chapter 4, chapter 5 , chapter 6 , chapter 7 - telecommunications, the internet, and wireless technology, chapter 8, Chapter 9 , chapter 10 , chapter 11, chapter 12 , Chapter 14

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

your company, an online discount pet supply store, has calculated that a loss of internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occuring each year. what is the annual expected loss from this exposure?

$1,250

according to Accenture and Ponemon Institute's ninth annual cost of cybercrime study, the average annualized cost of cybercrime in 2018 for benchmarked organizations was approximately:

$13 million

according to the 2020 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2019?

$16.9 billion

if an inventory manager is required to make a daily decision about parts inventory levels, and the estimated value to the firm of a single improved decision bby that manager is $2,500, what is the annual business value of the enhanced decision?

$912,500

___ uses individual atoms and molecules to create computer chips and other devices.

. B. nanotechnology

what are the steps in conducting an ethical analysis?

1. ID and describe the facts clearly 2. define the conflict or answer 3. ID stakeholders 4. ID the options that you can reasonably take 5. ID the potential consequences of your options

when did e-commerce bbegin?

1995

According to Gartner, more than ____ percent of the critical data in large Fortune 1000 companies' databases are inaccurate or incomplete.

25

supply chain inefficiencies waste as much as ____ percent of a company's operating costs?

25

the WiMax standard can transmit up to a distance of approximately:

30 miles

what perent on top retailers now have m-commerce websites?

47 percent

on average, private sector IT projects are underestimated by ____ percent in terms of bbudget and time required to deliver the complete system promised by the system plan.

50

which of the following statements about 5G is true?

5G will be able to transmit data in the gigabit range

according to small world theory, you are only _____ links away from any other person on earth.

6

according to a 2020 survey of 181 ERP users conducted by Panorama consulting Group, 38 percent of ERP projects experienced cost overuns, and these overrun averaged ____ percent over budget

66

hardware and software acquisitions costs account for about ___ percent of TCO.

A. 20

___ are small, specialized software programs that run on the internet, on a computer, or on a mobile phone or tablet and are generally delivered other the internet.

A. Apps

which of the following statements about cookies is NOT true?

A. Cookies are installed only at the user's request

which of the following adjusts copyright laws to the internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

A. Digital Millennium Copyright Act

which of the following U.S. laws gives patients access to personal medical records and the right to authorize this information can be used to disclosed?

A. HIPPA

a colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. you tell her that if everyone were to take office supplies, then the loss would no longer be minimal. your rationale expresses which of the following ethical principles?

A. Kant's Categorical Imperative

____states that the value or power of a network grows exponentially as a function of the number of network members.

A. Metcalfe's

which of the following is a multitasking, multiuser, operating system developed by ell Laboratories that operates on a wide variety of computers from different manufacturers?

A. Unix

which of the following refers to a set of loosely coupled software components that exchange information with each other using standard web communication standards and languages?

A. Web services

which of the following became the standard PC in the personal computer era?

A. Wintel PC

which of the following is the foundation technology for web services?

A. XML

the introduction of the minicomputer:

A. allowed computers to be customized to the specific needs of departments or business units.

all of the following are steps in the process for analyzing an ethical issue except:

A. assigning responsibility

advertisers use ___ in order to display more relevant ads based on a user's search and browsing history.

A. behavioral targeting

the internet hardware server marketplace:

A. has become increasingly concentrated in top firms

the Network Advertising Initiative is an industry association that:

A. has developed privacy policies to help consumers opt out of advertising network programs and provide consumers redress from abuses

redesigning and automating business processes can be seen a double-edged sword because:

A. increases in efficiency may be accompanied by job losses

a ___ is an intergraded circuit which contains two or more processors to enhance performance and reduce power consumption.

A. multicore and reduce power consumption

which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

A. on-demand

which of the following is not an IT infrastructure service component?

A. operating system software services

in the ____ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.

A. opt-in

the use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

A. profiling

which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve?

A. quality of life

_____ means that you accept the potential costs and obligations for the decisions you make.

A. responsibility

which ethical rule states that is an action cannot be taken repeatedly, it is not right to take all?

A. slippery-slope rule

prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:

A. software package

which of the following regulates the U.S federal government collection, use, and disclosure of information?

A. the Privacy Act

which of the following is an example of a legacy system?

A. transaction processing system running on a mainframe

CVS refers to:

A> eyestrain related to computer display screen use

_____ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.

Administrative

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing era, 2. client/server, 3. enterprise era, 4. personal computer; and 5. mainframe and minicomputer.

B. 5,4,2,3,1

___ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

B. Accountability

___ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

B. Due process

a formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a:

B. SLA

Nanotubes are about 10,000 times thinner than:

B. a human hair

which of the following is the most popular smartphone operating system?

B. android

a man steals from a grocery store in order to feed his starving family. which of the following best expresses the utilitarian principle in evaluating this situation?

B. his action is acceptable, because the higher social value is the survival of the family

which of the following best describes the effect that new I.T has on society?

B. it has a ripple effect, raising new ethical, social, and political issues

when a cookie is created during a website visit, it is stored:

B. on the hard drive of the vistor's computer

The NAI is an industry association formed to help with which of the following?

B. online privacy issues

which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

B. scalability

"look and feel" copyright infringement lawsuits are concerned with:

B. the distinction between an idea and it expression

in a multitiered network:

B. the work of the entire network is balanced over several levels of servers

which one of the following best describes how new I.S. can result in legal gray areas?

B. they work with networked, digital which are more difficult to control than information stored manually.

which of the following is a recent addition to the mobile digital platform?

B. wearable computing devices

which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet?

B2C e-commerce

which of the following is a management methodology that attempts to systematically translate a firm's strategy into generate operational targets?

BPM

which of the following is the popular name for the 802.15 wireless networking standard?

Bluetooth

which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of clients/server computing and local area networks and further stimulated the adoption of personal computers?

C. Ethernet

which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?

C. Green computing

which of the following statements about Java is NOT true?

C. Java programs cannot be used on mobile phones

which of the following statements about Linux is NOT true?

C. Linux is the leading operating system for desktop systems.

which of the following is a data analysis technology that finds obscure connections between data in disparate sources?

C. NORA

which of the following runs an antipiracy hotline for individuals to report piracy activities?

C. SIIA

which of the following refers to a set of self-contained services that communicate with each other to create a working software application?

C. SOA

Linux is:

C. an example of open-source software

the right to ___ is a feature of the GDPR that allows individuals to request that organizations delete their personal data.

C. be forgotten

which of the following is NOT a principle cause of poor system performance?

C. computer abuse

which of the following terms refers to significant disparities in access to computers and the internet among different social groups and different locations?

C. digital divide

how would yo determine the market demand for your firms IT services?

C. hold focus groups to asses whether your services are meeting the needs of your customers.

which of the following is NOT one of the current key technology trends that raises ethical issues?

C. increase in data quality

which of the following are the leading operating systems for corporate servers?

C. microsoft window server, Unix, and Linux

FIP principles are based on a belief in which of the following?

C. mutuality of interest between the record holder and the individual

_____ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

C. patent law

which of the following is NOT an example of a wearable computing device?

C. smartphones

all of the following are factors in U.S. federal sentencing guidelines with respect to business executives except:

C. the use of technology to commit the crime

which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as a multiple logical resources?

C. virtualization

which of the following is an easy-to-use software program with a graphical user interface for displaying web pages and for accessing the web and other internet resources?

C. web browser

craiglist is an example of:

C2C e-commerce

all of the following are examples of machine learning EXCEPT:

CAD systems

a network that spans a college or corporate facility is called a:

CAN

which metric is bbased on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and serving that customer, and the expected life of the relationship between the customer and the company?

CLTV

firms that allow employees to use their own devices are embracing which one of the following?

D. BYOD

which of the following is NOT an example of the mobile digital platform?

D. SDS devices

all of the following are current hardware platform trends except:

D. SOA

ZipRealty, which combines Google Maps with real estate data, is an example of:

D. a web mashup

what percent of global internet users use Google search and other Google services?

D. about 80 percent

A____ is used to communicate between a user and an organizations back-end systems.

D. application server

all of the following laws apply to actions by the federal government EXCEPT the:

D. children's online privacy protection act

all of the following are FTC privacy guidelines EXCEPT:

D. firms should limit the length of time that any personal data is stored to six months or less

which of the following best describes Immanuel Kant's categorical imperative?

D. if an action is not right for everyone to take, it is not right for anyone to take.

the ethical no-free-lunch rule states state:

D. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

the windows operating systems:

D. is an operating system used by nearly 88 percent of PCs

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

D. it blurs the traditional boundaries between work and family time

which type of software is created and uploaded by a worldwide community of programmers and available for free?

D. open source

which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

D. the golden rule

which of the following statements about trademarks is NOT true?

D. trademark laws are designed solely to protect consumers

a client computer networked to a server computer, with processing split between the two types of machines, is called a ___.

D. two-tiered client/server architecture

which of the following is NOT one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?

D. your firms organizational culture

all of the following are, or were, file-sharing services EXCEPT:

D.pandora

Dyn suffered which of the following types of attacks?

DDoS

using numerous computers to inundate and overwhelm the network from numerous lanch points is called a(n) ____ attack.

DDoS

Microsoft SQL server is a(n):

DMS for midrange computers

what service converts natural language names to IP addresses?

DNS

which of the following information systems supports a manager's role as a resource allocator?

DSS

amazon.com is known primarily for its use of which of the following business models?

E-tailer

at what percent of capacity do most servers operate?

E. 15-20%

which of the following is NOT an example of the consumerization of IT?

E. Amazon web services

which of the following is a leading networking hardware provider?

E. Cisco

which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data?

E. Data Management

which of the following involves hosting and managing access to software applications delivered over the internet to clients on subscription basis?

E. Saas

which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

E. Trade secret

all of the following have multitouch capabilities EXCEPT:

E. Unix

___ provides a standard format for data exchange, enabling web services to pass data from one process to another.

E. XML

which of the following were involved in what has been called the patent trial of the century?

E. apple and samsung

which of the following is NOT a U.S. federal law affecting private institutions?

E. computer matching and privacy protection act

interpretations of Moore's law assert that:

E. computing power doubles every 18 months

which of the following is by far the most common source of business system failure?

E. data quality

all of the following are technical solutions to protecting user privacy EXCEPT:

E. data use policies

during which era did business firms begin seriously to use TCP/IP?

E. enterprise computing

which of the five moral dimensions of the information age do the central business activities of Google Marketing Platform involve?

E. information rights and obbligations

which of the following is NOT a feature of the General Data Protection Regulation (GDPR)?

E. it prevents firms from using cookies

which of the following allows the EU to enforce GDPR requirements with non-EU countries?

E. privacy shield agreement

which of the following statements about mobile devices is NOT true?

E. qualcomm has a monopoly on manufacture of processors for mobile devices.

the obligation that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

E. quality of life

the ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of:

E. quantum computing

which of the following is NOT one of the characteristics of cloud computing, as defined by the US national institute of standard and technology?

E. reduced elasticity

which of the following is NOT one of the current software platform trends?

E. software-defined storage

which of the following statements about spam is NOT true?

E. spamming is more tightly regulated in the US than in Europe

all of the following are cloud computing services EXCEPT:

E. system integration services

all of the following are typically factors in a firm's decision to engage consulting and system integration services EXCEPT:

E. the firms staff knows more about the firms IT infrastructure than service providers.

____ allows an organization to collect personal information without the user's explicit consent.

E. the opt-out model

which of the following is NOT a difficulty in establishing patent protection?

E. the requirement that the work must be a secret

which model can be used to analyze the direct and indirect cots to help firms determine the actual cost of specific technology implementations?

E. total cost of ownership

the FIP principle of Notice/Awareness states that:

E. websites must disclose their information practices before collecting data

which of the following is NOT a technology driver transforming IT infrastructure?

E. widespread rejection of technology standards

which of the following types of systems enables organizations to digitize, index, and tag structured and instructured knowledge and docuements according to a coherent framework?

ECM

which of the following statements about an ECM system is NOT true?

ECM systems only enable users to access internal sources of information

____software modules deal with setting employee objectives, performance, and compensation

ERM

which of the following provides a suite of integrated software modules and a common central database that allows data to be used by multiple functions and business process?

ERP systems

an information system that combines data from internal MIS with informaiton form financial systems and external sources to deliver reports such as profit-loss statements and impact analyses, is an example of:

ESS

which of the following types of system woulf be used to present senior marketing executives with high-level information about customer retention, satisficatiom, and quality performance?

ESS

which of the following is an example of a company primarily engaged in B2B e-commerce?

Elemica

which of the following is the largest mobile advertising market?

Facebook/ Instagram

In N-tier computing, significant parts of website content, logic, and processing are performed by a single web server. true or false?

False

Quantum computing is a common method of reducing technology costs by providing the ability to host multiple systems on a single physical machine.

False

identifying the stakeholders- people who have a vested interest in the outcome of the decision- is the last step in analyzing an ethical issue. true or false?

False

in todays legal environment, managers who are convicted for the misuse of I.S. are unlikely to be given a prison sentence. True or False?

False

web services can exchange information between two different systems only if the operating systems and programming languages upon which of the systems are based are identical.

False

which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitzed maps?

GIS

geoadvertising sends ads to users based on their:

GPS location

which digital cellular standard is used widely throughout the world EXCEPT the Unted States

GSM

which type of planning tool shpws each task as a horizontal bar whose length is proportional to the time required to compete it?

Gantt chart

web browser software requests web pages from the internet using which of the following protocols?

HTTP

which of the following technologies would you use to analyze the social media data collected by a major online retailer?

Hadoop

which of the following statements about Hadoop is NOT true?

Hadoop is propriety software sold by the Apache Software FOundation

which organization manages the domain name system of the internet?

ICANN

a (n) ____ is a commerical organization with a permament connection tothe internet that sells temporary connections to retail subscriers.

ISP

as described in the text, which of the following statement about runaway or failed IT projects is NOT true?

IT projects often fail because they lack sufficient computing capacity

the NHL Puck and Player Tracking system described in the chapter opening case is an example of which of the following?

IoT application

which of the following is not a major CRM application software vendor?

JDA software

specialized systems that enables scientists and engineers to create and discover new knowledge for a company called:

KWS

which of the following provides tools for the management, delivery, tracking, and assessment of various types of employee learning?

LMS

4G networks use which of the following standards?

LTE and WiMax

which type of network is used to connect digital devices within a city or metropolitan area?

MAN

which of the following technologies is used to reduce WiFi network interference from nearby systems in the same spectrum?

MIMO

an information system for a building company that tracks construction costs for varius projects across the United States would be cateforized as a type of:

MIS

which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

Modem

which of the following statements about natural language processing (NLP) is NOT true?

NLP relies on the use of an expert system

which of the following companies uses the subscription revenue model?

Netflix

which of the following is NOT an example of location-based services?

Netflix

to review a project;s tasks and their interrelationships, you would use which of the following?

PERT chart

______ software modules seek to enhance collaboration between a company and its selling partners>

PRM

which of the following technologies does Walmart use to track for sale on store shelves?

RFID

which of the following statements about RFID is NOT true?

RFIDs require line-of-sight contact to be read

which of the following pulls content from websites and feeds it automatically to users' computers?

RSS

which of the following is NOT an example of a next-generation enterprise application?

SAP R/3

which of the following can be used to help a website achieve a higher ranking with the major search engines?

SEO

____ modules in CRM systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services.

SFA

which of the following is the most prominent data manipulation language today?

SQL

currently, the protocols used for secure information transfer over the internet are:

SSL, TLS, and S_HTTP

which of the following is an example of a NoSQL database?

SimpleDB

Big Tech firms are facing increasing scrutiny with respect to alleged anticompetitive and unfair practices. True or False?

True

Ethics describe the principles of right and wrong that can be used by individuals to make choices to guide their behavior. true or false?

True

HTML5 makes it easier for web pages to function across different display devices.

True

Whereas HTML is limited to describing how data should be presented in the form of web pages, XML can be performed presentation , communication, and data storage tasks.

True

because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. true or false?

True

malicious software that can secretly install itself on an internet users computer by piggybacking on other applications and then report the users movements on the internet to other computers, is called spyware. True or False?

True

one of the key concepts in patent law is originality. true or false?

True

routine violation of individual privacy are made easier by advances in data storage. True or False?

True

some forms of illegal sharing of music files have declined as legitimate online music stores and streaming services have expanded. true or false?

True

the decisions to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.

True

today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace.

True

trade secret laws grant a monopoly on the idea behind a work product. True or false?

True

websites using cookie technology cannot directly obtain visitors names and addresses from the cookie. true or false?

True

comprehensive security managment products, with tools for firewalls, VPNs, intrusion, detection systems, and more, are called ____ systems.

UTM

which of the following is an example of a private industrial network?

VW Group Supply

which of the following is the most recent specification of the security standard developed for Wi_fi?

WPA3

the 802.11 set of standards is known as:

Wi-Fi

which of the following is an example of a keylogger?

Zeus

a one-to-many relationship between two entities is symbolized in a diagram by a line the ends with:

a crow's foot topped by a short mark

which of the following is NOT a true statement about performing a data quality audit?

a data quality audit can be performed by surveying data definition and query files

which of the following is a type of ambient data?

a file deleted from a hard disk

____ is spyware that logs and transmits everything a user types.

a keylogger

all of the following are directly correlated with increased risk EXCEPT:

a large amount of technical expertise from project team and information team staff

two_factor authentication utilizes a(n):

a multistep process of authentication

an expert system would bbe an appropriate application for making decisions for all of the following EXCEPT:

a recommender systems

which of the following is the best description of a protocol in a telecommunications network architecture?

a standard set of rules and procedures for control of communications in a network

an inference engine is:

a strategy used to search through an expert system's collection of rules and formulate conclusions

a MOOC is:

a type of online course

when a hacker discovers a security hole in software that is unknown to the software's creator, it is an example of:

a zero-day vulnerability

the practice of contracting custom software development to an outside firm is commonly referred to as:

a. outsourcing

the obligations that individuals and organizations have concerning rights to intellectual property involves which one of the following moral dimensions of the information age?

a. property right and obligations

which of the following enables a DBMS to reduce data redundancy and inconsistency

ability to minimize isolated files with repeated data

which of the following is NOT a major benefit of expert systems?

ability to scale to deal with very large data sets

a (n) _____ is a box consisting of a radio receiver/transmtter and antennas that links to a wired network, router, or hub.

access point

which of the following is the first value-adding step of information system activities in the knowledge management value chain?

acquire

which of the following statements about project management is NOT true?

acquiring human and material resources is not considered to be part of project management

to eliminate excessively high inventories of its Pampers disposible diapers at various points along its upply cahin because of such distorted information, Procter & Gambble did all of the following EXCEPT:

add safety stock

which of the following revenue models generates almost all of Yahoo's revenue?

advertising

you are creating a database to store temperature and wind data from various airports. which of the following fields is the most likely candidate to use as the basis for a primary key in the Aiport table?

airport code

which of the following describes how the SImon framework of decision-making works in high-velocity decision envirnoments?

all four steps of the process are handled by software algorithms; humans are eliminate from the decisions because they are too slow

which of the following is an intelligent personal assistant

amazons alexa

which of the following defines acceptable uses of a firm's information resources and computing equipment?

an AUP

which signal types are represented by a continuous waveform?

analog

which of the following applications provides analysis of customer data?

analytical CRM

which of the following tools is used to analyze customer bbuyer patterns?

analytical CRM

which of the following best illustrates the sales revenue model?

apple accepts micropayments for single music track downloads

all of the following are types of information systems general controls EXCEPT:

application controls

which of the following technizques stops data packets originating outside the organization, inspects them, and uses a proxy to pass packet information to the other side of an organization's firewall?

application proxy filtering

which of the following is software the handles all application operations between browser-based computers and a company's back-end business applications or databases?

application server software

what are the four layers of the TCP/IP reference model?

application, transport, internet, and network interface

genetic algorithm:

are a form of machine learning

T1 and T3 lines:

are high-speed, leased data lines providing guaranteed service levels

All of the following are typical components or capabilities of an ECM system EXCEPT:

artifical intelligence tools

customer service modules in CRM systems provide tools for:

assigning and managing customer service requests

information ____ exists when one party in a transaction has more information that is important for the transaction than the other party.

asymmetry

a characteristic or quality that describes a particular database entity is called a(n):

attribute

implementation controls:

audit the systems development process at various points to ensure that the process is properly controlled and managed.

which of the following seeks to enhance human perception by combining a love direct view of the physical world with computer-generated images?

augmented reality

which of the following statements abbout augment reality is NOT true?

augmented reality is a method of orgnaizing expert system knowledge into chunks

which of the following statements about passwords is NOT true?

authentication cannot be established by the use of a password

The US CAN-SPAM act:

b. requires commercial email senders to identify themselves

according to ______, you should take the action that produces the least harm.

b. the risk aversion principle

the leading methodology for understanding the really important information needed by a firm's executives is called the ____ method.

balanced scoreboard

which of the following is not a part of business intelligence infrastructure?

balanced scorecards

all of the following are physical components of an RFID system except:

bar codes

which of the following is NOT one of the six main analytic functionalities of BI systems for helping decision makers understand information and take action?

bbusiness case archives

Entripe software is built around thousands of predefined business process excellence:

best practices

which of the following BI tools or abilities has been driving the movement toward "smart cities"?

big data analytics

which of the following statements about big data is NOT true?

big data refers solely to data in the petabyte range

which of the following statements about wireless security is NOT true?

bluetooth is the only wireless technology that is not susceptible to hacking by eavesdropper

all of the following are currently being used as human traits that can bbe profiled by biometric authentican EXCEPT:

body oder

evil twins are:

bogus wireless network access points that look legitimate to users

the total amount of digital information that can be transmitted through any telecommunications medium is measured in:

bps

a distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ____ effect.

bullwhip

Resource efficiency is a KPI for which of the following dimensions?

business processes

which of the following occurs when muscles groups are forced through tens of thousands of repetitions under low-impact loads?

c. RSI

which of the following protects the author of a book from having their work copied by others?

c. copyright laws

operational CRM applications include tools for all of the following EXCEPT:

calculating CLTV

____ methods rely on measures of cash flows into and out of the firm.

capital budgeting

which of the following is NOT something you would use to control risk factors in an information systems project?

capital budgeting models

succeddful system building requries careful ___ management to minimize organizational resistance.

change

instant messaging is a type of _____ service.

chat

the measurement of the number of customers who stop using or purchasing products or services form a company called:

churn rate

the traditional telephone system is an example of a ___ network

circuit-switched

in data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules?

classification

you work for a car rental agency and wamt to determine what charactericitics are shared among your most loyal customer. to do this, you will want to use the data mining software you are using to do which of the following?

classify data

a salesperson clicks. repeatedly on the online ads of a competitor in order to drive the competitor;s advertising costs up. this is an example of:

click fraud

the internet is based on which three key technologies

client/server computing, packet switching, and the development of communications standards for linking networks and computers

an environment where consumers can share their shopping experiences with one another by viewing products, chatting, or texting about brands, products, and services is an example of:

collaborative shopping

computer forensics tasks include all of the following EXCEPT:

collecting physical evidence on the computer

the join operation:

combines relational tables to provide the user with more information than is otherwise available.

which of the following Internet business models involves a merchant creating an online digital environment that enables people with like interests to share information?

community provider

which of the following statments abbout enterprise applications is NOT true?

companies adopting enterprise applications can also save time and money bby extensively customizing their applications to fit their business processes

which quality dimension of information is concerned that ll the necessary data needed to make a decision is present?

completeness

GumGum;'s system relies on which of the following?

computer vision systems

which of the following is a worm that uses flaws in Windows software to take over a computer remotely?

conficker

which of the following enables a company to tailor a particular aspect of enterprise software to the way a company does business?

configuration tables

external integration tools:

consist of ways to link the work of the implementation team with users at all organization levels

the dimension of ____ describes whether data elements are consistently defined.

consistency

which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

controls

which of the following is NOT one of four types of presence to be considered when building an e-commerce presence?

corporate

which of the following would NOT be considered semistructured knowledge?

corporate annual report

all of the following are intangible benefits of information systems EXCEPT:

cost reduction

IPv6 has been developed in order to:

creat more IP addresses

the project operation:

creates a subset consisting of columns in a table

the select operation:

creates a subset consisting of rows in a tabble that meet stated criteria.

which of the following is NOT one of the five classical functions of managers?

creating

selling a customer with a checking account a home improvement laon is an example of:

cross-selling

pepsico using SUper Bowl viewers to build an online video is an example of;

crowdsourcing

which of the following would NOT be covered in the Strategic Business Plan Rationale section of an information systems plan?

current infrastructure capabilities

all of the following are long-term strategic factors that should be considered in making the business case for a new information system EXCEPT:

current relationships with suppliers

which of the following is the last entity in the downstream portion of a supply chain?

customers

to achieve the maximum benefit of a new ERP system, Tasty Baking implemented an enterprise system by:

customizing less than 5 percent of the enterprise system process

a foreign country attempting to access government networks in order to disabble a national power grid is an example of:

cybberwarefare

the intentional defacement or destruction of a website is called:

cybervandalism

the total time it takes to complete a buisness process, from start to finish, is called its ____ time

cycle

a ____ is a BI feature that presents performance data defined by users.

dashboard

____ are visual tools for presenting performance data is a BI system.

dashboards and scorecards

the test defines ____ as flows of events or transactions captured by an organization's systems

data

detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

data cleansing

which of the following is an automated or manual file that stores information about data elements and data characterictics such as usage, physical representation, ownership, authorization, and security.

data dictionary

____ established an organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information.

data governance

which of the following occurs when the same attributes in related data files has different values?

data inconsistency

which common database challenge is illustrated by a person recieving multiple copies of an LL Bean catalog, each addressed to a slightly different variation of his or her full name?

data inconstancy

which of the following is a specialized language that programmer use to add and change data in the database?

data manipulation language

___ creates confusion that hampers the creation of information systems that integrate data from different sources.

data redundancy

the role of negotiator falls into which of Mintzberg's managerial classifications?

decisional

some commentators believe which of the following comes closest to the "Grand Vision" of AI?

deep learning networks

counterimplementation is best defined as:

deliberate attempts to thwart the implementation of a system

which supply chain planning function determines how much products is needed to satisfy all customer demands?

demand planning

the ____ phase of decision making invloves identifying and exploring various solutions to a problem.

design

a business case does all of the following EXCEPT:

details the specific hardware and software needed to implement the investment

location analytics can be used for all of the following EXCEPT:

determining call center resolution rates

from your reading of the chapter's opening case, which of the answers below is NOT a reason why Lenzing chose JDA's Sales & operation Planning software?

develop a new business model

Bandwidth is the:

difference between the highest and lowest frequencies that can be accommodated on a single channel

a ____ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits

digital

coca-cola uses a _____ in order to classify, store and distribute all the images of the brand.

digital asset management system

you are advising a video production company on the best type of knowledge management system to help them archive digital video and sound clips. which of the following will best suit their needs?

digital asset management system

in TCP/IP, IP is responsible for which of the following?

disassembling and reassembling packets during transmission

which of the following focueses primarily on the technical issues of keeping systems up and running?

disaster recovery planning

removing the business process layers in a distribution channel is called:

disintermediation

DBMSs typically include report generating tools in order to:

display data ina more structured and polished format than would be possible just by querying

client/server computing is a:

distributed computing model where clients are linked to one another through a network that is controlled by a network server computer

the process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called:

distribution

all of the following managerial roles can be supported by information systems EXCEPT:

disturbance handler

distribution and delivery of products to retailers is part of the:

downstream portion of the supply chain

changing the prices of products based on the level of demand characteristics of the customer is called ____ pricing.

dynamic

digital media differs from a physical book in all of the following ways except:

e. ease of establishing uniqueness

which of the following best illustrates the transaction fee revenue model?

eBay receives a small fee from a seller if a seller is successful in selling an item.

bluetooth can be used to link up to ___ devices within a 10-meter area using low-power, radio-based communication.

eight

which of the following is NOT a bbusiness intelligenece feature of SAP's next generation business intelligence applications?

employee relationship management

all of the following are indications of a failed information systems project EXCEPT:

employees require training to properly use the system

formal planning and control tools:

enable a project manager to properly document and monitor project plans

CAD workstations:

enables designed specification for tooling and manufacturing processes to be easily tested and changed

data cleansing not only corrects errors but also:

enforces consistency among different sets of data that originated in a separate information systems

CRM systems help businesses achieve which of the following business objectives?

enhanced customer intimacy

which of the following is NOT true about enterprise systems?

enterprise software is expressly built to allow companies to support their existing business practices

which of the following are the three major types of knowledge management systems?

enterprise-wide knowledge management systems, KWS, and intelligent technique

a schematic of the entire database that describes the relationships in a database is called a(n):

entity-relationship diagram

which of the following statements about exchanges is NOT true?

exchanges are the most successful form of B2B commerce

according to the project management institute, what is the leading factor in project success?

executive sponsors who are actively engaged

all of the following are considered to be knowledge workers EXCEPT:

executives

which of the following would NOT be classified as a KWS?

expert system

which of the following statements about expert systems is NOT true?

expert system development has grown rapidly in the last decade

which of the following best illustrates the advertising revenue model?

facebbook provides a social network for free but shows sponsered content in users' News Feed.

which of the following is NOT one of the top five search engines?

facebook

which of the following is NOT a factor in the high failure rate of reengineering systems projects?

failures of the new technologies to perform according to plan

Apple's iOS is the mobile platform targeted by most hackers

false

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. true or false?

false

ESS typically produce fixed, regulalry scheduled reports based on data extracted and summarized from the firms underlying transaction processing systems.

false

GIS are useful for bbusinesses, bbut not as much for state and local governments

false

IT infrastructure consists of only those physical computing devices and software required to operate the enterprise. true or false

false

MOOCs are designed to serve a limited number of participants.

false

NFC tags are always passive

false

Quantum computing is not yet available to the general public.

false

S-HTTP is a protocol used to establish a secure connection between two computers.

false

SEM saves consumers cognitive energy and increases search costs.

false

TCO refers just to the original cost of purchased technology: both hardware and software.

false

VoIP technology delivers voice information in digital form using circuit switching.

false

a Gantt chart portrays a project as a network diagram consisting of numbered nodes representing project tasks.

false

a NOS must reside on all the local computers in a network. true or false

false

a PRM module in CRM software helps organizations identify high-value customers for preferential treatments.

false

a benefit of using TCO analysis to evaluate an information technology investment is that it is able to incorporate intangible and "soft" factors such as benefits and complexity costs.

false

a computer network consists of at least three computers. true or false

false

a computer virus replicates more quickly than a computer worm.

false

all CRM packages contain models for PRM and ERM

false

an expert system cannot consider multiple rules at the same time.

false

an information systems plan focuses solely on the technology needed to implement the propsed new information system

false

apple music is an example of the market creator buinsess model.

false

behavioral targeting cannot be used id a consumer is using a mobile app.

false

clusters are occurrences linked to multiple events

false

computer networks are based on the same principles as traditional telephone networks. true or false?

false

computer networks that use packet switching are less efficient than telephone networks that use circuit switching. true or false

false

contemporary supply chain managment systems are driven by a push-based model in which production master schedules are based on forecats of demand for products

false

cross-selling is the marketing of products to different customers

false

data scrubbing is a more intensive corrective process than data cleansing.

false

digitial resiliency focuses solely on the resiliency of the IT function

false

disintermediation does not benefit the consumer.

false

due process is a feature of political systems and allows individuals to recover damages done to them by others. true or false?

false

eBay is an example of the portal business model

false

enterprise applications reduce switching costs

false

enterprise database management software is used to manage the software applications used in business activities. true or false?

false

enterprise systems are built around a small number of predefined business processes.

false

enterprise systems do not require fundamental changes in the way the buisness operates.

false

exchanges have become one of the most popular types of Net marketplace because they encourage competitve bidding that drives prices down.

false

experts systems work by applying a set of decision cases against a knowledge base, both of which are extracted from human experts.

false

firms in the supply chain develop safety stocks in order to reduce the cost of inventory.

false

implementing a web interface for an organization's internal database usually requires substantial change to be made to the database.

false

in 2020, B2C e-commerce revenues are expected to grow at single-digit rates.

false

in a client/ server environment, a DBMS is located on a dedicated computer called a web server.

false

in a client/server network, the client sets the rules of communication for the network. true or false

false

in a database, a bit represents a single character, which can be a letter, a number, or another symbol. true or false?

false

in push-based models, transactions to produce and deliver only what customers have ordered move up the supply chain from retailers to distribtutors to manufacttures and eventually to suppliers

false

in-memory computing relies primarily on a computer's disk drives for data storage.

false

information asymmetry exists when there is more information about one product than there is about a similar product .

false

knowledge workers include all of a company's workers who are tasked with managing or creating knowledge, from top-level scientists to clerical and data workers.

false

malicious software programs referred to as spyware include a variety of threats such as computer ciruses, worms, and Trojans horses.

false

mandatory use of a system is one effective way of overcoming user resistance to an information system.

false

microsoft is no longer the market leader in client/server networking. true or false

false

mobile devices typically features state-of0the-art encryption and security features, making them highly secure tools for businesses, and therefore do not require any special protections.

false

mobile search makes up less than 50% of all Internet searches.

false

more than 80 percent of the audience for BI consits of power users

false

most IoT devices support sophisticated security approaches.

false

multiple data marts are combined and streamlined to create a data warehouse

false

neural network applications explain why they arrive at a particular solution.

false

neural networks are not well-suited for diagnostic systems in medicine.

false

one apt slogan of the knowledge management field is "Effective knowledge management is 80 orecent technological and 20 percent managerial and organizational."

false

operational managment face primarily semistructured decision.

false

packet filtering catches most types of network attacks

false

public key encryption uses one key.

false

relational DBMSs use key field rules to ensure the relationships between coupled tables remain consistent. t or f?

false

semistructured information is all of the knoweldge in a firm that resides in the heads of experienced employees.

false

sensitivity analysis predicts outcomes from constant inputs.

false

smartphones are not vulnerable to malicious software or penetration from outsiders

false

social marketing enables firms to tightly control their brands.

false

software can never be considered to be a trade secret. true or false ?

false

software programs were unprotected by copyright law until the early 1990s. true or false

false

structured data accounts for the majority of organizational information and is one of the major sources of big data.

false

symmetric encryption is more secure than public key encryption

false

the CEO and Board of Directors of a company are responsible for developing a corporate-wide information systems plan.

false

the bullwhip effects leads to declining inventory costs across the entire supply chain.

false

the classical model of management describes what managers fo when they plan, decide things, and control the work of others.

false

the cost of a project is based solely on the time to complete a project multiplied by the cost of computer resources required to complete the project.

false

the design phase of decision maing consists of discovering, identifying, and understanding the problems occuring in the organization.

false

the foal of sociotechnical design is to create systems where the organization changes to fit the requirements of the technology.

false

the impacts of knowledge-based investments are easy to measure.

false

the internet increases information asymmetry

false

the term SWITCHING COSTS refers to a merchant's costs of changing prices.

false

the third stage in SImon's description of decision-making is implementation.

false

the upstream portion of the suppply chain consists of the organizationsa and processes for distributing and delivering products to the final customers.

false

the way an information systems project is executed is likely to be the least important factor influencing its success or failure

false

to reap the maximum benefits from enterprise software, companies should customize it to conform. totheir existing business processes

false

transaction and clerical systems that displace labor and save space typically produce less tangible benefits than management information systems.

false

unstructured decison makin is most prevalent at lower organizational levels.

false

use of standalone server computers is increasing as organizations transition to cloud computing services. true or false?

false

user concerns and designer concerns are usually the same at the beginning of the project but may diverge later as the system is built.

false

which of the following is a grouping of characters into a word, a group of words, or a complete number?

field

the concept of management ____ involves situation in which managers act on preconceived notions that reject information that does not conform to their prior conceptions.

filters

data mining allows users to:

find hidden relationships in a large database

MIS typically produce:

fixed, regularly scheduled reports bbased on data extracted from the organization's TPS

in data mining, which of the following involves using a series of existing values to determine what other future values will be?

forecasting

a common field that links two different tables and serves as a primary key to one of these tables is called the:

foreign key

which of the following helps project managers identify bottlenecks in project development?

formal planning and control tools

which of the following is NOT one of the activities of the systems analyst?

formulating of capital budgeting models

in the ____ revenue models, a firm offers some services for free but charges a subbscription fee for premium services.

free/freemium

supply chain execution systems provide all of the following functions EXCEPT:

generating demand forecasts for products

which of the following statements about genetic algorithms is NOT true?

genetic algorithm discover knowledge by using hardware and software that parallel the processing patterns of the biological or human brain

which of the following best describes a difference between neural networks and genetic algorithms?

genetic algorithms ar eused to evaluate alternative solutions to problems, whereas neural netowrks are used to discover patterns in data

a new social mobile app you are deceloping allows users to find friends who are logged in and within a 10-mile radius. This would be categorized as a ____ service.

geosocial

which of the following companies is NOT indentified in the text as one of the leading producers of business intelligence and analytics products?

google

a drawbcak to high-velocity, automated decision-making systems is that:

great care needs to be taken to ensure the proper operation of the systems, since they are making decisions faster than managers can monitor or conrtrol

you are using a capital budgeting method to assess the worth of your company's new information system. which of the following costs would you include in measuring the cash outflow?

hardware, software, and labor expenditures

a firm in the finance industry should do which of the following to ensure that it stays current with technology?

have a few high-risk, high-benefit projects

you have been hired by a firm in a non-information-intensive industry to evaluate its inventory of systems and IT projects. which types of projects should the firm focus on?

high-benefit, low-risk projects

google's search engine is an example of which of the following types of decision?

high-velocity

compared to digital goods, traditional goods have:

higher costs of distribution

which of the following is an example of using an internal integration tool?

holding frequent project team meetings

which of the following would NOT be covered in the New Developments section of an information systems plan?

human resources strategy

which of the following stratagies represents the proper approach to a low risk, high reward project?

identify and develop

you work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. you wish to find out if there are any particular activities that your customer engages in, or the types of purchases made in the month before or after purchasing select items from your store. to do this, you will use the data mining software you are using to do which of the following?

identify sequence

project management software typicaly has all of the following capabilities EXCEPT:

identifying and quantifying project risk

when hackers gain access to a database containing your personal private information, this is an example of:

identity thieft

which of the following is NOT an example of a computer used as a target of crime?

illegally accessing stored electronic communication

which of the following refers to all organizational activities working toward the adoption, management, and routinization of a new information system?

implementation

the sarbanes-oxley act:

imposes responsibility on companies and management to safeguard the accuracy of financial information

which of the following statements best describes the business value of improved decision making at all levels of a firm?

improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values

which of the following is NOT a tangible benefit of information systems?

improved resource control

Enterprise systems improve management decision making in all of the following ways EXCEPT:

improving forecasts of consumer behavior

which of the following is a limitation of using a financial approach to evaluate information systems?

inability to assess costs from organizational disruption

all of the following are issues with the tradition file environment EXCEPT:

inability to develop specialized applications for functional areas

which of the following is an example of using an external integration tool?

inclusing user representatives as active memebers of the project team

the business value of an effective supply chain management system includes all of the following EXCEPT:

incresed inventory levels

which of the following dimensions of e-commerce technology has the potential to raise the quality of information?

information density

as discussed in the chapter text, the three main reasons that investments in information technology do NOT always produce prositive result are:

information quality, organizational culture, and management filters

which of the following serves as a road map indicating the direction of systems development, the rationale, the current systems, new developments to consider, the management strategy, the implementation plan, and the budget?

information systems plan

which of the following statements about the user-designer communication gap is NOT true?

information systems specialists prefer systems that are oriented toward solving business problems or facilitating organizational tasks.

all of the following are intangible assets of a firm EXCEPT its:

information technology

the role of spokesperson falls into which of Mintzberg's managerial classifications?

informational

___ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

instrusion detection systems

enhanced employee goodwill falls under what category of costs and benefits of information systems?

intangible benefits

the dimension of ___ in information quality describes whether the structure of data is consistent

integrity

a chatbot is an example of which of the following?

intelligent agent

apple's siri application is an example of which of the following?

intelligent agent

software programs that work withoutdirect human intervention to carry out specific tasks for individual users, business processes, or software applications, are called:

intelligent agents

which of the following dimensions of e-commerce technology involves engaging consumers in a dialogue that dynamically adjusts the experience to the individual?

interactivity

in the supply chain, components or parts are referred to as:

intermediate products

the principle capital budgeting models for evaluating information technology projects are the payback method, the accounting rate of return on investment (ROI), net present value, and the:

internal rate of return

when managers represent their company in the outside world and perform symbolic duties, they are acting in their:

interpersonal role

Mintzberg outlined three categories of managerial roles:

interpersonal, informational, and decisional

which of the following would NOT be considered a contact point?

intranet

a distributed database:

is a database that is stored in multiple physical locations

a trojan horse:

is a software that appears to be benign but does something other than expected

a VPN:

is an encrypted private network configured within a public network

which of the following is NOT one of the benefits of a blockchain database?

it eneables the ability to use relational databases

which of the following statments about botnet is NOT true?

it is not possible to make a smartphone part of a botnet

which of the following statements about 3-D printing is NOT true?

it often results in wasted materials

in a ____ strategy, componenets arrive exactly at the moment they are needed and finished goods are shipped as soon as they leave assembly line.

just-in-time

all of the following are examples of supply chain inefficiencies except:

just-in-time productions

a field identified in a record as holding the unique identifier for a record is called the:

key field

what is meant by the statement "knowledge is sticky'?

knowledge is hard to move

which of the following statements about knowledge is NOT true?

knowledge is not subject to network effects

which of the following statements is NOT an accurate description of the importance of knowledge to a firm?

knowledge is subject to the law of diminishing returns

which of the following is NOT one of the main four dimensions of knowledge described in the chapter?

knowledge is timeless

which of the following statements best describes the relationship between collaboration and knowledge management?

knowledge that cannot be communicated and shared with other is in nearly useless

the fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems?

lack of flexibility

which of the following statements about Internet security vulnerabilities is NOT true?

large public networks, such as the internet, are less vulnerable than internal network

major CRM software products include whihc of the following capabilities to support the sale process?

lead management

using the internet to find potential customers inexpensively for products that have low demand is an example of:

long tail marketing

what is the primary benefit to consumers of disintermediation?

lower costs

compared to traditional goods, digital goods have:

lower marginal cost of production on a per unit basis

compared to traditional markets, digital markets have:

lower search costs

which of the following statements about machine learning is NOT true?

machine learning is based on computer code that reflects rules underlying an expert's understanding

a well-designed ESS helps senior executives do all of the following EXCEPT:

make high-velocity automated decisions

the differentce between push- and pull-based models is summarized by which of the following slogans?

make what we sell, not sell what we make

SFA modules in CRM systems provide tools for all of the following EXCEPT:

managing customer service requests

based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?

managing the supply chain

Airbnb uses the _____ business model.

market creator

the universal standards of the internet and e-commerce lower which of the following?

market entry costs

CRM systems typically procide software and online tools for sale, customer service, and:

marketing

a marketplace extended beyond traditional boundaries and removed from a temporal and geographical location is called:

marketspace

in digital markets:

menu costs are lower

content providers use ____ systems to process large amount of very small monetary transactions cost-effectively.

micropayment

which of the following is a DBMS for desktop computers?

microsoft access

which of the following is the most widely used project management software today?

microsoft project

behavioral models of management see managers as being ___ than does the classical model.

more informal

which of the following is NOT one of the five observed ways in whcih managerial behavior differs from the classical description of managers?

most managerial activities take at least one hour to perform

which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

national information infrastructure protection act

____ involves placing ads in social network newfeeds or within traditional editorial content, such as a newspaper article.

native advertising

according to Mintzberg, managers in their informational role act as:

nerve centers of the organization

each computer on a network must contain which of the following?

network interface device

facebook's "like" button is an example of which of the following?

network notification

companies that own internet backbone networks are called:

network service providers

a ____ is a type of intelligent technique that finds patterns and relationships in massive data sets too large for a human to analyze.

neural network

which of the following has a hidden layer that processes inputs?

neural network

which of the following is NOT a major entity in Nike's supply chain?

nikes employees

the process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization

in the context of data minging, the term associations refers to:

occurrences linked to a single event

digital subscriber lines:

operate over existing telephone lines to carry voice, data, and video

decisions regarding managing and monitoring day-to-day business activities are referred to as ____ intelligence

operational

information systems specialists often tend to seek solutions that:

optimize hardware and software efficiency at the expense of ease of use.

major CRM products typically have all of the following services capabbilities EXCEPT:

order management

the set of business processes, culture, and behavior required to obtain value from investments in information systems is one type of:

organizational and management capital

which of the following is NOT one of the six main elements in the business intelligence environment discussed in this chapter?

organizational culture

you have been hired to implement an enterprise system that will automate mush of the billing and accounting work for a statewide HVAC services company. which of the following would you prepare to describe how the new system will affect a firm's structure and operations?

organizational impact analysis

changing organizational behavior by sensing and responding to new experience and knowledge is called:

organizational learning

The HIPAA ACT of 1996:

outlines medical security and privacy rules.

Microsoft Access's data dictionary displays all of the following information about a field EXCEPT the:

ownership of the field

which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination?

packet switching

which of the following is NOT a characteristic of packet switching?

packet switching requires point-to-point circuits

a ____ report is produced when a user enters various values in a pivot table to filter data.

parameterized

most computer viruses deliver a:

payload

in the domain name "https://books.pearson.com", which element is the second_level domain?

pearson.com

which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?

peer-to-peer

which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?

peer-to-peer network

predictive analytics is used for all of the following EXCEPT:

performing a bills of meterial analysis

which of the following best describes the central method used in a scoring model?

performing a weighted compariosn of the criteria used to evaluate a system

which of the following best describes the central method used in a portfolio analysis?

performing an inventory of all of the organization's information systems projects and assets

what is the difference between personalization and customization, as applied to e-commerce technologies?

personalization refers to adjusting marketing messages for a specific consumer; customization refers to adjusting a product or service based on a user's preferences

all of the following are specific security challenges that threaten the communications lines in a client/server environment EXCEPT:

phising

a DBMS makes the:

physical database available for different logical views

Supply chain software can be classified as either supply chain ___ systems or supply chain ___ systems.

planning; execution

which method would you use to develop risk profiles for a firm;s information system projects and assets?

portfolio analysis

informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of:

practice

which of the following is NOT one of Simon's four stages of decision making?

prediction

BI that is designed to determine the most likely effects of changes in the business environment is called:

predictive analytics

as discussed in the chapter texrt, Slack Technologies uses which of the following to identify customers who are most likely to uses it products frequently and upgrade to its paid services?

predictive analytics

predictive search in Google's search engine:

predicts what you are looking for as you enter words into the query box

the logical view database:

presents data as they would be perceived by end users

a firewall allows the organization to:

prevent unauthorized communication into and out of its netork

selling the same goods to different target groups at different prices is called:

price discrimination

a secure website that links a large firm to its suppliers and other key business partners is called:

private industrial network

wireless sensor networks(WSNs) are used for the following tasks EXCEPT:

processing consumer transaction

Procurement involves all of the following EXCEPT:

production scheduling

which of the following would OT be convered in the Management Strategy section of an information systems plan?

profess reports

unsupervised machine learning involves:

programs that can "teach themselves" without human intervention.

which of the following statements best describes the effect that project structure has on overall project risk?

projects with relatively undefined goals are more likely to be subjected to users changing requirements and to run a higher risk of not satifying project goals.

market creators:

provide a digital environment where buyers and sellers can establish prices for products

a supply chain driven by actual customer orders is called a ___ model>

pulled-based

walamrt's continuous replenishment system is an example of a (n) ++++ model.

pulled-bbased

a supply chain driven bby forecastes or bbest guesses of consumer demand follows a (n) ____ model

push-based

which of the following variables in project management is an indicator of how well the project satisfies management objectives?

quality

all of the following are specific security challenges that threaten corporate systems in a client/server environment EXCEPT:

radiation

_____ is malware that hijacks a user's computer and demands payment in return for giving back access.

ransomware

cryptoLocker is and example of which of the following?

ransomware/trojan

a database ___ describes a database entity.

record

pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser

according to the chapter text, BDO Canada obtained all of the following benefits from implementing a new system EXCEPT:

reduced workforce

as discussed in the chapter, which of the following is NOT one of the immediate consequences of inadequate software project management?

reduced workforce

the bullwhip effect can be countered by:

reducing information uncertainty

coca-cola implemented enterprise software from SAP that enabled it to achieve all of the following EXCEPT:

reducing the number of employees

data_____ occurs when the same data is duplicated in multiple files of a database.

redundancy

fault tolerant information systems create an environment designed to provide continuous, uninterrupted services by using:

redundant hardware, software, and pwer supplies

a ___ represent data as two-dimensional tables.

relational DBMS

all of the following are technologies used to analyze and manage big data EXCEPT:

relational DBMS

The Gramm-Leach-Bliley Act:

requires financial institutions to ensure the security of customer data

which of the following is NOT one of the seven major factors that should be addressed when making the business case for a specific new information system?

results of a portfolio analysis of alternative solutions

the value of systems from a financial perspective essentially revolves around the issues of:

return on invested capital

which of the following is NOT an organizational factor to be addressed when designing a new system to fit the organization?

return on investment

which of the following dimensions of e-commerce technology invloves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience?

richness

an analysis of an information system that rates the likelihood of a security incident occuring and its cost would be included in which of the following?

risk assessment

which of the following statements about robotics is NOT true?

robotics does not require programming but instead relies solely on AI

which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?

router

in a relationship database table for customers, the information about a single customer resides in a single:

row

expert systems use real-time data to guide their deicisions.

salse

transaction brokers:

save users money and time by processing transactions normally handled in person, by phone, or by mail online

which of the following project management variables defines what work is or is not included in a project?

scope

which method is used to assign weights to various features of a system?

scoring model

the effort required to locate a suitable product is called:

search costs

which of the following marketing formats is sales-oriented, rather than branding-oriented or a mix?

search engine

which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

security

a statement ranking information risks and identifying security goals would be included in which of the following?

security policy

you have been asked to implement enterprise software for a manufacturer of kitchen appliances. what is the first step you should take?

select the functions of the system you wish to use

in a relational database, the three basic operations used to develop useful sets of data are:

select, project, and join

if you can follow a definite procedure to make a business decision, you are making a _____ decision.

semistructured

the decisions involved in creating and producing a corporate intranet can be classified as ___ decisions

semistructured

which of the following typically makes the unstructured decision for a firm?

senior management

a household appliances manufacturer has hired you to help analyze its social media data sets to determine which of its refrigerators are seen as the most reliable. which of the following tools would you use to analyze this data.

sentiment analysis software

in sociotechnical design:

separate sets of technical and social design solutions are developed and compared

in data mining, which of the following involves events linked over time?

sequences

which of the following is NOT one of the techniques used in web mining?

server mining

which of the following is an example of a direst good in the automobile industry?

sheet steel

all of the following are specific security challenges that threaten corporate servers in a client/server environment EXCEPT:

sniffing

which of following enables a business to connect customer conversations and relationships from social networking sites to CRM processes?

social CRM

in planning a robust e-commerce presence, you will want to consider the blog platform as part of you ____ presence.

social media

which of the following statements about Net marketplaces is NOT true?

some Net marketplaces are owned by a single firm and used to link solely to the firm's suppliers and key business partners

VR systems:

sometimes require the user to don special clothing, headgear, or equipment

an employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website which asks for personal information is an example of:

spear phishing

a pivot table is a:

spreadsheet tool that displays two or more dimensions of data in a convenient fromat

what is the second value-adding step in information system activities in the knowledge management value chain?

store

_____knowledge exists in formal documents, as well as in formal rules that ogranizations derive by observing experts and their decisons-making behaviors.

structured

checking store inventory is an example of a ___ decision

structured

which type of decision is determinging vacation eligibility for an employee?

structured

a network of organizations and business processes for procuring raw materials, tranforming these materials into intermediate finshed products, and distributing the finished products to customers ic alled a(n).

supply chain

a company having a difficulty with timely deliverly of parts to its manufacturing plants should implement a ___ system

supply chain execution

the WMS that Haworth Incorporated uses is an example of which of the following?

supply chain execution system

which of the following manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner?

supply chain execution system

which of the following enables a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product?

supply chain planning systems

in which methon of encryption is a single encryption key sent to the receiver so bboth sender and receiver share the same key?

symmetric key encryption

which of the following best describes the relationship between system implementation and user involvement and management support?

system implementation generally benefits from high levels of user involvement and management support

the test defines ____ as expertise of organizational members that has not been formally documented.

tacit knowledge

a key problem in managing knowledge is the creation of a _____ to organize the information into meaningful categories.

taxonomy

which of the following systems support a managers role as figurehead of an organization?

telepresence systems

which of the following internet services enables logging on to one computer system and doing work on another?

telnet

_____ tools can used to rapidly analyze large unstructured data sets, such as email, memos, and survey responses to discover patterns and relationships.

text mining

measures defined by managment and used to internally evaluate the success of a firm's financial, buisiness process, customer, and learning and growth are called:

the balanced scorecard method

as described in the text, which of the following does NOT have an impact on the level of risk in information systems projects?

the capital budgeting model chosen to evaluate the system

which of the following statements about blockchain is NOT true?

the data represented in a bblockchain is maintained in a central database

which of the following best illustrates the relationship between entities and attributes?

the entity CUSTOMER with the attributes PURCHASE

what event marked the beginning of e-commerce?

the first paid advertisments placed on a website

which of the following statements about project risk is NOT true?

the higher the number of implementation staff on a project, the lower the risk

all of the following have contributed to an increase in software flaws EXCEPT:

the increase in the number of computer hackers in the world

which of the following statements best describes the term BUSINESS INTELLIGENCE?

the infrastructure for warehousing, integrating, reporting, and analyzing business data

in an expert system, the set of rules that models human knowledge is called:

the knowledge base

which of the following statements about scoring models is NOT true?

the most important outcome of a scoring model is the score

which of the following statments about neural networks is NOT true?

the strength of the connections between neurons in a neural network cannot bbe altered

which of the following statements is NOT true about search engines?

there are hundreds of search engines vying for user attention, with no clear leader having yet emerged

which of the following is NOT true about the evolution of AI technologies?

there have been many fundamental conceptual bbreakthrough in AI during the last decade

which of the following statements about DSS is NOT true?

they are BI delivery platforms for casual users

which of the following is not a true statement about ESS?

they support the structured decision making of senior executives

Schneider national is an example of which fo the follwoing?

third-party logistics provider

which of the following statements abbout EDI is NOT true?

today, EDI is only used for document automation

marketing modules in CRM systems provide tools for all of the following EXCEPT:

tools for assessing its selling partners' performance

the domain .gov is a(n):

top-level domain

information density refers to the:

total amount and quantity of information available to all market participants

a ___ is an interaction with a customer.

touch point

Supply chain planning systems perform all of the following functions EXCEPT:

track the physical status of goods

supervised machine learning involves:

training a system by provding specific examples of desired inputs and outputs identified by humans in advance.

all of the following are unique features of e-commerce technology, EXCEPT:

transparency

3-D printers can produce fully functioning components, such as working bbatteries and LEDs.

true

AI applications are used by search engines and social networks to target ads.

true

BBPM uses ideas similar to the balanced scorecard frameword with a stronger emphasis on strategy.

true

Biometric authentication uses systems that read and interpret individual human traits

true

CAD and virtual reality are both types of KWS.

true

COPs can make it easier for people to reuse knowledge.

true

CRM software incorporates hundreds of business processes.

true

DBMS has a data defination capability to specify the structure of the content of the database. t or f

true

DNS has a hierarchical structure

true

DoS attacks flood a network server with thousands of requests for service.

true

EDI can be used as a system for continuous replenishment.

true

GIS software ties location data about the distribution of people or other reources to points, lines, and areas on a map.

true

KPIs are used both in the balanced scorecard framework and BPM.

true

Most internet businesses do very little to protect the privacy of their customers. true or false?

true

NoSQL technologies are useful for accelerating simple queries against large volumes of structured and unstructured data. t or f

true

OLAP can manage and handle queries with very large sets of data

true

SaaS business models are one of the trends leading toward a future web

true

The DMCA requires ISP's to take down sites of copyright infringers they are hosting when the ISP's are notified of the problem. true or false?

true

The European Parliament has banned unsolicited commercial messaging. true or false?

true

The term data governance encompasses policies and procedures through which data can be managed in an organization.

true

a NAT conceals the IP addresses of the organization's internal hot computer(s) to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems:

true

a computer worm is a program that can copy itself to other computers on the network.

true

a data entry screen is an example of a user interface:

true

a firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic

true

a hub is a networking device that sends packets of data to all other devices on the network. true or false

true

a majority of Americans want a Do Not Track option in browsers that will stop websites from collecting information about their online behavior

true

a physical view shows data as it is actually organized and structured on the data storage media. t or f

true

a query is a request for data from a database.. true or false?

true

a semistructured decision is one in which only part of the problem has a clear-cut answer provided by an accepted procedures.

true

a structured decision is repetitive and routine.

true

a web server is responsible for locating and managing stored web pages. true or false

true

according to experts, at least 80 percent for an organization's business content is semistructured or unstructured.

true

advertising networks such as microsoft advertising, yahoo, and google's marketing platform are capable of tracking personal browsing behavior across thousands of websites. true or false?

true

advertising networks track a user's behavior at thousands of websites.

true

all previous mass media in modern history, including the printing press, use a broadcast model where content is created in a central location by experts.

true

an acceptable use defines acceptale uses of the firm's information resources and computing equipment .

true

an application server may reside on the same computer as a web server or on its own dedicated computer. true or false?

true

an information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals.

true

an unnormalized relation contains repeating groups. t or f

true

an unstructured decision is novel and important and requires the decision maker to provide judgment, evaluation, and insight.

true

analytical CRM uses tools to analyze customer data collected from the firms customer touch points and from other sources

true

apple pay uses an RFID-related technology called near field communication

true

authentication refers to verifying that people are who they claim to bbe.

true

babies have a huge computational advantage over even the biggest machine language research systems.

true

behavioral targeting refers to targeting ad messages to a person's clickstream behavior.

true

big data is used to analyze consumer preferences for both in-store and online purchases

true

business intelligence and analytics can deliver nearly real-time information to decision makers.

true

chrun rate is an important indicator of the growth or decline of a company's customer base

true

client/server computing has largely replaced centralized mainframe computing. true or false

true

cloud computing is the fastest growing form of computing. true or false

true

coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire

true

complex groupings of data is a relational database need to be adjusted to minimize awkward many-to-many relationships. t or f

true

computer abuse refers to acts involving a computer that may not be illegal but are considered unethical. true or false?

true

computers using Chrome OS store both programs and user data on Internet cloud servers. true or false

true

core operational transaction systems provide data to date warehouses.

true

cost transparency refers to the ability of consumers to discover what merchants actually pay for products.

true

data visualization technologies are used to help human users see patterns and relationships in large amounts of data.

true

deep learning neural netwprks are used almost exclusively for pattern detection on unlabled data.

true

document management systems are essentially large databases.

true

downtime is a component of TCO.

true

e-commerce refers to the use of the Internet and the web to transact business.

true

encryption is a key feature of a blockchain database. T or F

true

enterprise applications are based on organization-wide definitions of data

true

enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business. true or false?

true

ergonomics is the interaction of people and mcahines in the work environment, including the design of jobs, health issues, and the end-user interface of information systems

true

expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization.

true

experts from a variety of fields have found that managers are poor at assessing risk.

true

exponential growth in the number of transistors and the power of processors is expected to decrease in the foreseeable future. true or false

true

facebaook's deepface is an example of a computer vision system.

true

fiber-optic cable is more expensive and harder to install than other physical transmission media

true

high-speend analytics platforms use both relational and non-relational tools to analyze large data sets.

true

hypertext markup language specifies how text, graphics, video, and sound are placed on a webpage.

true

if an intended benefit of an IT project is improved decision making, managers should develop a set of metrics to quantify the value of an improved decision.

true

in a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks. true or false

true

in addition to being an online retailer, Amazon is also a powerful product search engine.

true

in cloud computing, accountability and repsonsibility for protection of sensitive data resides with the company owning the data.

true

in cloud computing, accountability and responsiility for protection of sensitive data resides witht eh company owning the data

true

in financial services firms, investments in IT infrastructure represents more than half of all capital investment. true or false

true

in general, for digital goods, the marginal cost of producing another unit is about zero.

true

in some industries, total supply chain costs can approach 75 percent of a company's operating budget.

true

in the affiliate revenue model, firms derive revenue by referring consumers to other firms

true

increased error rates may be a sign of user resistance to a new system

true

indirect goods that are not directly involved in the production process

true

inefficicencies in a supply chain are caused by inaccurate or untimely information

true

intangible benefits may lead to quantifiable gains in the long run.

true

knowledge is conditional.

true

knowledge work systems require strong links to external knowledge bbases.

true

legislation requiring private or governmental entities to notify individals of secuirty breaches invloving personally identifiable information has been enacted in all 50 states.

true

managaing a global supply chain is more complex than managing a domestic supply chain.

true

many back-end databases cannot interpret commands written in HTML

true

middleware is an application that transfers information from an organization's internal database to a web server for delivery to a user as part of a web page.

true

mobile is the leading digital platform, with total activity on smartphones and tablets accounting for two-thirds of digital media time spent.

true

more than 80 percent of mobile minutes in the United States are generated through apps.

true

more timely information is an intangible benefit of information systems

true

net marketplaces may either support contractual purchasing based on long-term relationships with designated suppliers or short-term spot purchasing.

true

oligopolies and monopolies dominate the Web and mobile platform. true or false?

true

organizations can rewrite enteprise systems software to support their existing business process.

true

phising is a form of spoofing.

true

podcasting allows subscribers to listen to live, streaming radio and other audio content.

true

privacy protection in Europe has historically been much stronger than in the US. True or False?

true

procter & gambble experienced a growth in its pampers diapers inventory due to the bullwhip effect.

true

program-data dependence refers to the coupling of data stores in files and the specific programs required to update and maintain those files such that changes in programs require chaes to the data. true or false?

true

project management refers to the application of knowledge, skills, tools, and techniques to achieve specific targets within specified budget and time constraints.

true

projects with many undefined requirements must involve users fully at all stages

true

risk is an important variable that project management must deal with.

true

ruby is an object-oriented programming language known for speed and ease of use in building we applications.

true

sniffers enabbles hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

true

some decision scenarious made by middle managers may have unstructured components.

true

some experts believe that exposure to computers reduces intelligence and cognitive abilities. true or false?

true

some intelligent agent systems are capable of learning from experience and adjusting their bbehavior.

true

spanner is an example of a distributed database. t or f

true

stand-alone enterprise systems are becoming a thing of the past

true

streaming is a publishing method for music and video files that flows a continuous stream of content to a user's device without being stored locally on the device.

true

studies have found that firms systematically bblame performance on the external bbusiness environment.

true

supply chain planning systems enables the firm to model its existing supply chain

true

the Mirai botnet infected numerous IoT devices and then used them to launch a DDoS attack

true

the Term cracker is used to identify a hacker with criminal or malicious intent.

true

the claim to privacy is protected by the US constitution. true or false?

true

the data-driven farming systems described in the chapter-opening case are an example of operational intelligence.

true

the design of jobs, health issues, and the end-user interface of information systems are all consideration in the field of ergonomics

true

the difference between cash outflows and cash inflows is used for calculating the financial worth of an investment.

true

the emerging internet-driven supply chain provides multidirectional communication amon firms, networks of firms, and e-marketplaces.

true

the first stage in Simon's decision-making process model is the intelligence stage.

true

the internet is the largest implementation of client/server computing. true or false

true

the internet is the most universal and powerful WAN.

true

the internet of things is based on billions of internet-connected sensors throughout the physical world.

true

the relationship between users and information systems specialists has traditionally been a problem area for information systems implementation efforts

true

the systems analyst is the catalyst for the entire change process and is responsible for making sure that everyone invloved accepts the changes created by a new system.

true

the yellow firs-down markers shown on televised football games are examples of AR.

true

thee is a very high failure rate among information systems projects because organizations have incorrectly assessed their business value.

true

todays 3-D printers can create objects out of human cartilage.

true

two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. true or false

true

using the number of unique visitors a website produces as a measure of marketing success is a carryover from the world of television.

true

viral marketing is like traditional word-of -mouth marketing except that it is spread via online communities.

true

virtualization has become one of the principal technologies for promoting green computing.

true

web beacons are tiny, invisible software programs embedded in email messages and web pages that are used to track and report a user's online behavior. true or false?

true

web hosting services maintain a large web server, or series of servers, and provide fee-paying subscribers with space to maintain their websites. true or false?

true

what-if analysis works forward from known or assumed conditions

true

wikis allows visitors to change or add to the original posted material

true

you can use OLAP to perform multidimensional data analysis.

true

zero defects cannot be achieved in larger software programs because fully testing prgrams that contain thousands of choices and millions of paths would require thousands pf years

true

before the internet, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes.

true q

the choice phase of SImon's decision-making model includes choosing among solution alternative.

trues

in a relational database, a record is referred to in technical terms as a(n):

tuple

an authenticication system in which a user must provide two types of identification, such as a bank card and PIN, is called:

two-factor authentication

all of the following are examples of social commerce companies EXCEPT:

uber

______ integrates disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience.

unified communication

together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):

uniform resource locator

establishing a firm's long-term goals is an example of a ___ decision.

unstructured

when there is no well-understood or agreed-on procedure for making a decison, it is said to be:

unstructured

which type of decision is deciding whether to introduce a new product line?

unstructured

a data lake is composed of:

unstructured and structured data that has not been analyzed

the seminal research effort often referred to as "the cat paper" involved which of the following?

unsupervised learning

the ____ includes a company's suppliers, the suppliers' suppliers, and the processes for managing relationships witht them>

upstream portion of the supply chain

neutral networks:

use Learning Rules to identify the optimal path through the network

deep learning networks:

use mulitple layers of neural networks to detect patterns in input data

which of the following is the single greatest cause of network security breaches?

user lack of knowledge

the differing background between users and information systems specialists is referred to as the:

user-designer communications gap

OLAP enables:

users to quickly generate reports using multidimensional views of data

bblockchain refers to a technology that:

uses a chain of digital 'blocks' that contain records of transaction

a digital certificate system:

uses third party CAs to validate a user's identity

which of the following types of projects have a higher likelihood of failure?

very large-scale or complex systems project

which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

war driving

which of the following would you use to find patterns in user interaction data recorded by a wen server?

we usage mining

which of the following is a milestone for the Phase 1: Planning phase of developing an e-commerce presence?

web mission statement

a (n) _____ is software for locating and managing stored web pages.

web server

which of the following is a milestone for the website development phase of building an e-commerce presence?

website plan

while users are concered about an information system delivering the information needed for work, designers might be concerned about:

what demands the system will place on the company servers

which of the following is NOT an example of a BI predefined production report?

what-if scenario analysis

a data governance policy specifies all of the following EXCEPT: which type of business intelligence tool should be used

which type of business intelligence tool should be used

a network that covers entire geographical regions is most commonly referred to as a(n):

wide area network

which of the following involves where, when, and how to apply knowledge?

wisdom


Kaugnay na mga set ng pag-aaral

Megaquest, Ultraquest, Hyperquest, Black Hole Quest, Fortnite, D&D, and more internet games ban. [Part 2 - Chameleon Master Roller Jonathan Gets Sent To Hell - Scenes 41-76]

View Set

Final Exam for Clinical Chemistry (Quiz 6,7 and 8)

View Set

Community Nursing Ch. 15: Emerging Infectious Diseases

View Set

Chapter 5 - Receivables and Sales, Ch 4: Cash and Internal Controls, CHAPTER 6: Cost of Goods Sold, ACC 210 E2

View Set