2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Anne-Marie Cole runs the sales division for a local auto insurance firm. One of her key duties is to calculate her company's market share. When evaluating the prior year numbers, she found that her firm achieved total sales of $3 million and the entire industry had $30 million in sales. What is Anne-Marie's current market share?

10%

Which of the following represents sales force automation?

A system that automatically tracks all of the steps in the sales process

Which of the following is not an example of unplanned downtime?

A system upgrade

What is a project?

A temporary endeavor undertaken to create a unique product, service, or result.

What is trend analysis?

A trend is examined to identify its nature, causes, speed of development, and potential impacts

What is the primary difference between a worm and a virus?

A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer

Which of the following provides an accurate definition of systems thinking?

A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs, while continuously gathering feedback on each part.

What is the difference between a wiki and a blog?

A wiki user can alter the original content of an article, but a blog user can only add information as a comment.

What is the digital divide?

A worldwide gap giving advantage to those with access to technology

A(n) ____________ computer use policy contains general principles to guide computer user behavior

A(n) ____________ computer use policy contains general principles to guide computer user behavior

Which of the following does a project manager perform?

A. Defines and develops the project plan B. Tracks the plan to ensure all key project milestones are completed on time C. Expert in project planning and management D. All of the above*

Which of the following is a characteristic of a successful project?

A. Delivered on time B. Delivered within budget C. Meets the business's requirements D. All of the above*

Which of the following is an outsourcing challenge caused by contract length?

A. Difficulties in getting out of a contract B. Problems in foreseeing future issues C. Problems in reforming an internal IT department D. All of the above*

What is information redundancy?

A. Duplication of information B. Storing the same information in multiple places C. Storing duplicate information in multiple places D. All of the above

What categories should an organization evaluate when making an outsourcing decision?

A. Geopolitical risk B. English proficiency C. Salary cost D. All of the above*

Which activity is performed during the planning phase?

A. Identify and select the system for development B. Assess project feasibility C. Develop the project plan D. All of the above*

Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information?

A. Identify trends B. Make projections C. Decide key business issues D. All of the above

Which of the following can use BI to make informed decisions?

A. Law enforcement industry B. Airline industry C. Broadcasting industry D. All of the above*

Which of the following is a result of implementing business intelligence systems and tools allowing business users to receive data for analysis?

A. Reliable B. Understandable C. Easily Manipulated D. All of the above*

Which of the following is a quantitative model typically used by a DSS?

A. Sensitivity analysis B. What-if analysis C. Goal-seeking analysis D. All of the above A DSS can perform all of the above.

Which of the following represents operational CRM?

A. Supports traditional transactional processing B. Supports day-to-day front-office operations C. Supports operations that deal directly with the customers D. All of the above

Which of the following uses a DBMS to interact with a database?

A. Users of accounting programs B. Users of human resource programs C. Users of marketing programs D. All of the above

Which of the following is an evaluation criteria used to prioritize software development projects?

A. Value chain analysis B. Strategic alignment C. Resource availability D. All of the above*

An organization must identify what it wants to do and how it is going to do it. What does the "what" part of this question focus on?

A.Justification of the project B. Definition of the project C. Expected results of the project D. All of the above*

Universities were among some of the first users of the Internet. What was the Internet first called?

ARPANET

What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

Acceptable use policy

Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?

Acceptable use policy

Which policy typically contains a nonrepudiation clause?

Acceptable use policy

What are the seven characteristics of an agile MIS infrastructure?

Accessibility, availability, maintainability, portability, reliability, scalability, and usability

Which characteristics support an agile MIS infrastructure?

Accessibility, availability, maintainability, portability, reliability, scalability, usability

Which of the following is not one of the CRM business drivers?

Accountability

What analyzes the transactional information of the business so the owners and investors can make sound economic decisions?

Accounting

From the following list, which component would include a credit-management feature?

Accounting and finance components

Who are the primary users of ERP systems?

Accounting, finance, logistics, and production

Achieving perfect information is almost impossible. The more complete and accurate an organization wants its information to be, the more it costs. Which two variables are used to determine the trade-off for perfect information?

Accuracy versus completeness.

Which of the following lists include all of the five characteristics common to high-quality information?

Accuracy, completeness, consistency, timeliness, and uniqueness

Which of the following does not draw a parallel between the challenges in business and the challenges of war?

Accurate and complete information

The banking industry has implemented several competitive advantages including ATMs, online bill pay services, and electronic statements. Of course, these competitive advantages were quickly duplicated by any competitor that wanted to remain in the banking industry. These were examples of...

Acquiring new technology products and services

____________ maintenance makes changes to increase system functionality to meet new business requirements.

Adaptive

Which of the following is not a common type of test performed during system testing?

Adaptive testing

An organization processing personal data of a person living in the EU must comply with which of the following principles?

Adequate, relevant, and not excessive

Enterprise architects require ____access so they can perform such functions as resetting passwords or deleting accounts

Administrator

Enterprise architects require _____________ access so they can perform such functions as resetting passwords or deleting accounts?

Administrator access

Gina Brooks works for Aquarium Retail Services selling high-end saltwater fish and tank supplies. Aquarium Retail Services is the current market leader in Gina's city. Gina has recently been approached by Deep Blue Incorporated with an opportunity to run its corporate nationwide marketing and sales division. Gina decides to jump at the opportunity! Deep Blue is attempting to gain a competitive ________ by stealing its competitor's key employees.

Advantage

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?

Adware

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet

Adware

What type of revenue generation model is Google using when it generates revenue by allowing advertisers to bid on common search terms?

Adwords

The _________ methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirement.

Agile

The ____________ MIS infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation.

Agile

Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements?

Agile methodology

Which of the following are examples of transactional information?

Airline ticket, sales receipts, and packing slips

Which of the following represents the bus topology?

All devices are connected to a central cable or backbone.

Which of the following is a characteristic of information?

All of the above

Which of the following is one of the 21st century organizational trends on the business side?

All of the above

Which of the following is one of the new series of business success factors that are helping to determine marketplace winners?

All of the above

Which of the following represents a level of information within an organization?

All of the above

The structure of an organization is similar to a pyramid. The different levels require different types of info to assist with which of the following?

All of the above Decision making, problem solving, opportunity capturing

Online transaction processing (OLTP) is the capturing of transaction and event info using technology to ______

All of the above Update existing info to reflect new info Store the info Process the info according to defined business rules

What is the primary problem with redundant information?

All of the above: It is difficult to determine which values are the most current It is often inconsistent It is difficult to determine which values are the most accurate

Why do relational databases use primary keys and foreign keys?

All of the above: To create a database To create physical relationships To create logical relationships

Which of the following industries has technology changed the way business is performed?

All of the above: Travel Education Training

What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system?

All of the these: System virtualization Server virtualization Desktop virtualization

Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ______________.

All of these

Which of the below focuses on user-generated content?

All of these

Which of the following are challenges of Business 2.0?

All of these

Which of the following is an example of a disruptive technology?

All of these

Which of the following is a type of backup/recovery media?

All of these DVD Disk Tape

Which of the following does a firewall perform?

All of these Detects computers communicating with the Internet without approval Blocks messages without the correct markings from entering the network Examines each message that wants entrance to the network

Both individuals and organizations have embraced ebusiness to do which of the following?

All of these Maximize convenience. Improve communications. Enhance productivity.

Which application are employees most likely to use?

All of these SCM CRM ERP

Why is the global economy becoming more integrated?

All of these The Internet International outsourcing Relaxed borders in the European Union

Which of the following is a reason for the growth of the World Wide Web?

All of these Web pages being easy to create and flexible. Advancements in networking hardware. The microcomputer revolution.

Which of the following represents a form of disruptive technology?

All of these are included: Enters the marketplace at the low end. Is a new way of doing things that initially does not meet the needs of existing customers. Tends to open new markets and destroy old ones.

Which of the below represents an example of why an employer would use social media?

All of these.

What are some of the immediate results businesses found from using instant messaging?

All of these. Easily hold simultaneous IM sessions with multiple people. Resolve questions or problems immediately. Quickly identify which employees are at their computers.

Which of the following can be use BI to make informed decisions?

All of these: Airline industry Broadcasting industry Law enforcement industry

What are characteristics or properties of an entity called?

All of these: Attributes Fields Columns

Managing consumer trust is a challenge for ebusinesses. Which of the following is a good way to build trust when working with customers over the Internet?

All of these: Be accessible to communicate in-person. Be available to communicate in-person. Use customer testimonials that link to your client website.

Which of the following occurs during data cleansing?

All of these: Clean inaccurate data. Clean redundant records. Clean missing records.

What is the best way to measure a company's ebusiness success?

All of these: Clickstream data Interactivity Effective MIS metrics

Which of the following is one of the fundamental issues surrounding the struggle between Internet censorship and openness?

All of these: Controlling the conduits Filtering the flows Punishing the purveyors

Which of the following statements is true regarding customer information?

All of these: Customer information can exist in several operational systems. Customer information in each operational system could change. Customer information in each operational system can be different.

Which of the following was the original design for the Internet?

All of these: Display of static content Email Document exchange

Which of the following offers an example where Porter's five forces are mostly weak and competition is low?

An international hotel chain purchasing milk.

Planning, ___________, design, development, testing, implementation, and maintenance are the seven phases in the SDLC.

Analysis

The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.

Analysis

What is the second step in the SDLC?

Analysis

Which phase of the SDLC gathers business requirements?

Analysis

An organization must identify what it wants to do and how it is going to do it. What does the "how" part of this question focus on?

Analysis of project risks

What supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers?

Analytical CRM

What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks?

Analytical information

What encompasses all organizational information and its primary purpose is to support the performing of managerial analysis tasks?

Analytical information

What encompasses all organizational information where its primary purpose is to support the performing of managerial analysis tasks?

Analytical information

Which of the following encompasses all organizational information, where its primary purpose is to support the performing of managerial analysis tasks?

Analytical information

Which of the following is not considered an epolicy?

Anti-hacker use policy

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?

Anti-spam policy

When building a scalable system that can support new company developments what are the key factors to consider?

Anticipating expected and unexpected growth

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?

Antivirus software

What are project deliverables?

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

What is a project deliverable?

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

What is an asset?

Anything owned that has value or earning power

What is a program that runs within another application such as a website?

Applet

What does API stand for?

Application Programming Interface

The virtual assistant will be a small program stored on a PC or portable device that monitors all of the following, except:

Application processing

What verifies that all units of code work together and the total system satisfies all of its functional and operational requirements?

Application testing

Which of the following financial statements gives an accounting picture of property owned by a company and of claims against the property on a specific date?

Balance sheet

What types of BI decisions include forecasting levels of bad loans and fraudulent credit card use, credit card spending by new customers, and which kinds of customers will best respond to new loan offers?

Banking BI decisions

What is the name for a small ad on one website that advertises the products and services of another business, usually another dot-com business?

Banner Ad

Which of the following represents geographic segmentation?

Based on regional variables such as region, climate, population density, and population growth rate

Which of the following represents psychographic segmentation?

Based on variables such as usage rate, usage patterns, price sensitivity, and brand loyalty

Market __________ analysis analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predicts future behavior by identifying affinities among customers' choices of products and services.

Basket

Which of the following will enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?

Business critical integrity constraints

Management info Systems

Business function, like accounting and HR moves info about people, products, and processes across the company to problem solve.

What is information that people use to support their decision-making efforts?

Business intelligence

What is the activity of creating a detailed flow chart or process map of a work process showing its inputs, tasks, and activities, in a structured sequence?

Business process modeling

What represents the detailed set of knowledge worker requests that the system must meet in order to be successful?

Business requirements

What are the four global IT business management areas critical to running multinational companies?

Business strategies, enterprise architectures, information issues, systems development

Which of the following is a valid type of integrity constraint?

Business-critical integrity constraint

Sarah Schin was recently hired by Bank West as the Global Director of HR. Her job duties include determining employment policies as well as overseeing all the hiring, firing and training of employees. What type of process does Sarah's new job demonstrate

Business-facing processes

The accounting and finance department performs processes such as creating financial statements, paying accounts payables, and collecting accounts receivables. What form of processes do these represent?

Business-facing processes

What is the ebusiness model that represents 80 percent of all online businesses and is typically more complex, requiring greater security needs?

Business-to-business

What are the four main types of ebusiness models?

Business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer.

How would a company like Flickr use social tagging on its website?

By allowing users to upload images and tag the images with their own keywords.

Who is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology?

CTO

The potential for contracting viruses on mobile devices is increasing; in fact, the first known mobile phone virus was called ______________?

Cabir

Which state recognizes an individual's right to privacy?

California

What accesses organizational databases that track similar issues or questions and automatically generates the details to the CSR, who can then relay them to the customer?

Call scripting

What guides users through marketing campaigns, performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis?

Campaign management system

What determines future environmental infrastructure requirements that ensure high-quality system performance?

Capacity planning

The sustainable infrastructure pressure of increased energy consumption poses new and growing pressure. The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by a __________.

Car

The power of MIS comes from its ability to ____________ information?

Carry House Support

What is a means to conduct a periodic check on the company's financial health?

Cash flow analysis

. What-if analysis checks the impact of a __________ in an assumption on the proposed solution.

Change

Most people request real-time information without understanding that continual __________ is one of its biggest pitfalls

Change

Which of the following is not a phase in the SDLC?

Change

____________ management system includes a collection of procedures to document a change request and define the steps necessary to consider the change based on the expected impact of the change.

Change

The PMI develops procedures and concepts necessary to support the profession of project management. Which of the following is not one of the three areas it focuses on?

Change in business goals during project planning (management)

If a supplier has high power what can it do to influence its industry?

Charge higher prices. Shift costs to industry participants. Limit quality or services.

Which company is improving how it manages the assets in fields by enabling employees in multiple disciplines to easily access and share the information they need to make decisions?

ChevronTexaco Corporation

Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers. What is Jeremy's role within the company?

Chief Security Officer (CSO).

Which of the following countries is considered an up-and-comer in the outsourcing industry?

China

What is the name of the highly publicized survey administered by the Institute for Citizen-Centered Services and the Institute for Public Administration in Canada?

Citizens First

Which of the following is the first CRM implementation strategy?

Clearly communicate the CRM strategy

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversation revenue by models by repeatedly clicking on a link to increase charges or costs for the advertiser?

Click Fraud

Which type of ebusiness model is Barnes and Noble using?

Click-and-mortar

What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?

Clickstream

What is the exact pattern of a consumer's navigation through a site?

Clickstream data

What are three examples of goods?

Clothing, groceries and cars

What refers to resources and applications hosted remotely as a shared service over the Internet?

Cloud Computing

Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?

-Building a strong brand identity -Protecting the company reputation through counter-damage control -Engaging directly with customers and prospective customers

Which of the following offers a common example of a LAN?

-College campus -Home office -City library

Which of the following is an example of a clickstream data metric?

-Dates and times of visits -Number of customers with shopping carts -The number of page views (all of these)

Which of the following is a business-related consequence of software failure?

-Decreased productivity -Damage to brand reputation -Incurred liabilities (all of the above)

Which of the following describes information technology monitoring?

. Tracking people's activities by such measures as number of keystrokes B. Tracking people's activities by such measures as error rate C. Tracking people's activities by such measures as number of transactions processed D. All of the above*

What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance?

. Waterfall methodology

Which domain is reserved for accredited postsecondary institutions?

.edu

Which domain is reserved for the U.S. military?

.mil

What is the success rate for a project using the waterfall methodology?

1 in 10 The waterfall methodology has a 10 percent success rate, or 1 in 10.

What 3 goals/objectives might a leadership plan include to achieve a solid business strategy?

1) Attracting new customers 2) Decreasing costs 3) Increasing sales

What are 3 generic business strategies Porter identified for entering a new market?

1) Broad differentiation 2) Broad cost leadership 3) Focused strategy

What are the three common tools managers use to analyze competitive intelligence and develop competitive advantages.

1) Five Forces Model 2) The three generic strategies 3) Value chain analysis

What are 3 value activities

1) Marketing and sales 2) Outbound logistics 3)Inbound logistics

What are the challenges of a connected world?

1) Networks create a diverse globally connected world eliminating time and distance 2) Networks make it possible to communicate in ways not previously imaginable 3) Even though networks provide many business advantages, they also create increased challenges in security, social, ethical and political issues.

What are 3 examples of service?

1) Waiting tables 2) Cutting hair 3) Personal training

Which company turned brand loyalty into brand relationships by using the vast amounts of information it collected to better understand customers' needs and expectations?

1-800-Flowers.com

The _________ act restricts what information the federal government can collect.

Privacy

What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?

Privacy

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

Privacy

Cooking a patty and putting the ingredients together are included in which category of making a hamburger?

Process

_________ modeling involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment

Process

What is data mining?

Process of analyzing data to extract information not offered by the raw data alone.

Which of the following is not one of the three phases in the evolution of CRM?

Processing

Which of the following is an incorrect enterprise view of information technology?

Processing is OLTP for executives and OLAP for analysts

Amazon.com uses a customer-profiling system whenever a customer visits its website. Using this system, Amazon can offer products tailored to that particular customer's profile and buying pattern. What is Amazon using to achieve this competitive advantage?

Product differentiation.

What is the process that where a business takes raw materials and processes them or converts them into a finished product for its goods or services?

Production

What are the factors included in the global customer's category of global IT business drivers?

Products are the same worldwide and global IT can help manage worldwide marketing, sales, and quality control.

What occurs when businesses sell products or services for more than they cost to produce?

Profit

Key logger or key trapper software is a __________ that when installed on a computer, records every keystroke and mouse click

Program

Which company used BPR to change its industry by implementing a mobile claims process?

Progressive Insurance.

. A(n) ____________ is a temporary endeavor undertaken to create a unique product, service, or result.

Project

A(n) ____________ is a temporary endeavor undertaken to create a unique product, service, or result.

Project

Failure to manage __________ scope is one of the primary reasons for project failure.

Project

What is a temporary endeavor undertaken to create a unique product, service, or result?

Project

_________ management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements

Project

_________ management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

Project

Which organization develops procedures and concepts necessary to support the profession of project management?

Project Management Institute

What is any measurable, tangible, verifiable coutcome, result or time that is produced to complete a project or part of a project?

Project deliverable

What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?

Project management

What is an internal department that oversees all organizational projects?

Project management office

Who are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion?

Project stakeholders

The rapid application development methodology emphasizes extensive user involvement in the rapid and evolutionary construction of working __________ of a system to accelerate the systems development process.

Prototypes

Which of the following is a challenge of sustaining technology?

Provides a product that does not meet existing customers' future needs

Which of the following is a challenge in sustaining technology?

Provides a product that does not meet the existing customer's future needs.

What is a real-time system?

Provides real-time information in response to requests.

What type of encryption technology uses multiple keys, one for public and one for private?

Public key encryption

Which type of ebusiness model is Amazon using?

Pure-play

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

Quadrant 1

The project management role has several responsibilities in the area of time. Which of the following represent these areas for time?

Quality, methodology

Which of the following is one of the four main categories of BI benefits?

Quantifiable benefits

Which type of BI benefits includes working time saved in producing reports and selling information to suppliers?

Quantifiable benefits

What are project objectives?

Quantifiable criteria that must be met for the project to be considered a success

All of the following are characteristics of information except:

Quantity

All of the following are characteristics of information, except:

Quantity

Which of the following is not a primary trait of information?

Quantity

Which of the following is not one of the five characteristics common to high quality information?

Quantity

Which of the following is not one of the five characteristics common to high-quality information?

Quantity

What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process?

RAD methodology

what emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process?

RAD methodology

Many websites use _______ to constantly feed news to consumers instead of having the consumer search for the news.

RSS

Which methodology is owned by IBM?

RUP

Which methodology provides a framework for breaking down the development of software into four gates?

RUP

What is a dynamic high-resolution electronic display that combines a paperlike reading experience with the ability to access information anytime, anywhere?

Radio Paper

What uses active or passive tags in the form of chips or smart labels?

Radio frequency identification

A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data?

Radio signals

Which of the following is an example of an emergency notification system?

Radio stations' occasional tests of the national alert system

Which business application uses electronic tags and labels to identify objects wirelessly over short distances?

Radio-frequency identification

What does RSS stand for?

Real Simple Syndication

What occurs when a system updates information at the same rate it receives the information?

Real-time communication

What is immediate, up-to-date information?

Real-time information

Which of the following refers to immediate, up-to-date information?

Real-time information

Which of the following provides real-time information in response to requests?

Real-time system

What provides real-time information in response to query requests?

Real-time systems

What provides real-time information in response to requests?

Real-time systems

The R in the SMART criteria for successful objective creation stands for _________.

Realistic

Building and deploying flexible systems can allow for ___________.

Reconfigurations Easy updates and changes Solutions for unexpected business environmental changes

All of the following are challenges of outsourcing, except:

Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market

All of the following are challenges of outsourcing, except?

Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market

All of the following are challenges of outsourcing except:

Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market.

Which of the following is a benefit of a solid MIS infrastructure?

Reduces costs Improves productivity Optimizes business operations

What is encryption?

Scrambles information into an alternative form that requires a key or password to decrypt the information

Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?

Script kiddies

Which methodology ends each day or begins with a stand-up meeting to monitor and control the development effort?

Scrum

Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal?

Scrum

What evaluates variables that search engines use to determine where a URL appears on the list of search results?

Search engine ranking

Which of the following is not considered an ePolicy?

Security badge policy

The information MIS infrastructure supports the day-to-day business operations and plans for ____________?

Security breaches and theft Floods and earthquakes Malicious Internet attacks

What is the major challenge of networking or performing business in a connected world?

Security issues

What automates order processes from initial customer inquiry to final product delivery?

Selling chain management

What is a component of Web 3.0 that describes things in a way that computers can understand?

Semantic web

Not attempting to mail bomb a site

Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space

What is a mail bomb?

Sending a massive amount of email to a specific person or system that can cause that user's server to stop functioning.

. ___________ analysis occurs when users change the value of one variable repeatedly and observe the resulting changes in other variables.

Sensitivity

What is the study of the impact that changes in one (or more) parts of the model have on other parts of the model?

Sensitivity analysis

What is a computer called that is dedicated to providing information in response to requests?

Server

What is a business-driven IT architectural approach that supports organizational computing needs with utility-based computing concepts?

Service oriented architecture

Which of the below is not a valid form of ebusiness revenue model?

Service provider

What are the key technical concepts of SOA?

Services, interoperability, loose coupling

With ___________, less experienced staff observe more experienced staff to learn how their more experienced counterparts approach their work.

Shadowing

Partnership agreements typically include all of the following, except:

Shareholder's expectations for a successful business

Which benefits of a connected world make all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user?

Sharing resources

What advantages do networks offer businesses?

Sharing resources, providing opportunities and reducing travel

A(n) _____________ bot is software that will search several retailer Web sites and provide a comparison of each retailer's offerings including price and availability.

Shopping

What is the system users' actual signatures indicating they approve all of the business requirements?

Sign-off

Which of the following is an example of P2P?

Skype

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

Smart card

Cell phones have morphed into ___________________ that offer more advanced computing ability and connectivity than basic cell phones?

Smartphones

Which of the following is a program or device that can monitor data traveling over a network?

Sniffer

To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ____________ policy?

Social Media Policy

Which of the following represents the classic example of unintentional information reuse?

Social Security number

What are websites that rely on user participation and user-contributed content, such as Facebook, LinkedIn, and YouTube?

Social media

Which of the following best describes Web 2.0?

Social media and user-generated web content

Which company policy implements online communication policy detailing brand communication, LinkedIn policy, and corporate YouTube policy?

Social media policy

What is the practice of expanding your business and social contacts by constructing a personal network?

Social networking

Which of the following is not a topic or feature that is included in Web 3.0?

Social networking

What is an SNA?

Social networking analysis

What maps group contacts, identifying who knows each other and who works together?

Social networking analysis

Corporate social responsibility is a company's acknowledged responsibility to __________.

Society

What is a model of software deployment, where an application is licensed for use as a service, provided to customers on-demand?

Software as a Service

Which cloud computing model offers applications on a pay-per-use basis?

Software as a service

According to Infonetics research, what is the leading cause of downtime?

Software failure followed by human error

Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?

Some online companies have to charge sales tax.

What is the most costly and intrusive form of authentication?

Something that is part of the user such as a fingerprint or voice signature

In which of the five basic supply chain activities do you build relationships with suppliers to procure raw materials?

Source

What is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (eg networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction?

Cloud computing

What might change the way businesses operate, as well as the way people interact with technology?

Cloud computing

What uses resources and applications hosted remotely on the Internet?

Cloud computing

Which company was the victim of a distributed denial-of-service (DDoS) attack that forced the company to close operations and to eventually transfer over 2,500 customers to a rival organization?

CloudNine Communications

What is a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?

Cluster analysis

What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?

Cluster analysis

What are the three common forms for mining structured and unstructured data?

Cluster analysis, association detection, and statistical analysis

Cheap electricity is great for keeping business energy costs down, but this mean that we have to rely more on ____________ for power.

Coal

Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's Five Forces Model. Which of the following represents rivalry in the soft drink industry?

Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games.

What is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster?

Cold site

A(n) ____________ system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.

Collaboration

Which of the following is not one of the four gates in the RUP methodology?

Collaboration Elaboration is the gate in RUP, not collaboration.

What is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information?

Collaboration system

Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?

Collaboration system

What allows an organization to reduce product development costs?

Collaborative engineering

Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa's job requires her to gather industry info, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the below would Lisa use to perform her job?

Collective intelligence

Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa's job requires her to gather industry information, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the below would Lisa use to perform her job?

Collective intelligence

Which of the following is not a topic associated with the information age?

College statistics for data.

The primary purpose of a data warehouse is to _____________

Combine strategic information

According to the text, which of the following does not benefit from smart grid computing?

Comcast Cable's grid

What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting?

Committee of Sponsoring Organizations

What is the most important part of the project plan?

Communication

The project management role has several responsibilities in the area of scope. Which of the following answers lists these responsibilities for scope?

Communication, requirements, changes

What type of cloud computing serves a specific community with common business models, security requirements, and compliance considerations?

Community Cloud

A __________ advantage features a product or service on which customers place a greater value than they do on similar offerings from competitors.

Competitive

Business intelligence is information collected from multiple sources. Which of the following provides an example of a source that would be included in business intelligence?

Competitors, Customers and Suppliers

CRM allows an organization to accomplish all of the following, except:

Complicate marketing and sales processes

CRM allows an organization to accomplish all of the following except:

Complicate marketing and sales processes.

Contract length, competitive edge, ____________, and scope definition are the four primary challenges for outsourcing.

Confidentiality

What is the assurance that messages and information remain available only to those authorized to view them?

Confidentiality

What is the primary way that social networks work?

Connecting people by matching profile information.

Which of the following is one of the primary reasons for the increase in Internet use?

Connectivity technology

Which of the following implies that aggregate or summary information is in agreement with detailed information?

Consistency

Which of the following is the result of BI that the processes that deliver the data to the business community are well documents and there are no surprises such as missing or inaccurate data?

Consistent

What is hardware?

Consists of the physical devices associated with a computer system

Which gate in the RUP methodology includes building and developing the product?

Construction

Which gate in the RUP methodology includes building and developing the project?

Construction

Which of the following does not represent a company that requires up-to-the-second information?

Construction companies

What maintains customer contact information and identifies prospective customers for future sales?

Contact management CRM system

What was the primary problem Saab encountered with one of its marketing companies?

Contacted customers regardless of their opt-out or opt-in decision

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

Content filtering

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?

Content filtering, encryption, and firewalls

What are the technologies available to help prevent and build resistance to attacks?

Content filtering, encryption, firewalls

What provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment?

Content management system

Which of the below is not considered an advantage of a content management system?

Content management systems increase order entry speed.

Which of the following represents the primary forms of ebusiness?

Content providers, infomediaries, online marketplaces, portals, service providers, and transaction brokers.

What are the four most common Business 2.0 characteristics?

Content sharing through open source, user-contributed content, collaboration inside the organization, and collaboration outside the organization.

Websites sometimes deposit on a customer's hard drive a small file containing information about the customer and the customer's web activities. What is that small file called?

Cookie

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

Cookie

What is a small file deposited on a hard drive by a website that contains information about customers and their web activities?

Cookie

What is a small file deposited on a hard drive by a website containing info about customers and their Web activities

Cookies

Privacy is the legal protection afforded an expression of an idea, such as a song, book or video game.

Copyright

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

Copyright

What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

Copyright

What is the legal protection afforded an expression of an idea?

Copyright

_____________ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents

Copyright

What is an organization's key strength, a business function that it does better than any of its competitors?

Core competency

What is it called when an organization chooses to focus specifically on what it does best and forms partnerships and alliances with other specialist organizations to handle nonstrategic business processes?

Core competency strategy

What describes the basic transaction data such as its date, purpose, and amount and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc?

Source document

. _________ is unsolicited email.

Spam

What is unsolicited email that plagues employees at all levels and clogs email systems?

Spam

What are project constraints?

Specific factors that can limit options

What do SMART criteria for successful objective creation include?

Specific, measurable, agreed upon, realistic, time framed

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

Spoofing

__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.

Spyware

Which of the following is not one of the principal BI enablers?

Corporate processes

Sustainable MIS is a critical part of _____________ within a company?

Corporate social responsibility

____________ maintenance makes changes to repair system defects.

Corrective

Which of the following is not one of the five basic components of supply chain management?

Cost

Which of the following is one of the five key competitive priorities?

Cost

LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the following are the most important network differentiating dimensions?

Cost and performance

Transaction processing systems are primarily used to automate business processes. Automation increases efficiency and effectiveness, while reducing head count which in turn reduces overall operational

Costs

What is the difference between pirated and counterfeit software?

Counterfeit is software that is manufactured to look like the real thing and is sold as such. Pirated is the authorized use, duplication, distribution, or sale of copyrighted software.

What is software that is manufactured to look like the real thing and sold as such?

Counterfeit software

Who are hackers with criminal intent?

Crackers

Which of the following is not a type of feasibility study?

Critical success factor feasibility study

A dimension is a particular attribute of information. Each layer in a data warehouse or data mart represents information according to an additional dimension. What is the common term for the representation of multidimensional information?

Cube

Which of the following is the common term for the representation of multidimensional information?

Cube

What are the three primary challenges facing global businesses?

Cultural, political, geoeconomic

What is another term that represents CRM reporting technologies that help organizations identify their customers across other applications?

Customer identification

Charles Schwab recouped the cost of a multimillion-dollar system in less than two years. What type of system was it?

Customer relationship management.

What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer?

Customer satisfaction

What is another term that represents CRM analysis technologies that help organizations segment their customers into categories such as best and worst customers?

Customer segmentation

Which of the following is not a valid way that a CRM system can collect information?

Customer's personal computer.

The most popular IaaS operation today is Amazon's Elastic Compute Cloud (EC2). The benefits when using Amazon as an IaaS include ____________.

Customers can load and run their own applications. Customers can control their own operating environment. Customers can create, run, and stop services as needed.

Who are the primary users of SCM systems?

Customers, resellers, partners, suppliers, and distributors

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Froogle and bank account aggregation services such as Citibank?

Cybermediation

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?

Cybermediation

What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?

Cybermediation

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

Cyberterrorists

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?

Cyptography

The sales department needs to rely on information from operations to understand _________.

Demand Forecasts, Customer Orders & Inventory

Which of the following generates demand forecasts using statistical tools and forecasting techniques?

Demand planning software

What floods a website with so many requests for service that it slows down or crashes the site?

Denial-of-service attack

A(n) _________ is a logical relationship that exists between the project tasks, or between a project task and a milestone.

Dependency

What is the logical relationship that exists between project tasks or between a project task and a milestone?

Dependency

What is the logical relationship that exists between the project tasks, or between a project task and a milestone?

Dependency

Which phase describes the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation?

Design phase

Which of the following represents the different information granularities?

Detail, summary, aggregate

Which of the following is not one of the three primary information security areas?

Detection and resistance

If there is a security breach on your organizational information systems, which information security area is best suited to handle the breach?

Detection and response

What is a feasibility study?

Determines if the proposed solution is feasible and achievable from a financial, technical, and organizational standpoint

Which of the following is not a technique for choosing strategic projects?

Develop a project plan

Which phase takes all of the detailed design documents from the design phase and transforming them into the actual system?

Development phase

Which of the following is not a cultural business challenge?

Differences in architectures

Which of the following is not a political business challenge?

Differences in social attitude

_________ asset management system works with binary rather than text files, such as multimedia file types.

Digital

Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?

Digital Darwinism

What works with binary rather than text files, such as multimedia file types?

Digital asset management system

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

Digital certificate

Which of the following is not a reason for the explosive growth of the WWW?

Digital darwinism

What integrates information from multiple components and tailors the information to individual preferences?

Digital dashboard

What is the worldwide gap giving advantage to those with access to technology?

Digital divide

Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

Digital information

What is technology that digitally represents handwriting in its natural form?

Digital ink

What is any paper that is optimized for any type of digital printing?

Digital paper

Which of the following allows high-speed digital data transmission over standard telephone lines?

Digital subscriber line (DSL)

What are the two most prevalent types of broadband access?

Digital subscriber line and cable connection

A disaster recovery plan contains a _____________ that outlines the costs to support the plan.

Disaster recovery cost curve

What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time?

Disaster recovery cost curve

To combat disasters a company can create a _________ that would detail the process for recovering information or a system in the event of a catastrophic disaster.

Disaster recovery plan

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

Disaster recovery plan

What is the business strategy that lets a company shorten the order process and add value with reduced costs or a more responsive and efficient service, and occurs when a business sells directly to the customer online?

Disintermediation

What occurs when a business sells directly to the customer online and cuts out the middle man?

Disintermediation

Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane?

Disrupting communications Damaging physical infrastructures Halting transportation

The Innovator's Dilemma suggests that established companies can take advantage of ___________ without hindering existing relationships with customers, partners, and stakeholders.

Disruptive technologies

Which of the following represents the bullwhip effect?

Distorted product-demand information ripples from one partner to the next throughout the supply chain.

A DDoS stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for?

Distributed denial-of-service attack

Which of the following is not a current CRM trend?

Distributor relationship management

Which of the following is not a common form of data mining?

Division organization

Which of the following is not one of the tenets in the Agile Alliance's manifesto?

Do not allow changing requirements, especially late in development

Which of the following is NOT a common stipulation when creating an employee monitoring policy?

Do not state the consequences of violating the policy

Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy?

Do not state the consequences of violating the policy

___________ management system supports the electronic capturing, storage, distribution, archival, and accessing of documents.

Document

What support the electronic capturing, storage, distribution, archival, and accessing of documents?

Document management system

____________ testing verifies that the instruction guides are helpful and accurate

Documentation

Which of the following statements is inaccurate in reference to domain names?

Domain names are owned

What is the practice of buying a domain name and not using the web page but waiting to profit from the trademark?

Domain or cyber squatting

Which of the following refers to a period of time when a system is unavailable?

Downtime

Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text?

Downtime monitoring policy

What company monitors the operation of its vending machines via wireless technology?

Dr Pepper/Seven Up Inc.

Which of the following represents the connecting and communicating tools supporting and driving ebusiness?

Email, instant messaging, podcasting, content management systems, and video and Web conferencing

What is an infrastructure built for notifying people in the event of an emergency?

Emergency notification service

Which of the following is not an example of explicit knowledge?

Employee opinion

What is drill-down capability?

Enables users to get details, and details of details, of information

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?

Encryption

Which issue concerns CIOs the most?

Enhancing customer satisfaction

Which of the following is not a primary use of GIS?

Ensuring safety equipment is on an airplane before a flight

What connects the plans, methods, and tools aimed at integrating separate enterprise systems?

Enterprise application integration

What represents a new approach to middleware by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors?

Enterprise application integration middleware

What is a person called who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business?

Enterprise architect

Which of the following is not an example of a primary enterprise system?

Enterprise revenue planning

Which of the following illustrates the primary concepts of the relational database model?

Entities, attributes, keys, and relationships

In the relational database model, what is a person, place, thing, transaction, or event about which information is stored?

Entity

Which of the following stores information about a person, place, thing, transaction, or event, and is usually referred to as a table?

Entity

Which of the following is not a potential business impact created by the growth in information industries?

Entry-level positions will require less education

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

Epolicies

Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents supplier power in the music industry?

Established record labels like EMI, Sony, Universal.

What is another name for an eshop?

Estore or etailer

If an organization were to have only one policy, which one would it want?

Ethical computer use policy

If an organization were to have only one policy, which one would it want? Ethical computer use policy Information privacy policy Internet use policy Acceptable use policy

Ethical computer use policy

Which of the following contains general principles to guide computer user behavior?

Ethical computer use policy

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

Ethical computer use policy

What are the principles and standards that guide our behavior toward other people?

Ethics

Which of the following key terms represents the principles and standards that guide our behavior toward other people?

Ethics

___________ are the principles and standards that guide our behavior toward other people.

Ethics

Which of the following represents the two fundamental building blocks that protect organizational information?

Ethics and security

Which two terms are confirmed or validated with a fact?

Event and Object

The increased demand in technology devices has caused an increase in discarded devices, a phenomenon known as ________?

Ewaste

Who is the person or group who provides the financial resources for the project?

Executive sponsor

The project management role has several responsibilities in the area of cost. Which of the following answers lists these responsibilities for cost?

Expectations, resources, technology choices

The project management role has several responsibilities in the area of cost. Which of the following represent these areas for cost?

Expectations, resources, technology choices

Test conditions are the detailed steps the system must perform along with the _______ results of each step.

Expected

______________ systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.

Expert

Which of the following is the most commonly used form of AI in the business arena?

Expert system

___________ knowledge consist of anything that can be documented, archived, and codified, often with the help of IT.

Explicit

What consists of anything that can be documented, archived, and codified, often with the help of IT?

Explicit knowledge

What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS department?

Explicit knowledge

What are the two categories that include intellectual and knowledge-based assets?

Explicit knowledge and tacit knowledge

What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?

Extreme programming

Human resources is the most common outsourced function.

FALSE IT is the most common outsourced function.

A document management system works with binary rather than text files, such as multimedia file types.

FALSE A digital asset management system works with binary rather than text files, such as multimedia file types.

A foreign key is a field (or group of fields) that uniquely identifies a given entity in a table.

FALSE A primary key is a field (or group of fields) that uniquely identifies a given entity in a table.

Data latency is the time from which data are made available to the time when analysis is complete.

FALSE Analysis latency is the time from which data are made available to the time when analysis is complete.

What is it called when you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?

Fair Use Doctrine

What gives, in certain situations, a person the legal right to use copyrighted material?

Fair use doctrine

A data mart is a company that collects and sells external data for a data warehouse.

False

A profit occurs when businesses sell products or services for less then they cost to produce.

False

A project is an ongoing endeavor undertaken to create a unique product or service.

False

An insignificant number of IT projects are considered failures.

False

Communication between Business and IT personnel is generally considered to be good.

False

Companies that outsource services reduce their costs but still grow at the same pace of companies that do not outsource.

False

Ethics are the laws that guide our behavior toward other people.

False

Job titles, roles, and responsibilities do not differ from organization to organization.

False

Most business managers are also good project managers.

False

Purchasing stocks is an example of analytical information.

False

Reducing costs in the primary reason that companies outsource services?

False

Sensitivity analysis, what-if analysis, and market basket analysis are the three quantitative models typically used by a DSS.

False

The M in the SMART criteria for successful objective creation stands for manageable.

False

The chief security officer is responsible for ensuring the ethical and legal use of information within an organization.

False

The majority of organizations spend over 10% of their IT budget on information security.

False

The most important skills for an IT excutive are technical knowledge and proficiency.

False

The uniqueness characteristic of high-quality information ensures that all the values are correct.

False

There reminds a sharp distinction between IT and business roles in an organization.

False

Transactional information encompasses all organizational information and its primary purpose is to support the performing of managerial analysis tasks.

False

Timely information must be up-to-the-second to be accurate.

False Timely information can change for each business decision. Some decisions require weekly information while others require daily information.

Which of the following describes agile?

Fast and efficient B. Small and nimble C. Lower cost D. All of the above*

With grid computing, a problem is broken into pieces and distributed to many machines, allowing _________ processing than could occur with a single system.

Faster

Standardizing of data elements allows for ______________?

Greater accuracy, completeness, and consistency

What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration?

Grid Computing

What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data?

Grid Computing

DreamWorks Animation Company used which sustainable infrastructure component to complete many of its films, including Shrek, Madagascar, and Antz?

Grid computing

Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem?

Grid computing

Which characteristics support a sustainable MIS infrastructure?

Grid computing, cloud computing, and virtualization

____________ supports team interaction and dynamics including calendaring, scheduling, and videoconferencing

Groupware

What is software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing?

Groupware system

Why is estimating future growth a challenge for most companies?

Growth can occur because the company acquires new markets Growth can occur because the company acquires new customers Growth can occur because the company acquires new products

Which act protects health insurance information?

HIPAA

Experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge are know as what?

Hackers

______have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

Hactivists

Which activities do production and materials management components perform?

Handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control

Cloud computing allows users to connect via a web browser and stores all of your software documents "in the cloud," which means that there is no more need for users to have ____________?

Hard drives Physical servers Software or processing power

John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What role at Internal Computer Specialists was John hired to fix?

Hardware

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard

Hardware

Which of the following is the top reason why organizations launch knowledge management systems?

Increase profits or revenues According to the key reasons why organizations launch knowledge management systems figure, increase profits or revenues.

Which of the following is a business-related consequence of successful software?

Increase revenues

____________ revenues are a business-related consequence of successful software.

Increased

Which of the following is a disadvantage of database-stored information?

Increased data redundancy

All of the following are advantages of database-stored information except:

Increased information redundancy

All of the following are advantages of database-stored information, except:

Increased performance

Where would you categorize a cloud computing benefit that allows a customer to store fewer applications on a client computer, which frees up the memory allowing for increases in performance?

Increased performance

As a manager for your company some of your responsibilities include measuring metrics and overseeing company strategies. You observe some critical success factors and see large increases in productivity. What would you suspect would be the primary reason for the large increases in productivity?

Increases in effectiveness

What are the three pressures driving sustainable MIS infrastructures?

Increases in electronic waste, energy consumption, and carbon emissions

What is a disadvantage of networking or performing business in a connected world?

Increases resource threats

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

Information security

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the following company policies?

Information security policies

What identifies the rules required to maintain information security?

Information security policies

With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures as keystrokes, error rate, and number of transaction processed?

Information technology monitoring

What is data converted into a meaningful and useful context?

Information.

What service delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model?

Infrastructure as a Service (IaaS)

What are the three cloud computing service delivery models?

Infrastructure as a Service, Software as a Service and Platform as a Service

Which four elements are included in systems thinking?

Input, process, output and feedback

What is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems?

Insourcing

____________ is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems.

Insourcing

What is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet?

Instant messaging

What types of BI decisions include forecasting claim amounts and medical coverage costs, classifying the most important elements that affect medical coverage; predicting which customers will buy new insurance policies?

Insurance BI decisions

Which type of BI benefits includes improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing?

Intangible benefits

What is enterprise resource planning?

Integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise-wide information on all business operations.

What allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?

Integration

____________ testing exposes faults in the integration of software components or software units.

Integration

What are rules that help ensure the quality of information?

Integrity constraints

What are the rules that help ensure the quality of information?

Integrity constraints

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

What is intangible creative work that is embodied in physical form?

Intellectual property

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

Intellectual property

A(n) _________ agent is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.

Intelligent

_____________ systems are various commercial applications of artificial intelligence.

Intelligent

What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users?

Intelligent agent

What are various commercial applications of artificial intelligence?

Intelligent system

What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?

Intermediaries

What is the rate at which the net present value of an investment equals zero?

Internal rate of return (IRR)

What is the largest and most important network that has evolved into a global information superhighway?

Internet

Which of the following began as an essential emergency military communications system operated by the U.S. Department of Defense Advanced Research Project Agency (DARPA)?

Internet

Which of the following are types of web browsers?

Internet Explorer and Mozilla's Firefox

Which of the following provides Internet access using a cable television company's infrastructure and a special cable modem?

Internet cable connection

What distributes digital video content using IP across the Internet and private IP networks?

Internet protocol TV (IPTV)

What is an ISP?

Internet service provider, a company that provides access to the Internet for a monthly fee.

Jackie is the head teller at ABC bank and her responsibilities include overseeing and managing tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find the complaints started right around the time ABC bank provided internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amount of time playing internet games and posting on FB. Which policy should the company implement to help eliminate this problem?

Internet use policy

Managing global enterprise architectures is a key global IT challenge for the 21st century. What is included in the term global enterprise architectures?

Internet, intranet, extranet, and other telecommunication networks

What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing?

Intranet

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?

Intrusion Detection Software (IDS)

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?

Intrusion detection software (IDS)

A database maintains information on ___________.

Inventory Transactions Employees

Which of the following metrics represents the time it takes to manufacture a product and deliver it to the retailer?

Inventory cycle time

Which of the following is not a typical CRM metric?

Inventory metrics

What is the analysis phase in the SDLC?

Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system

What is the design phase in the SDLC?

Involves describing the desired features and operations of the system

What is process modeling?

Involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment

What is the implementation phase in the SDLC?

Involves placing the system into production so users can begin to perform actual business operations with the system

What is consolidation?

Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.

MIS can be an important enabler of business success and innovation. Which statement is accurate when referring to MIS?

Is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.

Which of the following would not be considered part of the accurate characteristic of high-quality information?

Is aggregate information in agreement with detailed information?

Which of the following would not be considered part of the unique characteristic of high-quality information?

Is aggregate information in agreement with detailed information?

Which of the following would not be considered part of the complete characteristic of high-quality information?

Is each transaction represented only once in the information?

Which of the following would not be considered part of the timely characteristic of high-quality information?

Is the Zip code missing in the address?

Which of the following countries is considered a leader in the outsourcing industry?

Israel

Which of the following is the main drawback of biometrics?

It can be costly and intrusive

What is one of the biggest pitfalls associated with real-time information?

It continually changes

What is interactive voice response (IVR)?

It directs customers to use touch-tone phones or keywords to navigate or provide information

Which of the following is not a part of the email privacy policy stipulations?

It informs people that the organization has full control over email once it is transmitted outside the organization.

What is the role of a foreign key?

It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

What does extraction, transformation, and loading mean?

It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse

Which of the following is not an example of an advantage to using the web to access organizational databases?

It is cleaner and virus-free.

What consists of a series of tiny projects?

Iterative development

What represents a session where employees meet, sometimes for several days, to define or review the business requirements for the system?

JAD session

All of the following jobs will be increasingly performed by robots, except:

Jobs performed by scientists, engineers, and technicians

One of the most famous examples of wiki vandalism occurred when a false biography entry stated which of the following?

John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy's assassination as well as JFK's.

What is it called when you have a novice and an expert work together on a project to help bring the expert's approach to light?

Joint problem solving

Which of the below statements is correct?

Just putting up a website does not create an ebusiness.

Which of the following is NOT a strategy for successful project management?

Keep your resume updated

What is a program that, when installed on a computer, records every keystroke and mouse click?

Key logger software

What is a program, when installed on a computer, records every keystroke and mouse click?

Key logger software

What is the most common form of collective intelligence found inside the organization?

Knowledge management

What supports the capturing, organization, and dissemination of knowledge throughout an organization?

Knowledge management system

Which system supports the capture, organization, and dissemination of knowledge throughout an organization?

Knowledge management system

What kind of society is being created by the growth in information industries?

Knowledge-dependent global society

Which of the following includes the three primary network types?

LAN, WAN, MAN

What is a current or existing system that will become the base for upgrading or integrating with a new system?

Legacy System

What is the ideal type of decision making for people in an organization?

Legal and ethical

Employees need to compare different types of information for what they commonly reveal to make strategic decisions. Which of the following represents the three common types of information found throughout an organization?

Levels, formats, granularities

What are the different types of information?

Levels, formats, granularities

What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership?

Limited liability corporation

What compiles customer information from a variety of sources and segments the information for different marketing campaigns?

List generator

Which of the following operational CRM technologies does the marketing department typically use?

List generator, campaign management, cross-selling and up-selling

Which of the following is not a principle of supply chain management?

Listen to signals from telecommunications equipment.

Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content?

Location-based services

Which company developed a real-time collaboration system that ties together its partners, suppliers, and DoD customers via the Internet?

Lockheed Martin Corporation

Which of the following focuses on how individual users logically access information to meet their own particular business needs?

Logical view

A data warehouse is a _________ collection of information-gathered from many different ___________ databases-that supports business analysis activities and decision-making tasks.

Logical, operational

A data warehouse is a ______ collection of information - gathered from many different _____ databases - that supports business-analysis activities and decision-making tasks.

Logical; operational

How can companies reduce buyer power?

Loyalty programs, which reward customers based on their spendings.

Which of the following is not a type of wireless network?

MAN

Which of the following is the most common function outsourced?

MIS

What includes the plans for how an organization will build, deploy, use, and share its data, processes, and MIS assets?

MIS infrastructure

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?

Mail Bomb

Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environmental changes?

Maintainability

What is typically performed by the sales and marketing department?

Maintaining transactional data

An error found during the ___________ phase is the most expensive to fix.

Maintenance

The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.

Maintenance

What is not considered a core driver of the information age?

Malware

Project ____________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.

Manager

Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Jenny?

Managerial

What involves analyzing business operations for internal decision making and does not have to follow any rules issued by standard-setting bodies such as GAAP?

Managerial accounting

Which of the following is a challenge facing an ebusiness?

Managing Consumer Trust

Which of the following is a type of decision support system?

Manufacturing

Evaluate the advantages of using a workflow management system.

Many workflow management systems allow the opportunity to measure and analyze the execution of a process. Workflow systems integrate with other organizational systems, such as document management systems, and database management systems.

Financial savings, increased technical abilities, and _________ agility are the benefits an organization can receive from outsourcing.

Market

What is a common association detection analysis technique where you analyze certain items to detect customers' buying behavior and predict future behavior?

Market basket analysis

What is the division of a market into similar groups of customers?

Market segmentation

What is calculated by dividing the firm's sales by the total market sales for the entire industry?

Market share

Which of the following will help an organization maintain consistent business operations?

Marketing, sales, and accounting departments decide to use the same vendor for a new system

Within the beginning stage of the data warehouse models process, which of the following are included in the internal databases?

Marketing, sales, inventory, and billing

Which of the following is the least common function outsourced?

Marketing/sales

What is a website or web application that uses content from more than one source to create a completely new product or service?

Mashup

M&M's offers people the opportunity to order the candy in special colors or with customized sayings. How would you classify M&M's ebusiness strategy?

Mass customization

Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike's ebusiness strategy?

Mass customization

What is the ability of an organization to tailor its products or services to the customers' specifications?

Mass customization

What uses sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company?

Materials requirement planning system

Which company created several different website to respond to sensitive cultural differences?

McDonalds

What is information reach?

Measures the number of people a firm can communicate with all over the world.

Which industry spends the least per employee on computer security?

Medical

What sends work assignments through an email system?

Messaging-based workflow system

What is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges?

Methodology

What are the measurements that evaluate test results to determine whether a project is meeting its goals?

Metrics

What is a large computer network usually spanning a city?

Metropolitan area network

What do you call a large computer network usually spanning a city or a specific infrastructure like a college?

Metropolitan area network (MAN)

What is the practice of sending brief posts, only 140-200 characters long, to a personal blog, either publicly or to a private group of subscribers?

Microblogging

NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the following is not an NSP?

Microsoft

When a company is the first to market with a competitive advantage, this is called a first-mover advantage. All of the following companies were first movers except

Microsoft - Bing Search Engine

What are several different types of software that sit in the middle of and provide connectivity between two or more software applications?

Middleware

Project ____________ represent key dates when a certain group of activities must be performed

Milestones

Project ____________ represent key dates when a certain group of activities must be performed.

Milestones

Which of the following is not an advantage of building a data-driven website?

Minimizes or reduces efficiency

What is the ability to purchase goods and services through a wireless Internet-enabled device?

Mobile commerce

A(n) ___________ is a simplified representation or abstraction of reality.

Model

___________ is the activity of drawing a graphical representation of a design.

Modeling

What is a device that enables a computer to transmit and receive data?

Modem

Which of the following is not one of the three key steps involved in business process improvement?

Monitor the performance of key individuals

Information technology _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

Monitoring

Gordon Moore, the co-founder of Intel, established which MIS law?

Moore's Law

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?

Nonrepudiation

Which of the following is part of the acceptable use policy stipulations?

Not attempting to mail bomb a site

John Cleaver is the CEO of Tech World, which is a retail store that sells computers, monitors, cameras, TVs and many other electronic products. John and his executive team are meeting to brainstorm new ideas on how to grow the business. One idea is to mimic a competitor's product that is attempting to sell a new product in a different industry. After performing a Porter's Five Forces analysis, John determines that all the forces are high in this new industry. What should John do?

Not introduce the product because all 5 forces are strong and this would be a highly risky business strategy.

Which of the following would not be found in a typical acceptable use policy?

Not posting commercial messages to groups where the employee has received user consent

What is one of the guidelines an organization can follow when creating an information privacy policy?

Notice and disclosure

What do data warehouses support?

OLAP and analytical processing

What captures transaction and event info using technology to 1) process the info according to defined business rules 2) store the info 3) update existing info to reflect the new info

OLTP

Project __________ are quantifiable criteria that must be met for the project to be considered a success.

Objectives

What is deperimeterization?

Occurs when an organization moves employees outside its firewall

Project management ____________ is an internal department that oversees all organizational projects.

Office

___________ outsourcing is using organizations from developing countries to write code and develop systems.

Offshore

What is it called when a company uses organizations from developing countries to write code and develop systems?

Offshore outsourcing

What is using organizations from developing countries to write code and develop systems?

Offshore outsourcing

What percentage will all of today's technical knowledge represent in 2050?

One

What are the ramifications of improper electronic recycling, when analyzing the example of a single desktop computer?

One computer contains more than 700 chemicals that can be toxic to the environment. Computers in landfills can leak these toxic chemicals into our land, water, and air. Computers contain high levels of mercury, lead, and cadmium-harmful toxins

What caused Polaroid to go bankrupt?

One-hour film processing and digital cameras stole its market share.

What does the cloud computing service provider "Mozy" specializes in?

Online computer backup services

What is engaging another company within the same country for services?

Onshore outsourcing

What is the outsourcing option that includes the closest location and direct customer control?

Onshore outsourcing

What is software whose source code is available free for any third party to review and modify?

Open source

Which of the following demonstrates potential issues with Business 2.0 and information vandalism?

Open source allows anyone to be able to edit, damage, or destroy content.

What is a system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

Open system

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

Open system

Which form of BI has managers and analysts as its primary users?

Operational BI

Which form of BI uses real-time metrics for its data?

Operational BI

Which type of BI manages daily operations and integrates BI with operational systems?

Operational BI

At which level of an organization do employees develop, control, and maintain core business activities required to run the day-to-day operations?

Operational level

All of the following are reasons why operational systems are not appropriate for business analysis, except:

Operational systems are integrated

All of the following are reasons why operational systems are not appropriate for business analysis except:

Operational systems are integrated.

Greg works for Geneva Steel Corporation. Greg's duties include managing the overall processes for the company and transforming the steel resources into goods. Which department would Greg most likely work in?

Operations Manager.

What types of BI decisions include predicting machinery failures and finding key factors that control optimization of manufacturing capacity?

Operations management BI decisions

Most companies are organized by departments or functional areas. Which of the following is not a common department found in a company?

Payroll

Most companies are typically organized by departments or functional areas. Which of the following is not a common department found in a company?

Payroll

What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server?

Peer-to-peer (P2P)

What is the recommended way to implement information security lines of defense?

People first, technology second

Which of the following represents the biggest problem of information security breaches?

People misusing organizational information

Which of the following is not a reason for the growth of decision-making information systems?

People no longer have to worry about protecting the corporate asset of organizational information

A company should be able to calculate the cost of downtime by which of the following?

Per hour, per day, and per week

____________ maintenance makes changes to enhance the system, which improves such things as processing performance and usability

Perfective

Which type of maintenance makes changes to enhance the system, which improves such things as processing performance and usability?

Perfective maintenance

What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?

Performance

Which of the following measures how quickly a system performs a certain process or transaction?

Performance

Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?

Personalization

Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix's ebusiness strategy?

Personalization

What occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely to appeal to that person?

Personalization

Which company had an employee's spouse load file-sharing software onto a company laptop creating a security hole that appears to have compromised the names and Social Security numbers 17,000 current and former employees?

Pfizer

What targets sales opportunities by finding new customers or companies for future sales?

Opportunity management system

________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials

Opt-in

Which of the following is a type of transaction processing system?

Order processing

Which of the following is a customer-facing process?

Order shipping

Which of the following represents a business process you would find in the operations management department?

Ordering inventory

What does digital Darwinism imply?

Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.

Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses

Other expenses

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?

Outsourcing

_________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

Outsourcing

Question 20 Which company is a leader in the transformation of the broadcasting industry?

PBS

A(n) _____ chart is a graphical network model that depicts a project's tasks and the relationships between those tasks.

PERT

What is a graphical network model that depicts a project's tasks and the relationships between those tasks?

PERT chart

What type of chart typically displays the critical path?

PERT chart

What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?

Paradigm shift

____________ implementation uses both the old and the new systems until it is evident that the new system performs correctly.

Parallel

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. What type of identity theft were you just a victim of?

Pharming

What is the difference between phishing and pharming?

Phishing is a technique to gain personal info for the purpose of identifying theft. Pharming reroutes requests for legitimate websites to false websites.

____________ implementation has only a small group of people use the new system until it is evident that the new system performs correctly and then adds the remaining people to the new system.

Pilot

Counterfeit software

Pirated software

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

Pirated software

Which of the following is not one of the four phases in the product life cycle?

Place

A project ____________ is a formal, approved document that manages and controls project execution.

Plan

Which of the following represents the phases in the SDLC?

Plan, analysis, design, develop, test, implement, maintain

The ______________ phase involves establishing a high-level plan of the intended project and determining project goals.

Planning

What is the first step in the SDLC?

Planning

____________ implementation discards the old system completely and immediately starts to use the new system.

Plunge

What converts an audio broadcast for use by a digital music player?

Podcasting

Which of the following describes ePolicies?

Policies and procedures that address the ethical use of computers and Internet usage in the business environment.

Which of the following changes its form as it propagates?

Polymorphic viruses and worms

What is the number one reason that IT projects fall behind schedule or fail?

Poor planning or poor project management.

Which of the following is an example of a sustaining technology?

Porsche's faster car

Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?

Portability

What are forecasts?

Predictions made on the basis of time-series information

Which of the following is not a characteristic of a well-defined project plan?

Prepared by the project manager

Which of the following is not a characteristic of a well-defined project plan? Appropriate to the project's size

Prepared by the project manager

What type of keys do you need to use to create a relational database model?

Primary keys and foreign keys

What are the two main categories in a value chain analysis?

Primary value activities and support value activities.

What brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech and visual disabilities?

Web accessibility initiative

What allows users to access the WWW?

Web browser

What enables publishing content both to intranets and to public websites?

Web content management system

As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals?

Webinar

What is a locally stored URL or the address of a file or Internet page saved as a shortcut?

Website bookmark

Which of the following is not one of the questions asked during the analyzing phase?

What customers are at risk of leaving?

Which of the following provides an example of info

What is my worst selling product?

Which of the following is not one of the questions asked during the predicting phase?

What is the total revenue by customer?

What key questions should IT governance answer?

What key metrics management requires?

What is trend projection?

When numerical data are available, a trend can be plotted to display changes through time and into the future

OM information systems can answer all of the following questions, except:

Where the funding will come to support the effort?

The optimal disaster recovery plan in terms of cost and time is where on the disaster recovery cost curve.

Where the two cost effects intersect

What does a business continuity plan typically include?

Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems

Which company uses statistical analysis to automatically detect potential issues, provide quick and easy access to reports, and perform multidimensional analysis on all warranty information?

Whirlpool

Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs's top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?

White-hat hacker

Which of the following is not one of the questions asked during the reporting phase?

Who are our customers?

What do organizations using BI ask to find the root causes to problems and provide solutions?

Why

Which of the following questions represents a CRM analyzing technology question?

Why did sales not meet forecasts?

________ is a security protocol that protects wi-fi networks.

Wi-fi protected access

What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?

WiMAX wireless broadband

What spans a large geographic area such as a state, province, or country, similar to the Internet?

Wide area network (WAN)

What is a web-based tool that makes it easy for users to add, remove, and change online content?

Wiki

Which of the following is one of the largest wikis on the web and one of the 10 most popular web destinations?

Wikipedia

Which of the following is a potential business impact from teleliving?

Will take over routine tasks such as writing a letter, retrieving a file, and making a phone call

What refers to any type of electrical or electronic operation that is accomplished without the use of a "hard-wired" connection?

Wireless

What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves?

Wireless fidelity (wi-fi)

What technology uses radio waves rather than wires to transmit information across a local area network?

Wireless local area network

Which of the following statements is not accurate in reference to mobile and wireless computing?

Wireless technology is any type of operation accomplished with the use of a hard-wired connection.

A(n)___________ management system facilitates the automation and management of business processes and controls the movement of work through the business process.

Workflow

What facilitates the automation and management of business processes and controls the movement of work through the business process?

Workflow management systems

. What type of training is set in a classroom-type environment and lead by an instructor?

Workshop training

What does the wireless technology WiMAX stand for?

Worldwide interoperability for microwave access

Which of the following malware change their form as they propagate?

Worms

Which of the following is not performed during the implementation phase?

Write detailed business requirements

Who did Business 2.0 rank as number one in the top 50 people who matter most in business?

You - the customer

Which of the following is not a technology company but used technology to revamp the business process of selling shoes

Zappos

Which of the following does not describe Zappos' database?

Zappos' database was highly redundant

What is a great example of using cluster analysis in business to create target-marketing strategies?

Zip code segmentation

The cloud computing service provider ___________, specializes in word processor, spreadsheet, and online presentation tool services.

Zoho office

An API is a set of routines, protocols, and tools for ______________.

building software applications

The goal of value chain analysis is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a ________ or ________________.

cost advantage, product differentiation

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

ePolicies

Apple understood the importance of usability when it designed its _________?

iPod and iTunes system

What is another term for information cleansing?

information scrubbing

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

informed; consent

Enterprise resource planning (ERP):

integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprise wide information on all business operations.

Gender can be referred to in many ways (Male, Female, M/F, 1/0) in a data warehouse. What is this an example of?

Standardizing information

What tracks and communicates changes in the shareholder's earnings?

Statement of owner's equity

Which of the following best describes Web 1.0?

Static text-based information websites

What type of website is best to build for a general informational website with static information?

Static website

__________ analysis performs such functions as information correlations, distributions, calculations, and variance analysis.

Statistical

Which of the following techniques performs such functions as information correlations, distributions, calculations, and variance analysis?

Statistical analysis

Which system differentiates an executive information system from a decision support system and a transaction processing system?

Stock market information system

Which of the following is not a guideline for effectively dealing with change management?

Stop change

Which form of BI uses months to years as its time frame?

Strategic BI

Which type of BI achieves long-term organizational goals?

Strategic BI

Which evaluation criteria is an organization using that prioritizes its projects by giving priority to those projects that are in line with the organization's strategic goals and objectives?

Strategic alignment

Business process modeling or mapping, is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a ________ sequence.

Structured

___________ collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules

Structured

What involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules?

Structured collaboration

What is another term for data that are already contained in a database or a spreadsheet?

Structured data

Which of the following asks users to write lines of code to answer questions against a database?

Structured query language

Which social media site works by allowing content to find the users, instead of the users having to search for the content?

StumbleUpon

All of the following are forms of ebusiness except ______________.

Subscription fee

For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual ebusiness that acts like a search engine but focuses on only the real estate industry. The main revenue source for Perry's ebusiness will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry's new business?

Subscription fees

Which of the following represents a typical supply chain?

Suppliers - Company - Customers.

Which of the following automates the different steps and stages of the supply chain?

Supply chain execution software

Which of the following ensures supply chain cohesion by automating the different activities of the supply chain?

Supply chain execution systems

What is the ability to view all areas up and down the supply chain in real time?

Supply chain visibility

What is the ability to view all areas up and down the supply chain?

Supply chain visibility

Which of the following is a key to SCM success?

Support Organizational Goals.

What are the three business functions an MIS infrastructure supports?

Supports info change, change, and business continuity planning

What is a platform as a service (PaaS)?

Supports the deployment of entire systems, including hardware, networking, and applications using pay-per-use revenue model

What describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment?

Sustainability or green MIS

Grid computing, cloud computing, and virtualization are all elements of a (an) ________ MIS infrastructure?

Sustainable

The ____MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

Sustainable

The __________ MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

Sustainable

What do you call the safe disposal of MIS assets when they reach the end of their life cycle?

Sustainable MIS disposal

___________ make customers reluctant to switch to another product or service.

Switching costs

All of the following are business-critical integrity constraints, except:

System will not allow returns of fresh produce after 15 days past delivery

What is the overall process for developing information systems from planning and analysis through implementation and maintenance?

Systems development life cycle

Which of the following represents a brick-and-mortar business?

T.J. Maxx

Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL?

T1 line

. A shopping bot is one of the simplest examples of an intelligent agent.

TRUE

A genetic algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem

TRUE

Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

TRUE

A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.

TRUE A collaboration system is an IT -based set of tools that supports the work of teams by facilitating the sharing and flow of information.

When evaluating the business value of disintermediation, the more ____________ that are cut from the distribution chain, the lower the product price.

intermediaries

A content management system provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment.

TRUE A content management system provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment.

A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.

TRUE A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.

A kill switch is a trigger that enables a project manager to close the project prior to completion.

TRUE A kill switch is a trigger that enables a project manager to close the project prior to completion.

.A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.

TRUE A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.

Data is a strategic asset for a business and if the asset is not used the business is wasting resources.

TRUE Data is a strategic asset for a business and if the asset is not used the business is wasting resources.

Designing the IT infrastructure typically occurs during the design phase.

TRUE Designing the IT infrastructure typically occurs during the design phase.

Improving the quality of business decisions has a direct impact on costs and revenue.

TRUE Improving the quality of business decisions has a direct impact on costs and revenue.

In the past, outsourcing was often used tactically, as a quick-fix, short-term solution to a particular need or problem which did not form part of an overall business strategy.

TRUE In the past, outsourcing was often used tactically, as a quick-fix, short-term solution to a particular need or problem which did not form part of an overall business strategy.

Consider a home theater system. Which of the following represents the inputs?

The DVD player, DVD movie, speakers, TV, and electricity.

Which of the following is not a LAN?

The Internet

What is dynamic scaling?

The MIS infrastructure can be automatically scaled up or down based on needed requirements

Which act restricts what information the federal government can collect?

The Privacy Act

Which act protects investors by improving the accuracy and reliability of corporate disclosures?

The Sarbanes-Oxley Act

What are the two basic functions that social networking sites provide?

The ability to create and maintain a profile that is your online identity and create connections between other people within the network.

What is slice-and-dice capability?

The ability to look at information from different perspectives

What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?

The ability to use current devices such as iPhones and laptops as credit cards or tickets.

Which of the below represents the definition of information compliance?

The act of conforming, acquiescing or yielding info

Which of the following represents the definition of information compliance?

The act of conforming, acquiescing, or yielding information

What is a CPU?

The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together

What is business process reengineering?

The analysis and redesign of workflow within and between enterprises.

Which of the following describes confidentiality?

The assurance that messages and information are available only to those who are authorized to view them.

Consider a washing machine as a system. Which of the following represents the output?

The clean clothes.

Consider a washing machine as a system. Which of the following represents the outputs?

The clean clothes.

Which of the following reflects Moore's law?

The computer chip performance per dollar doubles every 18 months

What is information richness?

The depth and breadth of details contained in a piece of textual, graphic, audio, or video information.

What is the function of the sales department?

The function of selling a good or service and focuses on increasing customer sales, which increases company revenues

What category of outsourcing countries includes Canada, India, Ireland, Israel, and the Philippines?

The leaders

The balanced scorecard views the organization from four perspectives, and users should develop metrics, collect data, and analyze their business relative to each of these perspectives. Which of the following is not one of the four perspectives in the balanced scorecard?

The leading perspective

What is operations management?

The management of systems or processes that convert or transforms resources into goods and services

Ebusiness was characterized by a few companies or users posting content for the masses. What characterizes Business 2.0?

The masses posting content for the masses.

Which of the following statements is true?

The more complete and accurate an organization wants to get its information, the more it costs.

Which of the following represents megahertz?

The number of millions of CPU cycles per second

What is the systems development life cycle?

The overall process for developing information systems from planning and analysis through implementation and maintenance.

What is the critical path?

The path from start to finish that passes through all the tasks that are critical to completing the project in the shortest amount of time

Which of the following is included in Porter's Five-Forces Model?

The power of competitors.

What is the function of the marketing department?

The process associated with promoting the sale of goods or services. The marketing department supports the sales department by creating promotions that help sell the company's products

Which of the following is one of the important characteristics of business processes?

The process is cross-departmental

Which of the following is not one of the important characteristics of business processes?

The processes occur only within organizations

Which of the following defines supply chain logistics?

The product delivery processes and elements, including orders, warehouses, carriers, defective product returns, and invoicing.

The project management role has several responsibilities in the area of scope. Which of the following represent these areas for scope?

The project management role has several responsibilities in the area of scope. Which of the following represent these areas for scope?

Which of the following describes privacy?

The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.

What category of outsourcing countries includes Argentina, Chile, Costa Rica, New Zealand, Thailand, and Ukraine?

The rookies

Which of the following defines supply chain operations?

The schedule for production activities, including testing, packaging, and preparation for delivery.

What is software?

The set of instructions that the hardware executes to carry out specific tasks

Which of the following defines supply chain strategy?

The strategy for managing all the resources required to meet customer demand for all products and services.

What is usability?

The system is easy to learn and efficient and satisfying to use

What does reliability ensure?

The system is functioning correctly and providing accurate information

All of the following are business-critical integrity constraints except:

The system will not allow returns of fresh produce after 15 days past delivery.

What is data latency?

The time duration to make data ready for analysis and loading the data into the database

What is analysis latency?

The time from which data are made available to the time when analysis is complete

What is decision latency?

The time it takes a human to comprehend the analytic result and determine an appropriate action.

Which of the following is not a potential business impact from the world's population doubling in the next 40 years?

The time to get products and services to market is being shortened by technology

Consider an oven as a system. Which of the following represents the input?

The uncooked food.

What are countries that are beginning to emerge as solid outsourcing options?

The up-and-comers

Core business relationships and models are dramatically changing, including shifts from which of the following?

The value in material things to the value of knowledge and intelligence

Consider a washing machine as a system. Which of the following represents the process?

The wash and rinse cycle.

What is cloud computing services changing?

The way people access information The way people deliver information The way people use information

What are the three primary types of management info systems available to support decision making across the company levels

Transaction processing systems, decision support systems, executive information systems

What encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks?

Transactional

What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performance of daily operational tasks?

Transactional information

What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performing of daily operational tasks?

Transactional information

Which of the following encompasses all of the information contained within a single business process or unit of work, where its primary purpose is to support daily operational tasks?

Transactional information

Which of the following is not a type of operational planning?

Transformational planning

What is the standard Internet protocol that provides the technical foundation for the public Internet?

Transmission control protocol/Internet protocol (TCP/IP)

All of the following are scientific methods organizations use to anticipate, forecast, and assess the future, except:

Trend simulation

A cube is the common term for the representation of multidimensional information.

True

A data-driven website is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database.

True

A dimension is a particular attribute of information.

True

A genetic algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.

True

A loss occurs when businesses sell products or services for less then they cost to produce.

True

A project plan should include a "kill switch" or a trigger that enables a project manager to close the project prior to completion.

True

Break-even analysis is the point at which revenues equal costs.

True

Business intelligence (BI) refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts. -True -False

True

Consolidation, drill-down, and slice-and-dice are the three most common capabilities offered in an EIS.

True

Counterfeit software is manufactured to look like the real thing and sold as such.

True

Decisions in IT investments play critical role in business success.

True

For profit corporations primarily focus on making money and all profits and losses are shared by the business owners.

True

Globalization is an influential driver affecting the growth of outsourcing.

True

Human resources management includes the policies, plans, and procedures for the effective management of employees ('human resources').

True

IT infrastructure, security, e-business, and integrations are the four primary information technology areas where organizations are focusing.

True

Introduction, growth, maturity, and decline represent the product life cycle.

True

It is the responsibility of the CIO to ensure effective communications between business and IT personnel.

True

Most of the $1 trillion invested in IT projects worlwide through 2010 will be wasted due to failed projects.

True

One of the main ingredients in trust is privacy.

True

Organizational information comes at different levels and in different formats and granularities.

True

Organizational information comes in different levels, formats, and granularities.

True

Organizations use analytical information to make ad hoc decisions.

True

Organizations use transactional information to make repetitive decisions.

True

Poor planning is the most significant reason for projects failing.

True

Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

True

Project stakeholders are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution of project completion.

True

Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.

True

Reports for each sales person, product, and part are examples of detail or fine information granularities.

True

Risk management is the process of proactive and ongoing identification, analysis, and response to risk factors.

True

The IT infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.

True

The barriers to mobile employees adopting wireless communication still largely outweigh the benefits.

True

The chief technology officer is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology.

True

The completeness characteristic of high-quality information ensures that there are no missing data values.

True

The project management institute develops procedures and concepts necessary to support the profession of project management.

True

The project manager is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.

True

The ultimate goal of AI is the ability to build a system that can mimic human intelligence.

True

Transactional information is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry.

True

What refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath?

Twisted-pair cable

An information partnership occurs when _______ or more organizations cooperate by integrating their IT systems.

Two

Which of the following terms could you use synonymously when referring to the web?

URL, domain name

What is the difference between unavailable and high availability?

Unavailable is when the system is not operating and can't be used, whereas high availability is when a system is continuously operating at all times.

What is one of the most common reasons why systems development projects fail?

Unclear or missing business requirements

What are the two main objectives associated with data mining?

Uncovering trends and patterns

Which of the following is the result of BI that the data have been defined in business terms and calculations and algorithms are easily accessed for comprehension?

Understandable

What is it called when each transaction, entity, and event is represented only once in the information?

Uniqueness

____________ testing tests each unit of code as soon as the unit is complete to expose faults in the unit regardless of its interaction with other units.

Unit

Many social media sites today allow you to customize your Web address, for example www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?

Universal Resource Locator

Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?

Universal resource locator

Which type of BI benefits are the results of discoveries made by creative users?

Unpredictable benefits

_________ collaboration includes document exchange, shared whiteboards, discussion forums, and email.

Unstructured

What includes document exchange, shared whiteboards, discussion forums, and email?

Unstructured collaboration

What is another term for data that do not exist in a fixed location?

Unstructured data

What is web mining?

Unstructured data associated with websites to identify consumer behavior and website navigation

What is McDonald's performing when it asks its customers if they would like to super-size their meals?

Up-selling

Which of the following is a business benefit of BI?

Up-to-the minute information for everyone

On the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate?

Upper right-hand corner

Where would you find the suppliers' suppler in a typical supply chain?

Upstream

The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes. What is the recommended new phrase?

Uptime is money

What is the integration of communication channels into a single service?

Urified communication

All of the following are types of website visitors except:

Usability visitor

What is application software?

Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others

Which of the following highlights how to use the system?

User documentation

What is one of the major problems with email?

User's expectation of privacy

What is web content that is created and updated by many users for many users?

User-contributed content

What do Netflix and Amazon use to drive their recommendation tools?

User-generated content

Which of the following statements means the same as easy-to-manage content?

Users can update data-driven website with little or no training.

What is parallel implementation?

Using both the old and new systems until it is evident that the new system performs correctly

What is teleliving?

Using information devices and the Internet to conduct all aspects of life seamlessly

What is social engineering?

Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker

Which of the following is not one of the parallels between challenges in business and those of war?

Using tactical business intelligence

What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

Utility computing

What IT governance focus area ensures the IT department delivers the promised benefits for every project or investment?

Value delivery

Which company has "The Wall of Shaygan", which is a digital dashboard that tracks 100-plus IT systems on a single screen?

Verizon Communications

In a Gantt chart tasks are listed __________ and the project's timeframe is listed ____________.

Vertically, horizontally

Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?

Viral marketing

Grid computing takes advantage of the available 75 percent of unused processing power of a computer and links thousands of individual computers around the world, creating a (an) _______ that can process intensive tasks.

Virtual supercomputer

What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple "virtual" machines on a single computing device?

Virtualization

What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple "virtual" machines, all on a single computing device?

Virtualization

What is software written with malicious intent to cause annoyance or damage?

Virus

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?

Virus

Which of the following is the best security practice used today?

Virus protection

What category of website metrics does stickiness, or visit duration time, belong to?

Visit metric

Which network uses radio signals to transmit and receive data over distances of a few hundred feet?

WLAN

Which of the below would not be considered a company operating in the long tail of a typical sales curve?

Walmart

Which of the following companies used analytical analysis to identify a correlation between storms and the increased sale of Pop-Tarts?

Walmart

Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents buyer power in the music industry?

Walmart, Target, iTunes.

Within the sites that support disaster recovery, _________ is a separate facility with computer equipment that requires installation and configuration?

Warm site

Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness?

Waste or recycling industry

The ___________ methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.

Waterfall

Identify the different ways in which companies collaborate using technology.

Ways in which companies collaborate include document exchange, shared whiteboards, discussion forums, and email.

Which term describes the WWW during its first few years of operation between 1991 and 2003?

Web 1.0

Which statement below is inaccurate?

Web 2.0 is a simple static website without any interaction with its users.

Many social media websites use _________, or specific keywords or phrases incorporated into website content for means of classification or taxonomy.

tags

A social bookmarking site is dedicated to providing all of the following except ________.

to reconnect with colleagues for business progress

Which of the following offers an advantage of using a data-driven website?

• Easy to eliminate human errors • Easy to manage content • Easy to store large amounts of data

Which of the following represents a reason data warehouses were created?

• Numbers and types of operational databases increased as businesses grew. • Many companies had information scattered across multiple systems with different formats. • Completing reporting requests from numerous operational systems took days or weeks.

What is responsible for the speed, accuracy, availability, and reliability of the MIS

CTO

Which company is expected to gain the majority of its returns on new investments?

Dell

Which of the following includes a common reason that change occurs?

-A misunderstanding of the initial scope -Shifts in planned technology that force unexpected and significant changes to the business -An omission in defining initial scope

What category of outsourcing countries includes Brazil, China, Malaysia, Mexico, Russia, and South Africa?

. The up-and-comers

What is a widely held but difficult to achieve standard of availability for a system?

"Five 9s" availability

What does the Data Warehousing Institute estimate that low-quality information costs U.S. businesses annually?

$600 billion

Which of the following defines information security?

-A broad term encompassing the protection of information -Protects information from accidental misuse -Protects information from intentional misuse

Which of the following should be included in a company email privacy policy?

-Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization -Statement discouraging sending junk email or spam to anyone who doesn't want to receive it -Statement informing users that the organization has no control over email once it has been transmitted outside the organization

Which of the below should be included in a company email privacy policy?

-Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization. -Statement discouraging sending junk email or spam to anyone who doesn't want to receive it. -Statement informing users that the organization has no control over email once it has been transmitted outside the organization

Which of the following allows a user to access the Internet?

-Dial-up connection -Cable -T1 line

Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as __________.

-Editor -Subject matter expert -Reader (all of the above)

Which of the following occurs when everyone involved in sourcing, producing, and delivering the company's product works with the same information?

-Eliminates redundancies -Cuts down wasted time -Removes misinformation

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

-Employees copying and distributing company-owned software -Employees searching other employees' private information without consent -Employees intentionally creating or spreading viruses to confuse IT

What can unified communications merge?

-IMing -Videoconferencing -Voice mail

What is a feature of IPTV?

-IPTV uses low bandwidth. -IPTV offers personalization. -IPTV supports multiple devices.

A smart card is a device, the size of a credit card, that contains embedded technology that stores information and small amounts of software and can act as __________________?

-Identification instruments -A form of digital cash -A data storage device

Which of the following is an organizational result from an effective and efficient supply chain management system?

-Increase efficiencies while seeking a competitive advantage through cost leadership. -Decrease the power of its buyers. -Create entry barriers, thereby reducing the threat of new entrants. (all of the above)

What can effective and efficient supply chain management systems enable an organization to accomplish?

-Increase its supplier power. -Increase the power of its buyers. -Increase switching costs to increase the threat of substitute products or services. (all of the above)

Which of the following is a common Internet monitoring technology?

-Key logger -Hardware key logger -Cookie

Which of the following is a cost of downtime in addition to lost revenue?

-Legal expenses -Loss in financial performance -Damage to reputation

Which of the following is experiencing rapid growth due to wireless technology?

-RFID -GPS -GIS

Which of the following is an example of a way to maintain information security that a company should include in its information security policies?

-Requiring computer users to log off before leaving for lunch -Never sharing user or password information with anyone -Changing passwords every 30 to 60 days

What is the most secure type of authentication?

-Something the user knows such as a user ID and password -Something the user has such as a smart card or token -Something that is part of the user such as a fingerprint or voice signature

The most secure procedures combine which of the following authentication and authorization techniques?

-Something the user knows, such as a user ID and password -Something the user has, such as a smart card or token -Something that is part of the user, such as a fingerprint or voice signature

Michael Porter defined the Five-Forces Model and the potential pressures that can hurt sales. Which of the following is not one of the potential pressures that can hurt sales?

-Substitute products can steal customers. -New market entrants can steal potential investment capital. - Suppliers can drive down profits by charging more for supplies. (all of the above)

What can encryption technology perform?

-Switch the order of characters -Replace characters with other characters -Insert or remove characters

Which of the following offers an example of a WAN?

-The Internet -Microsoft's main campus in Washington -The city of Denver's court and police departments

What is a benefit of network convergence?

-The weaving together of voice, data, and video -Multiple services offered from a single vendor -Multiple devices supported by one provider

Which of the following would you find in a typical Internet use policy?

-User ramifications if the policy is violated -User responsibility for properly handling offensive material -User responsibility for protecting the company's good name

What are critical questions that managers should ask when determining the cost of downtime?

-What is the productivity cost associated with each hour of downtime? -How many transactions can the company afford to lose without significantly harming business?

Which of the following is an issue related to the waterfall methodology?

. Flaws in accurately defining and articulating the business problem B. Managing costs, resources, and time constraints C. Assumes users can specify all business requirements in advance D. All of the above*

How many days is a typical sprint in the Scrum methodology?

30 days

How many days is a typical sprint in the scrum methodology?

30 days

Which of the following represents the estimated percentage that spam accounts for in an organizations' email traffic?

40 to 60 percent

How long does a product's entire life cycle last today?

40 weeks

One comparison of the life expectancy of electronic devices is the analogy that one human year is equivalent to ________ years of technological advancements?

7

Currently, what percent of ewaste in the United States is not recycled?

80 percent

ERP, the heart

: ERP systems provide a foundation for collaboration between departments, enabling people in different business areas to communicate. The heart of an ERP system is a central database that collects info from and feeds info into all the ERP system's individual application components supporting diverse business functions such as accounting, manufacturing, marketing, and human resources. When info is updated in module, it is updated in all others throughout the entire system.

What is failover?

A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time

Which policy details the extent to which email messages may be read by others?

Email privacy policy

Bonnie Flat is a real estate agent who specializes in the luxury home market in Seattle, WA area. Bonnie is highly-technical and uses many types of online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of

A banner ad

Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using?

A banner ad

Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington, area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using?

A banner ad

What is an open system?

A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them

What is the difference between a business model and an ebusiness model?

A business model details how a company creates, delivers, and generates revenue. An ebusiness model does all of the same except on the Internet.

What is a pure-play business?

A business that operates only on the Internet without a physical store.

A change control board (CCB) that is responsible for approving or rejecting all change requests.

A change control board (CCB) that is responsible for approving or rejecting all change requests.

What is a network?

A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together

What is Mozilla Firefox?

A competitor to Internet Explorer.

What is fault tolerance?

A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service

Which of the following is correct in reference to a database?

A database can support many logical views.

Which of the following types of information can be found in a database?

A database maintains information on inventory, transactions, and employees.

What is a VPN?

A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server

What is a dividend?

A distribution of earnings to shareholders

What is a project charter?

A document issued by the project initiator or sponsor that formally authorizes the existence of a project and provides the project manager with the authority to apply organizational resources to project activities

What is a competitive advantage?

A feature of a product or service on which customers place a greater value than they do on similar offerings from competitors.

What is a primary key?

A field (or group of fields) that uniquely identifies a given entity in a table

What is a project milestone?

A key date by which a certain group of activities must be performed.

Which of the following clauses is typically contained in an acceptable use policy?

A nonrepudiation clause

What is a dimension?

A particular attribute of information.

What is a foreign key?

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables

What is a SOA service?

A simple business task

Which of the following delivers electricity using two-way digital technology?

A smart grid

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?

A social media policy

What is COTS?

A software package or solution that is purchased to support one or more business functions and information systems

What is a business process?

A standardized set of activities that accomplish a specific task, such as processing a customer's order.

Computers in United States account for 1 percent of the total energy needs of the entire country. This is roughly equal to the total energy needs of ______________?

A state such as Mississippi

Which of the following includes a common reason why change occurs?

A. A misunderstanding of the initial scope B. Shifts in planned technology that force unexpected and significant changes to the business C. An omission in defining initial scope D. All of the above*

Which of the following describes ETL?

A. A process that extracts information from internal and external databases B. A process that transforms information using a common set of enterprise definitions C. A process that loads information into a data warehouse D. All of the above

Which of the following is a phase in the SDLC?

A. Analysis B. Design C. Testing D. All of the above*

Which of the following should an organization consider during the buy vs. build decision?

A. Are there any currently available products that fit the organizations needs B. Can the organization customize or modify an existing COTS to fit its needs C. Is there a justification to purchase or develop based on the cost of acquisition D. All of the above*

Which act strengthened criminal laws against identity theft?

A. Bork Bill B. Sarbanes-Oxley Act C. Cable Communications Act D. None of the above*

What can a model accomplish?

A. Calculate risks B. Understand uncertainty C. Manipulate time D. All of the above A model can do all of the above.

Which of the following is a type of collaboration system?

A. Content management system B. Groupware system C. Knowledge management system D. All of the above*

What made-to-order views can analytical CRM tools slice-and-dice customer information into?

A. Customer value B. Customer spending C. Customer segmentation D. All of the above

Which of the following is a business-related consequence of failing software?

A. Decrease productivity B. Damage to brand reputation C. Incur liabilities D. All of the above*

Which of the following describes ERP systems?

All of these: ERP systems provide a foundation for collaboration between departments. ERP systems enable people in different business areas to communicate. ERP systems have been widely adopted in large organizations to store critical knowledge used to make the decisions that drive the organization's performance.

Which of the following is one of the four categories of costs associated with downtime?

All of these: Financial performance Revenue Damaged reputation

Which of the following is a benefit an organization can receive from outsourcing?

All of these: Financial savings Increased technical abilities Market agility

Which of the following is one of the 21st-century organizational trends on the business side?

All of these: Focus on improved business resiliency via the application of enhanced security. Emphasis on strategic analysis for cost reduction and productivity enhancement. Uncertainty in terms of future business scenarios and economic outlooks.

Which of the following is a benefit a business can receive by deploying the latest in security technology?

All of these: Greater advances in administration Fewer disruptions to organizational systems Increased productivity of employees

What is the name of a company's internal MIS department?

All of these: Management information systems (MIS) Information systems (IS) Information technology (IT)

How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking?

All of these: Mcommerce Mbusiness Mobile business

MIS is a business function. Which of the following does MIS perform to help aid the company in decision making and problem solving?

All of these: Moves information about people. Moves information about processes across the company to improve systems. Moves information about products.

Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?

All of these: Only authorized individuals can gain access to the network. Individuals cannot understand or alter information while in transit. Only authorized individuals can access applications for which they are entitled.

Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers?

All of these: Organization agility Instantaneous business response A focus on core competencies and processes

What is a potential problem or impact of technology dependence?

All of these: Outages create potentially great havoc for people, businesses, and educational institutions that rely heavily on technology. Many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills and could stunt psychological growth. How do people or businesses function if the connection is down?

Which of the following are the influential driver(s) affecting the growth of outsourcing markets?

All of these: Rapid growth Core competencies Industry changes

What is the most secure type of authentication?

All of these: Something the user knows such as a user ID and password Something the user has such as a smart card or token Something that is part of the user such as a fingerprint or voice signature

What is the primary difference between the different types of backup/recovery media?

All of these: Speed Cost Expense

Which of the following can be completed by encryption?

All of these: Switch the order of characters Replace characters with other characters Use a mathematical formula to convert the information into some sort of code

What is recovery?

All of these: The ability to get a system up and running in the event of a system crash The ability to get a system up and running in the event of a system failure Restoring the information backup

What does the disaster recovery cost curve chart(s)?

All of these: The cost to the organization of the unavailability of technology The cost to the organization of recovering from a disaster over time The cost to the organization of the unavailability of information

Which of the following represents market basket analysis?

All of these: Analyzes website information Analyzes checkout scanner information Detects customers' buying behavior

What can analytical CRM modeling tools discover?

All of these: Identify opportunities for expanding customer relationships. Identify opportunities for cross-selling. Identify opportunities for up-selling.

Which of the following is not included in the four quadrants of ethical and legal behavior?

All of these: Legal behavior and ethical behavior Illegal behavior and ethical behavior Legal behavior and unethical behavior

Which of the following activities does a CIO perform?

All of these: Oversees all uses of information technology. Ensures the strategic alignment of IT with business goals. Ensures the strategic alignment of IT with business objectives.

Web-based Self Service Systems

Allows customers to use the web to find answers to their questions or solutions to their problems.

What is an integration?

Allows separate systems to communicate directly with each other

What does the average company spend on production needs?

Almost 50 percent of every dollar that it earns

What is a backup?

An exact copy of a system's information

What is a project manager?

An individual who is an expert in project planning and management.

What is a project management office (PMO)?

An internal department that oversees all organizational projects.

What is a schedule feasibility study?

Assesses the likelihood that all potential time frames and completion dates will be met

What reveals the degree to which variables are related and the nature and frequency of these relationships in the information?

Association detection

Which of the following defines the relationship between variables along with the nature and frequency of the relationship?

Association detection

What is the difference between asynchronous and synchronous communication?

Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.

What is the continuous process improvement model?

Attempts to understand and measure the current process, and make performance improvements accordingly.

In the relational database model, what are characteristics or properties of an entity?

Attribute

In the relational database model, what is a characteristic or property of an entity?

Attribute

What is a method for confirming users' identities?

Authentication

Which of the following represents the three areas where technology can aid in the defense against attacks?

Authentication and authorization, prevention and resistance, detection and response

Which of the following represents the three areas where technology can aid in the defense against information security attacks?

Authentication and authorization, prevention and resistance, detection and response

What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

Authorization

What is the top CRM business driver?

Automation/productivity/efficiency

Which of the following is not contributing to ewaste?

Automobile

What is the DARPA grand challenge?

Autonomous ground vehicle field test

What addresses the time frames when systems can be accessed by employees, customers, and partners?

Availability

Which of the following is not a key factor an organization should consider when contemplating the buy vs. build decision?

Availability of CASE tools

Which of the following is a common customer service CRM metric?

Average time to resolution

What takes information entered into a given system and sends it automatically to all upstream systems and processes?

Backward integration

What occurs when a primary machine recovers and resumes operations, taking over from a secondary server?

Failback

Which of the following represents businesses buying from and selling to each other over the Internet?

B2B

Carfax is an example of a company that sells its products or services directly to its consumers online. Which ebusiness model is Carfax using?

B2C

Which category below represents the three common forms of business operations, brick-and-mortar, click-and-mortar, and pure play?

B2C

What is the difference between a B2C and a C2B?

B2C focuses on business to consumers, and C2B focuses on consumers to business.

The balanced scorecard was developed by Drs. Robert Kaplan of the Harvard Business School and David Norton. Which systems does the balanced scorecard measure?

BPR and ERP

Which of the following are all common forms of viruses?

Backdoor program, worm, Trojan-horse viruses

Which is a virus that opens a way into the network for future attacks?

Backdoor programs

Which characteristics support an information MIS infrastructure?

Backup and recovery plan, disaster recovery plan, business continuity plan

Each year, businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures.

Backup and recovery plans Fault tolerance Failover

Which of the following describes the difference between a backup plan and a recovery plan?

Backup is an exact copy of a system's information; recovery is the ability to get a system up and running in the event of a system crash or failure.

Which of the following represents the primary elements in an information MIS infrastructure?

Backup, recovery, disaster recovery, and business continuity planning

What question can be answered using info?

Best selling product, best customer, worst selling product

Cheryl is the operations manager for Nature's Bread Company, which specializes in providing natural products for health conscience individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of knowledge that Cheryl would be using to successfully perform her job.

Best-selling product changes when Tony the best banker is working.

Which of the following is the most uncommon reason why companies outsource?

Better manage the costs of internal processes.

Where do organizations typically place firewalls?

Between the server and the Internet

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?

Black-hat hacker

Who breaks into other people's computer systems and just looks around or steals and destroys information?

Black-hat hacker

Which of the following is the correct list of the six different types of hackers listed in your text?

Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers

What is an online journal that allows users to post their own opinions, comments, graphics, and video?

Blog or web log

Which of the following identifies Business 2.0 communication and collaboration tools?

Blogs, wikis, mashups

The ___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.

Bork

Contacted customers regardless of their opt-out or opt-in decision

Bork Bill

Automating a business process that contains _____ or____ will magnify or amplify these problems if they are not corrected first

Bottlenecks;redundancies

Where is the position of IT infrastructure within the organization?

Bottom

What is a business that operates in a physical store without an Internet presence?

Brick-and-mortar business

What are the three primary models that a B2C business can use to operate?

Brick-and-mortar, click-and-mortar, virtual

What are the three primary models that a B2C can use to operate?

Brick-and-mortar, click-and-mortar, virtual

Which company experienced difficulty with answering their call center phone?

Brother International Corporation

Lands' End created an organization wide data warehouse so all its employees could access organizational information. Lands' End soon found out that there could be "too much of a good thing." Many of its employees would not use the data warehouse because it was simply too big, too complicated, and had too much irrelevant information. Lands' End knew there was valuable information in its data warehouse, and it had to find a way for its employees to easily access the information. What was Lands' End solution?

Build a data mart

Broad functions of a CIO include all of the following, except:

Building and maintaining strong customer processes

An API is a set of routines, protocols, and tools for

Building software applications

A company's internal wiki can be a great tool for all of the following except:

Building software applications.

What is it called when distorted product demand information passes from one entity to the next throughout the supply chain?

Bullwhip effect

What is it called when distorted product-demand information ripples from one partner to the next throughout the supply chain?

Bullwhip effect

What is the size of the internal electrical pathway along which signals are sent from one part of the computer to another?

Bus width

ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.

Business

What are collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project. Wikipedia, one of the largest online collaboration websites, is a good example.

Business Wiki

What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption?

Business continuity planning

What is a more comprehensive and all-encompassing plan that details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.

Business continuity planning

25. According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

C. Informed, consent

John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that the airline tix are far more expensive than they had anticipated. They decide to try to find cheaper tix on Priceline where they are allowed to set their own price they are willing to pay for the airline tix. What form of ebusiness model are John and Jenny using?

C2B

What is the ebusiness model that applies to customers offering goods and services to each other over the Internet?

C2C

Which act imposes limitations and penalties on businesses sending unsolicited email to consumers?

CAN-SPAM Act

Who is responsible for collecting, maintaining, and distributing the organizational knowledge?

CKO

Which ebusiness tool plays a crucial role in getting website visitors to view more than just the home page by providing clear navigation choices?

CMS

Who is responsible for ensuring the ethical and legal use of information within an organization?

CPO

Which application's primary business benefits include sales forecasts, sales strategies, and marketing campaigns?

CRM

Which of the following is a component ERP vendors offer to differentiate themselves in the marketplace?

CRM

What is an organization performing when it asks questions such as, "Which customers are at risk of leaving"?

CRM predicting technologies

Which of the following statements is incorrect?

CRM predicting technologies help organizations identify their customers across other applications.

What helps an organization identify its customers across applications?

CRM reporting technologies

Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?

CSO

Which of the following is not one of the six principles for ethical information management according to CIO magazine?

D. The CIO is responsible for how outsiders view and analyze corporate information

Which of the following offers a low-speed and low-cost backup method?

DVD Thumb drive External hard drive

_________ models represent a formal way to express data relationships to a database management system (DBMS).

Data

What is a facility used to house management information systems and associated components, such as telecommunications and storage systems?

Data center

What is a variable?

Data characteristic that stands for a value that changes or varies over time.

What compiles all of the metadata about the data elements in the data model?

Data dictionary

What is the smallest or basic unit of information?

Data element

What is the overall management of the availability, usability, integrity, and security of company data?

Data governance

Which of the following occurs when the same data element has different values?

Data inconsistency issue

Which of the following contains a subset of data warehouse information?

Data mart

What is the ultimate outcome of a data warehouse?

Data marts

What is the process of analyzing data to extract information not offered by the raw data alone?

Data mining

What is a logical data structure that details the relationship among data elements using graphics or pictures?

Data model

What determines the accuracy and completeness of organizational data?

Data quality audit

What is the primary problem most organizations face today concerning information?

Data rich, information poor

What are the primary differences between a data warehouse and a data mart?

Data warehouses have a more organizationwide focus; data marts have functional focus

What is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database?

Data-driven website

What type of website is best to build for a continually changing information, including press releases, new product information, and updated pricing?

Data-driven website

What type of website is best to build for a website with continually changing information including press releases, new product information, and updated pricing?

Data-driven website

Which of the following uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?

Data-mining tools

What is at the heart of any ERP system?

Database

What maintains information about various types of objects, events, people, and places?

Database

Which of the following is not one of the primary information technology areas on which organizations are focusing?

Database

Which of the following is not one of the primary information technology areas where organizations are focusing?

Database

Which of the following creates, reads, updates, and deletes data in a database while controlling access and security?

Database management system

What stores documents in a central location and automatically asks the team members to access the document when it is their turn to edit the document?

Database-based workflow system

What is the physical view of information?

Deals with the physical storage of information on a storage device such as a hard disk

Which of the following is not part of a typical SOA solution?

Decrease people productivity with better business integration

Which of the following is not an example of an advantage of using a relational database?

Decreased information security

Where would you categorize the cloud computing benefits that include decreases in hardware, maintenance costs, and software upgrades?

Decreased maintenance issues

What is project scope?

Defines the work that must be completed to deliver a product with the specified features and functions

Project ______________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

Deliverables

Project ______________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

Deliverables

As the product manager for the eatery division of Whole Foods, Jerry is responsible for analyzing sales data to help him manage his team. Today Jerry is analyzing his data by looking at details, and details of details of info. Which of the following common digital dashboard capabilities is Jerry using to analyze his department's success?

Drill-down

What is the computer attack where an attacker accesses a wireless computer network, incepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

Drive-by-hacking

When does information cleansing occur in the data warehouse?

During the ETL process and once it is in the data warehouse

An MIS infrastructure is ___________ and ____________.

Dynamic and continually changing

Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?

EIS, DSS, TPS

Which application's primary business benefits include forecasting, planning, purchasing, material management, warehousing, inventory, and distribution?

ERP

The evolution of ERP

ERP has grown to become part of the extended enterprise.

Which of the following is not an additional benefit of virtualization?

Ease of use for customer relationship management systems

Which of the following is the result of BI that it is no longer required to have a PhD in statistics to get sophisticated analytics delivered to users' fingertips?

Easily manipulated

What is a plan that details how a company creates, delivers, and generates revenues on the Internet?

Ebusiness model

What is the difference between ecommerce and ebusiness?

Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations

. A(n) _________ feasibility study identifies the financial benefits and costs associated with the systems development project.

Economic

All of the following are types of information security breaches except?

Ediscovery

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

Ediscovery

According to Peter Drucker, what are managers who do things right addressing?

Efficiency

A common mistake that many managers tend to make is focusing on only one type of metrics because they are easier to measure. Which type of metrics do they focus on?

Efficiency MIS metrics

The government has taken an active role online. Which of the following is the term that describes the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between government and the citizen-consumer within all the branches of government?

Egovernment

Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.

Elaboration

Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it?

Elaboration

Which gate in the RUP methodology provides a rough order of magnitude?

Elaboration Elaboration provides a rough order of magnitude.

The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

Electronic

What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?

Electronic tagging

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?

Elevation of privilege

. A(n)____________ privacy policy details the extent to which email messages may be read by others

Email

Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone?

Email

Which of the following policies details the extent to which email messages may be read by others?

Email privacy policy

CRM is a technology based on the premise that those organizations that understand the needs of individual customers are best positioned to achieve sustainable competitive advantage in the future.

FALSE CRM is a business philosophy, not a technology, based on the premise that those organizations that understand the needs of individual customers are best positioned to achieve sustainable competitive advantage in the future.

Canada is considered a rookie outsourcing country.

FALSE Canada is considered a leader outsourcing country.

Extraction, transformation, and loading is a process that extracts information from internal databases, transforms the information using a common set of enterprise definitions, and loads the information into an external database.

FALSE Extraction, transformation, and loading is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse.

Ideally, an organization only wants to build forward integrations.

FALSE Ideally, an organization wants to build both forward and backward integrations.

Outsourcing is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems.

FALSE Insourcing is a common approach that uses the professional expertise within an organization to develop and maintain the organization's information technology systems

Insourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

FALSE Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

Preventing liabilities is a business-related consequence of failed software.

FALSE Preventing liabilities is a business-related consequence of successful software.

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

FALSE Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

Project milestones are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

FALSE Project deliverables are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

Project deliverables represent key dates when a certain group of activities must be performed.

FALSE Project milestones represent key dates when a certain group of activities must be performed.

Provide training for the system users typically occurs during the testing phase

FALSE Provide training for the system users typically occurs during the implementation phase.

Unstructured collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules.

FALSE Structured collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules.

Testing is the fourth phase in the SDLC.

FALSE Testing is the fifth phase in the SDLC.

The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $60 billion annually.

FALSE The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $600 billion annually.

38. The assess project feasibility activity typically occurs during the analysis phase.

FALSE The assess project feasibility activity typically occurs during the planning phase.

The data warehouse is a location for all of a business's information.

FALSE The data warehouse is not a location for all of a business's information.

The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.

FALSE The development phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.

The leaders, the newcomers, and the rookies are the three categories of outsourcing countries.

FALSE The leaders, the up-and-comers, and the rookies are the three categories of outsourcing countries.

The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its suppliers.

FALSE The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its customers.

The primary purpose of a data warehouse is to perform transactional processes.

FALSE The primary purpose of a data warehouse is to perform analytical process.

The relationship between the triple constraint variables is not dependent.

FALSE The relationship between the variables in the triple constraint is interdependent.

The three forms of BI include operational, tactical, and value-added.

FALSE The three forms of BI include operational, tactical, and strategic.

The triple constraint includes time, cost, and quality.

FALSE The triple constraint includes time, cost, and scope. All impact quality.

An information partnership is one in which an organization chooses to focus specifically on what it does best and forms partnerships and alliances with other specialist organizations to handle nonstrategic business processes.

FALSE This is the definition for core competency strategy, not information partnership.

Which of the below is not an ISP?

Facebook

Which of the below is not an example of a social bookmarking website?

Facebook

What are project assumptions?

Factors that are considered to be true, real, or certain without proof or demonstration

Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is prone to floods, high winds, and tornados. As the lead enterprise architect on the night shift, Shawn has been asked to suggest ways the company can protect its information MIS infrastructure. Shawn notices that the company does not have the ability for its systems to respond to unexpected failures or crashes, and there is no backup system that can automatically take over without a loss of serve to Boise residents. What should Shawn recommend his company implement?

Fault tolerance

___________ creep occurs when developers add extra features that were not part of the initial requirements.

Feature

What allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network?

File transfer protocol (FTP)

What involves preparing financial reports that provide information about the business's performance to external parties such as investors, creditors, and tax authorities?

Financial accounting

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?

Firewall

Which of the following is a fundamental of the RAD methodology?

Focus initially on creating a prototype that looks and acts like the desired system B. Actively involve system users in the analysis, design, and development phases C. Accelerate collecting the business requirements through an interactive and iterative construction approach D. All of the above*

Broad differentiation, broad cost leadership, and _________ are the three generic strategies identified by Porter.

Focused strategy

What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keyword-based classification system?

Folksonomy

Which of the following is a form of statistical analysis?

Forecasting

What are the primary business benefits of an ERP system?

Forecasting, planning, purchasing, material management, warehousing, inventory, and distribution.

_______ are predictions made on the basis of time-series information.

Forecasts

What takes information entered into a given system and sends it automatically to all downstream systems and processes?

Forward integration

Which social media site uses LBS?

Foursquare

The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.

Freedom

hich act allows any person to examine government records unless it would cause an invasion of privacy?

Freedom of Information Act

What is the term that identifies how frequently a customer purchases items?

Frequency

Which of the following are examples of analytical information?

Future growth analysis, sales projections, and product statistics

__________ logic is a mathematical method of handling imprecise or subjective

Fuzzy

What is the ability to model the information system screens for an entire system using icons, buttons, menus, and submenus?

GUI screen design

Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents the threat of substitute products or services in the music industry?

Game systems like Wii and social networks like Facebook.

A(n) __________ chart is a simple bar chart that depicts project tasks against a calendar.

Gantt

What is a simple bar chart that depicts project tasks against a calendar?

Gantt chart

What is included in feedback for a car's system

Gas

What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?

Genetic algorithm

What is the definition of geoeconomic?

Geographic and economic business challenges

_________ seeking analysis could answer the question "How many customers are required to purchase our new product line to increase gross profits to $5 million?"

Goal

What finds the inputs necessary to achieve a goal, such as a desired level of output?

Goal-seeking analysis

Executives of a company deal less with details of the operational activities and deal more with the higher meaningful aggregations of info or "courser" info. What refers to the level of detail in the model?

Granularity

Jessica started her own online company, which specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate, ensuring the best possible experience for her customers. Which of the following is a critical component in Jessica's MIS infrastructure?

Hardware and software Client Server

What is the difference between hardware and software?

Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks.

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

Hardware key logger

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?

Hardware key logger

Which of the following database structures stores information in a tree-like structure that allows repeating information using parent/child relationships, in such a way that it cannot have too many relationships?

Hierarchical database

Which type of metric measures when a visitor reaches a website and their computer sends a request to the site's computer server to begin displaying pages?

Hit metric

What attacks computer systems by transmitting a virus hoax, with a real virus attached?

Hoaxes

Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?

Hot Site

Within the sites that support disaster recovery, ____ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

Hot site

What are areas around access points where users can connect to the Internet via wi-fi?

Hotspots

What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?

Hourly

Artificial intelligence simulates ______________ intelligence such as the ability to reason and learn.

Human

What is the Internet protocol web browsers use to request and display web pages using universal resource locators?

Hypertext markup language (HTML)

What is true about IT and business?

IT enables business success and motivation

Which of the following is not included as an information cleansing activity?

Identifies sales trends

What is an economic feasibility study?

Identifies the financial benefits and costs associated with the systems development project

What are the four challenges facing ebusinesses outlined in the text?

Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules.

What is forging of someone's identity for the purpose of fraud?

Identity theft

Which of the following is not a CRM industry best practice?

Implement in the big bang approach

The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.

Implementation

The systems development life cycle is the overall process for developing information systems from planning and analysis through _________________ and maintenance.

Implementation

What is phased implementation?

Implementing the new system in phases until it is evident that the new system performs correctly and then implementing the remaining phases of the new system

Which of the following is true in regards to the elimination of redundant information?

Improves information quality

Which of the following is true with regard to the elimination of redundant data?

Improves information quality

Which of the following is true in regard to eliminating redundant information?

Improves information quality.

What is one simplification that has occurred with Business 2.0?

Improving access to information.

What reports operating results (revenues minus expenses) for a given time period ending at a specified date?

Income Statement

What do most companies measure to determine the success of their websites?

Traffic

Kevin Campbell is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses and he also needs to purchase a rather expensive laptop. In an effort to save money, Kevin begins a Facebook group to find other college students who need to purchase laptops. Soon, Kevin's FB group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops?

Increasing buying power

Which of the following is not an advantage of a data-driven website?

Increasing update costs

All of the following are countries expected to have the largest increases in population between 2000 and 2050, except:

India

Which of the following represents the different information formats?

Individual, department, enterprise

Which of the following represents the different information levels?

Individual, department, enterprise

Which of the following is an example of acting ethically?

Individuals copy, use, and distribute software. B. Employees search organizational databases for sensitive corporate and personal information. C. Individuals hack into computer systems to steal proprietary information. D. None of the above.*

What refers to the depth and breadth of details contained in a piece of textual, graphic, audio or video?

Info richness

A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of __________.

Information

A decision support system models __________ to support managers and business professionals during the decision-making process.

Information

The __________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured.

Information

Francis works in the human resources division of a large oil and gas company in Texas. Francis's tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis?

Information MIS infrastructure

Which of the following include the three section titles of an MIS infrastructure?

Information MIS, agile MIS, and sustainable MIS infrastructures

Which of the following is the most commonly outsourced service?

Information Technology

What is a framework provided by the government of the United Kingdom and offers eight sets of management procedures?

Information Technology Infrastructure Library

What is the set of ideas about how all information in a given context should be organized?

Information architecture

Which of the following governs the ethical and moral issues arising from the development and use of information technologies and the creation, collection, duplication, distribution, and processing of information?

Information ethics

What is the method or system of government for information management or control?

Information governance

Which of the following refers to the extent of detail within the information?

Information granularity

Which of the following is incorrect in reference to a database?

Information is accessed by physical structure

A relational database contains information in a series of two-dimensional tables. How is data contained in a data warehouse and data mart?

Information is multidimensional, meaning it contains layers of columns and rows.

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring it has the types of data or information required to function and grow effectively?

Information management

What is it called when two or more organizations cooperate by integrating their IT systems, thereby providing customers with the best of what each can offer?

Information partnership

Which of the following is true in regards to the United States?

Information privacy is not highly legislated nor regulated

According to the text, Visa created a program called Innovant. What was the primary purpose for Innovant?

Information privacy policy

Which policy contains general principles regarding information privacy?

Information privacy policy

What measures the number of people a firm can communicate with all over the world?

Information reach

What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video?

Information richness

Which of the following statements is inaccurate?

Most organizations invest in backward integrations only

Which of the below is not a characteristic associated with Mozilla's Firefox?

Mozilla's Firefox is a prime example of a reputation system.

What in the cloud means that a single instance of a system serves multiple customers?

Multi-tenancy

___________ is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.

Multisourcing

What must you do with antivirus software to make it protect effectively?

Must frequently update it to protect against viruses

When applying Porter's three generic strategies, Tiffany & Co. has a competitive scope and cost strategy that is a __________.

Narrow market, high cost strategy.

What first ever national appointment was made by President Barack Obama?

National Chief Technology Officer

Which of the following is not a reason to increase market share?

Nearing production capacity

___________ outsourcing refers to contracting an outsourcing arrangement with a company in a nearby country.

Nearshore

What is contracting an outsourcing arrangement with a company in a nearby country?

Nearshore outsourcing

What are the 5 different networking elements creating a connected world?

Network categories, network providers, network protocols, network convergence and network access technologies

What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures?

Network convergence

Which of the following database structures offers a flexible way of representing objects and their relationships?

Network database

What describes how products in a network increase in value to users as the number of users increase?

Network effect

What is a category of AI that attempts to emulate the way the human brain works

Neural network

Which of the following countries is considered a rookie in the outsourcing industry?

New Zealand

Which of the following reflects Moore's Law?

New generations of chips deliver double the processing power as the previous generation

Which of the following is similar to focused strategy versus broad strategy?

Niche market versus large market.

Which handset-maker estimates at least 20 percent of its 68,000 employees use wiki pages to update schedules, project status, trade ideas, and edit files?

Nokia

Businesses typically outsource their ___________ business functions, such as payroll and IT.

Noncore

Which activity is performed during the implementation phase?

None of the above Write detailed user documentation, determine implementation method, and provide training for the system users are the activities performed during the implementation phase.

What is the policy that contains general principles to guide computer user behavior?

None of these

Which of the following authentication methods is 100 percent accurate?

None of these

Which act strengthened criminal laws governing identity theft?

None of these Bork Bill Sarbanes-Oxley Act Cable Communications Act

Which of the following is not considered a type of biometrics?

None of these voice face iris

What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?

Nonrepudiation

Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a customer their 100th cup of coffee they receive a pound of free coffee of their choice. What is Callie attempting to create with her unique "Free Pound of Coffee" marketing program?

Reducing buyer power with a loyalty program

What is network topology?

Refers to the geometric arrangement of the actual physical organization of the computers (and other network devices) in a network

____________ testing is performed after making a functional improvement or repair to the system to determine if the change has affected (or impacted) the other functional aspects of the software.

Regression

What occurs when steps are added to the value chain as new players find ways to add value to the business process?

Reintermediation

What uses the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways?

Reintermediation

A change control board is responsible for approving or ____________ all change requests.

Rejecting

Which of the following systems allow users to create, read, update, and delete data in a relational database?

Relational database management system

What are rules that enforce basic and fundamental information-based constraints?

Relational integrity constraint

What are the rules that enforce basic and fundamental information-based constraints?

Relational integrity constraint

What type of integrity constraint does not allow someone to create an order for a nonexistent customer?

Relational integrity constraint

Which of the following is the result of BI that implies that the data have been documented as the certified or approved data for the enterprise?

Reliable

What are the three phases in the evolution of CRM?

Reporting, analyzing, predicting

What is a challenge for cloud computing that could cause employee performance to decrease?

Required Internet connectivity

What contains the final set of business requirements, prioritized in order of business importance?

Requirements definition document

A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?

Researching products to find the lowest price and visiting the store to purchase the item.

Which of the following is a performed by a CCB?

Responsible for approving or rejecting all change requests

What types of BI decisions include predicting sales, determining correct inventory levels and distribution schedules among outlets, and loss prevention?

Retail and sales BI decisions

What types of BI decisions include predicting sales, determining correct inventory levels, and distribution schedules among outlets, and loss prevention?

Retail and sales BI decisions

What refers to the amount earned resulting from the delivery or manufacture of a product or from the rendering of a service?

Revenue

Which company offers a strategic business information service using artificial intelligence that enables organizations to track the product offering, pricing policies, and promotions of online competitors?

RivalWatch

Which application's primary business benefits include market demand, resource and capacity constraints, and real-time scheduling?

SCM

Which of the following is not a primary form of agile methodology?

SDLC

What are the two main methods for encrypting network traffic on the web?

SSL and SHTTP

Which of the following was one of the first CRM components built to address the issues that sales representatives were struggling with the overwhelming amount of customer account information they were required to maintain and track?

Sales force automation system

What automates each phase of the sales process, helping individual sales representatives coordinate and organize all of their accounts?

Sales management CRM systems

___________ achieved great success by managing information.

Samsung Electronics

________________ achieved great success by managing information, while _________ was unsuccessful at managing information.

Samsung Electronics, Staples

What refers to how well a system can adapt to increased demands of growth?

Scalability

What refers to how well a system can adapt to increased demands?

Scalability

Which of the following is not one of the four changes resulting from advances in information technology that are driving supply chains?

Scalability

Project _________ defines the work that must be completed to deliver a product with the specified features and functions.

Scope

Time, cost, and ___________ are the three primary variables in any project.

Scope

____________ creep occurs when the scope of the project increases.

Scope

Instant messaging is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet.

TRUE Instant messaging is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet.

Multisourcing is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.

TRUE Multisourcing is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.

Offshore outsourcing is using organizations from developing countries to write code and develop systems.

TRUE Offshore outsourcing is using organizations from developing countries to write code and develop systems.

PMI stands for The Project Management Institute.

TRUE PMI stands for The Project Management Institute.

Parallel implementation uses both the old and new systems until it is evident that the new system performs correctly.

TRUE Parallel implementation uses both the old and new systems until it is evident that the new system performs correctly.

antifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits.

TRUE Quantifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits.

The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.

TRUE The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

TRUE This is the definition of employee monitoring policies.

Ethical computer use policy contains general principles to guide computer user behavior.

TRUE This is the definition of ethical computer use policy.

Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.

TRUE This is the definition of opt-in.

Project management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

TRUE This is the definition of project management.

Traditional business risk models typically ignored software development, largely because most organizations considered the impact from software and software development on the business to be minor.

TRUE Traditional business risk models typically ignored software development, largely because most organizations considered the impact from software and software development on the business to be minor.

___________ knowledge is contained in people's heads.

Tacit

What is the knowledge contained in people's heads?

Tacit knowledge

What is the type of knowledge that is contained in people's heads?

Tacit knowledge

Which form of BI uses the time frame of days to weeks to months?

Tactical BI

Which type of BI conducts short-term analysis to achieve strategic goals?

Tactical BI

What is a forward integration?

Takes information entered into a given system and sends it automatically to all downstream systems and processes

What is a backward integration?

Takes information entered into a given system and sends it automatically to all upstream systems and processes

Which of the following is the primary reason why companies outsource?

Tap outside sources of expertise.

What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?

Taxonomy

Which of the following is the least important skill for an IT executive to possess?

Technical

Which of the below is not a characteristic of Business 2.0?

Technical skills are required

Cell phone manufacturers often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?

Technology platform

What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements?

Technology recovery strategy

Which of the following are the principle BI enablers?

Technology, people, and corporate culture

Which of the following is one of the principle BI enablers?

Technology, people, and corporate culture

What is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations?

Telematics

Which of the following is not one of the primary principles an organization should follow for successful agile software development?

Test and deliver infrequently.

What are the detailed steps the system must perform along with the expected results of each step?

Test conditions

In which phase is it most expensive to make a system change?

Testing

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________?

The Company

On average, how many years longer does each generation live than the previous in the United States?

Three

How do the majority of potential customers find business websites?

Through search terms that match the content.

What are the different options where an emergency notification service can be deployed?

Through the firm's own infrastructure By an outside service provider on company premises By an outside service provider hosted remotely

Which trend has the following potential business impact?

Time is becoming one of the world's most precious commodities

What are the three primary variables (or triple constraints) in any project?

Time, cost, scope

When discovering trends and seasonal variations in transactional information, use a ________________ forecast to change the transactional information by units of time, such as transforming weekly information into monthly or seasonal information or hourly information and into daily information

Time-series

What is time-series information?

Time-stamped information collected at a particular frequency

Which of the following implies that information is current with respect to the business requirement?

Timeliness

Which of the following implies that information is current with respect to the business requirements?

Timeliness

What is the primary purpose of a data warehouse?

To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.

Paula Logston is the owner and operator of a high-end online custom clothing company. Paula has never heard of Porter's Five Forces Model and wants to understand why she would perform an analysis using it. If you were tasked with explaining Porter's Five Forces model to Paula what would be the primary reason she would want to use this type of analysis?

To help Paula evaluate the attractiveness of the clothing industry.

Why is Noodles & Company using business intelligence?

To improve financial analysis.

Why is Ben & Jerry's using business intelligence?

To improve quality.

What is the purpose of business process reengineering?

To make all business processes the best-in-class.

A social bookmarking site is dedicated to providing all of the following except

To reconnect with colleagues for business progress

What is the primary reason a company has a failover system?

To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations

______is a small electronic device that changes user passwords automatically. The user enters his/her user ID and device displayed password to gain access to the network.

Tokens

Which activities do human resource components perform?

Track employee information including payroll, benefits, compensation, and performance assessment, and assume compliance with the legal requirements of multiple jurisdictions and tax authorities

Using the collective power of a community to identify and classify content significantly _________ content categorization costs.

lowers

Twitter is an example of a __________.

microblogging website

Systems development life cycle (SDLC)

overall process for developing info systems from planning and analysis through implementation and maintenance

Which of the following is an example of transactional information?

purchasing stock

eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called a(n) ____________.

reputation system

Which of the following represents a reason an organization might encounter low-quality information?

• Online customers intentionally enter inaccurate information to protect their privacy. • Different systems have different information-entry standards and formats. • Third-party and external information contains inaccuracies and errors.


Kaugnay na mga set ng pag-aaral

Prep U: Foundations 2 Exam 2- Honan

View Set

FINANCE / EXAM THREE / CHAPTER 12

View Set

Imaginary & Complex Numbers (Unit 6) Review

View Set

Econ 201 Hellman Midterm 2 Oregon State University

View Set