demographic data E) attitudinal data

demographic data

Scalability

describes how well a system can scale up adapt to the increased demands of growth.

Sustainable MIS or green

describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment.

Business Continuity Planning

details how a company recovers and restores critical business operation and systems after a disaster or extended disruption.

Scalability CAPACITY PLANNING

determines future environmental infrastructure requirements to ensure high-quality performance

Capacity Planning

determines future environmental infrastructure requirements to ensure high-quality system performance.

7) Which of the following is an example of an economic change brought about by globalization? A) increases in the frequency of worldwide fads and phenomena B) development of low-cost computing platforms C) availability of low-cost communication systems D) increases in the outsourcing of labor E) decentralization of organizations

development of low-cost computing platforms

Which of the following computer-aided software engineering (CASE) tools enable system process, data, and control structures to be represented diagrammatically? A) repositories B) code generators C) diagramming tools D) screen and report generators E) analysis tools

diagramming tools

Which of the following is a geoeconomic challenge of operating in the digital world? A) differences in network infrastructures B) differences in the concept of time and life focus C) differences in measurement units D) differences in export and import regulations E) differences in languages

differences in network infrastructures

Which of the following is a cultural challenge of operating in the digital world? A) conducting videoconferences across different time zones B) aging populations in the United States and Western Europe C) differences in power distance and uncertainty avoidance D) availability of labor force and salary differences E) differences in academic degrees and measurement units

differences in power distance and uncertainty avoidance

A global project called One Laptop per Child is attempting to distribute low-cost laptop computers to children in developing countries around the world in an attempt to shrink the ________. A) digital divide B) electronic gap C) power distance D) horizontal disparity E) knowledge gap

digital divide

The gap between those individuals in our society who are computer literate and have access to information resources like the Internet and those who do not is referred to as the ________. A) horizontal disparity B) digital divide C) electronic gap D) generation gap E) knowledge divide

digital divide

The phenomenon of cutting out the "middleman" and reaching customers more directly and efficiently is known as ________. A) gentrification B) demutualization C) reintermediation D) mutualization E) disintermediation

disintermediation

Disaster Effects on Companies

disrupting communication, damaging physical infrastructure, halting transportation, blocking utilities

Which of the following is a mechanism for consumer-to-consumer transactions? A) e-tailing B) e-integration C) e-filing D) e-tendering E) e-auctions

e-auctions

Which of the following provides customers with the ability to obtain personalized information by querying corporate databases and other information sources? A) e-filing B) e-integration C) e-information D) e-transaction E) e-tailing

e-integration

The online sales of goods and services is known as ________. A) e-information B) e-integration C) e-tailing D) e-collaboration E) e-filing

e-tailing

________ is an example of m-commerce. A) e-auctions B) e-tailing C) e911 D) e-filing E) e-integrating

e911

What is the difference between eCommerce and eBusiness?

eCommerce is buying and selling of goods or services online; eBusiness includes eCommerce and all activities related to internal and external business operations.

Prior to the introduction of the Internet and Web, the secure communication of proprietary information in business-to-business electronic commerce was facilitated using ________. A) enterprise resource planning B) electronic data interchange C) cloud computing D) supply chain management E) executive information system

electronic data interchange

Which of the following represents the connectingand communicating tools supporting and driving Ebusiness

email, instat messageing, podcasting, content management systems, and video and web conferencing.

Intranets mostly affect the ________ of an organization. A) suppliers B) employees C) customers D) retailers E) advertisers

employees

The purpose of an intelligent system is to ________. A) enable people to communicate, collaborate, and coordinate with each other B) create, store, analyze, and manage spatial data C) emulate or enhance human capabilities D) support the coordination of suppliers, product or service production, and distribution E) produce detailed information to help manage a firm

emulate or enhance human capabilities

Which of the following is an example of a technological change brought about by globalization? A) increases in the frequency of international travel B) increases in the levels of immigration C) enforcement of global patent and copyright laws D) decreases in the frequency of worldwide fads E) decentralization of organizations

enforcement of global patent and copyright laws

Reliability (accuracy)

ensures a system is functioning correctly and providing accurately information.

The purpose of a(n) ________ is to support and integrate all facets of the business, including planning, manufacturing, sales, marketing, and so on. A) intelligent system B) functional area information system C) electronic commerce system D) enterprise resource planning system E) management information system

enterprise resource planning system

Which of the following types of ports used to connect networks, is the most common standard for local area networks? A) ethernet port B) VGA port C) serial port D) parallel port E) USB port

ethernet port

Which of the following object-oriented programming concepts is reflected by a word processor that reacts to a user's typing and clicking? A) inheritance B) event-driven program execution C) encapsulation D) class E) delegation

event-driven program execution

Which of the following forms of e-auction typically takes place on a business-to-business level? A) reverse auctions B) bartering C) exchanges D) forward auctions E) request for quotes

exchanges

A(n) ________ is a type of program that translates a program's source code into machine language and executes one statement at a time. A) compiler B) disassembler C) interpreter D) executable E) linker

executable

The ________ is an innovative pointing device developed primarily for the disabled for help with computer pointing. A) eye-tracking device B) graphics tablet C) optical mouse D) joystick E) touch screen

eye-tracking device

Some of the benefits for a company to operate an internal Wiki are that they are great tools for: Sharing confidential employee information (T/F)

false

Which of the following types of computer software utilities transfers a file from one format to another so that it can be used by an application other than the one used to create it? A) file conversion B) data compression C) backup D) file defragmentation E) device drivers

file conversion

Companies use ________ to secure proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users. A) firewalls B) phishing C) rootkits D) bots E) pharming

firewalls

The website that was the primary catalyst for growing electronic government and is the official US gatewat to all government information is...

first gov.org

E-filing is an example of a ________ tool. A) government-to-citizen B) consumer-to-consumer C) government-to-government D) consumer-to-business E) business-to-business

government-to-citizen

Which of the following selecting and pointing devices is used to simulate the process of drawing or sketching on a sheet of paper? A) eye-tracking device B) joystick C) optical mouse D) graphics tablet E) ergonomic keyboard

graphics tablet

mmuneEarth, a research and development company, has a motto to "eradicate all diseases." It has numerous departments that research the cure of various diseases. One of its largest departments include the AIDS department where more than 500 scientists are researching the cure for AIDS. ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose. Recently, one of its computers was updated because it had low performance which had slowed the entire system. Which of the following is ImmuneEarth using to research the cure for AIDS? A) grid computing B) cloud computing C) trusted computing D) edge computing E) IP convergence

grid computing

Components of a Sustainable MIS infrastructure

grid computing, cloud computing, virtualized computing

The term ________ refers to a class of software that enables people to work together more effectively. A) malware B) groupware C) freeware D) webware E) pestware

groupware

Which of the following is an example of secondary storage? A) cache memory B) read-only memory C) hard disk drives D) random access memory E) virtual memory

hard disk drives

A(n) ________ occurs if a read/write head for some reason touches one of the disks in a hard drive, leading to a loss of data. A) head crash B) click of death C) bad sector D) disk compression E) base isolation

head crash

In a URL, the ________ is the particular Web server or group of Web servers (if it is a larger Web site) that will respond to the Web request. A) domain name B) host name C) client name D) top-level domain name E) port name

host name

scalability

how well a system can scale up, or adapt to increased demands of growth

Prior to the invention of the Web, content posted on the Internet could be accessed through the Internet tool Gopher. The Web took Gopher one step further by introducing ________. A) animation B) hypertext C) simulation D) file sharing E) instant cha

hypertext

Sustainable MIS Infrastructure

identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

Supporting Operations (Information MIS)

identifies where and how important information is maintained and secured. It supports day to day business operations and plans for emergencies (blackouts, floods, earthquakes, security breaches)

Information MIS Infrastructure

identifies where and how important information, such as customer records, is maintained and secured.

Which of the following allows individuals to utilize powerful search engines on the Internet to build their "own personal supply chain of information, knowledge, and entertainment"? A) offshoring B) in-forming C) in-sourcing D) exporting E) outsourcing

in-forming

Agile MIS Infrastructure

includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals.

MIS Infrastructure

includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

MIS infrastructure

includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. - Hardware -Software -Network - Client - Server

Which of the following is an advantage of using interactive communication via the Web? A) reduced transaction costs B) increased customer loyalty C) enhanced operational efficiency D) reduced brand dilution E) decreased cannibalization

increased customer loyalty

Environmental Impacts from MIS

increased electronic waste, increased energy consumption, increased carbon emissions

Supporting Operations

information MIS infrastructure

Which of the following speech recognition-based technologies is used for telephone surveys and to guide customers through the various menu options when calling a company's customer service line? A) transcription B) telemetrics C) speaker diarization D) interactive voice response E) computer-aided translation

interactive voice response

Which of the following is an asynchronous groupware tool? A) shared whiteboard B) online chat C) intranet D) electronic meeting support system E) video communication system

intranet

hot site

is a separate and fully equipped facility where the company can move immediately after a disaster and resume business

cold site

is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

warm site

is a separate facility with computer equipment that requires installation and configuration.

Which of the following pointing devices works by moving a small lever that sits in a holder? A) QWERTY keyboard B) optical mouse C) trackball D) touch screen E) joystick

joystick

Which of the following is the host name in the URL "labs.google.co.in/jack carver?" A) labs B) google C) co D) in E) jack carver

labs

What is the function of markup languages such as HTML? A) adding dynamic content to Web pages B) developing applications in high-speed arcade graphics C) checking the accuracy of user-entered information on Web pages D) supplying interactive components to Web pages E) laying out or formatting Web pages

laying out or formatting Web pages

Cloud Computing Challenges

limited features, internet connection required, security can be questionable

Utility Computing

offers a pay-per-use revenue model similar to a metered service such as gas or electricity.

Which of the following scanning technologies is used by the banking industry to read data, account numbers, bank codes, and check numbers on preprinted checks? A) optical mark recognition B) bar code reading C) magnetic ink character recognition D) biometric scanning E) optical character recognition

magnetic ink character recognition

A ________ is used primarily as the main, central computing system for major corporations. A) microcomputer B) supercomputer C) server D) mainframe E) workstation

mainframe

Organizations primarily use extranets to ________. A) conduct market research B) manage their supply chains C) identify their target market D) control brand dilution E) manage public relations

manage their supply chains

Dynamic Scaling

means that the MIS infrastructure can be automatically scaled up or down based on needed requirements.

Scalability PERFORMANCE

measures how quickly a system performs a process of transaction

Performance

measures how quickly a system performs a process or transaction.

A ________ is used for personal computing and small business computing. A) workstation B) microcomputer C) mainframe D) server E) supercomputer

microcomputer

A(n) ________ is also referred to as the computer's brain. A) random-access memory B) operating system C) read-only memory D) application software E) microprocessor or CPU

microprocessor or CPU

What is the ability to purchase goods and services through a wireless internet enabled portable device?

mobile business of mcommerce

Which of the following is considered as the heart of a computer's system unit? A) motherboard B) random access memory (RAM) C) hard drive D) central processing unit (CPU) E) read-only memory (ROM)

motherboard

Aortego, a U.S.-based automobile company, has a manufacturing plant in India and has been able to reduce its manufacturing costs significantly because of the country's highly-skilled yet low cost labor. However, Aortego is forced to shift its plant from India to Canada because of the introduction of a new law which mandates that all companies collaborate with Indian companies before entering into the country. Which of the following best explains Aortego's shift from India to Canada? A) offshoring B) outsourcing C) in-forming D) nearshoring E) in-sourcing

nearshoring

U.S. companies move work from India back to Mexico or British Columbia in order to address some of the challenges associated with overseas destinations. This is an example of ________. A) in-sourcing B) outsourcing C) in-forming D) onshoring E) nearshoring

nearshoring

In a ________, a site hosting an advertisement creates fake clicks in order to get money from the advertiser. A) competitive click fraud B) irate click fraud C) network click fraud D) shill click fraud E) dedicated click fraud

network click fraud

Which of the following is part of an IS personnel's technical knowledge and skills? A) systems analysis and design B) integrating subsystems and systems C) alternative development methodologies D) network operating systems E) technological communication and presentation

network operating systems

The concept of the Long Tail refers to a focus on ________. A) mainstream products B) broad markets C) generic brands D) brand dilution E) niche markets

niche markets

The suffix ".org" is reserved for ________. A) governmental entities B) commercial organizations C) network organizations D) educational institutions E) nonprofit organizations

nonprofit organizations

Which of the following types of e-auction fraud is associated with the sellers failure to ship an item after the payment has been received? A) bid luring B) bid shielding C) nonshipment D) shipping fraud E) payment failure

nonshipment

High Availability

occurs when a system is continuously operational at all times.

Failback

occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

Aircraft manufacturer Boeing designed its new 787 Dreamliner aircraft in Russia, making use of the availability of highly skilled aeronautical engineers. Identify this strategy. A) offshoring B) outsourcing C) in-sourcing D) franchising E) licensing

offshoring

Which of the following refers to having certain functions performed by the same company but in a different country? A) outsourcing B) offshoring C) exporting D) licensing E) franchising

offshoring

Which of the following is a synchronous groupware tool? A) e-mail B) intranet C) group calendar D) online chat E) automation system

online chat

MySQL is a(n) ________. A) proprietary application development suite B) open source software for accessing and maintaining data in a database C) proprietary software that operates the hardware on mainframe computers D) open source software used to provide users access to Web sites E) automated software tool suite used by systems developers to design and implement information systems

open source software for accessing and maintaining data in a database

Which of the following types of specialized scanners is used to scan questionnaires and test answer forms where answer choices are indicated by filling in circles using pencils or pens? A) optical mark recognition B) biometric scanner C) bar code reader D) magnetic ink character recognition E) optical character recognition

optical mark recognition

maintainability

or flexibility, refers to how quickly a system can transform to support environmental changes

In order to take advantage of the high quality talent pool, Ernst & Young sets up operations in the Philippines and moves part of its tax services to its new facility. Identify this strategy. A) outsourcing B) franchising C) offshoring D) in-sourcing E) in-forming

outsourcing

Which of the following best explains the process of moving business processes or tasks to another company? A) offshoring B) in-forming C) in-sourcing D) exporting E) outsourcing

outsourcing

The Internet relies on ________ technology to deliver data and information across networks. A) circuit-switching B) frame-relay C) packet-switching D) packet-sniffing E) store-and-forward

packet-switching

Which of the following types of ports is used to connect printers to computers? A) serial ports B) HDMI ports C) parallel ports D) ethernet ports E) VGA ports

parallel ports

If a company's Web site is listed in the sponsored list of a search engine, the search engine receives revenue on a ________ basis. A) pay-per-click B) pay-per-sale C) click-through D) pay-per-conversion E) click-per-visit

pay-per-click

Under the ________ pricing model, the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement. A) pay-per-refresh B) pay-per-sale C) pay-per-click D) pay-per-conversion E) click-per-visit

pay-per-click

A ________ is any computer that requests and provides services. A) console B) client C) peer D) host E) port

peer

What converts an audio broadcast to a digital music player format for broadcasting over the internet for accessing using mobile device or personal computer..

podcasting

A(n) ________ provides a hardware interface, such as plugs and sockets, for connecting to computers. A) input device B) Universal Serial Bus C) removable storage device D) motherboard E) port

port

In the context of B2B supply chain management, ________ can be defined as access points through which a business partner accesses secured, proprietary information from an organization. A) bots B) forums C) portals D) rootkits E) hosts

portals

________ can provide substantial productivity gains and cost savings by creating a single point of access where the company can conduct business with any number of business partners. A) Rootkits B) Pharming C) Bots D) Phishing E) Portals

portals

Credit cards and electronic payment services are not used for large B2B transactions because of ________. A) the risks associated with these services B) the complications arising out of these transactions C) preset spending limits D) the resulting decrease in working capital E) the expenses associated with these services

preset spending limits

Which of the following tasks is performed by the systems software? A) writing a business letter B) managing a stock portfolio C) coordination of suppliers, product or service production, and distribution D) printing documents E) manipulating a series of forecasts

printing documents

Which of the following can be cited as an example of a supply chain management system? A) procurement planning B) market analysis C) knowledge portal D) sales force automation E) product demand forecasting system

procurement planning

In information systems management, a systems consultant is responsible for ________. A) analyzing business requirements and selecting information systems that meet those needs B) coding, testing, debugging, and installing programs C) auditing information systems for compliance with internal and external standards D) managing security measures and disaster recovery E) providing information systems knowledge to external clients

providing information systems knowledge to external clients

Which business type of eBusiness model is Amazon.com using?

pure- play

Ewaste

refers to discarded, obsolete, or broken electronic devices.

Maintainability (flexibility)

refers to how quickly a system can transform to support environmental changes.

Portability

refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

Moore's Law

refers to the computer chip performance per dollar doubling every 18 months.

Sustainable MIS Disposal

refers to the safe disposal of MIS assets at the end of their life cycle.

Availability

refers to the time frames when the system is operational.

cloud computing

refers to the use of resources and applications hosted remotely on the Internet

Accessibility

refers to the varying levels that define what a user can access, view, or perform when operating a system.

A ________ is a device used to connect two or more individual networks. A) port B) console C) router D) jitter E) codec

router

The ability to adapt to increases or decreases in demand for processing or data storage is known as ________. A) extensibility B) portability C) reliability D) scalability E) usability

scalability`

Utility computing offers tremendous benefits in terms of ________ for companies operating in the digital world. A) reliability B) usability C) portability D) extensibility E) scalability

scalability`

The CPU interacts with ________ for permanently storing data. A) primary storage B) volatile memory C) random-access memory D) output technologies E) secondary storage

secondary storage

Which of the following types of ports is used to transfer one bit at a time and hence, has the slowest data transfer rates? A) USB port B) parallel port C) IEEE 1394 port D) serial port E) ethernet port

serial port

A ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network. A) workstation B) server C) microcomputer D) supercomputer E) mainframe

server

In ________ networks, servers and clients have defined roles. A) server-centric B) peer-to-peer C) peer-centric D) client-centric E) server-to-peer

server-centric

Doug is a frequent visitor of online auction sites. He uses two different accounts to place a low followed by a very high bid on the desired item. This leads other bidders to drop out of the auction. He then retracts the high bid and wins the item at the low bid. This form of e-auction fraud is known as ________. A) shill bidding B) bid luring C) payment fraud D) nonshipment E) bid skimming

shill bidding

Cell phones have morphed into that offer more advanced computing ability and connectivity than basic cell phones

smart phones

Which of the following is a secondary storage technology that uses microchips to store information? A) cache memory B) virtual memory C) redundant array of independent disks D) solid state drive E) read-only memory

solid state drive

Which of the following types of computer software utilities monitors users' incoming e-mail messages and filters unwanted messages from arriving? A) spam blockers B) antivirus C) spyware detection and removal D) disk and data recovery E) data compression

spam blockers

Web-based technologies are cross platform, meaning that disparate computing systems can communicate with each other provided that ________. A) the computing systems have been manufactured by the same company B) the computing system manufacturing companies are business partners C) they are located in the same country D) standard Web protocols have been implemented E) the computing system manufacturing companies allow it

standard Web protocols have been implemented

Toyota's automotive electronics systems and FedEx's Web site were not developed solely because managers in these organizations wanted to do things faster or because they wanted to have the latest, greatest technology. These organizations developed these systems to help gain or sustain competitive advantage. The choices made in developing the systems at both Toyota and FedEx were ________ in their intent. A) operational B) functional C) strategic D) departmental E) tactical

strategic

A ________ is the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems. A) supercomputer B) workstation C) mainframe D) server E) microcomputer

supercomputer

A collection of companies and processes are involved in moving a product from the suppliers of raw materials, to the suppliers of intermediate components, to final production, and ultimately, to the customer; these companies are collectively referred to as ________. A) customer management B) product lifecycle C) enterprise resource management D) supply chain E) market entry

supply chain

Platform as a Service (PaaS)

supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model.

Supporting the Environment

sustainable MIS infrastructure

The electronic circuit that generates pulses at a rapid rate to set the pace for processing events to take place within a computer is known as the ________. A) peripheral port B) motherboard C) system clock D) universal serial bus E) system board

system clock

The operating system of a computer is an example of a(n) ________ software. A) systems B) open source C) transitory D) peripheral E) application

systems

The process of connecting separate information systems and data to improve business processes and decision making is known as ________. A) database development B) business intelligence C) systems integration D) application development E) collaboration systems

systems integration

Which of the following is part of an IS personnel's business knowledge and skills? A) information gathering and synthesis B) technological communication and presentation C) systems development life cycle D) problem identification and solution formulation E) virtualization

technological communication and presentation

Thomas L. Friedman uses the term "the steroids" to refer to technologies ________. A) that make different forms of collaboration digital, mobile, virtual, and personal B) that tightly integrate retailers, their suppliers, and their customers C) that allow firms to outsource business processes on a global scale D) that allow users to add, remove, or edit content from Web sites E) that allow individuals to build their own personal supply chain of information and entertainment

that make different forms of collaboration digital, mobile, virtual, and personal

Which of the following is likely to have the suffix ".org" after the domain name in its URL? A) the Red Cross Society B) Starbucks C) the Federal Bureau of Investigation D) McDonalds E) Harvard Business School

the Red Cross Society

Fault tolerance

the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss or service.

portability

the ability of an application to operate on different devices or software platforms

recovery

the ability to get a system up and running in the even of a system crash or failure

Recovery

the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup. - Fault tolerance - Failover - Failback

Which of the following IS personnel is responsible for strategic planning and IS use throughout a firm? A) the chief information officer B) the IS security manager C) the IS manager D) the Webmaster E) the IS auditor

the chief information officer

Usability

the degree to which a system is easy to learn and efficient and satisfying to use

Usability

the degree to which a system is easy to learn and efficient and satisfying to use.

Who owns the computerized information that is stored in thousands of databases by retailers, credit card companies, and marketing research companies? A) the government B) the Chief Information Officer C) the firm that maintains the database D) the customers themselves E) the company's IT department

the firm that maintains the database

Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________. A) the companies have already decided when to launch their next product B) the product is designed in such a way as to extend its life span C) the product is designed to last only for a certain life span D) the product is designed to avoid obsolescence E) the companies do not enter markets which have the risk of product obsolescence

the product is designed to last only for a certain life span

Sustainable MIS

the production, management, use, and disposal of technology in a way that minimizes damage to the environment

Click-through rate reflects ________. A) the ratio of surfers who visited the Web site divided by the number of surfers who clicked on the ad B) the ratio of surfers who click on an ad divided by the number of times it was displayed C) the percentage of visitors who actually perform the marketer's desired action D) the ratio of surfers who clicked on the ad divided by the number of people who made the purchase E) the ratio of surfers who visited the Web site divided by the number of people who made a purchase

the ratio of surfers who click on an ad divided by the number of times it was displayed

Sustainable MIS disposal

the safe disposal of MIS assets at the end of their life cycle

software

the set of instructions the hardware executes to carry out specific tasks

Software

the set of instructions the hardware executes to carry out specific tasks.

availability

the time frames when the system is operational

accessibility

the varying levels that define what a user can access, view, or perform when operating a system.

Identify the purpose of a transaction processing system used in organizations. A) to support the activities within a specific functional area of the firm B) to handle day-to-day business event data at the operational level of the organization C) to support interaction between the firm and its customers D) to support the coordination of suppliers, product or service production, and distribution E) to enable customers to buy goods and services from a firm's Web site

to handle day-to-day business event data at the operational level of the organization

Identify the purpose of an office automation system. A) to processes day-to-day business event data at the operational level of the organization B) to provide access to databases in order to support quantitative decision making C) to support a wide range of predefined day-to-day activities of individuals and small groups D) to support interaction between the firm and its customers E) to support the activities within a specific functional area of the firm

to support a wide range of predefined day-to-day activities of individuals and small groups

Which of the following matches the description of screen and report generators? A) tools that enable system process, data, and control structures to be represented graphically B) tools that automatically check for incomplete, inconsistent, or incorrect specifications in diagrams, screens, and reports C) tools that help produce both technical and user documentation in standard formats D) tools that make it easier for the systems analyst to identify data requirements and relationships and also help model how systems look and feel to users E) tools that enable the automatic generation of program and database definition code directly from the design documents, diagrams, screens, and reports v

tools that make it easier for the systems analyst to identify data requirements and relationships and also help model how systems look and feel to users

A grocery store checkout cash register with a connection to a network is an example of a(n) ________. A) intelligent system B) functional area information system C) decision support system D) transaction processing system E) electronic commerce system

transaction processing system

Any input your computer receives is digitized and then is processed by the CPU. Which of the following explains the meaning of the word "digitized" in the preceding sentence? A) stored in random-access memory B) encrypted in the operating system C) stored in a hard drive D) translated into binary code E) converted into application software

translated into binary code

The evolution of CRM (Customer Relationship Managment) Technologies is reporting, analyzing, and prediciting.

true

Administrator Access

unrestricted access to the entire system.

Which of the following best describes the phenomenon termed Web 2.0? A) using the Internet as a platform for applications B) uploading files on the Internet C) learning new technologies as they emerge D) setting up an online business E) downloading free software from the Internet

using the Internet as a platform for applications

Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used. A) cluster computing B) grid computing C) distributed computing D) utility computing E) parallel computing

utility computing `

Markets comprised of firms operating within a certain industry sector are known as ________ markets. A) vertical B) parallel C) horizontal D) stipulated E) focused

vertical

Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or usersl creating exponential growth in the messages visibility and effect?

viral marketing

Using ________, multiple machines located at different locations and each with its own applications can be configured to run on one single computer, enabling the IT service providers to better utilize their resources. A) indemnification B) gentrification C) demutualization D) ramification E) virtualization

virtualization

Information property focuses on ________. A) who owns information about individuals and how information can be sold and exchanged B) information that has been encrypted by the owner to make it unaccessible to others C) information an individual should or should not have to reveal to others in the workplace D) information a person or organization has the right to obtain about others E) the authenticity of information as well as responsibility for informational errors that harm people

who owns information about individuals and how information can be sold and exchanged

The term ________ refers to Web sites allowing users to add, remove, or edit content and is now often used synonymously with open source dictionaries. A) html B) ajax C) wiki D) perl E) Web 2.0

wiki

Designed for medical, engineering, or animation and graphics design uses, ________ are optimized for visualization and rendering of three-dimensional models. A) mainframes B) supercomputers C) workstations D) servers E) microcomputers

workstations

Which of the following tasks is performed by the application software? A) printing documents B) writing a business letter C) presenting information via a monitor D) updating the system clock E) saving data to a disk

writing a business letter

9. Most important part of the project plan?

Communication

B. What is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home?

Local area network

9.What is a business-related consequence of successful software?

Increased revenues, repair brand reputation, decreased liabilities and expenses

7. What is a disadvantage of networking or performing business in a connected world?

Increases resources threats

B. How many layers does the OSI model contain?

7: Physical, Data Link, Network, Transport, Session, Presentation, Application

A2. What would you enter on the "Criteria" line for the currency field "Fringe Benefits" of the query grid so that only records whose values are $10,000 or less are displayed in the query results?

<= 10000

B. What is a client/server network?

A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, which the front-end processing, which involves communicating with the users

B. What is a protocol?

A standard that specifics the format of data as feel as the rules to be followed during g transmission.

B. What is the bus topology?

All devices are connected to a central cable or backbone.

B. What is the ring topology?

All devices are connected to one another in the shape of a closed loop

7. The speed of transmission of a network is determined by the speed of its smallest _____.

Amount of bandwidth

9. What is the least common reason to outsource?

Better manage the costs of internal processes.

9. What is a technique for choosing strategic projects?

Categorize, perform a financial analysis, focus on organizational groups

7. A wireless WAN is a wide area network that uses radio signals to transmit and receive data and can be divided into which two categories?

Cellular and satellite communications systems

7. LANs, WANs, and MANs, all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions?

Cost and performance

8. What made-to-order views can analytical CRM tools slice-and-dice customer information into?

Customer value, customer spending, customer segmentation

A1. Which of the following entries would be made on the 'Field' line of the query design grid to cause the table field name 'Name' to be displayed in query results as 'Customer'?

Customer: Name

A3. While in Access table design view (records not showing), fields upon which their values may have mathematical calculations performed can not be of data type____.

Date/Time

9.What is a business-related consequence of failing software?

Decrease productivity, damage to brand reputation, increased liabilites

A3. Which of the following will always print on each and every page of a multi-page, grouped Access report?

Detail line

8. Where would you find the customers' customer in a typically supply chain?

Downstream

7. Which of the following is not a primary use of GIS?

Ensuring safety equipment is on an airplane before a flight

9. What agile methodology cannot continue on to the next phase until the first phase is complete?

Extreme programming

B. What allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network?

File transfer protocol

A3. While in Access table data sheet view )records showing, a temporary sub=set of selected records can be created and viewed by defining a ___.

Filter

A1. The Access assignment starter file consists of _______ tables.

Five

9.What is the fundamental of the RAD methodology?

Focus initially on creating. actively involve systems, accelerate collecting business

A2. If you want each specific value of a specific field to only appear once in the query results, you would use the ____ operator on the "Total" line of the query grid.

GroupBy

8. What can effective and efficient supply chain management systems enable an organization to accomplish?

Increase its supplier power

9. An organization must identify what it wants to do. What does the "what" mean?

Justification of the project, definition of the project, and expected results of the project

A1. What would be the entry on the "Criteria" line of the query design grid for "Last Name" to cause the display the records of only those individuals with last names starting with the letter "P"?

Like "P*"

8. A contact center is one of the best assets a customer driven organization can have. Why?

Maintaining a high level of customer support is critical to obtaining and retaining customers

A1. Which of the following entries would be made on the "Field" line of the query design grid to cause the concatenation of table field names "First" and "Last" separated by a space to be displayed in query results as "Name"

Name: [First] & " " & [Last]

7. What are the three levels outlined in the book from the top down include___?

National service provider. regional service provider, and internet service provider

7. What uses both GIS and GPS?

Navigation, Wireless advertising, and vehicle locatoin

B.What runs a network, steering information between computers and managing security and users?

Network Operating System

B. What is packet-switching?

Occurs when the sending computer divides a message into a number of efficiently sized units called packets

A1. The Access assignment requires the creations and printing of ___ reports.

One

8. What are current CRM trends?

Partner relationship management, supplier relationship management, employee relationship, etc

9. What are the phases in the SDLC?

Plan, analysis, design, develop, test, implement, maintain

9. Why do projects fall behind schedule or fail?

Poor planning or poor project management

A3. Which Access table fields are commonly defined with an input mask?

Social security number, zip code

B. What is interoperability?

The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

9. What is the critical path?

The path from start to finish that passes through all the tasks that are critical to completing the project in the shortest amount of time

9. What is a business requirement?

The specific business requests the system must meet to be successful

B. What are the commonly used type of guided media?

Twisted-pair cable, coaxial cable, fiber-optic cable

8. Where would you find the manufacturer and distributor in a typical supply chain?

Upstream

8. Which question below represents a CRM predicting technology question?

What customers are at risk of leaving?

7. Which of the below statements is not accurate in reference to mobile and wireless computing?

Wireless technology is any type of operation accomplished with the use of a hard-wired connection

A1. The Access assignment requires the creation of _____ data entry forms.

Zero

8. What are ways that CRM system can collect information?

accounting system, order fulfillment, system, inventory system

9. An organization must identify how it is going to do it. What does the "how" mean?

analysis of project risks, list of dates

B. What the TCP/IP four-layer reference model?

application, transport, internet, network interfaces

A2. If you must sort the query results based on the values in multiple fields, the sort order is executed ____.

by use of a SortOrder criteron

A3. Which of the following will be accepted by Access as valid during data entry?

entering numbers in a field of data type text

9. What is an issue related to the waterfall methodology?

flaws in accurately defining and articulating the business problem, managing costs, resources, and time, and business requirements

8. What can analytical CRM modeling tools discover?

identify opportunities for for expanding customer relationships, identify opportunities for cross-selling, identify opportunities for up-selling

9. What are common reasons why change occurs?

misunderstanding, shift in technology, omission in defining initial scope

A2. Which of the following is not available as an aggregate function in Access?

most occurring value (mode)

A2. When executing a query, all fields used in the design grid ____ be displayed in the query results.

on which selection criterion are specified must

7. What is a benefit of network convergence?

the weaving together of voice, data, and video, multiple services offered from a single vendor, multiple devices supported by one provider

7. What is a feature of IPTV?

uses low bandwidth, offers personalization, supports multiple devices


Conjuntos de estudio relacionados

Lesson 9: The Female Reproductive System Quiz

View Set

Module 13 (Chapter 13): Benefit Options

View Set

MLT ASCP Practice Questions 3.7.16

View Set

Ch 9 Maternal and Fetal Nutrition Eaqs

View Set

Філософія Рівень1

View Set

Chapter 22 Respiratory Homework & Quiz

View Set

Modern Islamic Politics - Midterm

View Set

Audit 3, Section 12.2 - Inventory

View Set