2
Anne-Marie Cole runs the sales division for a local auto insurance firm. One of her key duties is to calculate her company's market share. When evaluating the prior year numbers, she found that her firm achieved total sales of $3 million and the entire industry had $30 million in sales. What is Anne-Marie's current market share?
10%
Which of the following represents sales force automation?
A system that automatically tracks all of the steps in the sales process
Which of the following is not an example of unplanned downtime?
A system upgrade
What is a project?
A temporary endeavor undertaken to create a unique product, service, or result.
What is trend analysis?
A trend is examined to identify its nature, causes, speed of development, and potential impacts
What is the primary difference between a worm and a virus?
A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer
Which of the following provides an accurate definition of systems thinking?
A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs, while continuously gathering feedback on each part.
What is the difference between a wiki and a blog?
A wiki user can alter the original content of an article, but a blog user can only add information as a comment.
What is the digital divide?
A worldwide gap giving advantage to those with access to technology
A(n) ____________ computer use policy contains general principles to guide computer user behavior
A(n) ____________ computer use policy contains general principles to guide computer user behavior
Which of the following does a project manager perform?
A. Defines and develops the project plan B. Tracks the plan to ensure all key project milestones are completed on time C. Expert in project planning and management D. All of the above*
Which of the following is a characteristic of a successful project?
A. Delivered on time B. Delivered within budget C. Meets the business's requirements D. All of the above*
Which of the following is an outsourcing challenge caused by contract length?
A. Difficulties in getting out of a contract B. Problems in foreseeing future issues C. Problems in reforming an internal IT department D. All of the above*
What is information redundancy?
A. Duplication of information B. Storing the same information in multiple places C. Storing duplicate information in multiple places D. All of the above
What categories should an organization evaluate when making an outsourcing decision?
A. Geopolitical risk B. English proficiency C. Salary cost D. All of the above*
Which activity is performed during the planning phase?
A. Identify and select the system for development B. Assess project feasibility C. Develop the project plan D. All of the above*
Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information?
A. Identify trends B. Make projections C. Decide key business issues D. All of the above
Which of the following can use BI to make informed decisions?
A. Law enforcement industry B. Airline industry C. Broadcasting industry D. All of the above*
Which of the following is a result of implementing business intelligence systems and tools allowing business users to receive data for analysis?
A. Reliable B. Understandable C. Easily Manipulated D. All of the above*
Which of the following is a quantitative model typically used by a DSS?
A. Sensitivity analysis B. What-if analysis C. Goal-seeking analysis D. All of the above A DSS can perform all of the above.
Which of the following represents operational CRM?
A. Supports traditional transactional processing B. Supports day-to-day front-office operations C. Supports operations that deal directly with the customers D. All of the above
Which of the following uses a DBMS to interact with a database?
A. Users of accounting programs B. Users of human resource programs C. Users of marketing programs D. All of the above
Which of the following is an evaluation criteria used to prioritize software development projects?
A. Value chain analysis B. Strategic alignment C. Resource availability D. All of the above*
An organization must identify what it wants to do and how it is going to do it. What does the "what" part of this question focus on?
A.Justification of the project B. Definition of the project C. Expected results of the project D. All of the above*
Universities were among some of the first users of the Internet. What was the Internet first called?
ARPANET
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?
Acceptable use policy
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?
Acceptable use policy
Which policy typically contains a nonrepudiation clause?
Acceptable use policy
What are the seven characteristics of an agile MIS infrastructure?
Accessibility, availability, maintainability, portability, reliability, scalability, and usability
Which characteristics support an agile MIS infrastructure?
Accessibility, availability, maintainability, portability, reliability, scalability, usability
Which of the following is not one of the CRM business drivers?
Accountability
What analyzes the transactional information of the business so the owners and investors can make sound economic decisions?
Accounting
From the following list, which component would include a credit-management feature?
Accounting and finance components
Who are the primary users of ERP systems?
Accounting, finance, logistics, and production
Achieving perfect information is almost impossible. The more complete and accurate an organization wants its information to be, the more it costs. Which two variables are used to determine the trade-off for perfect information?
Accuracy versus completeness.
Which of the following lists include all of the five characteristics common to high-quality information?
Accuracy, completeness, consistency, timeliness, and uniqueness
Which of the following does not draw a parallel between the challenges in business and the challenges of war?
Accurate and complete information
The banking industry has implemented several competitive advantages including ATMs, online bill pay services, and electronic statements. Of course, these competitive advantages were quickly duplicated by any competitor that wanted to remain in the banking industry. These were examples of...
Acquiring new technology products and services
____________ maintenance makes changes to increase system functionality to meet new business requirements.
Adaptive
Which of the following is not a common type of test performed during system testing?
Adaptive testing
An organization processing personal data of a person living in the EU must comply with which of the following principles?
Adequate, relevant, and not excessive
Enterprise architects require ____access so they can perform such functions as resetting passwords or deleting accounts
Administrator
Enterprise architects require _____________ access so they can perform such functions as resetting passwords or deleting accounts?
Administrator access
Gina Brooks works for Aquarium Retail Services selling high-end saltwater fish and tank supplies. Aquarium Retail Services is the current market leader in Gina's city. Gina has recently been approached by Deep Blue Incorporated with an opportunity to run its corporate nationwide marketing and sales division. Gina decides to jump at the opportunity! Deep Blue is attempting to gain a competitive ________ by stealing its competitor's key employees.
Advantage
What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?
Adware
_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet
Adware
What type of revenue generation model is Google using when it generates revenue by allowing advertisers to bid on common search terms?
Adwords
The _________ methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirement.
Agile
The ____________ MIS infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation.
Agile
Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements?
Agile methodology
Which of the following are examples of transactional information?
Airline ticket, sales receipts, and packing slips
Which of the following represents the bus topology?
All devices are connected to a central cable or backbone.
Which of the following is a characteristic of information?
All of the above
Which of the following is one of the 21st century organizational trends on the business side?
All of the above
Which of the following is one of the new series of business success factors that are helping to determine marketplace winners?
All of the above
Which of the following represents a level of information within an organization?
All of the above
The structure of an organization is similar to a pyramid. The different levels require different types of info to assist with which of the following?
All of the above Decision making, problem solving, opportunity capturing
Online transaction processing (OLTP) is the capturing of transaction and event info using technology to ______
All of the above Update existing info to reflect new info Store the info Process the info according to defined business rules
What is the primary problem with redundant information?
All of the above: It is difficult to determine which values are the most current It is often inconsistent It is difficult to determine which values are the most accurate
Why do relational databases use primary keys and foreign keys?
All of the above: To create a database To create physical relationships To create logical relationships
Which of the following industries has technology changed the way business is performed?
All of the above: Travel Education Training
What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system?
All of the these: System virtualization Server virtualization Desktop virtualization
Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ______________.
All of these
Which of the below focuses on user-generated content?
All of these
Which of the following are challenges of Business 2.0?
All of these
Which of the following is an example of a disruptive technology?
All of these
Which of the following is a type of backup/recovery media?
All of these DVD Disk Tape
Which of the following does a firewall perform?
All of these Detects computers communicating with the Internet without approval Blocks messages without the correct markings from entering the network Examines each message that wants entrance to the network
Both individuals and organizations have embraced ebusiness to do which of the following?
All of these Maximize convenience. Improve communications. Enhance productivity.
Which application are employees most likely to use?
All of these SCM CRM ERP
Why is the global economy becoming more integrated?
All of these The Internet International outsourcing Relaxed borders in the European Union
Which of the following is a reason for the growth of the World Wide Web?
All of these Web pages being easy to create and flexible. Advancements in networking hardware. The microcomputer revolution.
Which of the following represents a form of disruptive technology?
All of these are included: Enters the marketplace at the low end. Is a new way of doing things that initially does not meet the needs of existing customers. Tends to open new markets and destroy old ones.
Which of the below represents an example of why an employer would use social media?
All of these.
What are some of the immediate results businesses found from using instant messaging?
All of these. Easily hold simultaneous IM sessions with multiple people. Resolve questions or problems immediately. Quickly identify which employees are at their computers.
Which of the following can be use BI to make informed decisions?
All of these: Airline industry Broadcasting industry Law enforcement industry
What are characteristics or properties of an entity called?
All of these: Attributes Fields Columns
Managing consumer trust is a challenge for ebusinesses. Which of the following is a good way to build trust when working with customers over the Internet?
All of these: Be accessible to communicate in-person. Be available to communicate in-person. Use customer testimonials that link to your client website.
Which of the following occurs during data cleansing?
All of these: Clean inaccurate data. Clean redundant records. Clean missing records.
What is the best way to measure a company's ebusiness success?
All of these: Clickstream data Interactivity Effective MIS metrics
Which of the following is one of the fundamental issues surrounding the struggle between Internet censorship and openness?
All of these: Controlling the conduits Filtering the flows Punishing the purveyors
Which of the following statements is true regarding customer information?
All of these: Customer information can exist in several operational systems. Customer information in each operational system could change. Customer information in each operational system can be different.
Which of the following was the original design for the Internet?
All of these: Display of static content Email Document exchange
Which of the following offers an example where Porter's five forces are mostly weak and competition is low?
An international hotel chain purchasing milk.
Planning, ___________, design, development, testing, implementation, and maintenance are the seven phases in the SDLC.
Analysis
The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
Analysis
What is the second step in the SDLC?
Analysis
Which phase of the SDLC gathers business requirements?
Analysis
An organization must identify what it wants to do and how it is going to do it. What does the "how" part of this question focus on?
Analysis of project risks
What supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers?
Analytical CRM
What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks?
Analytical information
What encompasses all organizational information and its primary purpose is to support the performing of managerial analysis tasks?
Analytical information
What encompasses all organizational information where its primary purpose is to support the performing of managerial analysis tasks?
Analytical information
Which of the following encompasses all organizational information, where its primary purpose is to support the performing of managerial analysis tasks?
Analytical information
Which of the following is not considered an epolicy?
Anti-hacker use policy
What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?
Anti-spam policy
When building a scalable system that can support new company developments what are the key factors to consider?
Anticipating expected and unexpected growth
Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?
Antivirus software
What are project deliverables?
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project
What is a project deliverable?
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
What is an asset?
Anything owned that has value or earning power
What is a program that runs within another application such as a website?
Applet
What does API stand for?
Application Programming Interface
The virtual assistant will be a small program stored on a PC or portable device that monitors all of the following, except:
Application processing
What verifies that all units of code work together and the total system satisfies all of its functional and operational requirements?
Application testing
Which of the following financial statements gives an accounting picture of property owned by a company and of claims against the property on a specific date?
Balance sheet
What types of BI decisions include forecasting levels of bad loans and fraudulent credit card use, credit card spending by new customers, and which kinds of customers will best respond to new loan offers?
Banking BI decisions
What is the name for a small ad on one website that advertises the products and services of another business, usually another dot-com business?
Banner Ad
Which of the following represents geographic segmentation?
Based on regional variables such as region, climate, population density, and population growth rate
Which of the following represents psychographic segmentation?
Based on variables such as usage rate, usage patterns, price sensitivity, and brand loyalty
Market __________ analysis analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predicts future behavior by identifying affinities among customers' choices of products and services.
Basket
Which of the following will enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?
Business critical integrity constraints
Management info Systems
Business function, like accounting and HR moves info about people, products, and processes across the company to problem solve.
What is information that people use to support their decision-making efforts?
Business intelligence
What is the activity of creating a detailed flow chart or process map of a work process showing its inputs, tasks, and activities, in a structured sequence?
Business process modeling
What represents the detailed set of knowledge worker requests that the system must meet in order to be successful?
Business requirements
What are the four global IT business management areas critical to running multinational companies?
Business strategies, enterprise architectures, information issues, systems development
Which of the following is a valid type of integrity constraint?
Business-critical integrity constraint
Sarah Schin was recently hired by Bank West as the Global Director of HR. Her job duties include determining employment policies as well as overseeing all the hiring, firing and training of employees. What type of process does Sarah's new job demonstrate
Business-facing processes
The accounting and finance department performs processes such as creating financial statements, paying accounts payables, and collecting accounts receivables. What form of processes do these represent?
Business-facing processes
What is the ebusiness model that represents 80 percent of all online businesses and is typically more complex, requiring greater security needs?
Business-to-business
What are the four main types of ebusiness models?
Business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer.
How would a company like Flickr use social tagging on its website?
By allowing users to upload images and tag the images with their own keywords.
Who is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology?
CTO
The potential for contracting viruses on mobile devices is increasing; in fact, the first known mobile phone virus was called ______________?
Cabir
Which state recognizes an individual's right to privacy?
California
What accesses organizational databases that track similar issues or questions and automatically generates the details to the CSR, who can then relay them to the customer?
Call scripting
What guides users through marketing campaigns, performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis?
Campaign management system
What determines future environmental infrastructure requirements that ensure high-quality system performance?
Capacity planning
The sustainable infrastructure pressure of increased energy consumption poses new and growing pressure. The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by a __________.
Car
The power of MIS comes from its ability to ____________ information?
Carry House Support
What is a means to conduct a periodic check on the company's financial health?
Cash flow analysis
. What-if analysis checks the impact of a __________ in an assumption on the proposed solution.
Change
Most people request real-time information without understanding that continual __________ is one of its biggest pitfalls
Change
Which of the following is not a phase in the SDLC?
Change
____________ management system includes a collection of procedures to document a change request and define the steps necessary to consider the change based on the expected impact of the change.
Change
The PMI develops procedures and concepts necessary to support the profession of project management. Which of the following is not one of the three areas it focuses on?
Change in business goals during project planning (management)
If a supplier has high power what can it do to influence its industry?
Charge higher prices. Shift costs to industry participants. Limit quality or services.
Which company is improving how it manages the assets in fields by enabling employees in multiple disciplines to easily access and share the information they need to make decisions?
ChevronTexaco Corporation
Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers. What is Jeremy's role within the company?
Chief Security Officer (CSO).
Which of the following countries is considered an up-and-comer in the outsourcing industry?
China
What is the name of the highly publicized survey administered by the Institute for Citizen-Centered Services and the Institute for Public Administration in Canada?
Citizens First
Which of the following is the first CRM implementation strategy?
Clearly communicate the CRM strategy
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversation revenue by models by repeatedly clicking on a link to increase charges or costs for the advertiser?
Click Fraud
Which type of ebusiness model is Barnes and Noble using?
Click-and-mortar
What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?
Clickstream
What is the exact pattern of a consumer's navigation through a site?
Clickstream data
What are three examples of goods?
Clothing, groceries and cars
What refers to resources and applications hosted remotely as a shared service over the Internet?
Cloud Computing
Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?
-Building a strong brand identity -Protecting the company reputation through counter-damage control -Engaging directly with customers and prospective customers
Which of the following offers a common example of a LAN?
-College campus -Home office -City library
Which of the following is an example of a clickstream data metric?
-Dates and times of visits -Number of customers with shopping carts -The number of page views (all of these)
Which of the following is a business-related consequence of software failure?
-Decreased productivity -Damage to brand reputation -Incurred liabilities (all of the above)
Which of the following describes information technology monitoring?
. Tracking people's activities by such measures as number of keystrokes B. Tracking people's activities by such measures as error rate C. Tracking people's activities by such measures as number of transactions processed D. All of the above*
What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance?
. Waterfall methodology
Which domain is reserved for accredited postsecondary institutions?
.edu
Which domain is reserved for the U.S. military?
.mil
What is the success rate for a project using the waterfall methodology?
1 in 10 The waterfall methodology has a 10 percent success rate, or 1 in 10.
What 3 goals/objectives might a leadership plan include to achieve a solid business strategy?
1) Attracting new customers 2) Decreasing costs 3) Increasing sales
What are 3 generic business strategies Porter identified for entering a new market?
1) Broad differentiation 2) Broad cost leadership 3) Focused strategy
What are the three common tools managers use to analyze competitive intelligence and develop competitive advantages.
1) Five Forces Model 2) The three generic strategies 3) Value chain analysis
What are 3 value activities
1) Marketing and sales 2) Outbound logistics 3)Inbound logistics
What are the challenges of a connected world?
1) Networks create a diverse globally connected world eliminating time and distance 2) Networks make it possible to communicate in ways not previously imaginable 3) Even though networks provide many business advantages, they also create increased challenges in security, social, ethical and political issues.
What are 3 examples of service?
1) Waiting tables 2) Cutting hair 3) Personal training
Which company turned brand loyalty into brand relationships by using the vast amounts of information it collected to better understand customers' needs and expectations?
1-800-Flowers.com
The _________ act restricts what information the federal government can collect.
Privacy
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
Privacy
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
Privacy
Cooking a patty and putting the ingredients together are included in which category of making a hamburger?
Process
_________ modeling involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment
Process
What is data mining?
Process of analyzing data to extract information not offered by the raw data alone.
Which of the following is not one of the three phases in the evolution of CRM?
Processing
Which of the following is an incorrect enterprise view of information technology?
Processing is OLTP for executives and OLAP for analysts
Amazon.com uses a customer-profiling system whenever a customer visits its website. Using this system, Amazon can offer products tailored to that particular customer's profile and buying pattern. What is Amazon using to achieve this competitive advantage?
Product differentiation.
What is the process that where a business takes raw materials and processes them or converts them into a finished product for its goods or services?
Production
What are the factors included in the global customer's category of global IT business drivers?
Products are the same worldwide and global IT can help manage worldwide marketing, sales, and quality control.
What occurs when businesses sell products or services for more than they cost to produce?
Profit
Key logger or key trapper software is a __________ that when installed on a computer, records every keystroke and mouse click
Program
Which company used BPR to change its industry by implementing a mobile claims process?
Progressive Insurance.
. A(n) ____________ is a temporary endeavor undertaken to create a unique product, service, or result.
Project
A(n) ____________ is a temporary endeavor undertaken to create a unique product, service, or result.
Project
Failure to manage __________ scope is one of the primary reasons for project failure.
Project
What is a temporary endeavor undertaken to create a unique product, service, or result?
Project
_________ management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements
Project
_________ management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.
Project
Which organization develops procedures and concepts necessary to support the profession of project management?
Project Management Institute
What is any measurable, tangible, verifiable coutcome, result or time that is produced to complete a project or part of a project?
Project deliverable
What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?
Project management
What is an internal department that oversees all organizational projects?
Project management office
Who are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion?
Project stakeholders
The rapid application development methodology emphasizes extensive user involvement in the rapid and evolutionary construction of working __________ of a system to accelerate the systems development process.
Prototypes
Which of the following is a challenge of sustaining technology?
Provides a product that does not meet existing customers' future needs
Which of the following is a challenge in sustaining technology?
Provides a product that does not meet the existing customer's future needs.
What is a real-time system?
Provides real-time information in response to requests.
What type of encryption technology uses multiple keys, one for public and one for private?
Public key encryption
Which type of ebusiness model is Amazon using?
Pure-play
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?
Quadrant 1
The project management role has several responsibilities in the area of time. Which of the following represent these areas for time?
Quality, methodology
Which of the following is one of the four main categories of BI benefits?
Quantifiable benefits
Which type of BI benefits includes working time saved in producing reports and selling information to suppliers?
Quantifiable benefits
What are project objectives?
Quantifiable criteria that must be met for the project to be considered a success
All of the following are characteristics of information except:
Quantity
All of the following are characteristics of information, except:
Quantity
Which of the following is not a primary trait of information?
Quantity
Which of the following is not one of the five characteristics common to high quality information?
Quantity
Which of the following is not one of the five characteristics common to high-quality information?
Quantity
What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process?
RAD methodology
what emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process?
RAD methodology
Many websites use _______ to constantly feed news to consumers instead of having the consumer search for the news.
RSS
Which methodology is owned by IBM?
RUP
Which methodology provides a framework for breaking down the development of software into four gates?
RUP
What is a dynamic high-resolution electronic display that combines a paperlike reading experience with the ability to access information anytime, anywhere?
Radio Paper
What uses active or passive tags in the form of chips or smart labels?
Radio frequency identification
A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data?
Radio signals
Which of the following is an example of an emergency notification system?
Radio stations' occasional tests of the national alert system
Which business application uses electronic tags and labels to identify objects wirelessly over short distances?
Radio-frequency identification
What does RSS stand for?
Real Simple Syndication
What occurs when a system updates information at the same rate it receives the information?
Real-time communication
What is immediate, up-to-date information?
Real-time information
Which of the following refers to immediate, up-to-date information?
Real-time information
Which of the following provides real-time information in response to requests?
Real-time system
What provides real-time information in response to query requests?
Real-time systems
What provides real-time information in response to requests?
Real-time systems
The R in the SMART criteria for successful objective creation stands for _________.
Realistic
Building and deploying flexible systems can allow for ___________.
Reconfigurations Easy updates and changes Solutions for unexpected business environmental changes
All of the following are challenges of outsourcing, except:
Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market
All of the following are challenges of outsourcing, except?
Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market
All of the following are challenges of outsourcing except:
Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market.
Which of the following is a benefit of a solid MIS infrastructure?
Reduces costs Improves productivity Optimizes business operations
What is encryption?
Scrambles information into an alternative form that requires a key or password to decrypt the information
Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?
Script kiddies
Which methodology ends each day or begins with a stand-up meeting to monitor and control the development effort?
Scrum
Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal?
Scrum
What evaluates variables that search engines use to determine where a URL appears on the list of search results?
Search engine ranking
Which of the following is not considered an ePolicy?
Security badge policy
The information MIS infrastructure supports the day-to-day business operations and plans for ____________?
Security breaches and theft Floods and earthquakes Malicious Internet attacks
What is the major challenge of networking or performing business in a connected world?
Security issues
What automates order processes from initial customer inquiry to final product delivery?
Selling chain management
What is a component of Web 3.0 that describes things in a way that computers can understand?
Semantic web
Not attempting to mail bomb a site
Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
What is a mail bomb?
Sending a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
. ___________ analysis occurs when users change the value of one variable repeatedly and observe the resulting changes in other variables.
Sensitivity
What is the study of the impact that changes in one (or more) parts of the model have on other parts of the model?
Sensitivity analysis
What is a computer called that is dedicated to providing information in response to requests?
Server
What is a business-driven IT architectural approach that supports organizational computing needs with utility-based computing concepts?
Service oriented architecture
Which of the below is not a valid form of ebusiness revenue model?
Service provider
What are the key technical concepts of SOA?
Services, interoperability, loose coupling
With ___________, less experienced staff observe more experienced staff to learn how their more experienced counterparts approach their work.
Shadowing
Partnership agreements typically include all of the following, except:
Shareholder's expectations for a successful business
Which benefits of a connected world make all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user?
Sharing resources
What advantages do networks offer businesses?
Sharing resources, providing opportunities and reducing travel
A(n) _____________ bot is software that will search several retailer Web sites and provide a comparison of each retailer's offerings including price and availability.
Shopping
What is the system users' actual signatures indicating they approve all of the business requirements?
Sign-off
Which of the following is an example of P2P?
Skype
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
Smart card
Cell phones have morphed into ___________________ that offer more advanced computing ability and connectivity than basic cell phones?
Smartphones
Which of the following is a program or device that can monitor data traveling over a network?
Sniffer
To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ____________ policy?
Social Media Policy
Which of the following represents the classic example of unintentional information reuse?
Social Security number
What are websites that rely on user participation and user-contributed content, such as Facebook, LinkedIn, and YouTube?
Social media
Which of the following best describes Web 2.0?
Social media and user-generated web content
Which company policy implements online communication policy detailing brand communication, LinkedIn policy, and corporate YouTube policy?
Social media policy
What is the practice of expanding your business and social contacts by constructing a personal network?
Social networking
Which of the following is not a topic or feature that is included in Web 3.0?
Social networking
What is an SNA?
Social networking analysis
What maps group contacts, identifying who knows each other and who works together?
Social networking analysis
Corporate social responsibility is a company's acknowledged responsibility to __________.
Society
What is a model of software deployment, where an application is licensed for use as a service, provided to customers on-demand?
Software as a Service
Which cloud computing model offers applications on a pay-per-use basis?
Software as a service
According to Infonetics research, what is the leading cause of downtime?
Software failure followed by human error
Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?
Some online companies have to charge sales tax.
What is the most costly and intrusive form of authentication?
Something that is part of the user such as a fingerprint or voice signature
In which of the five basic supply chain activities do you build relationships with suppliers to procure raw materials?
Source
What is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (eg networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction?
Cloud computing
What might change the way businesses operate, as well as the way people interact with technology?
Cloud computing
What uses resources and applications hosted remotely on the Internet?
Cloud computing
Which company was the victim of a distributed denial-of-service (DDoS) attack that forced the company to close operations and to eventually transfer over 2,500 customers to a rival organization?
CloudNine Communications
What is a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?
Cluster analysis
What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?
Cluster analysis
What are the three common forms for mining structured and unstructured data?
Cluster analysis, association detection, and statistical analysis
Cheap electricity is great for keeping business energy costs down, but this mean that we have to rely more on ____________ for power.
Coal
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's Five Forces Model. Which of the following represents rivalry in the soft drink industry?
Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games.
What is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster?
Cold site
A(n) ____________ system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.
Collaboration
Which of the following is not one of the four gates in the RUP methodology?
Collaboration Elaboration is the gate in RUP, not collaboration.
What is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information?
Collaboration system
Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?
Collaboration system
What allows an organization to reduce product development costs?
Collaborative engineering
Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa's job requires her to gather industry info, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the below would Lisa use to perform her job?
Collective intelligence
Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa's job requires her to gather industry information, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the below would Lisa use to perform her job?
Collective intelligence
Which of the following is not a topic associated with the information age?
College statistics for data.
The primary purpose of a data warehouse is to _____________
Combine strategic information
According to the text, which of the following does not benefit from smart grid computing?
Comcast Cable's grid
What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting?
Committee of Sponsoring Organizations
What is the most important part of the project plan?
Communication
The project management role has several responsibilities in the area of scope. Which of the following answers lists these responsibilities for scope?
Communication, requirements, changes
What type of cloud computing serves a specific community with common business models, security requirements, and compliance considerations?
Community Cloud
A __________ advantage features a product or service on which customers place a greater value than they do on similar offerings from competitors.
Competitive
Business intelligence is information collected from multiple sources. Which of the following provides an example of a source that would be included in business intelligence?
Competitors, Customers and Suppliers
CRM allows an organization to accomplish all of the following, except:
Complicate marketing and sales processes
CRM allows an organization to accomplish all of the following except:
Complicate marketing and sales processes.
Contract length, competitive edge, ____________, and scope definition are the four primary challenges for outsourcing.
Confidentiality
What is the assurance that messages and information remain available only to those authorized to view them?
Confidentiality
What is the primary way that social networks work?
Connecting people by matching profile information.
Which of the following is one of the primary reasons for the increase in Internet use?
Connectivity technology
Which of the following implies that aggregate or summary information is in agreement with detailed information?
Consistency
Which of the following is the result of BI that the processes that deliver the data to the business community are well documents and there are no surprises such as missing or inaccurate data?
Consistent
What is hardware?
Consists of the physical devices associated with a computer system
Which gate in the RUP methodology includes building and developing the product?
Construction
Which gate in the RUP methodology includes building and developing the project?
Construction
Which of the following does not represent a company that requires up-to-the-second information?
Construction companies
What maintains customer contact information and identifies prospective customers for future sales?
Contact management CRM system
What was the primary problem Saab encountered with one of its marketing companies?
Contacted customers regardless of their opt-out or opt-in decision
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
Content filtering
How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?
Content filtering, encryption, and firewalls
What are the technologies available to help prevent and build resistance to attacks?
Content filtering, encryption, firewalls
What provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment?
Content management system
Which of the below is not considered an advantage of a content management system?
Content management systems increase order entry speed.
Which of the following represents the primary forms of ebusiness?
Content providers, infomediaries, online marketplaces, portals, service providers, and transaction brokers.
What are the four most common Business 2.0 characteristics?
Content sharing through open source, user-contributed content, collaboration inside the organization, and collaboration outside the organization.
Websites sometimes deposit on a customer's hard drive a small file containing information about the customer and the customer's web activities. What is that small file called?
Cookie
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?
Cookie
What is a small file deposited on a hard drive by a website that contains information about customers and their web activities?
Cookie
What is a small file deposited on a hard drive by a website containing info about customers and their Web activities
Cookies
Privacy is the legal protection afforded an expression of an idea, such as a song, book or video game.
Copyright
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
Copyright
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
Copyright
What is the legal protection afforded an expression of an idea?
Copyright
_____________ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents
Copyright
What is an organization's key strength, a business function that it does better than any of its competitors?
Core competency
What is it called when an organization chooses to focus specifically on what it does best and forms partnerships and alliances with other specialist organizations to handle nonstrategic business processes?
Core competency strategy
What describes the basic transaction data such as its date, purpose, and amount and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc?
Source document
. _________ is unsolicited email.
Spam
What is unsolicited email that plagues employees at all levels and clogs email systems?
Spam
What are project constraints?
Specific factors that can limit options
What do SMART criteria for successful objective creation include?
Specific, measurable, agreed upon, realistic, time framed
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
Spoofing
__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.
Spyware
Which of the following is not one of the principal BI enablers?
Corporate processes
Sustainable MIS is a critical part of _____________ within a company?
Corporate social responsibility
____________ maintenance makes changes to repair system defects.
Corrective
Which of the following is not one of the five basic components of supply chain management?
Cost
Which of the following is one of the five key competitive priorities?
Cost
LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the following are the most important network differentiating dimensions?
Cost and performance
Transaction processing systems are primarily used to automate business processes. Automation increases efficiency and effectiveness, while reducing head count which in turn reduces overall operational
Costs
What is the difference between pirated and counterfeit software?
Counterfeit is software that is manufactured to look like the real thing and is sold as such. Pirated is the authorized use, duplication, distribution, or sale of copyrighted software.
What is software that is manufactured to look like the real thing and sold as such?
Counterfeit software
Who are hackers with criminal intent?
Crackers
Which of the following is not a type of feasibility study?
Critical success factor feasibility study
A dimension is a particular attribute of information. Each layer in a data warehouse or data mart represents information according to an additional dimension. What is the common term for the representation of multidimensional information?
Cube
Which of the following is the common term for the representation of multidimensional information?
Cube
What are the three primary challenges facing global businesses?
Cultural, political, geoeconomic
What is another term that represents CRM reporting technologies that help organizations identify their customers across other applications?
Customer identification
Charles Schwab recouped the cost of a multimillion-dollar system in less than two years. What type of system was it?
Customer relationship management.
What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer?
Customer satisfaction
What is another term that represents CRM analysis technologies that help organizations segment their customers into categories such as best and worst customers?
Customer segmentation
Which of the following is not a valid way that a CRM system can collect information?
Customer's personal computer.
The most popular IaaS operation today is Amazon's Elastic Compute Cloud (EC2). The benefits when using Amazon as an IaaS include ____________.
Customers can load and run their own applications. Customers can control their own operating environment. Customers can create, run, and stop services as needed.
Who are the primary users of SCM systems?
Customers, resellers, partners, suppliers, and distributors
What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Froogle and bank account aggregation services such as Citibank?
Cybermediation
What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?
Cybermediation
What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?
Cybermediation
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
Cyberterrorists
What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?
Cyptography
The sales department needs to rely on information from operations to understand _________.
Demand Forecasts, Customer Orders & Inventory
Which of the following generates demand forecasts using statistical tools and forecasting techniques?
Demand planning software
What floods a website with so many requests for service that it slows down or crashes the site?
Denial-of-service attack
A(n) _________ is a logical relationship that exists between the project tasks, or between a project task and a milestone.
Dependency
What is the logical relationship that exists between project tasks or between a project task and a milestone?
Dependency
What is the logical relationship that exists between the project tasks, or between a project task and a milestone?
Dependency
Which phase describes the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation?
Design phase
Which of the following represents the different information granularities?
Detail, summary, aggregate
Which of the following is not one of the three primary information security areas?
Detection and resistance
If there is a security breach on your organizational information systems, which information security area is best suited to handle the breach?
Detection and response
What is a feasibility study?
Determines if the proposed solution is feasible and achievable from a financial, technical, and organizational standpoint
Which of the following is not a technique for choosing strategic projects?
Develop a project plan
Which phase takes all of the detailed design documents from the design phase and transforming them into the actual system?
Development phase
Which of the following is not a cultural business challenge?
Differences in architectures
Which of the following is not a political business challenge?
Differences in social attitude
_________ asset management system works with binary rather than text files, such as multimedia file types.
Digital
Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
Digital Darwinism
What works with binary rather than text files, such as multimedia file types?
Digital asset management system
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
Digital certificate
Which of the following is not a reason for the explosive growth of the WWW?
Digital darwinism
What integrates information from multiple components and tailors the information to individual preferences?
Digital dashboard
What is the worldwide gap giving advantage to those with access to technology?
Digital divide
Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?
Digital information
What is technology that digitally represents handwriting in its natural form?
Digital ink
What is any paper that is optimized for any type of digital printing?
Digital paper
Which of the following allows high-speed digital data transmission over standard telephone lines?
Digital subscriber line (DSL)
What are the two most prevalent types of broadband access?
Digital subscriber line and cable connection
A disaster recovery plan contains a _____________ that outlines the costs to support the plan.
Disaster recovery cost curve
What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time?
Disaster recovery cost curve
To combat disasters a company can create a _________ that would detail the process for recovering information or a system in the event of a catastrophic disaster.
Disaster recovery plan
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
Disaster recovery plan
What is the business strategy that lets a company shorten the order process and add value with reduced costs or a more responsive and efficient service, and occurs when a business sells directly to the customer online?
Disintermediation
What occurs when a business sells directly to the customer online and cuts out the middle man?
Disintermediation
Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane?
Disrupting communications Damaging physical infrastructures Halting transportation
The Innovator's Dilemma suggests that established companies can take advantage of ___________ without hindering existing relationships with customers, partners, and stakeholders.
Disruptive technologies
Which of the following represents the bullwhip effect?
Distorted product-demand information ripples from one partner to the next throughout the supply chain.
A DDoS stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for?
Distributed denial-of-service attack
Which of the following is not a current CRM trend?
Distributor relationship management
Which of the following is not a common form of data mining?
Division organization
Which of the following is not one of the tenets in the Agile Alliance's manifesto?
Do not allow changing requirements, especially late in development
Which of the following is NOT a common stipulation when creating an employee monitoring policy?
Do not state the consequences of violating the policy
Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy?
Do not state the consequences of violating the policy
___________ management system supports the electronic capturing, storage, distribution, archival, and accessing of documents.
Document
What support the electronic capturing, storage, distribution, archival, and accessing of documents?
Document management system
____________ testing verifies that the instruction guides are helpful and accurate
Documentation
Which of the following statements is inaccurate in reference to domain names?
Domain names are owned
What is the practice of buying a domain name and not using the web page but waiting to profit from the trademark?
Domain or cyber squatting
Which of the following refers to a period of time when a system is unavailable?
Downtime
Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text?
Downtime monitoring policy
What company monitors the operation of its vending machines via wireless technology?
Dr Pepper/Seven Up Inc.
Which of the following represents the connecting and communicating tools supporting and driving ebusiness?
Email, instant messaging, podcasting, content management systems, and video and Web conferencing
What is an infrastructure built for notifying people in the event of an emergency?
Emergency notification service
Which of the following is not an example of explicit knowledge?
Employee opinion
What is drill-down capability?
Enables users to get details, and details of details, of information
What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?
Encryption
Which issue concerns CIOs the most?
Enhancing customer satisfaction
Which of the following is not a primary use of GIS?
Ensuring safety equipment is on an airplane before a flight
What connects the plans, methods, and tools aimed at integrating separate enterprise systems?
Enterprise application integration
What represents a new approach to middleware by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors?
Enterprise application integration middleware
What is a person called who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business?
Enterprise architect
Which of the following is not an example of a primary enterprise system?
Enterprise revenue planning
Which of the following illustrates the primary concepts of the relational database model?
Entities, attributes, keys, and relationships
In the relational database model, what is a person, place, thing, transaction, or event about which information is stored?
Entity
Which of the following stores information about a person, place, thing, transaction, or event, and is usually referred to as a table?
Entity
Which of the following is not a potential business impact created by the growth in information industries?
Entry-level positions will require less education
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
Epolicies
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents supplier power in the music industry?
Established record labels like EMI, Sony, Universal.
What is another name for an eshop?
Estore or etailer
If an organization were to have only one policy, which one would it want?
Ethical computer use policy
If an organization were to have only one policy, which one would it want? Ethical computer use policy Information privacy policy Internet use policy Acceptable use policy
Ethical computer use policy
Which of the following contains general principles to guide computer user behavior?
Ethical computer use policy
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
Ethical computer use policy
What are the principles and standards that guide our behavior toward other people?
Ethics
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
Ethics
___________ are the principles and standards that guide our behavior toward other people.
Ethics
Which of the following represents the two fundamental building blocks that protect organizational information?
Ethics and security
Which two terms are confirmed or validated with a fact?
Event and Object
The increased demand in technology devices has caused an increase in discarded devices, a phenomenon known as ________?
Ewaste
Who is the person or group who provides the financial resources for the project?
Executive sponsor
The project management role has several responsibilities in the area of cost. Which of the following answers lists these responsibilities for cost?
Expectations, resources, technology choices
The project management role has several responsibilities in the area of cost. Which of the following represent these areas for cost?
Expectations, resources, technology choices
Test conditions are the detailed steps the system must perform along with the _______ results of each step.
Expected
______________ systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.
Expert
Which of the following is the most commonly used form of AI in the business arena?
Expert system
___________ knowledge consist of anything that can be documented, archived, and codified, often with the help of IT.
Explicit
What consists of anything that can be documented, archived, and codified, often with the help of IT?
Explicit knowledge
What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS department?
Explicit knowledge
What are the two categories that include intellectual and knowledge-based assets?
Explicit knowledge and tacit knowledge
What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?
Extreme programming
Human resources is the most common outsourced function.
FALSE IT is the most common outsourced function.
A document management system works with binary rather than text files, such as multimedia file types.
FALSE A digital asset management system works with binary rather than text files, such as multimedia file types.
A foreign key is a field (or group of fields) that uniquely identifies a given entity in a table.
FALSE A primary key is a field (or group of fields) that uniquely identifies a given entity in a table.
Data latency is the time from which data are made available to the time when analysis is complete.
FALSE Analysis latency is the time from which data are made available to the time when analysis is complete.
What is it called when you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?
Fair Use Doctrine
What gives, in certain situations, a person the legal right to use copyrighted material?
Fair use doctrine
A data mart is a company that collects and sells external data for a data warehouse.
False
A profit occurs when businesses sell products or services for less then they cost to produce.
False
A project is an ongoing endeavor undertaken to create a unique product or service.
False
An insignificant number of IT projects are considered failures.
False
Communication between Business and IT personnel is generally considered to be good.
False
Companies that outsource services reduce their costs but still grow at the same pace of companies that do not outsource.
False
Ethics are the laws that guide our behavior toward other people.
False
Job titles, roles, and responsibilities do not differ from organization to organization.
False
Most business managers are also good project managers.
False
Purchasing stocks is an example of analytical information.
False
Reducing costs in the primary reason that companies outsource services?
False
Sensitivity analysis, what-if analysis, and market basket analysis are the three quantitative models typically used by a DSS.
False
The M in the SMART criteria for successful objective creation stands for manageable.
False
The chief security officer is responsible for ensuring the ethical and legal use of information within an organization.
False
The majority of organizations spend over 10% of their IT budget on information security.
False
The most important skills for an IT excutive are technical knowledge and proficiency.
False
The uniqueness characteristic of high-quality information ensures that all the values are correct.
False
There reminds a sharp distinction between IT and business roles in an organization.
False
Transactional information encompasses all organizational information and its primary purpose is to support the performing of managerial analysis tasks.
False
Timely information must be up-to-the-second to be accurate.
False Timely information can change for each business decision. Some decisions require weekly information while others require daily information.
Which of the following describes agile?
Fast and efficient B. Small and nimble C. Lower cost D. All of the above*
With grid computing, a problem is broken into pieces and distributed to many machines, allowing _________ processing than could occur with a single system.
Faster
Standardizing of data elements allows for ______________?
Greater accuracy, completeness, and consistency
What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration?
Grid Computing
What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data?
Grid Computing
DreamWorks Animation Company used which sustainable infrastructure component to complete many of its films, including Shrek, Madagascar, and Antz?
Grid computing
Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem?
Grid computing
Which characteristics support a sustainable MIS infrastructure?
Grid computing, cloud computing, and virtualization
____________ supports team interaction and dynamics including calendaring, scheduling, and videoconferencing
Groupware
What is software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing?
Groupware system
Why is estimating future growth a challenge for most companies?
Growth can occur because the company acquires new markets Growth can occur because the company acquires new customers Growth can occur because the company acquires new products
Which act protects health insurance information?
HIPAA
Experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge are know as what?
Hackers
______have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Hactivists
Which activities do production and materials management components perform?
Handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control
Cloud computing allows users to connect via a web browser and stores all of your software documents "in the cloud," which means that there is no more need for users to have ____________?
Hard drives Physical servers Software or processing power
John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What role at Internal Computer Specialists was John hired to fix?
Hardware
________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard
Hardware
Which of the following is the top reason why organizations launch knowledge management systems?
Increase profits or revenues According to the key reasons why organizations launch knowledge management systems figure, increase profits or revenues.
Which of the following is a business-related consequence of successful software?
Increase revenues
____________ revenues are a business-related consequence of successful software.
Increased
Which of the following is a disadvantage of database-stored information?
Increased data redundancy
All of the following are advantages of database-stored information except:
Increased information redundancy
All of the following are advantages of database-stored information, except:
Increased performance
Where would you categorize a cloud computing benefit that allows a customer to store fewer applications on a client computer, which frees up the memory allowing for increases in performance?
Increased performance
As a manager for your company some of your responsibilities include measuring metrics and overseeing company strategies. You observe some critical success factors and see large increases in productivity. What would you suspect would be the primary reason for the large increases in productivity?
Increases in effectiveness
What are the three pressures driving sustainable MIS infrastructures?
Increases in electronic waste, energy consumption, and carbon emissions
What is a disadvantage of networking or performing business in a connected world?
Increases resource threats
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
Information security
Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the following company policies?
Information security policies
What identifies the rules required to maintain information security?
Information security policies
With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures as keystrokes, error rate, and number of transaction processed?
Information technology monitoring
What is data converted into a meaningful and useful context?
Information.
What service delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model?
Infrastructure as a Service (IaaS)
What are the three cloud computing service delivery models?
Infrastructure as a Service, Software as a Service and Platform as a Service
Which four elements are included in systems thinking?
Input, process, output and feedback
What is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems?
Insourcing
____________ is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems.
Insourcing
What is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet?
Instant messaging
What types of BI decisions include forecasting claim amounts and medical coverage costs, classifying the most important elements that affect medical coverage; predicting which customers will buy new insurance policies?
Insurance BI decisions
Which type of BI benefits includes improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing?
Intangible benefits
What is enterprise resource planning?
Integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise-wide information on all business operations.
What allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?
Integration
____________ testing exposes faults in the integration of software components or software units.
Integration
What are rules that help ensure the quality of information?
Integrity constraints
What are the rules that help ensure the quality of information?
Integrity constraints
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
What is intangible creative work that is embodied in physical form?
Intellectual property
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?
Intellectual property
A(n) _________ agent is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.
Intelligent
_____________ systems are various commercial applications of artificial intelligence.
Intelligent
What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users?
Intelligent agent
What are various commercial applications of artificial intelligence?
Intelligent system
What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?
Intermediaries
What is the rate at which the net present value of an investment equals zero?
Internal rate of return (IRR)
What is the largest and most important network that has evolved into a global information superhighway?
Internet
Which of the following began as an essential emergency military communications system operated by the U.S. Department of Defense Advanced Research Project Agency (DARPA)?
Internet
Which of the following are types of web browsers?
Internet Explorer and Mozilla's Firefox
Which of the following provides Internet access using a cable television company's infrastructure and a special cable modem?
Internet cable connection
What distributes digital video content using IP across the Internet and private IP networks?
Internet protocol TV (IPTV)
What is an ISP?
Internet service provider, a company that provides access to the Internet for a monthly fee.
Jackie is the head teller at ABC bank and her responsibilities include overseeing and managing tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find the complaints started right around the time ABC bank provided internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amount of time playing internet games and posting on FB. Which policy should the company implement to help eliminate this problem?
Internet use policy
Managing global enterprise architectures is a key global IT challenge for the 21st century. What is included in the term global enterprise architectures?
Internet, intranet, extranet, and other telecommunication networks
What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing?
Intranet
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?
Intrusion Detection Software (IDS)
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?
Intrusion detection software (IDS)
A database maintains information on ___________.
Inventory Transactions Employees
Which of the following metrics represents the time it takes to manufacture a product and deliver it to the retailer?
Inventory cycle time
Which of the following is not a typical CRM metric?
Inventory metrics
What is the analysis phase in the SDLC?
Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system
What is the design phase in the SDLC?
Involves describing the desired features and operations of the system
What is process modeling?
Involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment
What is the implementation phase in the SDLC?
Involves placing the system into production so users can begin to perform actual business operations with the system
What is consolidation?
Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
MIS can be an important enabler of business success and innovation. Which statement is accurate when referring to MIS?
Is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.
Which of the following would not be considered part of the accurate characteristic of high-quality information?
Is aggregate information in agreement with detailed information?
Which of the following would not be considered part of the unique characteristic of high-quality information?
Is aggregate information in agreement with detailed information?
Which of the following would not be considered part of the complete characteristic of high-quality information?
Is each transaction represented only once in the information?
Which of the following would not be considered part of the timely characteristic of high-quality information?
Is the Zip code missing in the address?
Which of the following countries is considered a leader in the outsourcing industry?
Israel
Which of the following is the main drawback of biometrics?
It can be costly and intrusive
What is one of the biggest pitfalls associated with real-time information?
It continually changes
What is interactive voice response (IVR)?
It directs customers to use touch-tone phones or keywords to navigate or provide information
Which of the following is not a part of the email privacy policy stipulations?
It informs people that the organization has full control over email once it is transmitted outside the organization.
What is the role of a foreign key?
It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
What does extraction, transformation, and loading mean?
It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse
Which of the following is not an example of an advantage to using the web to access organizational databases?
It is cleaner and virus-free.
What consists of a series of tiny projects?
Iterative development
What represents a session where employees meet, sometimes for several days, to define or review the business requirements for the system?
JAD session
All of the following jobs will be increasingly performed by robots, except:
Jobs performed by scientists, engineers, and technicians
One of the most famous examples of wiki vandalism occurred when a false biography entry stated which of the following?
John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy's assassination as well as JFK's.
What is it called when you have a novice and an expert work together on a project to help bring the expert's approach to light?
Joint problem solving
Which of the below statements is correct?
Just putting up a website does not create an ebusiness.
Which of the following is NOT a strategy for successful project management?
Keep your resume updated
What is a program that, when installed on a computer, records every keystroke and mouse click?
Key logger software
What is a program, when installed on a computer, records every keystroke and mouse click?
Key logger software
What is the most common form of collective intelligence found inside the organization?
Knowledge management
What supports the capturing, organization, and dissemination of knowledge throughout an organization?
Knowledge management system
Which system supports the capture, organization, and dissemination of knowledge throughout an organization?
Knowledge management system
What kind of society is being created by the growth in information industries?
Knowledge-dependent global society
Which of the following includes the three primary network types?
LAN, WAN, MAN
What is a current or existing system that will become the base for upgrading or integrating with a new system?
Legacy System
What is the ideal type of decision making for people in an organization?
Legal and ethical
Employees need to compare different types of information for what they commonly reveal to make strategic decisions. Which of the following represents the three common types of information found throughout an organization?
Levels, formats, granularities
What are the different types of information?
Levels, formats, granularities
What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership?
Limited liability corporation
What compiles customer information from a variety of sources and segments the information for different marketing campaigns?
List generator
Which of the following operational CRM technologies does the marketing department typically use?
List generator, campaign management, cross-selling and up-selling
Which of the following is not a principle of supply chain management?
Listen to signals from telecommunications equipment.
Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content?
Location-based services
Which company developed a real-time collaboration system that ties together its partners, suppliers, and DoD customers via the Internet?
Lockheed Martin Corporation
Which of the following focuses on how individual users logically access information to meet their own particular business needs?
Logical view
A data warehouse is a _________ collection of information-gathered from many different ___________ databases-that supports business analysis activities and decision-making tasks.
Logical, operational
A data warehouse is a ______ collection of information - gathered from many different _____ databases - that supports business-analysis activities and decision-making tasks.
Logical; operational
How can companies reduce buyer power?
Loyalty programs, which reward customers based on their spendings.
Which of the following is not a type of wireless network?
MAN
Which of the following is the most common function outsourced?
MIS
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and MIS assets?
MIS infrastructure
What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?
Mail Bomb
Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environmental changes?
Maintainability
What is typically performed by the sales and marketing department?
Maintaining transactional data
An error found during the ___________ phase is the most expensive to fix.
Maintenance
The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.
Maintenance
What is not considered a core driver of the information age?
Malware
Project ____________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.
Manager
Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Jenny?
Managerial
What involves analyzing business operations for internal decision making and does not have to follow any rules issued by standard-setting bodies such as GAAP?
Managerial accounting
Which of the following is a challenge facing an ebusiness?
Managing Consumer Trust
Which of the following is a type of decision support system?
Manufacturing
Evaluate the advantages of using a workflow management system.
Many workflow management systems allow the opportunity to measure and analyze the execution of a process. Workflow systems integrate with other organizational systems, such as document management systems, and database management systems.
Financial savings, increased technical abilities, and _________ agility are the benefits an organization can receive from outsourcing.
Market
What is a common association detection analysis technique where you analyze certain items to detect customers' buying behavior and predict future behavior?
Market basket analysis
What is the division of a market into similar groups of customers?
Market segmentation
What is calculated by dividing the firm's sales by the total market sales for the entire industry?
Market share
Which of the following will help an organization maintain consistent business operations?
Marketing, sales, and accounting departments decide to use the same vendor for a new system
Within the beginning stage of the data warehouse models process, which of the following are included in the internal databases?
Marketing, sales, inventory, and billing
Which of the following is the least common function outsourced?
Marketing/sales
What is a website or web application that uses content from more than one source to create a completely new product or service?
Mashup
M&M's offers people the opportunity to order the candy in special colors or with customized sayings. How would you classify M&M's ebusiness strategy?
Mass customization
Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike's ebusiness strategy?
Mass customization
What is the ability of an organization to tailor its products or services to the customers' specifications?
Mass customization
What uses sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company?
Materials requirement planning system
Which company created several different website to respond to sensitive cultural differences?
McDonalds
What is information reach?
Measures the number of people a firm can communicate with all over the world.
Which industry spends the least per employee on computer security?
Medical
What sends work assignments through an email system?
Messaging-based workflow system
What is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges?
Methodology
What are the measurements that evaluate test results to determine whether a project is meeting its goals?
Metrics
What is a large computer network usually spanning a city?
Metropolitan area network
What do you call a large computer network usually spanning a city or a specific infrastructure like a college?
Metropolitan area network (MAN)
What is the practice of sending brief posts, only 140-200 characters long, to a personal blog, either publicly or to a private group of subscribers?
Microblogging
NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the following is not an NSP?
Microsoft
When a company is the first to market with a competitive advantage, this is called a first-mover advantage. All of the following companies were first movers except
Microsoft - Bing Search Engine
What are several different types of software that sit in the middle of and provide connectivity between two or more software applications?
Middleware
Project ____________ represent key dates when a certain group of activities must be performed
Milestones
Project ____________ represent key dates when a certain group of activities must be performed.
Milestones
Which of the following is not an advantage of building a data-driven website?
Minimizes or reduces efficiency
What is the ability to purchase goods and services through a wireless Internet-enabled device?
Mobile commerce
A(n) ___________ is a simplified representation or abstraction of reality.
Model
___________ is the activity of drawing a graphical representation of a design.
Modeling
What is a device that enables a computer to transmit and receive data?
Modem
Which of the following is not one of the three key steps involved in business process improvement?
Monitor the performance of key individuals
Information technology _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
Monitoring
Gordon Moore, the co-founder of Intel, established which MIS law?
Moore's Law
Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?
Nonrepudiation
Which of the following is part of the acceptable use policy stipulations?
Not attempting to mail bomb a site
John Cleaver is the CEO of Tech World, which is a retail store that sells computers, monitors, cameras, TVs and many other electronic products. John and his executive team are meeting to brainstorm new ideas on how to grow the business. One idea is to mimic a competitor's product that is attempting to sell a new product in a different industry. After performing a Porter's Five Forces analysis, John determines that all the forces are high in this new industry. What should John do?
Not introduce the product because all 5 forces are strong and this would be a highly risky business strategy.
Which of the following would not be found in a typical acceptable use policy?
Not posting commercial messages to groups where the employee has received user consent
What is one of the guidelines an organization can follow when creating an information privacy policy?
Notice and disclosure
What do data warehouses support?
OLAP and analytical processing
What captures transaction and event info using technology to 1) process the info according to defined business rules 2) store the info 3) update existing info to reflect the new info
OLTP
Project __________ are quantifiable criteria that must be met for the project to be considered a success.
Objectives
What is deperimeterization?
Occurs when an organization moves employees outside its firewall
Project management ____________ is an internal department that oversees all organizational projects.
Office
___________ outsourcing is using organizations from developing countries to write code and develop systems.
Offshore
What is it called when a company uses organizations from developing countries to write code and develop systems?
Offshore outsourcing
What is using organizations from developing countries to write code and develop systems?
Offshore outsourcing
What percentage will all of today's technical knowledge represent in 2050?
One
What are the ramifications of improper electronic recycling, when analyzing the example of a single desktop computer?
One computer contains more than 700 chemicals that can be toxic to the environment. Computers in landfills can leak these toxic chemicals into our land, water, and air. Computers contain high levels of mercury, lead, and cadmium-harmful toxins
What caused Polaroid to go bankrupt?
One-hour film processing and digital cameras stole its market share.
What does the cloud computing service provider "Mozy" specializes in?
Online computer backup services
What is engaging another company within the same country for services?
Onshore outsourcing
What is the outsourcing option that includes the closest location and direct customer control?
Onshore outsourcing
What is software whose source code is available free for any third party to review and modify?
Open source
Which of the following demonstrates potential issues with Business 2.0 and information vandalism?
Open source allows anyone to be able to edit, damage, or destroy content.
What is a system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
Open system
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
Open system
Which form of BI has managers and analysts as its primary users?
Operational BI
Which form of BI uses real-time metrics for its data?
Operational BI
Which type of BI manages daily operations and integrates BI with operational systems?
Operational BI
At which level of an organization do employees develop, control, and maintain core business activities required to run the day-to-day operations?
Operational level
All of the following are reasons why operational systems are not appropriate for business analysis, except:
Operational systems are integrated
All of the following are reasons why operational systems are not appropriate for business analysis except:
Operational systems are integrated.
Greg works for Geneva Steel Corporation. Greg's duties include managing the overall processes for the company and transforming the steel resources into goods. Which department would Greg most likely work in?
Operations Manager.
What types of BI decisions include predicting machinery failures and finding key factors that control optimization of manufacturing capacity?
Operations management BI decisions
Most companies are organized by departments or functional areas. Which of the following is not a common department found in a company?
Payroll
Most companies are typically organized by departments or functional areas. Which of the following is not a common department found in a company?
Payroll
What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server?
Peer-to-peer (P2P)
What is the recommended way to implement information security lines of defense?
People first, technology second
Which of the following represents the biggest problem of information security breaches?
People misusing organizational information
Which of the following is not a reason for the growth of decision-making information systems?
People no longer have to worry about protecting the corporate asset of organizational information
A company should be able to calculate the cost of downtime by which of the following?
Per hour, per day, and per week
____________ maintenance makes changes to enhance the system, which improves such things as processing performance and usability
Perfective
Which type of maintenance makes changes to enhance the system, which improves such things as processing performance and usability?
Perfective maintenance
What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?
Performance
Which of the following measures how quickly a system performs a certain process or transaction?
Performance
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?
Personalization
Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix's ebusiness strategy?
Personalization
What occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely to appeal to that person?
Personalization
Which company had an employee's spouse load file-sharing software onto a company laptop creating a security hole that appears to have compromised the names and Social Security numbers 17,000 current and former employees?
Pfizer
What targets sales opportunities by finding new customers or companies for future sales?
Opportunity management system
________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials
Opt-in
Which of the following is a type of transaction processing system?
Order processing
Which of the following is a customer-facing process?
Order shipping
Which of the following represents a business process you would find in the operations management department?
Ordering inventory
What does digital Darwinism imply?
Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses
Other expenses
What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?
Outsourcing
_________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
Outsourcing
Question 20 Which company is a leader in the transformation of the broadcasting industry?
PBS
A(n) _____ chart is a graphical network model that depicts a project's tasks and the relationships between those tasks.
PERT
What is a graphical network model that depicts a project's tasks and the relationships between those tasks?
PERT chart
What type of chart typically displays the critical path?
PERT chart
What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?
Paradigm shift
____________ implementation uses both the old and the new systems until it is evident that the new system performs correctly.
Parallel
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. What type of identity theft were you just a victim of?
Pharming
What is the difference between phishing and pharming?
Phishing is a technique to gain personal info for the purpose of identifying theft. Pharming reroutes requests for legitimate websites to false websites.
____________ implementation has only a small group of people use the new system until it is evident that the new system performs correctly and then adds the remaining people to the new system.
Pilot
Counterfeit software
Pirated software
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
Pirated software
Which of the following is not one of the four phases in the product life cycle?
Place
A project ____________ is a formal, approved document that manages and controls project execution.
Plan
Which of the following represents the phases in the SDLC?
Plan, analysis, design, develop, test, implement, maintain
The ______________ phase involves establishing a high-level plan of the intended project and determining project goals.
Planning
What is the first step in the SDLC?
Planning
____________ implementation discards the old system completely and immediately starts to use the new system.
Plunge
What converts an audio broadcast for use by a digital music player?
Podcasting
Which of the following describes ePolicies?
Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
Which of the following changes its form as it propagates?
Polymorphic viruses and worms
What is the number one reason that IT projects fall behind schedule or fail?
Poor planning or poor project management.
Which of the following is an example of a sustaining technology?
Porsche's faster car
Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?
Portability
What are forecasts?
Predictions made on the basis of time-series information
Which of the following is not a characteristic of a well-defined project plan?
Prepared by the project manager
Which of the following is not a characteristic of a well-defined project plan? Appropriate to the project's size
Prepared by the project manager
What type of keys do you need to use to create a relational database model?
Primary keys and foreign keys
What are the two main categories in a value chain analysis?
Primary value activities and support value activities.
What brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech and visual disabilities?
Web accessibility initiative
What allows users to access the WWW?
Web browser
What enables publishing content both to intranets and to public websites?
Web content management system
As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals?
Webinar
What is a locally stored URL or the address of a file or Internet page saved as a shortcut?
Website bookmark
Which of the following is not one of the questions asked during the analyzing phase?
What customers are at risk of leaving?
Which of the following provides an example of info
What is my worst selling product?
Which of the following is not one of the questions asked during the predicting phase?
What is the total revenue by customer?
What key questions should IT governance answer?
What key metrics management requires?
What is trend projection?
When numerical data are available, a trend can be plotted to display changes through time and into the future
OM information systems can answer all of the following questions, except:
Where the funding will come to support the effort?
The optimal disaster recovery plan in terms of cost and time is where on the disaster recovery cost curve.
Where the two cost effects intersect
What does a business continuity plan typically include?
Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems
Which company uses statistical analysis to automatically detect potential issues, provide quick and easy access to reports, and perform multidimensional analysis on all warranty information?
Whirlpool
Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs's top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?
White-hat hacker
Which of the following is not one of the questions asked during the reporting phase?
Who are our customers?
What do organizations using BI ask to find the root causes to problems and provide solutions?
Why
Which of the following questions represents a CRM analyzing technology question?
Why did sales not meet forecasts?
________ is a security protocol that protects wi-fi networks.
Wi-fi protected access
What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?
WiMAX wireless broadband
What spans a large geographic area such as a state, province, or country, similar to the Internet?
Wide area network (WAN)
What is a web-based tool that makes it easy for users to add, remove, and change online content?
Wiki
Which of the following is one of the largest wikis on the web and one of the 10 most popular web destinations?
Wikipedia
Which of the following is a potential business impact from teleliving?
Will take over routine tasks such as writing a letter, retrieving a file, and making a phone call
What refers to any type of electrical or electronic operation that is accomplished without the use of a "hard-wired" connection?
Wireless
What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves?
Wireless fidelity (wi-fi)
What technology uses radio waves rather than wires to transmit information across a local area network?
Wireless local area network
Which of the following statements is not accurate in reference to mobile and wireless computing?
Wireless technology is any type of operation accomplished with the use of a hard-wired connection.
A(n)___________ management system facilitates the automation and management of business processes and controls the movement of work through the business process.
Workflow
What facilitates the automation and management of business processes and controls the movement of work through the business process?
Workflow management systems
. What type of training is set in a classroom-type environment and lead by an instructor?
Workshop training
What does the wireless technology WiMAX stand for?
Worldwide interoperability for microwave access
Which of the following malware change their form as they propagate?
Worms
Which of the following is not performed during the implementation phase?
Write detailed business requirements
Who did Business 2.0 rank as number one in the top 50 people who matter most in business?
You - the customer
Which of the following is not a technology company but used technology to revamp the business process of selling shoes
Zappos
Which of the following does not describe Zappos' database?
Zappos' database was highly redundant
What is a great example of using cluster analysis in business to create target-marketing strategies?
Zip code segmentation
The cloud computing service provider ___________, specializes in word processor, spreadsheet, and online presentation tool services.
Zoho office
An API is a set of routines, protocols, and tools for ______________.
building software applications
The goal of value chain analysis is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a ________ or ________________.
cost advantage, product differentiation
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
ePolicies
Apple understood the importance of usability when it designed its _________?
iPod and iTunes system
What is another term for information cleansing?
information scrubbing
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
informed; consent
Enterprise resource planning (ERP):
integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprise wide information on all business operations.
Gender can be referred to in many ways (Male, Female, M/F, 1/0) in a data warehouse. What is this an example of?
Standardizing information
What tracks and communicates changes in the shareholder's earnings?
Statement of owner's equity
Which of the following best describes Web 1.0?
Static text-based information websites
What type of website is best to build for a general informational website with static information?
Static website
__________ analysis performs such functions as information correlations, distributions, calculations, and variance analysis.
Statistical
Which of the following techniques performs such functions as information correlations, distributions, calculations, and variance analysis?
Statistical analysis
Which system differentiates an executive information system from a decision support system and a transaction processing system?
Stock market information system
Which of the following is not a guideline for effectively dealing with change management?
Stop change
Which form of BI uses months to years as its time frame?
Strategic BI
Which type of BI achieves long-term organizational goals?
Strategic BI
Which evaluation criteria is an organization using that prioritizes its projects by giving priority to those projects that are in line with the organization's strategic goals and objectives?
Strategic alignment
Business process modeling or mapping, is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a ________ sequence.
Structured
___________ collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules
Structured
What involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules?
Structured collaboration
What is another term for data that are already contained in a database or a spreadsheet?
Structured data
Which of the following asks users to write lines of code to answer questions against a database?
Structured query language
Which social media site works by allowing content to find the users, instead of the users having to search for the content?
StumbleUpon
All of the following are forms of ebusiness except ______________.
Subscription fee
For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual ebusiness that acts like a search engine but focuses on only the real estate industry. The main revenue source for Perry's ebusiness will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry's new business?
Subscription fees
Which of the following represents a typical supply chain?
Suppliers - Company - Customers.
Which of the following automates the different steps and stages of the supply chain?
Supply chain execution software
Which of the following ensures supply chain cohesion by automating the different activities of the supply chain?
Supply chain execution systems
What is the ability to view all areas up and down the supply chain in real time?
Supply chain visibility
What is the ability to view all areas up and down the supply chain?
Supply chain visibility
Which of the following is a key to SCM success?
Support Organizational Goals.
What are the three business functions an MIS infrastructure supports?
Supports info change, change, and business continuity planning
What is a platform as a service (PaaS)?
Supports the deployment of entire systems, including hardware, networking, and applications using pay-per-use revenue model
What describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment?
Sustainability or green MIS
Grid computing, cloud computing, and virtualization are all elements of a (an) ________ MIS infrastructure?
Sustainable
The ____MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption
Sustainable
The __________ MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
Sustainable
What do you call the safe disposal of MIS assets when they reach the end of their life cycle?
Sustainable MIS disposal
___________ make customers reluctant to switch to another product or service.
Switching costs
All of the following are business-critical integrity constraints, except:
System will not allow returns of fresh produce after 15 days past delivery
What is the overall process for developing information systems from planning and analysis through implementation and maintenance?
Systems development life cycle
Which of the following represents a brick-and-mortar business?
T.J. Maxx
Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL?
T1 line
. A shopping bot is one of the simplest examples of an intelligent agent.
TRUE
A genetic algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
TRUE
Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
TRUE
A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.
TRUE A collaboration system is an IT -based set of tools that supports the work of teams by facilitating the sharing and flow of information.
When evaluating the business value of disintermediation, the more ____________ that are cut from the distribution chain, the lower the product price.
intermediaries
A content management system provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment.
TRUE A content management system provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment.
A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.
TRUE A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.
A kill switch is a trigger that enables a project manager to close the project prior to completion.
TRUE A kill switch is a trigger that enables a project manager to close the project prior to completion.
.A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
TRUE A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
Data is a strategic asset for a business and if the asset is not used the business is wasting resources.
TRUE Data is a strategic asset for a business and if the asset is not used the business is wasting resources.
Designing the IT infrastructure typically occurs during the design phase.
TRUE Designing the IT infrastructure typically occurs during the design phase.
Improving the quality of business decisions has a direct impact on costs and revenue.
TRUE Improving the quality of business decisions has a direct impact on costs and revenue.
In the past, outsourcing was often used tactically, as a quick-fix, short-term solution to a particular need or problem which did not form part of an overall business strategy.
TRUE In the past, outsourcing was often used tactically, as a quick-fix, short-term solution to a particular need or problem which did not form part of an overall business strategy.
Consider a home theater system. Which of the following represents the inputs?
The DVD player, DVD movie, speakers, TV, and electricity.
Which of the following is not a LAN?
The Internet
What is dynamic scaling?
The MIS infrastructure can be automatically scaled up or down based on needed requirements
Which act restricts what information the federal government can collect?
The Privacy Act
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
The Sarbanes-Oxley Act
What are the two basic functions that social networking sites provide?
The ability to create and maintain a profile that is your online identity and create connections between other people within the network.
What is slice-and-dice capability?
The ability to look at information from different perspectives
What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?
The ability to use current devices such as iPhones and laptops as credit cards or tickets.
Which of the below represents the definition of information compliance?
The act of conforming, acquiescing or yielding info
Which of the following represents the definition of information compliance?
The act of conforming, acquiescing, or yielding information
What is a CPU?
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
What is business process reengineering?
The analysis and redesign of workflow within and between enterprises.
Which of the following describes confidentiality?
The assurance that messages and information are available only to those who are authorized to view them.
Consider a washing machine as a system. Which of the following represents the output?
The clean clothes.
Consider a washing machine as a system. Which of the following represents the outputs?
The clean clothes.
Which of the following reflects Moore's law?
The computer chip performance per dollar doubles every 18 months
What is information richness?
The depth and breadth of details contained in a piece of textual, graphic, audio, or video information.
What is the function of the sales department?
The function of selling a good or service and focuses on increasing customer sales, which increases company revenues
What category of outsourcing countries includes Canada, India, Ireland, Israel, and the Philippines?
The leaders
The balanced scorecard views the organization from four perspectives, and users should develop metrics, collect data, and analyze their business relative to each of these perspectives. Which of the following is not one of the four perspectives in the balanced scorecard?
The leading perspective
What is operations management?
The management of systems or processes that convert or transforms resources into goods and services
Ebusiness was characterized by a few companies or users posting content for the masses. What characterizes Business 2.0?
The masses posting content for the masses.
Which of the following statements is true?
The more complete and accurate an organization wants to get its information, the more it costs.
Which of the following represents megahertz?
The number of millions of CPU cycles per second
What is the systems development life cycle?
The overall process for developing information systems from planning and analysis through implementation and maintenance.
What is the critical path?
The path from start to finish that passes through all the tasks that are critical to completing the project in the shortest amount of time
Which of the following is included in Porter's Five-Forces Model?
The power of competitors.
What is the function of the marketing department?
The process associated with promoting the sale of goods or services. The marketing department supports the sales department by creating promotions that help sell the company's products
Which of the following is one of the important characteristics of business processes?
The process is cross-departmental
Which of the following is not one of the important characteristics of business processes?
The processes occur only within organizations
Which of the following defines supply chain logistics?
The product delivery processes and elements, including orders, warehouses, carriers, defective product returns, and invoicing.
The project management role has several responsibilities in the area of scope. Which of the following represent these areas for scope?
The project management role has several responsibilities in the area of scope. Which of the following represent these areas for scope?
Which of the following describes privacy?
The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
What category of outsourcing countries includes Argentina, Chile, Costa Rica, New Zealand, Thailand, and Ukraine?
The rookies
Which of the following defines supply chain operations?
The schedule for production activities, including testing, packaging, and preparation for delivery.
What is software?
The set of instructions that the hardware executes to carry out specific tasks
Which of the following defines supply chain strategy?
The strategy for managing all the resources required to meet customer demand for all products and services.
What is usability?
The system is easy to learn and efficient and satisfying to use
What does reliability ensure?
The system is functioning correctly and providing accurate information
All of the following are business-critical integrity constraints except:
The system will not allow returns of fresh produce after 15 days past delivery.
What is data latency?
The time duration to make data ready for analysis and loading the data into the database
What is analysis latency?
The time from which data are made available to the time when analysis is complete
What is decision latency?
The time it takes a human to comprehend the analytic result and determine an appropriate action.
Which of the following is not a potential business impact from the world's population doubling in the next 40 years?
The time to get products and services to market is being shortened by technology
Consider an oven as a system. Which of the following represents the input?
The uncooked food.
What are countries that are beginning to emerge as solid outsourcing options?
The up-and-comers
Core business relationships and models are dramatically changing, including shifts from which of the following?
The value in material things to the value of knowledge and intelligence
Consider a washing machine as a system. Which of the following represents the process?
The wash and rinse cycle.
What is cloud computing services changing?
The way people access information The way people deliver information The way people use information
What are the three primary types of management info systems available to support decision making across the company levels
Transaction processing systems, decision support systems, executive information systems
What encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks?
Transactional
What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performance of daily operational tasks?
Transactional information
What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performing of daily operational tasks?
Transactional information
Which of the following encompasses all of the information contained within a single business process or unit of work, where its primary purpose is to support daily operational tasks?
Transactional information
Which of the following is not a type of operational planning?
Transformational planning
What is the standard Internet protocol that provides the technical foundation for the public Internet?
Transmission control protocol/Internet protocol (TCP/IP)
All of the following are scientific methods organizations use to anticipate, forecast, and assess the future, except:
Trend simulation
A cube is the common term for the representation of multidimensional information.
True
A data-driven website is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database.
True
A dimension is a particular attribute of information.
True
A genetic algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.
True
A loss occurs when businesses sell products or services for less then they cost to produce.
True
A project plan should include a "kill switch" or a trigger that enables a project manager to close the project prior to completion.
True
Break-even analysis is the point at which revenues equal costs.
True
Business intelligence (BI) refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts. -True -False
True
Consolidation, drill-down, and slice-and-dice are the three most common capabilities offered in an EIS.
True
Counterfeit software is manufactured to look like the real thing and sold as such.
True
Decisions in IT investments play critical role in business success.
True
For profit corporations primarily focus on making money and all profits and losses are shared by the business owners.
True
Globalization is an influential driver affecting the growth of outsourcing.
True
Human resources management includes the policies, plans, and procedures for the effective management of employees ('human resources').
True
IT infrastructure, security, e-business, and integrations are the four primary information technology areas where organizations are focusing.
True
Introduction, growth, maturity, and decline represent the product life cycle.
True
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
True
Most of the $1 trillion invested in IT projects worlwide through 2010 will be wasted due to failed projects.
True
One of the main ingredients in trust is privacy.
True
Organizational information comes at different levels and in different formats and granularities.
True
Organizational information comes in different levels, formats, and granularities.
True
Organizations use analytical information to make ad hoc decisions.
True
Organizations use transactional information to make repetitive decisions.
True
Poor planning is the most significant reason for projects failing.
True
Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
True
Project stakeholders are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution of project completion.
True
Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.
True
Reports for each sales person, product, and part are examples of detail or fine information granularities.
True
Risk management is the process of proactive and ongoing identification, analysis, and response to risk factors.
True
The IT infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
True
The barriers to mobile employees adopting wireless communication still largely outweigh the benefits.
True
The chief technology officer is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology.
True
The completeness characteristic of high-quality information ensures that there are no missing data values.
True
The project management institute develops procedures and concepts necessary to support the profession of project management.
True
The project manager is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.
True
The ultimate goal of AI is the ability to build a system that can mimic human intelligence.
True
Transactional information is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry.
True
What refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath?
Twisted-pair cable
An information partnership occurs when _______ or more organizations cooperate by integrating their IT systems.
Two
Which of the following terms could you use synonymously when referring to the web?
URL, domain name
What is the difference between unavailable and high availability?
Unavailable is when the system is not operating and can't be used, whereas high availability is when a system is continuously operating at all times.
What is one of the most common reasons why systems development projects fail?
Unclear or missing business requirements
What are the two main objectives associated with data mining?
Uncovering trends and patterns
Which of the following is the result of BI that the data have been defined in business terms and calculations and algorithms are easily accessed for comprehension?
Understandable
What is it called when each transaction, entity, and event is represented only once in the information?
Uniqueness
____________ testing tests each unit of code as soon as the unit is complete to expose faults in the unit regardless of its interaction with other units.
Unit
Many social media sites today allow you to customize your Web address, for example www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?
Universal Resource Locator
Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?
Universal resource locator
Which type of BI benefits are the results of discoveries made by creative users?
Unpredictable benefits
_________ collaboration includes document exchange, shared whiteboards, discussion forums, and email.
Unstructured
What includes document exchange, shared whiteboards, discussion forums, and email?
Unstructured collaboration
What is another term for data that do not exist in a fixed location?
Unstructured data
What is web mining?
Unstructured data associated with websites to identify consumer behavior and website navigation
What is McDonald's performing when it asks its customers if they would like to super-size their meals?
Up-selling
Which of the following is a business benefit of BI?
Up-to-the minute information for everyone
On the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate?
Upper right-hand corner
Where would you find the suppliers' suppler in a typical supply chain?
Upstream
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes. What is the recommended new phrase?
Uptime is money
What is the integration of communication channels into a single service?
Urified communication
All of the following are types of website visitors except:
Usability visitor
What is application software?
Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others
Which of the following highlights how to use the system?
User documentation
What is one of the major problems with email?
User's expectation of privacy
What is web content that is created and updated by many users for many users?
User-contributed content
What do Netflix and Amazon use to drive their recommendation tools?
User-generated content
Which of the following statements means the same as easy-to-manage content?
Users can update data-driven website with little or no training.
What is parallel implementation?
Using both the old and new systems until it is evident that the new system performs correctly
What is teleliving?
Using information devices and the Internet to conduct all aspects of life seamlessly
What is social engineering?
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
Which of the following is not one of the parallels between challenges in business and those of war?
Using tactical business intelligence
What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?
Utility computing
What IT governance focus area ensures the IT department delivers the promised benefits for every project or investment?
Value delivery
Which company has "The Wall of Shaygan", which is a digital dashboard that tracks 100-plus IT systems on a single screen?
Verizon Communications
In a Gantt chart tasks are listed __________ and the project's timeframe is listed ____________.
Vertically, horizontally
Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?
Viral marketing
Grid computing takes advantage of the available 75 percent of unused processing power of a computer and links thousands of individual computers around the world, creating a (an) _______ that can process intensive tasks.
Virtual supercomputer
What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple "virtual" machines on a single computing device?
Virtualization
What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple "virtual" machines, all on a single computing device?
Virtualization
What is software written with malicious intent to cause annoyance or damage?
Virus
What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?
Virus
Which of the following is the best security practice used today?
Virus protection
What category of website metrics does stickiness, or visit duration time, belong to?
Visit metric
Which network uses radio signals to transmit and receive data over distances of a few hundred feet?
WLAN
Which of the below would not be considered a company operating in the long tail of a typical sales curve?
Walmart
Which of the following companies used analytical analysis to identify a correlation between storms and the increased sale of Pop-Tarts?
Walmart
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents buyer power in the music industry?
Walmart, Target, iTunes.
Within the sites that support disaster recovery, _________ is a separate facility with computer equipment that requires installation and configuration?
Warm site
Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness?
Waste or recycling industry
The ___________ methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Waterfall
Identify the different ways in which companies collaborate using technology.
Ways in which companies collaborate include document exchange, shared whiteboards, discussion forums, and email.
Which term describes the WWW during its first few years of operation between 1991 and 2003?
Web 1.0
Which statement below is inaccurate?
Web 2.0 is a simple static website without any interaction with its users.
Many social media websites use _________, or specific keywords or phrases incorporated into website content for means of classification or taxonomy.
tags
A social bookmarking site is dedicated to providing all of the following except ________.
to reconnect with colleagues for business progress
Which of the following offers an advantage of using a data-driven website?
• Easy to eliminate human errors • Easy to manage content • Easy to store large amounts of data
Which of the following represents a reason data warehouses were created?
• Numbers and types of operational databases increased as businesses grew. • Many companies had information scattered across multiple systems with different formats. • Completing reporting requests from numerous operational systems took days or weeks.
What is responsible for the speed, accuracy, availability, and reliability of the MIS
CTO
Which company is expected to gain the majority of its returns on new investments?
Dell
Which of the following includes a common reason that change occurs?
-A misunderstanding of the initial scope -Shifts in planned technology that force unexpected and significant changes to the business -An omission in defining initial scope
What category of outsourcing countries includes Brazil, China, Malaysia, Mexico, Russia, and South Africa?
. The up-and-comers
What is a widely held but difficult to achieve standard of availability for a system?
"Five 9s" availability
What does the Data Warehousing Institute estimate that low-quality information costs U.S. businesses annually?
$600 billion
Which of the following defines information security?
-A broad term encompassing the protection of information -Protects information from accidental misuse -Protects information from intentional misuse
Which of the following should be included in a company email privacy policy?
-Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization -Statement discouraging sending junk email or spam to anyone who doesn't want to receive it -Statement informing users that the organization has no control over email once it has been transmitted outside the organization
Which of the below should be included in a company email privacy policy?
-Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization. -Statement discouraging sending junk email or spam to anyone who doesn't want to receive it. -Statement informing users that the organization has no control over email once it has been transmitted outside the organization
Which of the following allows a user to access the Internet?
-Dial-up connection -Cable -T1 line
Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as __________.
-Editor -Subject matter expert -Reader (all of the above)
Which of the following occurs when everyone involved in sourcing, producing, and delivering the company's product works with the same information?
-Eliminates redundancies -Cuts down wasted time -Removes misinformation
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?
-Employees copying and distributing company-owned software -Employees searching other employees' private information without consent -Employees intentionally creating or spreading viruses to confuse IT
What can unified communications merge?
-IMing -Videoconferencing -Voice mail
What is a feature of IPTV?
-IPTV uses low bandwidth. -IPTV offers personalization. -IPTV supports multiple devices.
A smart card is a device, the size of a credit card, that contains embedded technology that stores information and small amounts of software and can act as __________________?
-Identification instruments -A form of digital cash -A data storage device
Which of the following is an organizational result from an effective and efficient supply chain management system?
-Increase efficiencies while seeking a competitive advantage through cost leadership. -Decrease the power of its buyers. -Create entry barriers, thereby reducing the threat of new entrants. (all of the above)
What can effective and efficient supply chain management systems enable an organization to accomplish?
-Increase its supplier power. -Increase the power of its buyers. -Increase switching costs to increase the threat of substitute products or services. (all of the above)
Which of the following is a common Internet monitoring technology?
-Key logger -Hardware key logger -Cookie
Which of the following is a cost of downtime in addition to lost revenue?
-Legal expenses -Loss in financial performance -Damage to reputation
Which of the following is experiencing rapid growth due to wireless technology?
-RFID -GPS -GIS
Which of the following is an example of a way to maintain information security that a company should include in its information security policies?
-Requiring computer users to log off before leaving for lunch -Never sharing user or password information with anyone -Changing passwords every 30 to 60 days
What is the most secure type of authentication?
-Something the user knows such as a user ID and password -Something the user has such as a smart card or token -Something that is part of the user such as a fingerprint or voice signature
The most secure procedures combine which of the following authentication and authorization techniques?
-Something the user knows, such as a user ID and password -Something the user has, such as a smart card or token -Something that is part of the user, such as a fingerprint or voice signature
Michael Porter defined the Five-Forces Model and the potential pressures that can hurt sales. Which of the following is not one of the potential pressures that can hurt sales?
-Substitute products can steal customers. -New market entrants can steal potential investment capital. - Suppliers can drive down profits by charging more for supplies. (all of the above)
What can encryption technology perform?
-Switch the order of characters -Replace characters with other characters -Insert or remove characters
Which of the following offers an example of a WAN?
-The Internet -Microsoft's main campus in Washington -The city of Denver's court and police departments
What is a benefit of network convergence?
-The weaving together of voice, data, and video -Multiple services offered from a single vendor -Multiple devices supported by one provider
Which of the following would you find in a typical Internet use policy?
-User ramifications if the policy is violated -User responsibility for properly handling offensive material -User responsibility for protecting the company's good name
What are critical questions that managers should ask when determining the cost of downtime?
-What is the productivity cost associated with each hour of downtime? -How many transactions can the company afford to lose without significantly harming business?
Which of the following is an issue related to the waterfall methodology?
. Flaws in accurately defining and articulating the business problem B. Managing costs, resources, and time constraints C. Assumes users can specify all business requirements in advance D. All of the above*
How many days is a typical sprint in the Scrum methodology?
30 days
How many days is a typical sprint in the scrum methodology?
30 days
Which of the following represents the estimated percentage that spam accounts for in an organizations' email traffic?
40 to 60 percent
How long does a product's entire life cycle last today?
40 weeks
One comparison of the life expectancy of electronic devices is the analogy that one human year is equivalent to ________ years of technological advancements?
7
Currently, what percent of ewaste in the United States is not recycled?
80 percent
ERP, the heart
: ERP systems provide a foundation for collaboration between departments, enabling people in different business areas to communicate. The heart of an ERP system is a central database that collects info from and feeds info into all the ERP system's individual application components supporting diverse business functions such as accounting, manufacturing, marketing, and human resources. When info is updated in module, it is updated in all others throughout the entire system.
What is failover?
A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Which policy details the extent to which email messages may be read by others?
Email privacy policy
Bonnie Flat is a real estate agent who specializes in the luxury home market in Seattle, WA area. Bonnie is highly-technical and uses many types of online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of
A banner ad
Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using?
A banner ad
Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington, area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using?
A banner ad
What is an open system?
A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
What is the difference between a business model and an ebusiness model?
A business model details how a company creates, delivers, and generates revenue. An ebusiness model does all of the same except on the Internet.
What is a pure-play business?
A business that operates only on the Internet without a physical store.
A change control board (CCB) that is responsible for approving or rejecting all change requests.
A change control board (CCB) that is responsible for approving or rejecting all change requests.
What is a network?
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
What is Mozilla Firefox?
A competitor to Internet Explorer.
What is fault tolerance?
A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
Which of the following is correct in reference to a database?
A database can support many logical views.
Which of the following types of information can be found in a database?
A database maintains information on inventory, transactions, and employees.
What is a VPN?
A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server
What is a dividend?
A distribution of earnings to shareholders
What is a project charter?
A document issued by the project initiator or sponsor that formally authorizes the existence of a project and provides the project manager with the authority to apply organizational resources to project activities
What is a competitive advantage?
A feature of a product or service on which customers place a greater value than they do on similar offerings from competitors.
What is a primary key?
A field (or group of fields) that uniquely identifies a given entity in a table
What is a project milestone?
A key date by which a certain group of activities must be performed.
Which of the following clauses is typically contained in an acceptable use policy?
A nonrepudiation clause
What is a dimension?
A particular attribute of information.
What is a foreign key?
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables
What is a SOA service?
A simple business task
Which of the following delivers electricity using two-way digital technology?
A smart grid
Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?
A social media policy
What is COTS?
A software package or solution that is purchased to support one or more business functions and information systems
What is a business process?
A standardized set of activities that accomplish a specific task, such as processing a customer's order.
Computers in United States account for 1 percent of the total energy needs of the entire country. This is roughly equal to the total energy needs of ______________?
A state such as Mississippi
Which of the following includes a common reason why change occurs?
A. A misunderstanding of the initial scope B. Shifts in planned technology that force unexpected and significant changes to the business C. An omission in defining initial scope D. All of the above*
Which of the following describes ETL?
A. A process that extracts information from internal and external databases B. A process that transforms information using a common set of enterprise definitions C. A process that loads information into a data warehouse D. All of the above
Which of the following is a phase in the SDLC?
A. Analysis B. Design C. Testing D. All of the above*
Which of the following should an organization consider during the buy vs. build decision?
A. Are there any currently available products that fit the organizations needs B. Can the organization customize or modify an existing COTS to fit its needs C. Is there a justification to purchase or develop based on the cost of acquisition D. All of the above*
Which act strengthened criminal laws against identity theft?
A. Bork Bill B. Sarbanes-Oxley Act C. Cable Communications Act D. None of the above*
What can a model accomplish?
A. Calculate risks B. Understand uncertainty C. Manipulate time D. All of the above A model can do all of the above.
Which of the following is a type of collaboration system?
A. Content management system B. Groupware system C. Knowledge management system D. All of the above*
What made-to-order views can analytical CRM tools slice-and-dice customer information into?
A. Customer value B. Customer spending C. Customer segmentation D. All of the above
Which of the following is a business-related consequence of failing software?
A. Decrease productivity B. Damage to brand reputation C. Incur liabilities D. All of the above*
Which of the following describes ERP systems?
All of these: ERP systems provide a foundation for collaboration between departments. ERP systems enable people in different business areas to communicate. ERP systems have been widely adopted in large organizations to store critical knowledge used to make the decisions that drive the organization's performance.
Which of the following is one of the four categories of costs associated with downtime?
All of these: Financial performance Revenue Damaged reputation
Which of the following is a benefit an organization can receive from outsourcing?
All of these: Financial savings Increased technical abilities Market agility
Which of the following is one of the 21st-century organizational trends on the business side?
All of these: Focus on improved business resiliency via the application of enhanced security. Emphasis on strategic analysis for cost reduction and productivity enhancement. Uncertainty in terms of future business scenarios and economic outlooks.
Which of the following is a benefit a business can receive by deploying the latest in security technology?
All of these: Greater advances in administration Fewer disruptions to organizational systems Increased productivity of employees
What is the name of a company's internal MIS department?
All of these: Management information systems (MIS) Information systems (IS) Information technology (IT)
How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking?
All of these: Mcommerce Mbusiness Mobile business
MIS is a business function. Which of the following does MIS perform to help aid the company in decision making and problem solving?
All of these: Moves information about people. Moves information about processes across the company to improve systems. Moves information about products.
Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?
All of these: Only authorized individuals can gain access to the network. Individuals cannot understand or alter information while in transit. Only authorized individuals can access applications for which they are entitled.
Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers?
All of these: Organization agility Instantaneous business response A focus on core competencies and processes
What is a potential problem or impact of technology dependence?
All of these: Outages create potentially great havoc for people, businesses, and educational institutions that rely heavily on technology. Many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills and could stunt psychological growth. How do people or businesses function if the connection is down?
Which of the following are the influential driver(s) affecting the growth of outsourcing markets?
All of these: Rapid growth Core competencies Industry changes
What is the most secure type of authentication?
All of these: Something the user knows such as a user ID and password Something the user has such as a smart card or token Something that is part of the user such as a fingerprint or voice signature
What is the primary difference between the different types of backup/recovery media?
All of these: Speed Cost Expense
Which of the following can be completed by encryption?
All of these: Switch the order of characters Replace characters with other characters Use a mathematical formula to convert the information into some sort of code
What is recovery?
All of these: The ability to get a system up and running in the event of a system crash The ability to get a system up and running in the event of a system failure Restoring the information backup
What does the disaster recovery cost curve chart(s)?
All of these: The cost to the organization of the unavailability of technology The cost to the organization of recovering from a disaster over time The cost to the organization of the unavailability of information
Which of the following represents market basket analysis?
All of these: Analyzes website information Analyzes checkout scanner information Detects customers' buying behavior
What can analytical CRM modeling tools discover?
All of these: Identify opportunities for expanding customer relationships. Identify opportunities for cross-selling. Identify opportunities for up-selling.
Which of the following is not included in the four quadrants of ethical and legal behavior?
All of these: Legal behavior and ethical behavior Illegal behavior and ethical behavior Legal behavior and unethical behavior
Which of the following activities does a CIO perform?
All of these: Oversees all uses of information technology. Ensures the strategic alignment of IT with business goals. Ensures the strategic alignment of IT with business objectives.
Web-based Self Service Systems
Allows customers to use the web to find answers to their questions or solutions to their problems.
What is an integration?
Allows separate systems to communicate directly with each other
What does the average company spend on production needs?
Almost 50 percent of every dollar that it earns
What is a backup?
An exact copy of a system's information
What is a project manager?
An individual who is an expert in project planning and management.
What is a project management office (PMO)?
An internal department that oversees all organizational projects.
What is a schedule feasibility study?
Assesses the likelihood that all potential time frames and completion dates will be met
What reveals the degree to which variables are related and the nature and frequency of these relationships in the information?
Association detection
Which of the following defines the relationship between variables along with the nature and frequency of the relationship?
Association detection
What is the difference between asynchronous and synchronous communication?
Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.
What is the continuous process improvement model?
Attempts to understand and measure the current process, and make performance improvements accordingly.
In the relational database model, what are characteristics or properties of an entity?
Attribute
In the relational database model, what is a characteristic or property of an entity?
Attribute
What is a method for confirming users' identities?
Authentication
Which of the following represents the three areas where technology can aid in the defense against attacks?
Authentication and authorization, prevention and resistance, detection and response
Which of the following represents the three areas where technology can aid in the defense against information security attacks?
Authentication and authorization, prevention and resistance, detection and response
What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?
Authorization
What is the top CRM business driver?
Automation/productivity/efficiency
Which of the following is not contributing to ewaste?
Automobile
What is the DARPA grand challenge?
Autonomous ground vehicle field test
What addresses the time frames when systems can be accessed by employees, customers, and partners?
Availability
Which of the following is not a key factor an organization should consider when contemplating the buy vs. build decision?
Availability of CASE tools
Which of the following is a common customer service CRM metric?
Average time to resolution
What takes information entered into a given system and sends it automatically to all upstream systems and processes?
Backward integration
What occurs when a primary machine recovers and resumes operations, taking over from a secondary server?
Failback
Which of the following represents businesses buying from and selling to each other over the Internet?
B2B
Carfax is an example of a company that sells its products or services directly to its consumers online. Which ebusiness model is Carfax using?
B2C
Which category below represents the three common forms of business operations, brick-and-mortar, click-and-mortar, and pure play?
B2C
What is the difference between a B2C and a C2B?
B2C focuses on business to consumers, and C2B focuses on consumers to business.
The balanced scorecard was developed by Drs. Robert Kaplan of the Harvard Business School and David Norton. Which systems does the balanced scorecard measure?
BPR and ERP
Which of the following are all common forms of viruses?
Backdoor program, worm, Trojan-horse viruses
Which is a virus that opens a way into the network for future attacks?
Backdoor programs
Which characteristics support an information MIS infrastructure?
Backup and recovery plan, disaster recovery plan, business continuity plan
Each year, businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures.
Backup and recovery plans Fault tolerance Failover
Which of the following describes the difference between a backup plan and a recovery plan?
Backup is an exact copy of a system's information; recovery is the ability to get a system up and running in the event of a system crash or failure.
Which of the following represents the primary elements in an information MIS infrastructure?
Backup, recovery, disaster recovery, and business continuity planning
What question can be answered using info?
Best selling product, best customer, worst selling product
Cheryl is the operations manager for Nature's Bread Company, which specializes in providing natural products for health conscience individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of knowledge that Cheryl would be using to successfully perform her job.
Best-selling product changes when Tony the best banker is working.
Which of the following is the most uncommon reason why companies outsource?
Better manage the costs of internal processes.
Where do organizations typically place firewalls?
Between the server and the Internet
What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?
Black-hat hacker
Who breaks into other people's computer systems and just looks around or steals and destroys information?
Black-hat hacker
Which of the following is the correct list of the six different types of hackers listed in your text?
Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
What is an online journal that allows users to post their own opinions, comments, graphics, and video?
Blog or web log
Which of the following identifies Business 2.0 communication and collaboration tools?
Blogs, wikis, mashups
The ___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.
Bork
Contacted customers regardless of their opt-out or opt-in decision
Bork Bill
Automating a business process that contains _____ or____ will magnify or amplify these problems if they are not corrected first
Bottlenecks;redundancies
Where is the position of IT infrastructure within the organization?
Bottom
What is a business that operates in a physical store without an Internet presence?
Brick-and-mortar business
What are the three primary models that a B2C business can use to operate?
Brick-and-mortar, click-and-mortar, virtual
What are the three primary models that a B2C can use to operate?
Brick-and-mortar, click-and-mortar, virtual
Which company experienced difficulty with answering their call center phone?
Brother International Corporation
Lands' End created an organization wide data warehouse so all its employees could access organizational information. Lands' End soon found out that there could be "too much of a good thing." Many of its employees would not use the data warehouse because it was simply too big, too complicated, and had too much irrelevant information. Lands' End knew there was valuable information in its data warehouse, and it had to find a way for its employees to easily access the information. What was Lands' End solution?
Build a data mart
Broad functions of a CIO include all of the following, except:
Building and maintaining strong customer processes
An API is a set of routines, protocols, and tools for
Building software applications
A company's internal wiki can be a great tool for all of the following except:
Building software applications.
What is it called when distorted product demand information passes from one entity to the next throughout the supply chain?
Bullwhip effect
What is it called when distorted product-demand information ripples from one partner to the next throughout the supply chain?
Bullwhip effect
What is the size of the internal electrical pathway along which signals are sent from one part of the computer to another?
Bus width
ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.
Business
What are collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project. Wikipedia, one of the largest online collaboration websites, is a good example.
Business Wiki
What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption?
Business continuity planning
What is a more comprehensive and all-encompassing plan that details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.
Business continuity planning
25. According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
C. Informed, consent
John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that the airline tix are far more expensive than they had anticipated. They decide to try to find cheaper tix on Priceline where they are allowed to set their own price they are willing to pay for the airline tix. What form of ebusiness model are John and Jenny using?
C2B
What is the ebusiness model that applies to customers offering goods and services to each other over the Internet?
C2C
Which act imposes limitations and penalties on businesses sending unsolicited email to consumers?
CAN-SPAM Act
Who is responsible for collecting, maintaining, and distributing the organizational knowledge?
CKO
Which ebusiness tool plays a crucial role in getting website visitors to view more than just the home page by providing clear navigation choices?
CMS
Who is responsible for ensuring the ethical and legal use of information within an organization?
CPO
Which application's primary business benefits include sales forecasts, sales strategies, and marketing campaigns?
CRM
Which of the following is a component ERP vendors offer to differentiate themselves in the marketplace?
CRM
What is an organization performing when it asks questions such as, "Which customers are at risk of leaving"?
CRM predicting technologies
Which of the following statements is incorrect?
CRM predicting technologies help organizations identify their customers across other applications.
What helps an organization identify its customers across applications?
CRM reporting technologies
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
CSO
Which of the following is not one of the six principles for ethical information management according to CIO magazine?
D. The CIO is responsible for how outsiders view and analyze corporate information
Which of the following offers a low-speed and low-cost backup method?
DVD Thumb drive External hard drive
_________ models represent a formal way to express data relationships to a database management system (DBMS).
Data
What is a facility used to house management information systems and associated components, such as telecommunications and storage systems?
Data center
What is a variable?
Data characteristic that stands for a value that changes or varies over time.
What compiles all of the metadata about the data elements in the data model?
Data dictionary
What is the smallest or basic unit of information?
Data element
What is the overall management of the availability, usability, integrity, and security of company data?
Data governance
Which of the following occurs when the same data element has different values?
Data inconsistency issue
Which of the following contains a subset of data warehouse information?
Data mart
What is the ultimate outcome of a data warehouse?
Data marts
What is the process of analyzing data to extract information not offered by the raw data alone?
Data mining
What is a logical data structure that details the relationship among data elements using graphics or pictures?
Data model
What determines the accuracy and completeness of organizational data?
Data quality audit
What is the primary problem most organizations face today concerning information?
Data rich, information poor
What are the primary differences between a data warehouse and a data mart?
Data warehouses have a more organizationwide focus; data marts have functional focus
What is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database?
Data-driven website
What type of website is best to build for a continually changing information, including press releases, new product information, and updated pricing?
Data-driven website
What type of website is best to build for a website with continually changing information including press releases, new product information, and updated pricing?
Data-driven website
Which of the following uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?
Data-mining tools
What is at the heart of any ERP system?
Database
What maintains information about various types of objects, events, people, and places?
Database
Which of the following is not one of the primary information technology areas on which organizations are focusing?
Database
Which of the following is not one of the primary information technology areas where organizations are focusing?
Database
Which of the following creates, reads, updates, and deletes data in a database while controlling access and security?
Database management system
What stores documents in a central location and automatically asks the team members to access the document when it is their turn to edit the document?
Database-based workflow system
What is the physical view of information?
Deals with the physical storage of information on a storage device such as a hard disk
Which of the following is not part of a typical SOA solution?
Decrease people productivity with better business integration
Which of the following is not an example of an advantage of using a relational database?
Decreased information security
Where would you categorize the cloud computing benefits that include decreases in hardware, maintenance costs, and software upgrades?
Decreased maintenance issues
What is project scope?
Defines the work that must be completed to deliver a product with the specified features and functions
Project ______________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project
Deliverables
Project ______________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
Deliverables
As the product manager for the eatery division of Whole Foods, Jerry is responsible for analyzing sales data to help him manage his team. Today Jerry is analyzing his data by looking at details, and details of details of info. Which of the following common digital dashboard capabilities is Jerry using to analyze his department's success?
Drill-down
What is the computer attack where an attacker accesses a wireless computer network, incepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
Drive-by-hacking
When does information cleansing occur in the data warehouse?
During the ETL process and once it is in the data warehouse
An MIS infrastructure is ___________ and ____________.
Dynamic and continually changing
Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?
EIS, DSS, TPS
Which application's primary business benefits include forecasting, planning, purchasing, material management, warehousing, inventory, and distribution?
ERP
The evolution of ERP
ERP has grown to become part of the extended enterprise.
Which of the following is not an additional benefit of virtualization?
Ease of use for customer relationship management systems
Which of the following is the result of BI that it is no longer required to have a PhD in statistics to get sophisticated analytics delivered to users' fingertips?
Easily manipulated
What is a plan that details how a company creates, delivers, and generates revenues on the Internet?
Ebusiness model
What is the difference between ecommerce and ebusiness?
Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations
. A(n) _________ feasibility study identifies the financial benefits and costs associated with the systems development project.
Economic
All of the following are types of information security breaches except?
Ediscovery
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
Ediscovery
According to Peter Drucker, what are managers who do things right addressing?
Efficiency
A common mistake that many managers tend to make is focusing on only one type of metrics because they are easier to measure. Which type of metrics do they focus on?
Efficiency MIS metrics
The government has taken an active role online. Which of the following is the term that describes the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between government and the citizen-consumer within all the branches of government?
Egovernment
Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.
Elaboration
Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it?
Elaboration
Which gate in the RUP methodology provides a rough order of magnitude?
Elaboration Elaboration provides a rough order of magnitude.
The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
Electronic
What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?
Electronic tagging
What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?
Elevation of privilege
. A(n)____________ privacy policy details the extent to which email messages may be read by others
Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone?
Which of the following policies details the extent to which email messages may be read by others?
Email privacy policy
CRM is a technology based on the premise that those organizations that understand the needs of individual customers are best positioned to achieve sustainable competitive advantage in the future.
FALSE CRM is a business philosophy, not a technology, based on the premise that those organizations that understand the needs of individual customers are best positioned to achieve sustainable competitive advantage in the future.
Canada is considered a rookie outsourcing country.
FALSE Canada is considered a leader outsourcing country.
Extraction, transformation, and loading is a process that extracts information from internal databases, transforms the information using a common set of enterprise definitions, and loads the information into an external database.
FALSE Extraction, transformation, and loading is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse.
Ideally, an organization only wants to build forward integrations.
FALSE Ideally, an organization wants to build both forward and backward integrations.
Outsourcing is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems.
FALSE Insourcing is a common approach that uses the professional expertise within an organization to develop and maintain the organization's information technology systems
Insourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
FALSE Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
Preventing liabilities is a business-related consequence of failed software.
FALSE Preventing liabilities is a business-related consequence of successful software.
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
FALSE Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Project milestones are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
FALSE Project deliverables are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project
Project deliverables represent key dates when a certain group of activities must be performed.
FALSE Project milestones represent key dates when a certain group of activities must be performed.
Provide training for the system users typically occurs during the testing phase
FALSE Provide training for the system users typically occurs during the implementation phase.
Unstructured collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules.
FALSE Structured collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules.
Testing is the fourth phase in the SDLC.
FALSE Testing is the fifth phase in the SDLC.
The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $60 billion annually.
FALSE The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $600 billion annually.
38. The assess project feasibility activity typically occurs during the analysis phase.
FALSE The assess project feasibility activity typically occurs during the planning phase.
The data warehouse is a location for all of a business's information.
FALSE The data warehouse is not a location for all of a business's information.
The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
FALSE The development phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
The leaders, the newcomers, and the rookies are the three categories of outsourcing countries.
FALSE The leaders, the up-and-comers, and the rookies are the three categories of outsourcing countries.
The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its suppliers.
FALSE The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its customers.
The primary purpose of a data warehouse is to perform transactional processes.
FALSE The primary purpose of a data warehouse is to perform analytical process.
The relationship between the triple constraint variables is not dependent.
FALSE The relationship between the variables in the triple constraint is interdependent.
The three forms of BI include operational, tactical, and value-added.
FALSE The three forms of BI include operational, tactical, and strategic.
The triple constraint includes time, cost, and quality.
FALSE The triple constraint includes time, cost, and scope. All impact quality.
An information partnership is one in which an organization chooses to focus specifically on what it does best and forms partnerships and alliances with other specialist organizations to handle nonstrategic business processes.
FALSE This is the definition for core competency strategy, not information partnership.
Which of the below is not an ISP?
Which of the below is not an example of a social bookmarking website?
What are project assumptions?
Factors that are considered to be true, real, or certain without proof or demonstration
Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is prone to floods, high winds, and tornados. As the lead enterprise architect on the night shift, Shawn has been asked to suggest ways the company can protect its information MIS infrastructure. Shawn notices that the company does not have the ability for its systems to respond to unexpected failures or crashes, and there is no backup system that can automatically take over without a loss of serve to Boise residents. What should Shawn recommend his company implement?
Fault tolerance
___________ creep occurs when developers add extra features that were not part of the initial requirements.
Feature
What allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network?
File transfer protocol (FTP)
What involves preparing financial reports that provide information about the business's performance to external parties such as investors, creditors, and tax authorities?
Financial accounting
What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?
Firewall
Which of the following is a fundamental of the RAD methodology?
Focus initially on creating a prototype that looks and acts like the desired system B. Actively involve system users in the analysis, design, and development phases C. Accelerate collecting the business requirements through an interactive and iterative construction approach D. All of the above*
Broad differentiation, broad cost leadership, and _________ are the three generic strategies identified by Porter.
Focused strategy
What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keyword-based classification system?
Folksonomy
Which of the following is a form of statistical analysis?
Forecasting
What are the primary business benefits of an ERP system?
Forecasting, planning, purchasing, material management, warehousing, inventory, and distribution.
_______ are predictions made on the basis of time-series information.
Forecasts
What takes information entered into a given system and sends it automatically to all downstream systems and processes?
Forward integration
Which social media site uses LBS?
Foursquare
The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.
Freedom
hich act allows any person to examine government records unless it would cause an invasion of privacy?
Freedom of Information Act
What is the term that identifies how frequently a customer purchases items?
Frequency
Which of the following are examples of analytical information?
Future growth analysis, sales projections, and product statistics
__________ logic is a mathematical method of handling imprecise or subjective
Fuzzy
What is the ability to model the information system screens for an entire system using icons, buttons, menus, and submenus?
GUI screen design
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents the threat of substitute products or services in the music industry?
Game systems like Wii and social networks like Facebook.
A(n) __________ chart is a simple bar chart that depicts project tasks against a calendar.
Gantt
What is a simple bar chart that depicts project tasks against a calendar?
Gantt chart
What is included in feedback for a car's system
Gas
What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?
Genetic algorithm
What is the definition of geoeconomic?
Geographic and economic business challenges
_________ seeking analysis could answer the question "How many customers are required to purchase our new product line to increase gross profits to $5 million?"
Goal
What finds the inputs necessary to achieve a goal, such as a desired level of output?
Goal-seeking analysis
Executives of a company deal less with details of the operational activities and deal more with the higher meaningful aggregations of info or "courser" info. What refers to the level of detail in the model?
Granularity
Jessica started her own online company, which specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate, ensuring the best possible experience for her customers. Which of the following is a critical component in Jessica's MIS infrastructure?
Hardware and software Client Server
What is the difference between hardware and software?
Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks.
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
Hardware key logger
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
Hardware key logger
Which of the following database structures stores information in a tree-like structure that allows repeating information using parent/child relationships, in such a way that it cannot have too many relationships?
Hierarchical database
Which type of metric measures when a visitor reaches a website and their computer sends a request to the site's computer server to begin displaying pages?
Hit metric
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
Hoaxes
Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
Hot Site
Within the sites that support disaster recovery, ____ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
Hot site
What are areas around access points where users can connect to the Internet via wi-fi?
Hotspots
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
Hourly
Artificial intelligence simulates ______________ intelligence such as the ability to reason and learn.
Human
What is the Internet protocol web browsers use to request and display web pages using universal resource locators?
Hypertext markup language (HTML)
What is true about IT and business?
IT enables business success and motivation
Which of the following is not included as an information cleansing activity?
Identifies sales trends
What is an economic feasibility study?
Identifies the financial benefits and costs associated with the systems development project
What are the four challenges facing ebusinesses outlined in the text?
Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules.
What is forging of someone's identity for the purpose of fraud?
Identity theft
Which of the following is not a CRM industry best practice?
Implement in the big bang approach
The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.
Implementation
The systems development life cycle is the overall process for developing information systems from planning and analysis through _________________ and maintenance.
Implementation
What is phased implementation?
Implementing the new system in phases until it is evident that the new system performs correctly and then implementing the remaining phases of the new system
Which of the following is true in regards to the elimination of redundant information?
Improves information quality
Which of the following is true with regard to the elimination of redundant data?
Improves information quality
Which of the following is true in regard to eliminating redundant information?
Improves information quality.
What is one simplification that has occurred with Business 2.0?
Improving access to information.
What reports operating results (revenues minus expenses) for a given time period ending at a specified date?
Income Statement
What do most companies measure to determine the success of their websites?
Traffic
Kevin Campbell is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses and he also needs to purchase a rather expensive laptop. In an effort to save money, Kevin begins a Facebook group to find other college students who need to purchase laptops. Soon, Kevin's FB group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops?
Increasing buying power
Which of the following is not an advantage of a data-driven website?
Increasing update costs
All of the following are countries expected to have the largest increases in population between 2000 and 2050, except:
India
Which of the following represents the different information formats?
Individual, department, enterprise
Which of the following represents the different information levels?
Individual, department, enterprise
Which of the following is an example of acting ethically?
Individuals copy, use, and distribute software. B. Employees search organizational databases for sensitive corporate and personal information. C. Individuals hack into computer systems to steal proprietary information. D. None of the above.*
What refers to the depth and breadth of details contained in a piece of textual, graphic, audio or video?
Info richness
A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of __________.
Information
A decision support system models __________ to support managers and business professionals during the decision-making process.
Information
The __________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured.
Information
Francis works in the human resources division of a large oil and gas company in Texas. Francis's tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis?
Information MIS infrastructure
Which of the following include the three section titles of an MIS infrastructure?
Information MIS, agile MIS, and sustainable MIS infrastructures
Which of the following is the most commonly outsourced service?
Information Technology
What is a framework provided by the government of the United Kingdom and offers eight sets of management procedures?
Information Technology Infrastructure Library
What is the set of ideas about how all information in a given context should be organized?
Information architecture
Which of the following governs the ethical and moral issues arising from the development and use of information technologies and the creation, collection, duplication, distribution, and processing of information?
Information ethics
What is the method or system of government for information management or control?
Information governance
Which of the following refers to the extent of detail within the information?
Information granularity
Which of the following is incorrect in reference to a database?
Information is accessed by physical structure
A relational database contains information in a series of two-dimensional tables. How is data contained in a data warehouse and data mart?
Information is multidimensional, meaning it contains layers of columns and rows.
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring it has the types of data or information required to function and grow effectively?
Information management
What is it called when two or more organizations cooperate by integrating their IT systems, thereby providing customers with the best of what each can offer?
Information partnership
Which of the following is true in regards to the United States?
Information privacy is not highly legislated nor regulated
According to the text, Visa created a program called Innovant. What was the primary purpose for Innovant?
Information privacy policy
Which policy contains general principles regarding information privacy?
Information privacy policy
What measures the number of people a firm can communicate with all over the world?
Information reach
What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video?
Information richness
Which of the following statements is inaccurate?
Most organizations invest in backward integrations only
Which of the below is not a characteristic associated with Mozilla's Firefox?
Mozilla's Firefox is a prime example of a reputation system.
What in the cloud means that a single instance of a system serves multiple customers?
Multi-tenancy
___________ is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.
Multisourcing
What must you do with antivirus software to make it protect effectively?
Must frequently update it to protect against viruses
When applying Porter's three generic strategies, Tiffany & Co. has a competitive scope and cost strategy that is a __________.
Narrow market, high cost strategy.
What first ever national appointment was made by President Barack Obama?
National Chief Technology Officer
Which of the following is not a reason to increase market share?
Nearing production capacity
___________ outsourcing refers to contracting an outsourcing arrangement with a company in a nearby country.
Nearshore
What is contracting an outsourcing arrangement with a company in a nearby country?
Nearshore outsourcing
What are the 5 different networking elements creating a connected world?
Network categories, network providers, network protocols, network convergence and network access technologies
What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures?
Network convergence
Which of the following database structures offers a flexible way of representing objects and their relationships?
Network database
What describes how products in a network increase in value to users as the number of users increase?
Network effect
What is a category of AI that attempts to emulate the way the human brain works
Neural network
Which of the following countries is considered a rookie in the outsourcing industry?
New Zealand
Which of the following reflects Moore's Law?
New generations of chips deliver double the processing power as the previous generation
Which of the following is similar to focused strategy versus broad strategy?
Niche market versus large market.
Which handset-maker estimates at least 20 percent of its 68,000 employees use wiki pages to update schedules, project status, trade ideas, and edit files?
Nokia
Businesses typically outsource their ___________ business functions, such as payroll and IT.
Noncore
Which activity is performed during the implementation phase?
None of the above Write detailed user documentation, determine implementation method, and provide training for the system users are the activities performed during the implementation phase.
What is the policy that contains general principles to guide computer user behavior?
None of these
Which of the following authentication methods is 100 percent accurate?
None of these
Which act strengthened criminal laws governing identity theft?
None of these Bork Bill Sarbanes-Oxley Act Cable Communications Act
Which of the following is not considered a type of biometrics?
None of these voice face iris
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
Nonrepudiation
Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a customer their 100th cup of coffee they receive a pound of free coffee of their choice. What is Callie attempting to create with her unique "Free Pound of Coffee" marketing program?
Reducing buyer power with a loyalty program
What is network topology?
Refers to the geometric arrangement of the actual physical organization of the computers (and other network devices) in a network
____________ testing is performed after making a functional improvement or repair to the system to determine if the change has affected (or impacted) the other functional aspects of the software.
Regression
What occurs when steps are added to the value chain as new players find ways to add value to the business process?
Reintermediation
What uses the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways?
Reintermediation
A change control board is responsible for approving or ____________ all change requests.
Rejecting
Which of the following systems allow users to create, read, update, and delete data in a relational database?
Relational database management system
What are rules that enforce basic and fundamental information-based constraints?
Relational integrity constraint
What are the rules that enforce basic and fundamental information-based constraints?
Relational integrity constraint
What type of integrity constraint does not allow someone to create an order for a nonexistent customer?
Relational integrity constraint
Which of the following is the result of BI that implies that the data have been documented as the certified or approved data for the enterprise?
Reliable
What are the three phases in the evolution of CRM?
Reporting, analyzing, predicting
What is a challenge for cloud computing that could cause employee performance to decrease?
Required Internet connectivity
What contains the final set of business requirements, prioritized in order of business importance?
Requirements definition document
A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?
Researching products to find the lowest price and visiting the store to purchase the item.
Which of the following is a performed by a CCB?
Responsible for approving or rejecting all change requests
What types of BI decisions include predicting sales, determining correct inventory levels and distribution schedules among outlets, and loss prevention?
Retail and sales BI decisions
What types of BI decisions include predicting sales, determining correct inventory levels, and distribution schedules among outlets, and loss prevention?
Retail and sales BI decisions
What refers to the amount earned resulting from the delivery or manufacture of a product or from the rendering of a service?
Revenue
Which company offers a strategic business information service using artificial intelligence that enables organizations to track the product offering, pricing policies, and promotions of online competitors?
RivalWatch
Which application's primary business benefits include market demand, resource and capacity constraints, and real-time scheduling?
SCM
Which of the following is not a primary form of agile methodology?
SDLC
What are the two main methods for encrypting network traffic on the web?
SSL and SHTTP
Which of the following was one of the first CRM components built to address the issues that sales representatives were struggling with the overwhelming amount of customer account information they were required to maintain and track?
Sales force automation system
What automates each phase of the sales process, helping individual sales representatives coordinate and organize all of their accounts?
Sales management CRM systems
___________ achieved great success by managing information.
Samsung Electronics
________________ achieved great success by managing information, while _________ was unsuccessful at managing information.
Samsung Electronics, Staples
What refers to how well a system can adapt to increased demands of growth?
Scalability
What refers to how well a system can adapt to increased demands?
Scalability
Which of the following is not one of the four changes resulting from advances in information technology that are driving supply chains?
Scalability
Project _________ defines the work that must be completed to deliver a product with the specified features and functions.
Scope
Time, cost, and ___________ are the three primary variables in any project.
Scope
____________ creep occurs when the scope of the project increases.
Scope
Instant messaging is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet.
TRUE Instant messaging is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet.
Multisourcing is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.
TRUE Multisourcing is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.
Offshore outsourcing is using organizations from developing countries to write code and develop systems.
TRUE Offshore outsourcing is using organizations from developing countries to write code and develop systems.
PMI stands for The Project Management Institute.
TRUE PMI stands for The Project Management Institute.
Parallel implementation uses both the old and new systems until it is evident that the new system performs correctly.
TRUE Parallel implementation uses both the old and new systems until it is evident that the new system performs correctly.
antifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits.
TRUE Quantifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits.
The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
TRUE The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
TRUE This is the definition of employee monitoring policies.
Ethical computer use policy contains general principles to guide computer user behavior.
TRUE This is the definition of ethical computer use policy.
Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.
TRUE This is the definition of opt-in.
Project management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.
TRUE This is the definition of project management.
Traditional business risk models typically ignored software development, largely because most organizations considered the impact from software and software development on the business to be minor.
TRUE Traditional business risk models typically ignored software development, largely because most organizations considered the impact from software and software development on the business to be minor.
___________ knowledge is contained in people's heads.
Tacit
What is the knowledge contained in people's heads?
Tacit knowledge
What is the type of knowledge that is contained in people's heads?
Tacit knowledge
Which form of BI uses the time frame of days to weeks to months?
Tactical BI
Which type of BI conducts short-term analysis to achieve strategic goals?
Tactical BI
What is a forward integration?
Takes information entered into a given system and sends it automatically to all downstream systems and processes
What is a backward integration?
Takes information entered into a given system and sends it automatically to all upstream systems and processes
Which of the following is the primary reason why companies outsource?
Tap outside sources of expertise.
What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
Taxonomy
Which of the following is the least important skill for an IT executive to possess?
Technical
Which of the below is not a characteristic of Business 2.0?
Technical skills are required
Cell phone manufacturers often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?
Technology platform
What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements?
Technology recovery strategy
Which of the following are the principle BI enablers?
Technology, people, and corporate culture
Which of the following is one of the principle BI enablers?
Technology, people, and corporate culture
What is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations?
Telematics
Which of the following is not one of the primary principles an organization should follow for successful agile software development?
Test and deliver infrequently.
What are the detailed steps the system must perform along with the expected results of each step?
Test conditions
In which phase is it most expensive to make a system change?
Testing
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________?
The Company
On average, how many years longer does each generation live than the previous in the United States?
Three
How do the majority of potential customers find business websites?
Through search terms that match the content.
What are the different options where an emergency notification service can be deployed?
Through the firm's own infrastructure By an outside service provider on company premises By an outside service provider hosted remotely
Which trend has the following potential business impact?
Time is becoming one of the world's most precious commodities
What are the three primary variables (or triple constraints) in any project?
Time, cost, scope
When discovering trends and seasonal variations in transactional information, use a ________________ forecast to change the transactional information by units of time, such as transforming weekly information into monthly or seasonal information or hourly information and into daily information
Time-series
What is time-series information?
Time-stamped information collected at a particular frequency
Which of the following implies that information is current with respect to the business requirement?
Timeliness
Which of the following implies that information is current with respect to the business requirements?
Timeliness
What is the primary purpose of a data warehouse?
To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.
Paula Logston is the owner and operator of a high-end online custom clothing company. Paula has never heard of Porter's Five Forces Model and wants to understand why she would perform an analysis using it. If you were tasked with explaining Porter's Five Forces model to Paula what would be the primary reason she would want to use this type of analysis?
To help Paula evaluate the attractiveness of the clothing industry.
Why is Noodles & Company using business intelligence?
To improve financial analysis.
Why is Ben & Jerry's using business intelligence?
To improve quality.
What is the purpose of business process reengineering?
To make all business processes the best-in-class.
A social bookmarking site is dedicated to providing all of the following except
To reconnect with colleagues for business progress
What is the primary reason a company has a failover system?
To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations
______is a small electronic device that changes user passwords automatically. The user enters his/her user ID and device displayed password to gain access to the network.
Tokens
Which activities do human resource components perform?
Track employee information including payroll, benefits, compensation, and performance assessment, and assume compliance with the legal requirements of multiple jurisdictions and tax authorities
Using the collective power of a community to identify and classify content significantly _________ content categorization costs.
lowers
Twitter is an example of a __________.
microblogging website
Systems development life cycle (SDLC)
overall process for developing info systems from planning and analysis through implementation and maintenance
Which of the following is an example of transactional information?
purchasing stock
eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called a(n) ____________.
reputation system
Which of the following represents a reason an organization might encounter low-quality information?
• Online customers intentionally enter inaccurate information to protect their privacy. • Different systems have different information-entry standards and formats. • Third-party and external information contains inaccuracies and errors.