FQ19 PLS 21 Chapter Study Guide Test Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Data reduction is the conversion of raw _______ into a smaller amount of more useful _______. A) data; information B) data; knowledge C) information; data D) information; knowledge

A) data; information

________ is an approach that integrates various automated factory systems. A)CIM B)TPS C)CRM D)MRP

A)CIM

Which of the following is NOT a use for data mining? A)Comparing products B) Detecting fraudulent credit card transactions C)Forecasting bankruptcy D) Predicting sales

A)Comparing products

________ is the marketing of additional related products to customers based on a previous purchase. A)Cross-selling B)Bundling C)Downselling D)Upselling

A)Cross-selling

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. A)Espionage B)Identity theft C)Information extortion D)Alien software

A)Espionage

Africa collaborated with ________ to stop the Ebola virus outbreak in 2013 and 2014. A)IBM B)Amazon C)Microsoft D)Google

A)IBM

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? A)Increasing skills necessary to be a computer hacker B)International organized crime taking over cybercrime C)Today's interconnected, interdependent, wirelessly networked business environment D)Lack of management support E)Smaller, faster, cheaper computers and storage devices

A)Increasing skills necessary to be a computer hacker

________ is the correct evolution of POM planning. A)MRP MRP II ERP B)ERP ARP MRP C)ERP MRP MRP II D)MRP ARP ERP

A)MRP MRP II ERP

________ is part of the ________ process and occurs when the company is trying to increase its inventory. A)Make-to-stock; production B)Make-to-order; production C)Make-to-order; procurement D)Make-to-stock; procurement

A)Make-to-stock; production

_________ is the first step in the general framework for ethics. A)Recognize an ethical issue B)Get the facts C)Act and reflect on the outcome of your decision D)Make a decision and test it E)Evaluate alternative actions

A)Recognize an ethical issue

________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. A)SFA B)JIT C)CIC D)CMA

A)SFA

A URL that begins with https uses _________. A)TLS B)VPN C)ERP D)DMZ

A)TLS

John Hancock partnered with ________, a global wellness company. A)Vitality B)TotalWellness C)Medifit D)Weight Watchers

A)Vitality

Which of the following is a privacy issue? A)What information about individuals should be kept in databases, and how secure is the information there? B)Under what circumstances can one use proprietary databases? C)How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? D)How much should companies charge for permitting access to information in their databases?

A)What information about individuals should be kept in databases, and how secure is the information there?

The end product of the _________ stage is a set of system requirements. A)analysis B)design C)investigation D)operation

A)analysis

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using A)data mining. B) DSS. C) OLAP. D)OLTP.

A)data mining.

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. A)deontology B)common good C)utilitarian D)rights E)fairness

A)deontology

A _________ conversion involves shutting the old system off and turning the new system on at a certain point in time. A)direct B)parallel C)pilot D)phased

A)direct

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________. A)explicit knowledge B)explicit information C)tacit information D)tacit knowledge

A)explicit knowledge

Operational CRM systems support _________-office business processes or processes that _________. A)front; directly interact with customers B)back; do not directly interact with customers C)back; directly interact with customers D)front; do not directly interact with customers

A)front; directly interact with customers

Packing, assembly, or manufacturing are ________ activities. A)internal B)upstream C)downstream D)irrelevant

A)internal

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance. A)minimum; maximum B)minimum; minimum C)maximum; maximum D)maximum; minimum

A)minimum; maximum

Data marts can be implemented ________ compared to data warehouses. A)more quickly B)It depends on the situation. C)at the same pace D)less quickly

A)more quickly

A _________ conversion introduces components of the new system in stages. A)phased B)direct C)parallel D)pilot

A)phased

A ________ generally describes an entity. A)record B)byte C)field D)file

A)record

You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________. A)rot B)clickstreaming C)scattering D)degradation

A)rot

The fulfillment process originates in the ________ department and ends in the ________ department. A)sales; accounting B)warehouse; warehouse C)accounting; sales D)warehouse; accounting

A)sales; accounting

SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet. A)software B)a platform C)hardware D)an architecture

A)software

Capital One's insourcing initiative meant it had to build its reputation as a _________ company. A)technology B)marketing C)banking D)human resources

A)technology

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of A)the development of infrastructure to support enterprise-wide analytics. B) the development of one or a few related analytics applications. C) support for maintaining organizational strategy. D)support for organizational transformation.

A)the development of infrastructure to support enterprise-wide analytics.

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. A)unstructured B)structured C)semi-structured D)part-structured

A)unstructured

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately. A)warm B)cold C)medium D)hot

A)warm

You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. A)black B) blue C) red C) white

B) blue

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. A)CSF B) drill down C) exception reporting D) trend analysis

B) drill down

Dashboards evolved from A)enterprise resource planning systems. B) executive information systems. C) functional area information systems. D) transaction processing systems.

B) executive information systems.

Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised. A)50; do not B)50; do C)95; do not D)95; do

B)50; do

_________ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan. A)Consumer Electronics Association B)Amazon C)Google D)Microsoft

B)Amazon

Analytical CRM systems provide ________ by analyzing customer behavior and perceptions. A)CIC B)BI C)SFA D)ERP

B)BI

The most current form of ransomware demands payment in the form of _________. A)Paypal transactions B)Bitcoins C)cash D)credit cards

B)Bitcoins

________________ development is closely linked with the idea of web services and service-oriented architectures. A)Object-oriented B)Component-based C)Agile D)End-user

B)Component-based

Hackers would use a botnet to perform a _________. A)virus B)DDoS C)a Trojan horse D)a logic bomb

B)DDoS

A(n) _________ is located between two firewalls. A)ERP B)DMZ C)spamware detector D)anti-malware system

B)DMZ

_________ is an approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department. A)JAD B)End-user development C)RAD D)Agile development

B)End-user development

_________ is the third step in the general framework for ethics. A)Make a decision and test it B)Evaluate alternative actions C)Recognize an ethical issue D)Get the facts E)Act and reflect on the outcome of your decision

B)Evaluate alternative actions

Which of the following data is NOT currently collected by usage-based car insurance companies? A)Time of day B)GPS C)Mileage D)Speed

B)GPS

________ is part of the ________ process and involves sending goods that are in the warehouse to customers. A)Configure-to-order; procurement B)Sell-from-stock; fulfillment C)Configure-to-order; fulfillment D)Sell-from-stock; procurement

B)Sell-from-stock; fulfillment

Legacy systems were developed as _________. A)ERP B)Silos C)Integrating systems D)DSS

B)Silos

________ is an extended ERP module. A)Operations management B)Supply chain management C)HR management D)Financial management

B)Supply chain management

________ is the cumulative store of subjective or experiential learning. A)Explicit knowledge B)Tacit knowledge C)Tacit information D)Explicit information

B)Tacit knowledge

________ refers to erratic shifts in orders up and down the supply chain. A)Vertical integration B)The bullwhip effect C)VMI D)JIT

B)The bullwhip effect

You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. A)social engineering; intentional B)a human error; unintentional C)a human error; intentional D)social engineering; unintentional

B)a human error; unintentional

Which of the following was NOT used in the cyberattack on Ukraine? A)Spear-phishing B)a logic bomb C)a SCADA attack D)DoS

B)a logic bomb

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. A)accessibility B)accuracy C)privacy D)property

B)accuracy

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs. A)through B)around C)with D)into

B)around

You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation. A)as-is B)best-of-breed C)custom D)vanilla

B)best-of-breed

A ________ is a group of eight ________. A)file; fields B)byte; bits C)field; files D)bit; bytes

B)byte; bits

A _________ site is the least expensive option. A)hot B)cold C)warm D)medium

B)cold

Amazon's recommender system is an example of ________. A)bundling B)cross-selling C)upselling D)downselling

B)cross-selling

You use FedEx and UPS to ship your products to customers. This is an example of a(n) ________ activity. A)irrelevant B)downstream C)internal D)upstream

B)downstream

The European Union's highest court ruled that ________. A)people must remove revealing photographs from the web when requested B)embarrassing material should be removed from search results when requested C)court documents should be taken off the Internet after a certain time period D)publishers need to remove or alter all articles that are no longer relevant

B)embarrassing material should be removed from search results when requested

SCM systems are ________ systems. A)extraorganizational B)interorganizational C)extraorganizational D)intraorganizational

B)interorganizational

Europeans and privacy advocates prefer the _________ model of informed consent. A)opt-out B)opt-in C)sign-out D)sign-up

B)opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. A)opt-in B)opt-out C)sign-up D)sign-out

B)opt-out

A _________ conversion involves running the old and new systems at the same time. A)phased B)parallel C)direct D)pilot

B)parallel

The ________ process originates in the warehouse department and ends in the accounting department. A)production B)procurement C)marketing D)fulfillment

B)procurement

Southwest Airlines utilized a(n) ________ CRM system to rearrange a customer's flight schedule to get to her comatose son. A)mobile B)real-time C)social D)open-source

B)real-time

In the ________ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products. A)deliver B)return C)source D)make E)plan

B)return

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision. A)structured; management control B)structured; operational control C)unstructured; management control D)unstructured; operational control

B)structured; operational control

Data marts are typically associated with A) the development of infrastructure to support enterprise-wide analytics. B)the development of one or a few related analytics applications. C) support for maintaining organizational strategy. D) support for organizational transformation.

B)the development of one or a few related analytics applications.

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. A)limitation B)transference C)avoidance D)acceptance

B)transference

Industry experts estimate that 80-90 percent of data in an organization is ________. A)part-structured B)unstructured C)structured D)semi-structured

B)unstructured

If a company doesn't want to write any computer code, it would choose to ________. A)outsource the application B)use a prewritten application C)custom-write an entire application D)customize a prewritten application

B)use a prewritten application

If you analyze a data cube, this is an example of using A)data mining. B) DSS. C) OLAP. D) OLTP.

C) OLAP.

GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using A)analytics. B) dashboards. C) digitized maps. D) solar energy.

C) digitized maps.

You would use optimization or simulation for ______ analytics. A)descriptive B) predictive C) prescriptive D) useful

C) prescriptive

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis. A)affinity B) goal-seeking C) sensitivity D) what-if

C) sensitivity

The 80/20 rule means that if the software meets _________ percent of the company's needs, then the company should modify _________ percent of its business processes to use the software. A)20; 20 B)20; 80 C)80; 20 D)80; 80

C)80; 20

________ is an advantage of cloud-based ERP systems. A)Security B)Control C)Cost D)Recovery

C)Cost

ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________. A)ERP I B)ERP III C)ERP II D)ERP IV

C)ERP II

________ are designed to correct a lack of communication among _________. A)FAIS; ERP B)ERP; TPS C)ERP; FAIS D)FAIS; TPS

C)ERP; FAIS

_________ is an access control. A)RFID B)A firewall C)Encryption D)A company gate

C)Encryption

Which of the following is an accessibility issue? A)Under what circumstances can one use proprietary databases? B)How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? C)How much should companies charge for permitting access to information in their databases? D)What information about individuals should be kept in databases, and how secure is the information there?

C)How much should companies charge for permitting access to information in their databases?

________ originally managed Priceline.com's customer management system. A)Product management B)Marketing C)IT D)HR

C)IT

_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A)Responsibility B)Answerability C)Liability D)Accountability

C)Liability

________ is the customer's potential revenue stream over a number of years. A)Customer life cycle B)Market capitalization C)Lifetime value D)Customer churn

C)Lifetime value

Data marts and data warehouses typically use ________. A)RFID B)OLTP C)OLAP D)ERP

C)OLAP

Most organizations design TPS to process transactions as soon as they occur. This is called _________. A)source data processing B)batch processing C)OLTP D)OLAP

C)OLTP

________ CRM systems are hosted by an external vendor in the vendor's data center. A) Mobile B)Social C)On-demand D)On-premise

C)On-demand

_________ is the most recent example of ethical misbehavior in organizations. A)Enron B)WorldCom C)Wells Fargo bank D)Tyco

C)Wells Fargo bank

Overstock's chatbot, called Mila, _________. A)asks shoppers to input their skin type and then suggests beauty tips and products tailored to their needs B)allows customers to describe what they are looking for instead of just choosing from standard options C)automates the simple but time-consuming process of requesting sick leave D)provides a list of recommendations and enables customers to have a real-time dialogue with the bot

C)automates the simple but time-consuming process of requesting sick leave

Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report. A)exception B)routine C)comparative D)drill-down

C)comparative

Companies purchase digital dossiers to ________. A)evaluate the competition B)engage in electronic surveillance C)create customer intimacy D)track their own reputations

C)create customer intimacy

A transaction is any business event that generates ________ worthy of being captured and stored in a database. A)knowledge B)information C)data D)wisdom

C)data

A(n) ________ report summarizes the performance of critical activities. A)comparative B)ad hoc C)key indicator D)drill-down

C)key indicator

Organizations typically invest in cloud-based ERP systems because they are _________. A)more accessible B)less error-prone C)less expensive D)more secure

C)less expensive

A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. A)optional single B)mandatory many C)optional many D)mandatory single

C)optional many

Database systems minimize ________. A)integrity B)security C)redundancy D)independence

C)redundancy

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision. A)midstructured B)semistructured C)structured D)unstructured

C)structured

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). A)the input; inputs B)the input; outputs C)the output; inputs D)the output; outputs

C)the output; inputs

A _________ is an intellectual work that is not based on public information. A)trademark B)patent C)trade secret D)copyright

C)trade secret

With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options. A) best-of-breed B)as-is C)vanilla D)custom

C)vanilla

_____ is NOT a statistical tool used for predictive analytics. A)Data mining B) Linear regression C) Logistic regression D) Multidimensional analysis

D) Multidimensional analysis

______ analytics require _______ analytics. A)Descriptive; predictive B) Descriptive; prescriptive C) Predictive; prescriptive D) Prescriptive; predictive

D) Prescriptive; predictive

_______ is a decisional role. A) Analyzer B) Leader C) Liaison D) Resource allocator

D) Resource allocator

_________ refers to determining who is responsible for actions that were taken. A)Liability B)Responsibility C)Answerability D)Accountability

D)Accountability

Which of the following is NOT a problem associated with Big Data? A)Big Data changes. B)Big Data lacks quality. C)Big Data can come from untrusted sources. D)Big Data can be structured, unstructured, or semi-structured.

D)Big Data can be structured, unstructured, or semi-structured.

________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity. A)Data dictionary B)Modality C)Business rules D)Cardinality

D)Cardinality

Which of the following is NOT a reason Priceline.com moved to a new customer contact center? A)Customer growth B)Competition C)Contact options D)Cost

D)Cost

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A)A SCADA attack B)Espionage C)Identity theft D)Cyberterrorism

D)Cyberterrorism

Ashley Madison's data was first released on the _________ by ________. A)Web; Anonymous B)Web; The Impact Team C)Dark Web; Anonymous D)Dark Web; The Impact Team

D)Dark Web; The Impact Team

_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project. A)Technical B)Behavioral C)Competitive D)Economic

D)Economic

_________ costs are those costs that remain the same regardless of any change in the company's activity level. The CIO's salary is an example of a _________ cost. A)Variable; variable B)Fixed; variable C)Variable; fixed D)Fixed; fixed

D)Fixed; fixed

Which of the following is an accuracy issue? A)What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? B)What information about oneself should an individual be required to reveal to others? C)How should we handle illegally copying copyrighted software? D)How can we ensure that the information will be processed properly and presented accurately to users?

D)How can we ensure that the information will be processed properly and presented accurately to users?

The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan. A)IT architecture B)organization strategic plan C)organization mission D)IS operational plan

D)IS operational plan

Which of the following is an advantage of JAD? A)Works wells for ill-defined problems B)Bypasses the IS department and avoids delays C)Enforces quality by maintaining standards D)Involves many users in the development process

D)Involves many users in the development process

________ is the most popular query language used for interacting with a database. A)ETL B)TPS C)RFID D)SQL

D)SQL

________ is the best-known on-demand CRM vendor. A)SAP B)Oracle C)Microsoft D)Salesforce

D)Salesforce

_________ collects personal information about users without their consent. A)Spamware B)Marketware C)Adware D)Spyware

D)Spyware

_________ are IS professionals who specialize in analyzing and designing information systems. A)Programmers B)Technical specialists C)Users D)Systems analysts

D)Systems analysts

_________ is a remote attack requiring user action. A)A Trojan horse B)A logic bomb C)DoS D)Virus

D)Virus

Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC. A)choice B)design C)intelligence D)implementation

D)implementation

All the information about you in your university's database is a(n) ________. A)entity B)attribute C)database D)instance

D)instance

Systems _________ addresses the business problem or business opportunity by means of a feasibility study. A)operation B)design C)analysis D)investigation

D)investigation

Typing in your password to access a system is an example of something the user _________. A)is B)does C)has D)knows

D)knows

The ________ component of SCM is the most metric-intensive part of the supply chain in which organizations measure quality levels, production output, and worker productivity. A)deliver B)return C)plan D)make E)source

D)make

Databases ________ inconsistency; this means ________. A)minimize; the same data are stored in multiple locations B)maximize; various copies of the data do not agree C)maximize; the same data are stored in multiple locations D)minimize; various copies of the data do not agree

D)minimize; various copies of the data do not agree

Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system. A)social B)on-premise C)mobile D)open-source

D)open-source

A _______________ is an underlying computer system on which application programs can run. A)virtual machine B)container C)stage D)platform

D)platform

The _________ represents the business users and any other stakeholders in the project. A)program developer B)scrum master C)team D)product owner

D)product owner

Jana is a mobile startup designed to ________. A)charge users less money to use mobile data than they have to pay their telecommunication company B)give app developers free access to other apps C)offer free smartphones to people who make less than 20 cents an hour in China D)reward users with data in exchange for collecting their personal information when sampling apps

D)reward users with data in exchange for collecting their personal information when sampling apps

Containers are another step in the development of _________ technology. A)architecture B)customized C)cloud computing D)virtual

D)virtual

Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM. A)return B)deliver C)source D)make E)plan

E)plan

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach. A)deontology B)utilitarian C)common good D)fairness E)rights

E)rights


Ensembles d'études connexes

IT Essentials 7.0 Chapter 10 Exam

View Set

Central problem of economics quiz

View Set

Computer Science A Level 1.1.3 Input, Output and Storage

View Set

HEALTH CHAPTER 3: Managing Stress

View Set