363
________ codes are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU) of a computer. Select one: a. Morse b. Block c. Binary d. Object e. Source
Binary
________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard. Select one: a. Stealware b. Spyware c. Adware d. Hardware e. Malware
Hardware
Which of the following is NOT one of Porter's five primary forces? Select one: a. Bargaining power of suppliers in an industry b. Substitute products from another industry c. Threat of flooding the industry with excellent products d. Rivalry among competing sellers in an industry e. Threat of potential new entrants in an industry
Threat of flooding the industry with excellent products
E-filing is an example of a ________ tool. Select one: a. consumer-to-business b. government-to-citizen c. business-to-business d. government-to-government e. consumer-to-consumer
government-to-citizen
Many ________ systems used by organizations combine a variety of tools supporting both synchronous and asynchronous communication and collaboration. Select one: a. firmware b. spyware c. mashup d. malware e. groupware
groupware
According to basic economics within a competitive marketplace, the price of a product is set by its ________. Select one: a. fixed cost b. sunk cost c. marginal cost d. opportunity cost e. transaction cost
marginal cost
The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles that will allow computers to be able to better index Web sites, topics, and subjects. Select one: a. folksonomy b. affiliate c. phishing d. collaborative e. semantic
semantic
Traditionally, companies are organized around five distinct functional areas. Which of the following is one of them? Select one: a. risk management b. communication management c. supply chain management d. technology management e. systems management
supply chain management
A network of a broad range of physical objects that can automatically share data over the Internet is called ________. Select one: a. the Internet of Things b. the Internet of Big Data c. the Wireless Internet Network d. the Broad Internet e. the Industrial Internet of Things
the Internet of Things
Which of the following HTML tags is used to create a new paragraph? Select one: a. <p> . . . </p> b. <tr> . . . </tr> c. <b> . . . </b> d. <i> . . . </i> e. <u> . . . </u>
<p> . . . </p>
________ testing involves testing of the capabilities of the system in the user environment with actual data. Select one: a. Beta b. Comparative c. Evolutionary d. Developmental e. Alpha
Beta
________ are a set of activities an organization performs in order to reach their business goals. Select one: a. Business standards b. Business cases c. Business technocracies d. Business processes e. Business data flow models
Business processes
Which type of innovation is best described as using innovative ways to connect offerings with customers? Select one: a. Brand innovation b. Structure innovation c. Service innovation d. Channel innovation e. Process innovation
Channel innovation
Which of the following is NOT a typical revenue model in the digital world? Select one: a. Freemium b. Channel marketing c. Licensing d. Affiliate marketing e. Subscriptions
Channel marketing
Which of the following occurs during wiki wars? Select one: a. Editors agree with the creators of the content. b. Contributors continuously edit or delete each other's posts. c. Administrators refuse to publish a creator's content. d. Guests edit a creator's content without permission. e. Editors do not agree with the creators of the content.
Contributors continuously edit or delete each other's posts.
________ activities are performed by the functional areas that process inputs and produce outputs. Select one: a. Extended b. Focus c. Support d. Base e. Core
Core
________ is the use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments. Select one: a. Cybersquatting b. Cyberforensics c. Cyberterrorism d. Cyberstalking e. Cyberbullying
Cyberterrorism
Which of the following explains the term geocoded? Select one: a. Data is transformed into coordinates. b. Data is used to create Web pages. c. Data is shared on the Internet. d. Data is converted into soft data. e. Data is compared with similar historical data.
Data is transformed into coordinates.
The ________ Act of 1986 made it much more difficult for anyone, including the government, to eavesdrop on phone conversations. Select one: a. Electronic Communication Modernization b. Internet Privacy c. Electronic Communications Privacy d. Sarbanes-Oxley e. Gramm-Leach-Bliley
Electronic Communications Privacy
________ is an XML-based specification for publishing financial information. Select one: a. Extensible Rights Markup Language b. Extensible Business Reporting Language c. Enterprise Mashup Markup Language d. Extensible Access Control Markup Language e. Extensible Application Markup Language
Extensible Business Reporting Language
________ is a standard for exchanging structured information over the Web. Select one: a. MySQL b. Active Server Pages c. Unified Modeling Language d. JavaScript e. Extensible Markup Language
Extensible Markup Language
________ allows using approximations or subjective values to handle situations where information about a problem is incomplete. Select one: a. Clustering b. Stickiness c. What-if analysis d. Normalization e. Fuzzy logic
Fuzzy logic
________ activities encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management. Select one: a. Technology development b. Account c. Human resource d. Procurement e. Architectural
Human resource
Web servers process user requests for pages using the ________. Select one: a. Trivial File Transfer Protocol b. TOC Protocol c. Dynamic Host Configuration Protocol d. Address Resolution Protocol e. Hypertext Transfer Protocol
Hypertext Transfer Protocol
________ is the stealing of another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid. Select one: a. Logic bombing b. Bot herding c. Battery d. Spear phishing e. Identity theft
Identity theft
Which of the following statements is true about social bookmarking? Select one: a. It is the distribution of digital media. b. It allows users to post short "status updates." c. It allows podcasters to publish and push current shows to the viewers or listeners. d. It allows users to create folksonomies. e. It allows people to communicate using avatars.
It allows users to create folksonomies.
Which of the following statements is true about an IP address? Select one: a. It is written as eight numbers separated by periods. b. It is written as a number with a period at the end. c. The format of an IP address is a 64-bit numeric address. d. Each number separated by periods can have any number between 0 and 999. e. It can be used to navigate to particular Web addresses.
It can be used to navigate to particular Web addresses.
Which of the following best describes the network effect? Select one: a. It refers to the type of network an organization employs. b. It refers to the idea that networks are attached to each other. c. It refers to the notion that the value of a network increases with the number of users. d. The value of a network depends on the number of mobile devices that are attached. e. It refers to the effect of the wireless devices that are attached.
It refers to the notion that the value of a network increases with the number of users.
Which of the following is an example of reintermediation? Select one: a. Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute as meals in order to provide competition to the other food chains in the area. b. Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations. c. The diamond card of the Futilery Centriono, is issued by invitation only to customers who spend more than $250,000 a year on their shopping card. d. Nanny Duke, a baby products manufacturing company, acquires a list of parents-to-be and showers them with samples of diapers and other baby products to capture a share of their future purchases. e. Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers.
Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations.
________ is a programming language used to develop applications in artificial intelligence and high-speed arcade graphics. Select one: a. COBOL b. Perl c. LISP d. C++ e. FORTAN
LISP
________ refers to the process of identifying, quantifying, and presenting the value provided by a system. Select one: a. Deploying a software product b. Testing a process c. Making a prototype d. Making a business case e. Refining a prototype
Making a business case
________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data. Select one: a. Object-oriented language b. Authentication service c. Media access control d. Packet switching e. Source code
Media access control
________ systems are designed to handle multiple concurrent transactions from customers. Select one: a. Online transaction processing b. Network transaction maximization c. Product allocation d. Yield optimization management e. Real utility management
Online transaction processing
________ refers to the process of integrating external stakeholders into the innovation process. Select one: a. Social cataloging b. Nearshoring c. Open innovation d. Media sharing e. Crowdsourcing
Open innovation
________ software are applications written by third-party vendors that are used by many different users and organizations. Select one: a. Personalized b. Packaged c. Custom d. Tailored e. Bespoke
Packaged
________ are produced at predefined intervals to support routine decisions. Select one: a. Key-indicator reports b. Scheduled reports c. Drill-down reports d. Exception reports e. Security reports
Scheduled reports
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source. Select one: a. Viral marketing b. Spear phishing c. Logic bombing d. Hacking e. Cyber tunneling
Spear phishing
________ refers to the use of key performance indicators to monitor performance of the entire supply chain, including sourcing, planning, production, and distribution. Select one: a. Supply chain optimization b. Supply chain integration c. Supply chain analytics d. Supply chain strategy e. Supply chain visibility
Supply chain analytics
________ involves the development of various resource plans to support the efficient and effective production of goods and services. Select one: a. Supply chain planning b. Supply chain analytics c. Requirement planning d. Supply chain networking e. Requirement execution
Supply chain planning
Which of the following statements is true about the infrastructure as a service model? Select one: a. The customer has to manage the licenses for the operating systems being used. b. The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. c. The user has control over the applications, but has limited or no control over the underlying infrastructure. d. The customer can run his or her own applications that are typically designed using tools provided by the service provider. e. The customer does not have to manage operating system licenses.
The customer has to manage the licenses for the operating systems being used.
Which of the following is true for tangible costs? Select one: a. They are recurring costs. b. They are always fixed costs. c. They are always non-recurring costs. d. They are the same as intangible benefits. e. They are relatively easy to quantify.
They are relatively easy to quantify.
Identify a true statement about the function of knowledge workers. Select one: a. They modify knowledge created by others, but do not create knowledge themselves. b. They work in a monotonous workplace and lack innovation. c. They lack the ability to solve non-routine problems at work. d. They create, modify, and/or synthesize knowledge as a fundamental part of their jobs. e. They use knowledge to perform their jobs, but do not create knowledge.
They create, modify, and/or synthesize knowledge as a fundamental part of their jobs.
Which of the following statements about vendor-managed inventory (VMI) is true? Select one: a. To make VMI possible, the manufacturer allows the supplier to monitor stock levels and ongoing sales data. b. Companies using this strategy try to optimize their ordering quantities such that parts or raw material arrive just when they are needed for production. c. Manufacturers using the VMI business model manage the inventories themselves and send out requests for additional items to the vendors as needed. d. Retailers using this strategy allow suppliers to maintain ownership of inventory within their warehouses or stores until items are scanned at the point of sale. e. To make VMI possible, the manufacturer must maintain large inventories of supplies, parts, warehousing resources, and extra workers to meet production contingencies.
To make VMI possible, the manufacturer allows the supplier to monitor stock levels and ongoing sales data.
Which of the following is a shifting perspective from Web 1.0 to Web 2.0? Select one: a. Web 1.0 - Me, Web 2.0 - You b. Web 1.0 - Read, Web 2.0 - Read, write c. Web 1.0 - Read, Web 2.0 - Write d. Web 1.0 - You, Web 2.0 - Me e. Web 1.0 - Write, Web 2.0 - Read
Web 1.0 - Read, Web 2.0 - Read, write
A hypertext document is otherwise known as a ________. Select one: a. Web host b. Web ring c. Webmaster d. Web consortium e. Web page
Web page
With regards to the World Wide Web, Web pages are stored on ________. Select one: a. Web rings b. Web consoles c. Web servers d. Web consortiums e. Web hosts
Web servers
Which of the following statements best describes the productivity paradox of technology investment? Select one: a. As investment in technology increases, productivity decreases steadily. b. The productivity of any technology is directly proportional to the investment in that technology. c. While it is easy to identify and quantify the intangible benefits of an information system, it is not easy to quantify the tangible benefits. d. The productivity of an information system is in no way related to the investment in the technology. e. While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use.
While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use
Requirements collection takes place during the systems ________ phase of the systems development life cycle (SDLC). Select one: a. maintenance b. operation c. implementation d. analysis e. design
analysis
Which of the following types of computer software utilities is used to archive files from hard disks to tapes, flash drives, or other storage devices? Select one: a. backup b. data compression c. disk and data recovery d. device drivers e. file defragmentation
backup
Entering a large number of separate forms or documents into a computer system and manipulating these data at a single time is referred to as ________. Select one: a. inter-processor communication b. process control block c. chain loading d. batch processing e. context switching
batch processing
With respect to the types of information systems used in organizations, an Online Analytical Processing (OLAP) system is an example of a(n) ________ system. Select one: a. electronic commerce b. office automation c. geographic information d. social software and collaboration e. business intelligence
business intelligence
What a company does, how a company uniquely does it, how a company gets paid for doing it, and what costs are involved are all part of an organization's ________. Select one: a. competitive model b. value model c. strategic model d. business model e. revenue model
business model
The form of electronic commerce that is used by organizations to conduct business with business partners without involving the end consumer is known as ________ electronic commerce. Select one: a. peer-to-peer b. business-to-intermediary c. business-to-supplier d. business-to-consumer e. business-to-business
business-to-business
The term "podcasting" is a misnomer because podcasts ________. Select one: a. cannot be played on Apple's iPods b. are concerned with the dissemination of information to a narrow audience c. can be played on a variety of devices in addition to Apple's iPods d. are not related to distribution of digital media for digital devices e. are concerned with outsourcing tasks to a large group of people or community
can be played on a variety of devices in addition to Apple's iPods
Companies using a ________ business strategy are also called virtual companies. Select one: a. bricks-and-clicks b. click-only c. click-and-flip d. brick-and-mortar e. click-and-mortar
click-only
A ________ is nothing more than an empty warehouse with all necessary connections for power and communication, but nothing else. Select one: a. cold backup site b. firewall c. buying center d. botnet e. collocation facility
cold backup site
Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system. Select one: a. office automation system b. functional area information system c. collaboration system d. data mining and visualization system e. geographic information system
collaboration system
Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power, backups, connectivity, and security. Such data centers are called ________. Select one: a. virtual private networks b. hot backup sites c. control centers d. offshore networks e. collocation facilities
collocation facilities
The ________ is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and to establish appropriate controls. Select one: a. control objectives for information and related technology (COBIT) b. U.S.A. Patriot Act c. Sarbanes-Oxley Act of 2002 (S-OX) d. Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) e. Electronic Communications Privacy Act of 1986
control objectives for information and related technology (COBIT)
With respect to the types of information systems used in organizations, sales force automation is an example of a(n) ________ system. Select one: a. customer relationship management b. geographic information c. electronic commerce d. data mining and visualization e. supply chain management
customer relationship management
Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name Fyroff Enterprise for the new solution. However, when the company attempts to register the domain name, it finds that a small unknown firm is already registered under the same domain name. The small firm is now attempting to sell the domain name to Fyroff. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks? Select one: a. logic bombing b. cybersquatting c. cyberbullying d. bot herding e. cyberstalking
cybersquatting
Identify the computer software utility that allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data. Select one: a. file conversion b. device drivers c. data compression d. disk and data recovery e. file defragmentation
data compression
Once the data model is created, the format of the data is documented in a data ________. Select one: a. dictionary b. domain c. warehouse d. entry e. mart
dictionary
The phenomenon of cutting out the "middleman" and reaching customers more directly and efficiently is known as ________. Select one: a. disintermediation b. dissemination c. demutualization d. defalcation e. gentrification
disintermediation
An example of an agile methodology approach is ________. Select one: a. eXtreme Programming b. Object VxP Programming c. Technet Extreme Programming d. Patch management e. SQL Extreme
eXtreme Programming
The extent to which tasks are accomplished well is called ________. Select one: a. accomplishment b. efficiency c. effort d. effectiveness e. goal setting
effectiveness
A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database. Select one: a. legacy system b. enterprise system c. distributed software system d. decision support system e. management information system
enterprise system
At the ________ level of an organization, information systems provide key performance indicators (KPIs) that are focused on balancing performance across the organization. Select one: a. executive b. tactical c. illusive d. operational e. managerial
executive
To assist ________ decision making, information systems are used to obtain aggregate summaries of trends and projections of the future. Select one: a. operational-level b. executive-level c. managerial-level d. tactical-level e. functional-level
executive-level
Business case arguments based on ________ focus on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on. Select one: a. fear b. facts c. fiction d. fallacy e. faith
faith
Which of the following key elements of supply chain execution includes information related to payment schedules, consignment, and ownership of products and materials? Select one: a. product flow b. information flow c. material flow d. financial flow e. personnel flow
financial flow
Two-tier ERP strategy can support operations at the corporate level, while providing the needed ________ at the subsidiary level. Select one: a. interoperability and reliability b. scalability and manageability c. flexibility and agility d. interoperability and accessibility e. reliability and componentization
flexibility and agility
A ________ key refers to an attribute that appears as a non-primary key attribute in one entity and as a primary key attribute (or part of a primary key) in another entity. Select one: a. primary b. candidate c. super d. foreign e. table
foreign
A ________ is a form of e-auction which allows businesses to buy seized and surplus government equipment. Select one: a. top-up b. rafter bid c. reverse auction d. forward auction e. mystery auction
forward auction
Iver Audio is an all-in-one music management tool that was first marketed in 1999. Most users can use the Basic version that is free, but a $19.99 upgrade provides extra features such as supertagging, faster ripping and burning. Which of the following explains this approach for applying freeconomics? Select one: a. cross subsidies approach b. labor exchange approach c. gift economy approach d. freemium approach e. zero marginal cost approach
freemium approach
According to the disruptive growth engine, executive leadership will allow a firm to ________. Select one: a. gain credibility and to bridge sustaining and disruptive product development b. build a disruptive team of expert innovators c. effectively identify and evaluate potential disruptive innovations d. gain the greatest disruptive opportunities e. educate those closest to customers and competitors in order to identify opportunities
gain credibility and to bridge sustaining and disruptive product development
Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________. Select one: a. social promoters b. internet activists c. hacktivists d. crackers e. online predators
hacktivists
"Backward looking" budgets are typically based on ________. Select one: a. marketing research b. current market conditions c. historical data d. future trends e. forecasts
historical data
In an information system, a ________ is the point of contact between a system and users. Select one: a. human computer interface b. point-to-point link c. data link d. network interface e. biointerface
human computer interface
Which of the following core competencies is part of an IS personnel's systems knowledge and skills? A) hardware platforms B) virtualization C) information gathering and analysis D) cabling and network interface cards E) application software
information gathering and analysis
With respect to computer networks, a typical ________ network has a bandwidth of 10 Mbps to 1 Gbps. Select one: a. local area b. wide area c. metropolitan area d. personal area e. campus area
local area
With respect to the general classes of computers, a ________ is very large and is used primarily as the main, central computing system for major corporations. Select one: a. workstation b. server c. personal computer d. supercomputer e. mainframe computer
mainframe computer
Which of the following core competencies are part of an IS personnel's technical knowledge and skills? Select one: a. systems analysis and design b. interpersonal skills and group dynamics c. network administration d. integrating subsystems and systems e. technological communication and presentation
network operating systems
Business rules are captured by the designers of a database and included in a data dictionary to ________. Select one: a. capture the structure of the database b. make sure that each table contains only attributes that are related to an entity c. prevent illegal or illogical entries from entering the database d. eliminate data duplication e. organize and sort the data, complete calculations, and allocate storage space
prevent illegal or illogical entries from entering the database
Subprocesses of the procure-to-pay process include ________. Select one: a. creating customer records b. creating customer satisfaction c. price and terms negotiations d. speeding up the collection process e. collecting the payment
price and terms negotiations
Analytical tools are used to optimally utilize materials, equipment, and labor during the ________ process of supply chain planning. Select one: a. production scheduling b. inventory planning c. demand forecasting d. safety stock scheduling e. distribution planning
production scheduling
The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________. Select one: a. rapid elasticity b. external network capability c. cloud engineered data d. packaged networking e. narrow network access
rapid elasticity
Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. The introduction of middlemen in business models is an example of ________. Select one: a. defalcation b. gentrification c. remutualization d. reintermediation e. disintermediation
reintermediation
The ability to adapt to increases or decreases in demand for processing or data storage is known as ________. Select one: a. reliability b. extensibility c. usability d. portability e. scalability
scalability
A way to ensure that a company's site is on the first page users see when looking for a specific term is using ________ advertising. Select one: a. stealth b. search c. buzz d. affiliate e. viral
search
With respect to organizational decision-making levels, for ________ decisions, some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made. Select one: a. planned b. unstructured c. asymmetrical d. semistructured e. structured
semistructured
The key use of the manufacturing execution module of supply chain management is to ________. Select one: a. assign optimal safety stock and target stock levels in all inventories in the supply network b. ensure that the materials required for production are available where needed and when needed c. support production processes, taking into account capacity and material constraints d. support receiving, storing, and picking of goods in a warehouse e. forecast and plan anticipated demand for products
support production processes, taking into account capacity and material constraints
Which of the following core competencies is part of an IS personnel's business knowledge and skills? A) cloud computing B) technological communication and presentation C) systems development life cycle D) integrating subsystems and systems E) virtualization
technological communication and presentation
Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________. Select one: a. the product is designed to last only for a certain life span b. the product is designed to avoid obsolescence c. the product is designed in such a way as to extend its life span d. the companies do not enter markets that have the risk of product obsolescence e. the companies have already decided when to launch their next product
the product is designed to last only for a certain life span
A(n) ________ information flow consists of information that is received from another organization. Select one: a. packaged b. downstream c. legacy d. upstream e. stand-alone
upstream
Which of the following is an example of synchronous communication? Select one: a. online reviews b. bulletin board systems c. work flow automation systems d. videoconferencing e. e-mail
videoconferencing
Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home. Select one: a. metropolitan area b. storage area c. near-me area d. virtual private e. body sensor
virtual private
Identify the programming language that allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code? Select one: a. scripting language b. prototype-based programming language c. Web development language d. object-oriented language e. visual programming language
visual programming language
Which of the following analyses involves making hypothetical changes to the data associated with a problem and observing how these changes influence the results? Select one: a. what-if analysis b. predictive analysis c. time-series analysis d. multivariate analysis e. linear regression analysis
what-if analysis
A ________ is a networking hardware component that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points. Select one: a. router b. network interface card c. modem d. wireless controller e. network switch
wireless controller