IS 290 Cronk FINAL - Test 1, 2, & Ch 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

CVS refers to: A. eyestrain related to computer display screen use. B. a business practice that attempts to evaluate the intangible values of computer systems. C. carpal vision syndrome. D. a type of antivirus protection software. E. wrist injuries brought about by incorrect hand position when using a keyboard.

A

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A. HIPAA B. Gramm-Leach-Billey Act C. Privacy Protection Act D. Freedom of Information Act E. COPPA

A

Which of the following types of computers would you use to support a computer network? A. Server B. Mainframe C. Workstation D. PC E. Tablet

A

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? A. local area network B. modem C. DSL D. twisted wire E. TCP/IP

B

Which of the following is a type of ambient data? A. Computer log containing recent systems errors B. A file deleted from a hard disk C. A file that contains an applications user settings D. A set of raw data from an environmental sensor

B

All of the following are examples of environmental actors in an information system except: A. customers B. stockholders C. feedback D. competitors E. regulatory agencies

C

Which signal types are represented by a binary waveform? A. Laser B. Optical C. Digital D. RFID E. Analog

C

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. A. service-oriented B. on-demand C. multitiered client/server D. two-tiered client/server E. grid

D

A human resources system that summarizes the total moving, house-hunting, and home financing costs for employees in all company divisions is an example of which of the following? A. Knowledge management system (KMS) B. Transaction processing system (TPS) C. Executive support system (ESS) D. Management information system (MIS) E. Customer relationship management (CRM) system

D

Pre-configured hardware-software systems that use both relational and non-relational technology optimized for analyzing large data sets are referred to as: A. hybrid DBMS B. hadoop C. BI D. analytic platforms E. data marts

D

SCM systems are considered to be a(n) ________ because they automate the flow of information across company boundaries. A. KMS B. enterprise system C. MIS D. interorganizational system E. cross-function system

D

The HIPAA Act of 1996: A. requires financial institutions to ensure the security of customer data. B. specifies best practices in information systems security and control. C. imposes responsibility on companies and management to safeguard the accuracy of financial information. D. outlines medical security and privacy rules. E. identifies computer abuse as a crime and defines abusive activities.

D

The select operation: A. Combines relational tables to provide the user with more information than is otherwise available B. Creates a subset consisting of columns in a table C. Identifies the table from which the columns will be selected D. Creates a subset consisting of all records in the file that meet stated criteria E. Specifies the content of the database

D

To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management, a firm would most likely use: A. CAD systems B. genetic algorithms C. fuzzy logic systems D. intelligent agents E. neural networks

D

Two factor authentication utilizes a(n): A. unique password B. a firewall C. a digital certificate D. a multistep process of authentication E. encrypted connection

D

Which of the following is not an essential characteristic of cloud computing? A. on demand self service B. rapid elasticity C. measured service D. open source software

D

A firm that must invest in a new information system in order to comply with federal legislation is investing to achieve which of the following business objectives? A. Customer intimacy B. Operational Excellence C. New products D. Improved decision making E. Survival

E

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? A. Legacy systems B. SSID standards C. Vulnerabilities D. Security policy E. Controls

E

Which of the following replaced the U.S. Department of Commerce safe harbor framework that enabled U.S. businesses to legally use personal data from EU countries? A. COPPA B. P3P C. PGP D. FIP E. Privacy Shield

E

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? A. Computer Fraud and Abuse Act B. Economic Espionage Act C. Electronic Communications Privacy Act D. Data Security and Breach Notification Act E. National Information Infrastructure Protection Act

E

Most MIS's use sophisticated mathematical models or statistical techniques. True False

False

Quality control is the sole goal of Six Sigma. True False

False

A business model describes how a company produces, delivers, and sells a product or service to create wealth. True False

True

When the output of some units can be used as inputs to other units, synergies develop, which can lower cost and generate profits. True False

True

In the value chain model, primary activities are those that are most directly related to the production and distribution of the firm's products and services. True False

True

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware. True False

True

Nearly all of the research on the business benefits of collaboration is anecdotal. True False

True

Senior management is responsible for ensuring the financial performance of the firm. True False

True

4G networks use which of the following standards? A. LTE and Wimax B. LTE and LTD C. CDMA and PAN D. GSM and LTD

A

A(n) ________ is software for locating and managing stored web pages. A. web server B. net server C. router D. modem E. hub

A

Whereas marketing and financial careers have been transformed by the growth in information systems, thus far managerial positions have remained relatively unaffected. True False

False

All of the following are considered primary activities of a firm except: A. inbound logistics B. sales and marketing C. procurement D. service E. outbound logistics

C

A ________ is a senior manager who oversees the use of IT in the firm. A. CEO B. CFO C. CIO D. CIT E. CPO

C

A foreign country attempting to access government networks in order to disable a national power grid is an example of: A. phishing B. denial of service attacks C. cyberwarfare D. evil twins

C

Strong linkages to customers and suppliers increase switching costs. True False

TRUE

A Trojan horse: A. is software that appears to be benign but does something other than expected. B. is a virus that replicates quickly. C. is malware named for a breed of fast-moving Near-Eastern horses. D. installs spyware on users' computers. E. is a type of sniffer used to infiltrate corporate networks.

A

A VPN: A. is an encrypted private network configured within a public network. B. is more expensive than a dedicated network. C. provides secure, encrypted communications using Telnet. D. is an Internet-based service for delivering voice communications. E. is a proprietary networking service technology developed by individual corporations.

A

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? A. Kant's Categorical Imperative B. The Golden Rule C. The Risk Aversion Principle D. The "No free lunch" rule E. The slippery-slope rule

A

A data ________ stores current and historical data of potential interest to decision makers throughout the company. A. warehouse B. mart C. archive D. mine E. center

A

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because: A. It typically focuse on a single subject area or line of business B. All the information is historical C. It uses a web interface D. It is open-source

A

A digital certificate system: A. uses third party CAs to validate a user's identity. B. uses digital signatures to validate a user's identity. C. uses tokens to validate a user's identity. D. is used primarily by individuals for personal correspondence. E. protects a user's identity by substituting a certificate in place of identifiable traits.

A

A field identified in a table as holding the unique identifier of the table's records is called the: A. primary key B. key field C. primary field D. foreign key E. identifying field

A

A firewall allows the organization to A. enforce a security policy on data exchanged between its network and the Internet. B. check the accuracy of all transactions between its network and the Internet. C. create an enterprise system on the Internet. D. check the content of all incoming and outgoing email messages E. create access rules for a network.

A

A firm can exercise greater control over its suppliers by having: A. more suppliers B. fewer suppliers C. global suppliers D. local suppliers E. only a single supplier

A

A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives? A. Survival B. Improved decision making C. Competitive advantage D. Operational excellence E. Customer intimacy

A

A moving company has an information system that analyzes travel patterns and decides which routes are the most efficient for every van. The need for employees to follow procedures to update this system with arrival and departure times is a(n) ________ dimension of the system. A. organizational B. managerial C. people D. technology E. cultural

A

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends: A. in two short marks B. in one short mark C. with a crow's foot D. with a crow's foot topped by a short mark

A

A statement ranking information risks and identifying security goals would be included in which of the following? A. Security policy B. AUP C. Risk Assessment D. Business impact analysis E. Business continuity plan

A

A(n) ________ is a free, online course made available via the web to very large numbers of participants. A. massive open online course B. multiperson online learning course C. EOC D. online learning system E. universal online course

A

A(n) ________ is a structured survey of the accuracy and level of completeness of the data in an information system. A. data quality audit B. systems analysis C. systems audit D. data analysis E. data overview

A

A(n) ________ table is a spreadsheet feature that displays two or more dimensions of data in a convenient format. A. pivot B. drill-down C. ad hoc D. multitier E. sensitivity

A

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. A. behavioral targeting B. web bugs C. NORA D. intelligent agents E. FIP principles

A

All of the following are physical components of an RFID system except: A. bar codes B. antennas C. radio transmitters D. tags E. a stationary or handheld service

A

All of the following are psychological aspects of quality except: A. effective marketing B. the company's knowledge of its products C. the product's reputation D. the courtesy of salespeople E. the sensitivity of support staff

A

All of the following are specific security challenges that threaten the communications lines in a client/server environment except: A. Errors. B. tapping. C. theft and fraud. D. radiation. E. sniffing.

A

All of the following are types of information systems general controls except: A. application controls B. computer operations controls C. hardware controls D. software controls E. administrative controls

A

An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except: A. The minimum response time for processing business transactions B. Real estate and utility costs for housing and providing power for the technology C. The purchase or license of software for each other D. The cost to provide training to information systems specialists and end users

A

An inference engine is A. A strategy used to research through the rule base in an expert system. B. a data mining strategy used by intelligent agents. C. The programming environment of an expert system. D. A method of organizing expert system knowledge into chunks E. A set of rules used to model human knowledge in an expert system

A

As described in the chapter case, which of the following constitutes an organizational element in the UPS tracking system? A. The specification of procedures for identifying packages with sender and recipient information B. Monitoring service levels C. Promoting the company strategy of low-cost, superior service D. The use of handheld computers and networks for managing package delivery E. Routing software that creates the most efficient delivery route for each driver

A

As discussed in the chapter opening case, which of the following statements about Verizon is not true? A. Verizon is focusing on satellite-based television in its competition with AT&T. B. Verizon claims that its wireless network is the largest and most reliable in the United States. C. AT&T is investing in upgrading its high-speed networks. D. Verizon sees acquiring companies involved in digital advertising as an investment for the future. E. Verizon offers a standalone video service.

A

Benchmarking: A. compares the efficiency and effectiveness of your business processes against strict standards. B. allows industry participants to develop industry-wide standards. C. is used to measure the speed and responsiveness of information technology. D. synchronizes the business processes of customers, suppliers, and trading partners. E. coordinates the value chains of independent firms to enable them to collectively produce a product or service.

A

Blockchain refers to a technology that: A. uses a distributed ledger system of transactions. B. uses a centralized data store in the cloud. C. relies on the Internet to provide secure transactions. D. uses existing banking systems to transfer funds. E. relies on peer-to-peer networks.

A

CAD Systems: A.are capable of generating realistic-looking three-dimensional graphic designs that can be rotated and viewed from all sides. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management. E. are used for creating virtual reality environments.

A

Caterpillar Corporation is example of which of the following? A. Domestic exporter B. Multinational C. Franchiser D. Transnational E. Virtual company

A

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. A. UTM B. DPI C. MSSP D. NSP E. PKI

A

Customer definitions of the quality of a product include all of the following except: A. uniformity of the product B. accuracy of the advertising with respect to the product C. durability and safety of the product D. ease of use of the product E. customer support for the product

A

Digital subscriber lines: A. Operate over existing telephone lines to carry voice, data, and video. B. operate over coaxial cable lines to deliver Internet access. C. are very-high-speed data lines typically leased from long-distance telephone companies. D. have up to twenty-four 64-Kbps channels. E. are assigned to every computer on the Internet.

A

Employees that assist with administrative work at all levels of the firm are called: A. data workers B. knowledge workers C. operational management D. service workers E. senior managers

A

Expert systems are used when: A. expertise is in short supply and needs to be captured B. predictions for the future are required C. patterns of consumer behavior need to be investigated D. big data needs to be analyzed E. senior managers need reports on overall business performance

A

Finding out why orders are not being filled on time at a distribution center is what kind of decision scenario? A. Semi-structured B. High-velocity C. Unstructured D. Procedural E. Operational

A

How are information systems used at the industry level to achieve strategic advantage? A. By building industry-wide, IT-supported consortia and symposia B. By raising the bargaining power of suppliers C. By encouraging the entry of new competitors D. By enforcing standards that reduce the differences between competitors E. By enabling companies to develop customer intimacy

A

In TCP/IP, IP is responsible for which of the following? A. Disassembling and reassembling packets during transmission B. Establishing an Internet connection between two computers C. Moving packets over the network D. Sequencing the transfer of packets E. Breaking messages down into packets

A

In a business relational database, tables contain: A. one table for each entity B. relations among entities C. bytes D. three-dimensional relations E. links to other tables

A

In a relational database, a record is also called a(n): A. tuple B. key field C. entity D. field E. table

A

In clustering, a data mining tool will find: A. new groupings within data. B. related predictions from existing values. C. several events grouped by time. D. new associations. E. forecasts for future events.

A

In co-location, a firm: A. purchases and owns its Web server but locates the server in the physical facility of a hosting service. B. contracts with an external vendor to run their computer center and networks. C. off-loads peak demand for computing power to remote, large-scale data centers. D. utilizes an external, distributed computing grid. E. uses only open source software to operate its computer systems

A

In network economics, the value of a commercial software vendor's software products: A. increases as more people use them. B. decreases as more people use them. C. increases due to higher marginal gain in output. D. decreases according to the law of diminishing returns. E. is unrelated to the number of people that use them.

A

In terms of the data relationships found by data mining, sequences refers to: A. events linked over time B. patterns that describe a group to which an item belongs C. occurrences linked to a single event D. undiscovered groupings E. classifications when no groups have yet been defined

A

Instant messaging is a type of ________ service. A. chat B. cellular C. email D. wireless E. network

A

Internet technology: A. makes it easy for rivals to compete on price alone. B. imposes a significant cost of entry, due to infrastructure requirements. C. increases the difference between competitors because of the wide availability of information. D. makes it easy to sustain operational advantages. E. has lessened competitive rivalries.

A

Journalist Thomas Friedman's description of the world as "flat" refers to the: A. flattening of economic and cultural advantages of developed countries. B. use of the Internet and technology for instantaneous communication. C. reduction in travel times and the ubiquity of global exchange and travel. D. growth of globalization. E. increased use of global currencies.

A

Key forces in a business' immediate environment include: A. regulations B. technological innovations C. economic conditions D. political conditions E. global events

A

Links coming out of an online document are a sign of: A. Richness or variety of topics covered B. Popularity C. Data quality D. Data usage E. Marketing

A

OLAP is a tool that enables users to: A. Obtain online answers to ad hoc questions in a rapid amount of time B. View both logical and physical views of data C. Quickly diagram data relationships D. Normalize data E. Find hidden patters in large databases

A

On which of the following protocols is the Internet based? A. TCP/IP B. FTP C. IMAP D. HTTP E. DNS

A

Pharming involves A. redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. B. pretending to be a legitimate business's representative in order to garner information about a security system. C. setting up fake Web sites to ask users for confidential information. D. using e-mails for threats or harassment. E. setting up fake Wi-Fi access points that look as if they are legitimate public networks.

A

Running a Java program on a computer requires: A. A Java Virtual Machine to be installed on the computer. B. A Java Virtual Machine to be installed on the server hosting the java applet C. An applet to be downloaded to the users computer D. No extra or specialized software, as java is platform-independent

A

Software that manages the resources of the computer is called: A. system software B. application software C. data management software D. network software E. web services software

A

The Gramm Leach Bliley Act: A. Requires financial institutions to ensure the security of customer data B. Outlines medical security and privacy rules C. Specifies best practices in information systems security and control D. Identifies computer abuse as a crime and defines abusive activities.

A

The Online Privacy Alliance: A. encourages self-regulation to develop a set of privacy guidelines for its members. B. protects user privacy during interactions with Web sites. C. has established technical guidelines for ensuring privacy. D. is a government agency regulating the use of customer information. E. is a safe harbor program established by the U.S. government

A

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called: A. The internet of things B. The Semantic Web C. Internet2 D. A 3-D Web E. Web 2.0

A

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? A. property rights and obligations B. system quality C. accountability and control D. information rights and obligations E. quality of life

A

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A. normalization B. data scrubbing C. data cleanising D. data administration E. data management

A

The reduction of errors to 3.4 defects per million opportunities is central to the concept of: A. six sigma B. TQM C. benchmarking D. cycle time reduction E. BPR

A

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A. bps. B. Hertz. C. baud. D. gigaflops. E. RPMs.

A

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A. Profiling B. Phishing C. Spamming D. Targeting E. Spyware

A

To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: A. Total cost of ownership model B. Return on investment model C. Break-even point D. Cost benefit analysis capacity plan

A

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A. Uniform resource locator B. IP address C. Third-level domain D. Root domain E. Child domain

A

Translating software to different languages is commonly referred to as: A. software localization B. scaling C. service-oriented architecture D. outsourcing E. open sourcing

A

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A. DDos B. DoS C. SQL injection D. phishing E. botnet

A

Walmart's continuous replenishment system allows it to do all of the following except: A. provide mass customization B. transmit orders to restock directly to its suppliers C. keep costs low D. better meet customer demands E. fine-tune merchandise availability

A

What are the four layers of the TCP/IP reference model? A. Application, transport, internet, and network interface B. Physical, application, transport, and network interface C. Physical, applications, internet, and network interface D. Application, hardware, internet, and network interface

A

What kind of decision making tool could help you develop a recommended system for your firm's website which has 50,000 visitors a month? A. Big data analytics B. Sensitivity analysis C. Goal seeking D. Forecasting E. Simulation

A

What would be a reason for using a workstation rather than a personal computer? A. When you need more powerful computational abilities B. When you need to access a network C. When you need to serve applications and data to client computers D. When you need to share resources E. When you need to connect to a cloud computing platform

A

Which are the three major dimensions of business problem solving? A. Organizational dimensions, people dimensions, and technology dimensions B. Organizational dimensions, people dimensions, and environmental dimensions C. People dimensions, technology dimensions, and environmental dimensions D. Technology dimensions, organizational dimensions, and environmental dimensions E. Organizational dimensions, technology dimensions, and cultural dimensions

A

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? A. slippery slope rule B. lemming rule C. high-failure cost rule D. utilitarian principle E. golden rule

A

Which of the five moral dimensions of the information age does spamming involve? A. quality of life B. system quality C. accountability and control D. information rights and obligations E. property rights and obligations

A

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A. Digital Millenium Copyright Act B. Privacy Act C. Freedom of Information Act D. Electronic Communications Privacy Act E. Computer Software Copyright Act

A

Which of the following devices collects data directly from the environment for input into a computer system? A. Sensor B. Touch screen C. Audio input D. Trackball E. Digital scanner

A

Which of the following illustrates the use of information systems to focus on market niche? A. A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy B. A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers You Answered C. A PC manufacturer's use of information systems to facilitate direct access from suppliers to production schedules D. A grocery store chain's use of information systems to produce products and services at a lower price than competitors E. An airline's use of information systems to analyze detailed data on customers to determine each customer's profitability

A

Which of the following is a type of optical drive storage? A. Blu-ray B. Hard drive C. USB flash drive D. Magnetic tape E. SSID

A

Which of the following is a typical middle management decision? A. How much of our product is selling in lower-income markets? B. Should we close a factory? C. Should we introduce our product to overseas markets? D. Should we discontinue this product? Which product is selling the best in overseas markets?

A

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely? A. Sasser B. Zeus C. Conficker D. ILOVEYOU E. Cryptolocker

A

Which of the following is an example of a business using information systems to create new products and services? A. Apple's creation of the iPad B. JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced C. The Mandarin Oriental's use of computers to keep track of guests' preferences D. Verizon's web-based digital dashboard providing real-time company information for managers E. Walmart's Retail Link system

A

Which of the following is an example of a keylogger? A. Zeus B. Conficker C. Sasser D. ILOVEYOU E. Cryptolocker

A

Which of the following is an example of a legacy system? A. Transaction processing system running on a mainframe B. Scalable grid computing system C. Web services running on a cloud computing platform D. MDM software E. Quantum computing system

A

Which of the following is an interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking? A. UNIX B. Linux C. OS X D. COBOL E. Chrome

A

Which of the following is considered the most important U.S. federal statute setting forth conditions for handling information about individuals? A. The Privacy Act B. The Gramm-Leach-Bliley Act C. The Freedom of Information Act D. COPPA E. HIPAA

A

Which of the following is not an example of a computer used as a target of crime? A. Illegally accessing stored electronic communication B. Threatening to cause damage to a protected computer C. Accessing a computer system without authority D. Knowingly accessing a protected computer to commit fraud

A

Which of the following is not one of the top five search engines? A. Facebook B. Yahoo C. Google D. Baidu

A

Which of the following is the best definition of an information system? A. A set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization B. Computers, keyboards, printers, and telecommunications devices C. A set of detailed programmed instructions that transform raw data into information D. Physical devices and software that can be connected to share voice, data, images, sound, and video E. A global network that uses universal standards

A

Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case? A. Higher customer satisfaction levels B. Survival C. Improved employee morale D. Improved decision making E. Reduced cost of supplies

A

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? A. War driving B. Sniffing C. Cybervandalism D. Drive-by tapping E. Snooping

A

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? A. security B. controls C. benchmarking D. algorithms E. identity management

A

Which of the following refers to the purchase or sale of goods and services over the Internet? A. E-commerce B . E-business C. Customer relationship management (CRM) D. Management information system (MIS) E. Supply chain management (SCM)

A

Which of the following statements about passwords is not true? A. Authentication cannot be established by the use of a password B. Password systems that are too rigorous may hinder employee productivity C. Passwords can be stolen through social engineering D. Passwords are often disregarded by employees E. Passwords can be sniffed when being transmitted over a network

A

Which of the following systems would you use to determine which trends in your supplier's industry will affect your firm the most during the next five years? A. Executive support systems (ESS) B. Transaction processing systems (TPS) C. Management information systems (MIS) D. Decision support system (DSS) E. KWM

A

Which of the following would you use to find patterns in user interaction data recorded by web servers? A. Web usage mining B. Web server mining C. Web structure mining D. Web content mining E. Web protocol mining

A

Which process is used to protect transmitted data in a VPN? A. Tunneling B. PPP C. VOIP D. Packet-switching E. Chaining

A

Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized A. GIS B. DSS C. GSS D. TPS E. MIS

A

You are answering phones for a local utilities provider and are speaking with an extremely angry customer. Because your company manual advises employees to transfer hostile calls to a superior, you do this. What quality dimension of decisions does your action reflect? A. Due Process B. Justice C. Fairness D. Unstructured decision making E. Structured Decision making

A

You have been hired by Inspiration Inc. to help improve its financial performance. Inspiration Inc. is a business communications consulting firm that services many clients in different industries throughout the world. The firm provides its clients with customized written recommendations about how to best use the client's existing resources to improve the client's internal communications. The company has approximately 100 consultants, all of whom are located in its central headquarters in Chicago. Which of the following systems would you recommend to improve Inspiration Inc.'s business processes and improve its financial performance? A. Extranet, to enable quick collaboration via the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed B. CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C. KMS, to minimize redundant work on similar clients D. Video conferencing system, to improve collaboration E. MIS, to produce reports on the firm's operations

A

You use ________ to predict when a computer hardware system becomes saturated. A. capacity planning B. virtualization C. localization D. measured service E. SLAs

A

______ identity the access points in a WI-Fi network. A. SSIDs B. UTMs C. URLs D. NICs

A

________ are intelligent techniques that parallel some aspects of the processing patterns of the biological brain. A. neural networks B. genetic algorithms C. CBR systems D. Fuzzy logic systems E. Intelligent agents

A

________ are not held liable for the messages they transmit. A. Regulated common carriers B. Private individuals C. Organizations and businesses D. Elected officials E. European ISPs

A

________ is the ability to offer individually tailored products or services using the same production resources as mass production. A. mass customization B. size customization C. personalization D. demand customization E. CAD

A

________ means that you accept the potential costs and obligations for the decisions you make. A. responsibility B. accountability C. liability D. due process E. duty

A

"Look and feel" copyright infringement lawsuits are concerned with: A. the distinction between tangible and intangible ideas. B. the distinction between an idea and its expression. C. using the graphical elements of another product. D. using the creative elements of another product. E. violation of a monopoly on the ideas behind a product.

B

A KPI is: A. an industry standard for measuring performance along a given dimension B. a measure proposed by senior management C. an alternative to the balanced scorecard method D. an analytic technique for measuring financial performance E. a measurement of knowledge performance

B

A field identified in a record as holding the unique identifier for that record is called the: A. primary key B. key field C. primary field D. foreign key E. identifying field

B

A firm that locates all systems development and operations at its headquarters is using a ________ system configuration. A. unilateral B. centralized C. decentralized D. networked E. virtual

B

A network that spans a college or corporate facility is called a: A. CAN B. MAN C. LAN D. WAN E. WSN

B

A table that links two tables that have a many-to-many relationship is often called a(n): A. Derived table B. Intersection relation C. Foreign table D. Entity relationship table

B

According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately: A. 900,000 B. 9 million C. 90 million D. 9 billion E. 90 billion

B

All of the following are currently being used as traits that can be profiled by biometric authentication except: A. fingerprints B. body odor C. voice D. retinal images

B

All of the following are tools or technologies for extracting information from unstructured data sets except: A. sentiment analysis software B. SQL queries C. Hadoop D. a non-relational DBMS E. text mining

B

An example of a business using information systems for supplier intimacy is: A. Apple's creation of the iPad B. JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced. C. Citibank's ATM system D. Verizon's web-based digital dashboard providing real-time company information for managers. E. the Mandarin Oriental's use of computers to keep track of guests' preferences.

B

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A. Logging transactions B. Managing the supply chain C. Lowering network costs D. Enabling client communication E. Improving employee engagement

B

Capabilities and tools to manage and analyze large quantities and different types of data from multiple sources are collectively known as: A. DSS B. business intelligence infrastructure C. OLAP D. data mining E. in-memory computing

B

Converting raw data into a more meaningful form is called: A. capturing B. processing C. organizing D. feedback E. inputting

B

CryptoLocker is an example of which of the following? A. worm B. ransomware C. sniffer D. evil twin

B

DSS and MIS are also referred to as ________ systems. A. collaboration B. business intelligence C. executive support D. business model E. expert

B

Each of the following is required for successful collaboration, except: A. open culture B. strong hierarchy C. decentralized structure D. breadth of collaboration E. appropriate collaboration technology

B

Federal law requires many businesses to keep email messages for ten years. A. True B. False

B

IPv6 has been developed in order to: A. update the packet transmission protocols for higher bandwidth. B. create more IP addresses. C. allow for different levels of service. D. support Internet2 E. reduce excess IP addresses.

B

In a hierarchical organization, the upper levels consist of: A. managerial, professional and knowledge workers. B. managerial, professional, and technical workers. C. professional and operational workers. D. managerial, professional, and operational workers. E. knowledge, technical and operational workers.

B

In a multitiered network: A. the work of the entire network is centralized. B. the work of the entire network is balanced over several levels of servers. C. processing is split between clients and servers. D. processing is handled by multiple, geographically remote clients. E. users interface with the server rather than the client.

B

In an examination of 50 of the most popular websites, researchers discovered that which of the following was the only one that had no tracking files? A. Yahoo B. Wikipedia C. YouTube D. Facebook E. LinkedIn

B

In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? A. books B. azimuth-interactive.com C. com D. none; there is no second-level domain in this name E. books.azimuth-interactive

B

In the domain name http://books.azimuth-interactive.com, which element is the second level domain? A. Books B. azimuth-interactive.com C. Com D. None, there is no second level domain

B

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A. SSL/TLS B. symmetric key encryption C. public key encryption D. private key encryption E. distributed encryption

B

Links pointing to an online document are a sign of: A. richness or variety of topics covered B. popularity C. data quality D. data usage E. marketing

B

Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? A. Web 3.0 application B. IoT application C. BLE application D. GPS application E. RFID application

B

Microsoft Excel is an example of: A. data management software B. spreadsheet software C. presentation graphics. D. word processing software E. presentation graphics software

B

Microsoft Word is an example of: A. open source software B. word processing software C. software productivity suite D. data management software E. presentation graphics software

B

Seeing quality as the responsibility of all people and functions in an organization is central to the concept of: A. six sigma B. TQM C. quality control D. cycle time reduction E. benchmarking

B

Software used to apply the computer to a specific task for an end user is called: A. System software B. Application software C. Data management software D. Network software E. Web services software

B

The NAI is an industry association formed to help with which of the following? A. Copyright protection B. Online privacy issues C. Patent protection D. Trademark protection E. Trade secret protection

B

The U.S. CAN-SPAM Act: A. makes spamming illegal B. requires commercial email senders to identify themselves C. has dramatically cut down spamming D. does not override state anti-spamming laws E. does not outlaw the use of fake return addresses

B

The ________ strategy concentrates financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries. A. domestic exporter B. multinational C. franchise D. transnational E. virtual company

B

The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline's website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following? A. cloud computing B. web services C. nanotechnology D. SaaS E. PaaS

B

The business case for using grid computing involves all of the following except: A. cost savings B. centralized maintenance C. centralized maintenance D. agility E. increased computational power

B

The culture of UPS places service to the customer among the company's highest business objectives, which is reflected in its use of information systems to enable customer tracking of their packages. Based on your reading of Chapter 1, why is "culture" an important factor to consider when building information system solutions to business problems? A. Culture is one element that can be radically changed, not always for the better, by new information systems. B. Culture affects how information system solutions are implemented and used. C. Culture is a cauldron of employee perspectives and conflicts, which can be used to improve business processes. D. Culture is the driving force behind decision making and innovation. E. Culture is the basis for organizational politics.

B

The domain .gov is a(n): A. Internet root domain B. top-level domain C. host domain D. network domain E. third level domain

B

The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as: A. IoT B. big data C. the mobile digital platform D. cloud computing E. business intelligence

B

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as: A. the point of no return B. the law of diminishing returns C. supply and demand D. inelasticity E. virtual economics

B

The intentional defacement or destruction of a website is called: A. spoofing B. cybervandalism C. cyberwarfare D. phishing E. pharming

B

The six important business objectives of information system investment include all of the following except: A. competitive advantage B. employee morale C. improved decision making D. survival E. new products

B

The three principal levels of hierarchies within a business organization are: A. senior management, knowledge workers, and service workers. B. senior management, middle management, and operational management. C. senior management, data workers, and operational management. D. senior management, operational management, and workers. E. senior management, operational management, and data workers.

B

The use of digital technology and the Internet to execute the major business processes in the enterprise is called: A. e-commerce B. e-business C. enterprise applications D. Management information system (MIS) E. KWM

B

The use of multiple computers linked by a communications network for processing is called: A. grid computing B. distributed processing C. client/server computing D. centralized processing E. supercomputing

B

Verizon's implementation of a web-based digital dashboard to provide managers with real-time information, such as customer complaints, is an example of: A. improved flexibility B. improved decision making C. competitive advantage D. supplier intimacy E. a new product

B

Virtual reality applications for the web use a standard called: A. CAD B. VRML C. VML D. TCP/IP E. XML

B

Virtually all successful expert systems deal with problems of: A. associative data B. classification C. logic and control D. unstructured decision making E. structured decision making

B

Walmart exemplifies the power of information systems coupled with excellent business practices and supportive management to achieve which of the following? A. new business models B. operational efficiency C. customer intimacy D. competitive advantage E. survival

B

Web browser software requests web pages from the Internet using which of the following protocols? A. URL B. HTTP C. DNS D. HTML E. FTP

B

What are the relationships that the relational database is named for? A. Relationships between rows and columns B. Relationships between entities C. Relationships between fields and records D. Relationships between databases E. Relationships between attributes

B

What is the foundation technology for web services? A. HTML B. XML C. SOAP D. UDDI E. Java

B

What is the most important benefit of an enterprise application? A. Enabling speed of communicating B. Enabling business functions and departments to share information C. Enabling a company to work collaboratively with customers and suppliers D. Enabling a cost-effective, e-business processes E. Enabling managers to make better decisions

B

When a cookie is created during a website visit, it is stored: A. on the website's server B. on the hard drive of the visitor's computer C. on the ISP's servers D. in the browser's application settings E. nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site

B

When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy. A. product differentiation B. market niche C. mass customization D. process efficiency E. market transparency

B

Where there is no well-understood or agreed-on procedure for making a decision, it is said to be: A. undocumented B. unstructured C. documented D. semi-structured E. low-level

B

Which of the following BI functionalities would you use to assess the likelihood of students dropping out of a college program? A. Parameterized reports B. Predictive analytics C. Ad hoc queries D. Production reports

B

Which of the following best describes the effect that new information technology has on society? A. It has a dampening effect on the discourse of business ethics. B. It has a ripple effect, raising new ethical, social, and political issues. C. It is beneficial for society as a whole, while raising dilemmas for consumers. D. It has a waterfall effect in raising ever more complex ethical issues. E. It has a magnifying effect, creating increasing numbers of ethical issues.

B

Which of the following best describes the importance of creating an accurate data model for your business's database? A. It is not essential, as the data model itself is modified by the database continuously. B. It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve. C. It is essential, as table relationships cannot be created without an accurate data model. D. It is somewhat important, as the type of data model will define what kinds of data will be stored. E. It is unnecessary, as a well-designed database should not require one.

B

Which of the following best illustrates the relationship between entities and attributes? A. The entity CUSTOMER with the attribute PRODUCT B. The entity CUSTOMER with the attribute ADDRESS C. The entity PRODUCT with the attribute PURCHASE D. The entity PRODUCT with the attribute CUSTOMER E. The entity ADDRESS with the attribute CUSTOMER

B

Which of the following can typically access a company's intranet? A. The general public B. The firm's employees C. The firm's customers D. The firm's suppliers E. The firm's outside contractors

B

Which of the following illustrates the use of information systems to achieve product differentiation? A. A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy B. A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers C. A PC manufacturer's use of information systems to facilitate direct access from suppliers to production schedules D. A grocery store chain's use of information systems to produce products and services at a lower price than competitors E. A hotel chain's use of information systems to analyze detailed data on guests to determine each guest's profitability

B

Which of the following is an important skill for a marketing major? A. An understanding of online transaction and reporting systems B. An understanding of product management enterprise systems C. An understanding of supplier management enterprise systems D. An understanding of enterprise systems that enhance leadership E. An understanding of financial reporting systems

B

Which of the following is not a type of input device? A. Digital scanner B. Flat panel (LCD) display screen C. Trackball D. Keyboard E. Sensor

B

Which of the following is not an element of the business intelligence environment? A. User interface B. Executive users C. Platform D. Business analytics toolset E. Production reports

B

Which of the following is the best description of a protocol in a telecommunications network architecture? A. A device that handles the switching of voice and data in a local area network B. A standard set of rules and procedures for control of communications in a network C. A communications service for microcomputer users D. The main computer in a telecommunications network E. A pathway through which packets are routed

B

Which of the following is the single greatest cause of network security breaches? A. Viruses B. User lack of knowledge C. Trojan horses D. Cyberwarfare E. Bugs

B

Which of the following pulls content from websites and feeds it automatically to a user's computers? A. FTP B. RSS C. HTTP D. Bluetooth E. IPv6

B

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A. Modifiability B. Scalability C. Expandability D. Disintermediation E. SLA

B

Which of the following software tools would you use to prepare a break-even analysis? A. Word processing B. Spreadsheet C. Desktop publishing D. Personal information management E. Presentation graphics

B

Which of the following statements about 3-D printing is not true? A. 3-D printing is also known as additive manufacturing. B. Unlike traditional techniques, 3-D printing results in some wasted material. C. 3-D printing can create objects from plastic, metal, or composite materials. D. CAD systems supply data for 3-D printing. E. 3-D printing is often used to fashion items for small production runs.

B

Which of the following statements about client/server computing is not true? A. The client provides the user interface B. The bulk of processing occurs on the client C. The client is normally a desktop or laptop computer D. The server provides security, remote access, and user authentication

B

Which of the following statements is not true about cloud computing? A. It is the fastest growing form of computing B. It removes the concern about data and systems security for business C. It allows smaller firms to use resources previously unaffordable D. It relies of the internet as the platform for delivering services to others

B

Which of the following statements is not true about collaboration in a business setting? A. Collaboration may be a short-lived activity, lasting just a few minutes. B. Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity. C. Meaningful collaboration requires a supportive business firm culture and the right, decentralized structure. D. The evidence of the business benefits of collaboration is largely anecdotal. E. Special types of information systems are available to support collaboration.

B

Which of the following technologies permits service calls to U.S. companies to be answered in India just as easily and inexpensively as if the help desk were in the United States? A. cellular networks B. internet telephony C. the world wide web D. software as a web service E. TQM

B

Which of the following types of business intelligence users is considered a power user? A. IT developers B. Business analytics C. Operational employees D. Senior managers E. Clerical workers

B

Which of the following types of systems could be used to enable different firms to work collaboratively on a product? A. Intranet B. Extranet C. Knowledge management system (KMS) D. Customer relationship management (CRM) E. Decision support system (DSS)

B

Which phase of decision making finds or recognizes a problem? A. data from the business environment B. cloud-based storage C. BI infrastructure D. business analytics E. delivery platform

B

You are the production manager for a manufacturer of bicycle parts. Which of the following tools or technologies would you use to improve production precision? A. value chain B. CAD software C. benchmarking D. industry best practices E. porter's competitive forces model

B

You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table? A. one-to-many B. one-to-one C. many-to-many D. many-to-one E. one-to-all

B

You work for a highly successful advertiser that is about to expand nationally. Of utmost importance will be finding a way to store and disseminate its clients' frequently updated branding and style guides throughout the organization. The guides include multiple image files and text documents. What system will best serve these needs? A. A wiki B. An extranet with knowledge management system (KMS) capabilities C. A transaction processing system (TPS) with knowledge management system (KMS) capabilities D. A telepresence system E. A virtual world

B

________ are designed to have a generalized capability to learn. A. Knowledge-based systems B. Neural Networks C. Fuzzy logic systems D. Expert Systems E. Genetic algorithms

B

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced. A. software B. administrative C. data security D. input E. implementation

B

________ decisions are most common at higher levels of management. A. Semi-structured B. Unstructured C. Structured D. Undocumented E. Procedural

B

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A. Due process B. Accountability C. The courts of appeakl D. The judicial system E. Liability

B

________ is malware that hijacks a user's computer and demands payment in return for giving back access. A. A Trojan horse B. Ransomware C. Spyware D. A virus E. An evil twin

B

________ provides users with free access to its program code. A. An app B. Open source software C. Cloud-based software D. A web service E. Office software

B

________ systems integrate and share information from suppliers, manufacturers, distributors, and logistics companies. A. collaborative distribution B. supply chain management C. reverse logistics D. enterprise planning E. digital dashboard

B

A restaurant client has asked you to develop a system that would provide smartphone alerts about special discounts to potential customers in the vicinity. Which of the following tools will provide the solution? A. Genetic algorithms B. Neural Networks C. Location analytics D. Operational analytics E. Big data analytics

C

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A. RFID receiver B. WiMax receiver C. Access point D. Hub E. hotspot

C

A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS. A. web server B. online server C. database server D. client server E. application server

C

A(n) ________ is a set of self-contained services that communicate with each other to create a working software application. A. web service B. hybrid cloud C. SOA D. ERP E. mashup

C

All of the following are factors in U.S. federal sentencing guidelines with respect to business executives except: A. the monetary value of the crime B. the presence of a conspiracy to prevent discovery of the crime C. the use of technology to commit the crime D. the use of structured financial transactions to hide the crime E. the failure to cooperate with prosecutors

C

All of the following are intelligent agents that are able to respond to human voice commands with useful information in voice or written form except: A. Apple's Siri B. Microsoft's Cortana C. Facebook's DeepFace D. Amazon's Alexa E. Google Now

C

All of the following are ways to improve quality except: A. improving products and services based on customer demands. B. simplifying the production process C. implementing a new information system D. improving production precision E. reducing cycle time

C

All of the following can be considered managerial responsibilities except: A. making action plans to solve organizational problems. B. creating new products and services. C. designing new information systems. D. allocating human resources to coordinate the work to be done. E. setting strategy for responding to business challenges in the environment.

C

All of the following have been disruptive technologies except: A. the PageRank algorithm B. digital photography C. minicomputers D. the iPod E. the automobile

C

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? A. security policy B. AUP C. risk assessment D. business impact analysis

C

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: A. smart card authentication B. biometric authentication C. two-factor authentication D. symmetric key authorization E. token authentication

C

As described in the chapter case, IBM's Watson is an example of: A. an intelligent agent B. genetic algorithm C. machine learning D. an expert system E. cloud computing

C

As described in the chapter case, the Charlotte Hornets used a ________ to consolidate fan data from multiple sources. A. database management system B. relational database C. data warehouse D. data model E. fan management system

C

As described in the chapter case, which of the following constitutes a people element of the UPS tracking system? A. The web-based Post Sales Order Management System B. The ability to provide package status reports to customers C. The decision to use automation D. The implementation of in-house package tracking software E. The ability to embed UPS functions in external sites

C

Backward sensitivity analysis software is used for: A. supply chain optimization B. historical what-if analysis C. goal seeking D. reverse forecasting E. customer analysis

C

Bandwidth is the A. number of frequencies that can be broadcast through a medium B. number of cycles per second that can be sent through a medium C. difference between the highest and lowest frequencies that can be accommodated on a single channel D. total number of bytes that can be sent through a medium per second E. geographical distance spanned by a network

C

Big data refers to any database that: A. contains more than one petabyte of data. B. discovers patterns in data. C. has a large volume and variety of data. D. includes data from thousands of websites. E. stores data in rows and columns.

C

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A. two B. five C. eight D. fifteen E. twenty

C

Businesses use ________ tools to search and analyze unstructured data sets, such as emails and memos. A. Hadoop B. web mining C. text mining D. OLAP E. DBMS

C

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: A. co-location B. cloud computing C. grid computing D. client/server computing E. centralized processing

C

Data management technology consists of the: A. physical hardware and media used by an organization for storing data. B. detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. C. software governing the organization of data on physical storage media. D. hardware and software used to transfer data. E. universally accepted standards for storing data

C

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A. data auditing B. defragmentation C. data scrubbing D. data optimization E. data repair

C

E-commerce and Internet advertising reached $83 billion in 2017, growing at about: A. 5 percent B. 10 percent C. 15 percent D. 20 percent E. 25 percent

C

Engineers and scientists are examples of: A. senior management B. production workers C. knowledge workers D. middle management E. operational management

C

Expert systems: A. solve problems too difficult for human experts. B. are based on DO WHILE rules. C. use rules based on human expertise. D. share characteristics with mainframe computing. E. are a type of machine based intelligence.

C

Fault tolerant information systems offer 100 percent availability because they use: A. high-capacity storage B. a multitier server network C. redundant hardware, software, and power supplies D. dedicated phone lines E. a digital certificate system

C

Final assembly of iPhones occurs in which of the following countries? A. United States B. South Korea C. China D. Germany E. Japan

C

Genetic algorithms: A. represent knowledge as groups of characteristics. B. are software programs that work in the background to carry out specific, repetitive tasks. C. develop solutions to particular problems using techniques such as mutation, crossover, and selection. D. "learn" patterns from large quantities of data by sifting through data. E. have a large number of sensing and processing nodes that continuously interact with each other.

C

Hadoop is a(n): A. NoSQL database technology that stores both data and procedures acting on the data as objects. B. data mining platform designed for storing and analyzing big data produced by web communications and transactions. C. open source software framework designed for distributing data-processing over inexpensive computers. D. pre-configured hardware-software system designed for analyzing big data. E. high-speed platform used to analyze large data sets.

C

Hilton Hotels' use of customer information software to identify the most profitable customers to direct its services to is an example of using information systems to: A. strengthen customer intimacy B. differentiate their service C. focus on market niche D. increase efficiency E. provide services at a lower price than its competitors

C

In a relational database, the three basic operations used to develop useful sets of data are: A. Select, project, where B. Select, join, where C. Select, project, join D. Select, from, join

C

In lightweight PCs, smartphones, and tablets, which of the following have replaced hard drives? A. CD-ROM B. RAID C. SSDs D. Magnetic tape E. SANs

C

In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): A. TCO B. SOA C. SLA D. API E. capacity plan

C

In terms of the data relationships found by data mining, associations refers to: A. Events linked over time B. Patters that describe a group to which an item belongs C. Occurrences linked to a single event D. Undiscovered groupings

C

Linux is A. primarily concerned with the tasks of end users. B. designed for specific machines and specific microprocessors. C. an example of open-source software. D. especially useful for processing numeric data. E. the operating system for the Macintosh computer

C

Linux plays a major role in supporting business information systems, and has garnered about________ of the U.S. server market. A. 10 percent B. 25 percent C. 35 percent D. 50 percent

C

MongoDB and SimpleDB are both examples of: A. Open source databases B. SQL databases C. noSQL databases D. cloud databases E. big data databases

C

Non-relational databases: A. Store information in an unstructured format B. Use rows and columns to organize data C. Are used to store structured and unstructured data D. Are used to store low volumes of transactional data E. Use database-mapping to normalize relations

C

Operational management typically makes which type of decisions? A. semi-structured B. documented C. structured D. procedural E. low-level

C

Producing a bill of materials is a responsibility of the ________ function. A. finance and accounting B. human resources C. manufacturing and production D. sales and marketing E. technology

C

Rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is referred to as: A. data cleansing B. data mining C. an information policy D. logical base design E. a data quality audit

C

SVF uses which of the following collaboration tools? A. EMC Documentation eRoom B. IBM Notes C. Microsoft SharePoint Online D. Microsoft Yammer E. Salesforce Chatter

C

Shopping bots use ________ software for searching the Internet. A. Web 2.0 B. Web 3.0 C. Intelligent agent D. Comparison E. SEO

C

Software applications that combine different components of online software applications are referred to as: A. integrated software B. widgets C. mashups D. grid computing E. web services

C

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: A. system software B. application software C. data management software D. network software E. web services software

C

T1 lines A. operate over existing telephone lines to carry voice, data, and video. B. operate over coaxial lines to deliver Internet access. C. are high-speed, leased data lines providing guaranteed service levels. D. have up to twenty-four 64-Kbps channels. E. do not provide guaranteed service levels, but simply "best effort"

C

The 802.11 set of standards is known as A. WLAN. B. WSN. C. Wi-Fi. D. WiMax. E. Wan.

C

The Internet is based on which three key technologies? A. TCP/IP, HTML, and HTTP B. TCP/IP, HTTP, and packet switching C. Client/server computing, packet switching, and the development of communications standards for linking networks and computers D. Client/server computing, packet switching, and HTTP

C

The Internet raises the bargaining power of customers most effectively by: A. creating new opportunities for building loyal customer bases. B. making more products available. C. making information available to everyone. D. lowering transaction costs. E. reducing barriers to entry.

C

The National Institute of Standards (NIST) defines cloud computing as having all of the following characteristics except: A. Measured service B. Ubiquitous network access C. Collaboration service D. Rapid elasticity E. On demand self service

C

The Sarbanes-Oxley Act: A. requires financial institutions to ensure the security of customer data. B. specifies best practices in information systems security and control. C. imposes responsibility on companies and management to safeguard the accuracy of financial information. D. outlines medical security and privacy rules. E. identifies computer abuse as a crime and defines abusive activities.

C

The WiMax standard can transmit up to a distance of approximately: A. 30 meters B. 500 meters C. 30 miles D. 5 miles E. 70 miles

C

The average number of baseball tickets sold at a particular price is an example of: A. input B. raw data C. meaningful information D. output E. feedback

C

The three activities in an information system that produce the information organizations use to control operations are: A. information, research, and analysis B. input, output, and feedback C. input, processing, and output D. data analysis, processing, and feedback E. information, data, and processing

C

The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? A. Mashups B. Extranet C. Web services D. Cloud computing E. Intranet

C

The world's data centers use as much energy as the output of ________ nuclear power plants, which is about ________ percent of all the energy use in the world. A. 10; 1 B. 20; 2.5 C. 30; 1.5 D. 50; 10 E. 100; 25

C

To make sure it stocks clothes that its customers will purchase, a department store implements a new application that analyzes spending levels at its stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support? A. new products B. survival C. customer intimacy D. improved decision making E. operational excellence

C

To what competitive force did the printed encyclopedia industry succumb? A. positioning and rivalry among competitors B. low cost of entry C. substitute products or services D. increased bargaining power of customers E. increased bargaining power of suppliers

C

Two-factor authentication utilizes a(n): A. Unique password B. Encrypted connection C. A multistep process of authentication D. A firewall E. A digital certificate

C

WPA2 is a more effective way to secure a wireless network than WEP because it: A. includes an AUP B. operated on a VPN C. uses much longer encryption keys D. uses symmetric encryption methods E. is part of most vendors UTM products

C

What are the two major types of knowledge management systems? A. Management information systems and decision support systems B. Enterprise systems and knowledge management systems C. Enterprise-wide knowledge management systems and knowledge work systems D. Expert systems and knowledge work systems E. Structured knowledge systems and unstructured knowledge systems

C

When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, ________ are created. A. value webs B. value chains C. synergies D. core competencies E. benchmarks

C

Which business objective were competitors seeking when they rushed to provide ATMs after Citibank introduced the first ATMs in New York? A. improved efficiency B. customer and supplier intimacy C. survival D. competitive advantage E. improved decision making

C

Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties? A. Due process B. Justice C. Fairness D. Coherence E. Accuracy

C

Which of the following database types would be best suited for storing multimedia? A. SQL DBMS B. Open source DBMS C. Non-relational DBMS D. Cloud-based database E. NoSQL DBMS.

C

Which of the following fields deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? A. Information systems literacy B. Information systems architecture C. Management information systems D. Information technology infrastructure E. Computer information systems

C

Which of the following focuses primarily on the technical issues of keeping systems up and running? A. Business continuity planning B. Security policies C. Disaster recovery planning D. An AUP E. An information systems audit

C

Which of the following illustrates the use of information systems to strengthen customer and supplier intimacy? A. A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy B. A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers C. A PC manufacturer's use of information systems to facilitate direct access from suppliers to their production schedules D. A grocery store chain's use of information systems to produce products and services at a lower price than competitors E. An airline's use of information systems to analyze detailed data on customers to determine each customer's profitability

C

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? A. HIPAA B. FIP C. NORA D. COPPA E. Spyware

C

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address? A. Hub B. Switch C. Router D. NIC E. Modem

C

Which of the following is a global network that uses universal standards to connect millions of different networks around the world? A. an extranet B. the world wide web C. the internet D. an intranet E. Verizon

C

Which of the following is an example of raw data from an automobile manufacturer? A. An average of 130 Subarus sold daily in New York in 2017 B. 1,300 Subaru Outbacks sold during the first quarter 2017 in New York C. One Subaru Outback sold January 7, 2017 in Mount Kisco, New York for $25,000 D. Annual sales of Subaru Outbacks increased 4.5 percent E. An average sale price of $26,000 for all Subaru Outbacks sold during January 2017 in Mount Kisco, New York

C

Which of the following is not a characteristic of packet switching? A. Packets travel independently of each other. B. Packets are routed through many different paths C. Packet switching requires point-to-point circuits. D. Packets include data for checking transmission errors. E. Packets are reassembled into the original message when they reach their destinations.

C

Which of the following is not a defining feature of Web 2.0? A. interactivity B. real-time user control C. semantic search D. social participation (sharing) E. user-generated content

C

Which of the following is not a true statement with respect to business processes? A. Every business can be seen as a collection of business processes. B. Analyzing business processes can enable you to achieve a clear understanding of how a business actually works. C. The efficiency of a business firm is not related to its business processes. D. Information systems can automate many steps in business processes that were formerly performed manually. E. A business process may involve a unique way in which work, information, and knowledge are coordinated within an organization.

C

Which of the following is not one of the competitive forces in Porter's model? A. suppliers B. competitors C. external environment D. customers E. Technology

C

Which of the following is the most prominent data manipulation language today? A. Access B. DB2 C. SQL D. Crystal Reports E. Hadoop

C

Which of the following is the world's largest collector of online user data? A. Facebook B. Yahoo C. Google D. Microsoft E. Apple

C

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? A. Carpal tunnel syndrome (CTS) B. Computer vision syndrome (CVS) C. Repetitive Stress Injury (RSI) D. Technostress E. RSS

C

Which of the following protects the authors of a book from having their work copied by others? A. Patent protection B. Due process C. Copyright law D. Fair Use Doctrine E. Trade Secret law

C

Which of the following statements about Linux is not true? A. Linux is a UNIX-like operating system. B. Linux plays a major role in running web servers and local area networks. C. Linux is the primary OS used in quantum computing. D. Linux is a robust alternative to Windows operating systems. E. Linux is an example of open source software.

C

Which of the following statements about the National Football League's use of RFID technology is not true? A. NFL teams use the data generated by the system to evaluate player and team performance and to analyze tactics. B. The system relies on cloud computing C. NFL teams use the data generated by the system to analyze fan behavior D. Information gathered by the system is used by commentators on live game broadcasts. E. Microsoft gathers and displays the data using NFL.com.

C

Which of the following statements is not true? A. In 2016, American businesses invested nearly $2.8 trillion in information systems hardware, software, and telecommunications equipment. B. In 2016, American businesses spent $800 billion on business and management consulting and information technology services. C. In 2016, about 25 percent of all capital investment in the United States was for information systems hardware, software, and telecommunications equipment. D. Expenditures in the United States for information systems are growing at a faster rate than the U.S. economy as a whole. E. Worldwide, non-U.S. expenditures for information technology exceeded $3.5 trillion.

C

Which of the following systems is especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance? A. MIS B. TPS C. DSS D. KMS E. CRM

C

Which of the following systems would you use to determine the five suppliers with the worst record in delivering goods on time? A. ESS B. TPS C. MIS D. DSS E. CRM

C

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? A. Computer vision syndrome (CVS) B. Technostress C. Digital divide D. Repetitive Stress Injury (RSI) E. Carpal tunnel syndrome (CTS)

C

Which organization manages the domain name system of the Internet? A. none (no one "owns" the internet) B. W3C C. ICANN D. The Department of Commerce (U.S.) E. IAB

C

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? A. MAN B. Domain-based LAN C. Peer-to-peer network D. WAN E. SAN

C

Why does improving a small value, routine decision have business value for a company? A. A small value, routine decision may have a great economic impact on the company. B. Even a small value, routine decision may have a "ripple" effect through a corporation. C. Small value, routine decisions have business value because of their large number and frequency. D. Small value, routine decisions involve important business processes. E. Small value, routine decisions can affect the culture of the entire organization.

C

Work environment is an example of the ________ dimension of business problems. A. management B. organizational C. people D. technology E. cultural

C

You are the CEO of a national apparel retail chain and want to add three new stores. Which of the following tools will best help you find the most potentially profitable new locations? A. Pivot Tables B. Sensitivity analysis C. GIS D. Location Analytics E. Intelligent agent

C

You manage the Information Systems department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics, such as views and click-throughs, about their current display ads. Which type of system will most efficiently provide a solution? A. Customer relationship management (CRM) B. Enterprise system C. Extranet D. Intranet E. KWM

C

You would expect to find all of the following tools in a major enterprise content management system except: A. videoconferencing B. knowledge preservation C. intelligent agents D. wiki building E. instant messaging

C

________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. A. Capacity planning B. Cloud computing C. Green computing D. Utility computing E. On-demand computing

C

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. A. Copyright law B. Trademark law C. Patent law D. Trade secret protection E. Privacy law

C

________ refers to the ability of a system to expand to serve a number of users without breaking down. A. Capacity planning B. Management future planning C. Scalability D. Guaranteed levels of service E. Service level agreements

C

________ systems help organizations manage both structured and semi-structured knowledge. A. Digital asset management B. Knowledge network C. Enterprise content management D. Knowledge work E. Learning management

C

________ typically develop a single information system, usually at the home base, and then replicate it around the world. A. domestic exporters B. multinational firms C. franchisers D. transnational firms E. virtual companies

C

A characteristic or quality describing an entity is called a(n): A. field B. tuple C. key field D. attribute E. table

D

A manufacturer of deep-sea oil rigs may be least concerned about which of these marketplace forces? A. Product differentiation B. Traditional competitors C. Low number of suppliers D. New market entrants E. Substitute products

D

A network that covers entire geographical regions is most commonly referred to as a(n): A. local area network B. intranet C. peer-to-peer network D. wide area network E. metropolitan area network

D

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends: A. in two short marks B. in one short mark C. with a crow's foot D. with a crow's foot proceeded by a short mark E. in three short marks

D

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A. RSS B. WAN C. NFP D. ISP E. FTP

D

All of the following are specific security challenges that threaten corporate servers in a client/server environment except: A. hacking B. malware C. denial-of-service attacks D. sniffing E. vandalism

D

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A. theft of data B. copying of data C. alteration of data D. radiation E. hardware failure

D

All of the following are traditional storage technologies except: A. magnetic disks B. optical drives C. magnetic tape D. cloud computing E. storage networks

D

All of the following describe the effects of globalization except: A. significant decreases in operating costs. B. reduction of labor costs through outsourcing C. ability to find low-cost suppliers D. increases in transaction costs E. replication of business models in multiple countries

D

An _______ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A. RSS B. WAN C. NFP D. ISP E. FTP

D

An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except: A. the maximum number of users a system can accommodate at one time. B. the minimum response time for processing business transactions. C. the impact of future software applications. D. the purchase price of new computer hardware equipment. E. the volume of transactions.

D

An information system can enable a company to focus on a market niche through: A. complex trend forecasting B. tailoring products to the client C. intensive product trend analysis D. intensive customer data analytics E. tightening linkages with suppliers

D

As discussed in the chapter case, all of the following are benefits of wearable computing devices except: A. providing geolocation information for employees. B. delivering instant notifications to sales managers. C. using analytic software for performance metrics. D. processing customer credit card information. E. providing access to corporate databases.

D

Client/server computing is a: A. network that connects sensors to desktop computers. B. network where centralized mainframe computers serve local devices. C. centralized model of computing for large corporations. D. distributed computing model where clients are linked to one another through a network that is controlled by a network server computer. E. centralized computing model where local computers are connected to one another by a network.

D

Data mining is more ________ than OLAP. A. data-focused B. Multidimensional C. query oriented D. discovery driven E. streamlined

D

Expertise and experience of organizational members that has been formally documented best describes: A. wisdom B. information C. explicit knowledge D. tacit knowledge E. unstructured knowledge

D

How many transactions per day can the IBM Z13 mainframe process? A. 2.5 million B. 25 million C. 250 million D. 2.5 billion E. 25 billion

D

In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. A. Scalable B. Quantam C. Grid D. Hybrid cloud E. Private cloud

D

Macys pick to the last unit system, described in the chapter opening case, is an example of which of the following? A. RFID application B. GPS application C. BLE application D. IoT application

D

Ouptut: A. is feedback that has been processed to create meaningful information. B. is information that is returned to appropriate members of the organization to help them evaluate the input stage. C. transfers raw data to the people who will use it or to the activities for which it will be used. D. transfers processed information to the people who will use it or to the activities for which it will be used E. is a stream of raw facts representing events occurring in organizations or the physical environment.

D

The ethical "no free lunch" rule states that: A. if an action cannot be taken repeatedly, then it is not right to be taken at any time. B. one should take the action that produces the least harm or incurs the least cost. C. one can put values in rank order and understand the consequences of various courses of action. D. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E. if an action is not right for everyone to take, it is not right for anyone to take.

D

The logical view of a database: A. Shows how data are organized and structured on the storage media B. Presents an entry screen to the user C. Allows the creation of supplementary reports D. Presents data as they would be perceived by the end users E. Shows the relationship between entities and attributes

D

The most appropriate wireless networking standard for creating PANs is: A. I-mode B. IEEE 802.11b C. Wi-Fi D. Bluetooth E. RFID

D

The most basic business database is comprised of: A. Attributes instead of tables B. Three tables: for suppliers, parts, and sales C. Four tablets: for customers, suppliers, parts, and sales D. Five tables: for customers, employees, suppliers, parts, and sales

D

The most common web servers today are: A. Microsoft IIS and IBM HTTP server B. webSTAR and Netscape server C. Netscape server and apache HTTP D. Apache HTTP server and Microsoft IIS

D

The support activities of a firm include: A. inbound logistics, technology, outbound logistics, sales and marketing, and service. B. inbound logistics, organization infrastructure, outbound logistics, technology, and procurement. C. organization infrastructure, human resources, sales and marketing, and technology. D. organization infrastructure, human resources, technology, and procurement. E. sales and marketing, procurement, human resources, and technology.

D

The telephone system is an example of a _____ network. A. Peer-to-peer B. Wireless C. Packet-switched D. Circuit-switched E. Client/server

D

The term management information systems refers to a specific category of information systems serving: A. integrated data processing throughout the firm. B. transaction processing reporting C. senior management D. middle management functions E. knowledge workers

D

Virtual reality systems: A. provide design engineers with precise, three-dimensional representations of their models. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. provide simulations of walking through or manipulating a three-dimensional model or programmed real-world environment. E. allow knowledge to be stored in simulated 3D environments.

D

What percent of employed Americans report spending some time working remotely? A. 13 percent B. 23 percent C. 33 percent D. 43 percent E. 53 percent

D

What percent of global Internet users use Google Search and other Google services? A. Less than 10 percent B. Around 25 percent C. About 50 percent D. Nearly 80 percent E. Over 90 percent

D

When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of: A. sniffing B. social engineering C. phishing D. zero-day vulnerability E. snooping

D

When hackers gain access to a database containing your personal private information, this is an example of: A. phishing B. spoofing C. social engineering D. identity theft

D

Which dimension of quality means that a decision should reflect a rational process? A. comprehensiveness B. accuracy C. fairness D. coherence E. due process

D

Which of the following best describes Immanuel Kant's categorical imperative? A. If an action cannot be taken repeatedly, then it is not right to be taken at any time. B. One should take the action that produces the least harm or incurs the least cost. C. One can put values in rank order and understand the consequences of various courses of action. D. If an action is not right for everyone to take, it is not right for anyone to take. E. You should act towards others as you would like them to act towards you.

D

Which of the following can be used to help a website achieve a higher ranking with the major search engines? A. VPN B. IAB C. SEM D. SEO E. RSS

D

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A. Kant's categorical imperative B. the risk aversion principle C. the utilitarian principle D. the Golden rule E. the "no free lunch" rule

D

Which of the following is a primary drawback to the "do anything anywhere" computing environment? A. It makes work environments less pleasant. B. It creates a digital divide. C. It centralizes power at corporate headquarters. D. It blurs the traditional boundaries between work and family time. E. It leads to employees being paid less for the total amount of work performed.

D

Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems? A. Java B. C++ C. XML D. Visual basic E. COBOL

D

Which of the following is an example of a key force in a firm's broader, less immediate environment? A. Competitors B. Regulations C. Suppliers D. Socioeconomic trends E. Customers

D

Which of the following is an interorganizational business process? A. hiring an employee B. identifying a customer C. creating financial statements D. ordering raw materials E. checking product quality

D

Which of the following is an open-source operating system designed for mobile devices? A. iOS B. OS X C. Chrome D. Android E. Apache HTTP

D

Which of the following is not a file-sharing service? A. The Pirate Bay B. Megaupload C. Morpheus D. Pandora E. Grokster

D

Which of the following is not a true statement about value webs? A. Value webs involve a collection of independent firms that use information technology to coordinate their value chains. B. Value webs are more customer-driven than traditional value chains C. Value webs operate in a less linear fashion than traditional value chains. D. Value webs are inflexible and cannot adapt quickly to changes in supply and demand. E. Value webs involve highly synchronized industry value chains.

D

Which of the following is not an advantage for new companies entering the marketplace? A. they can implement new systems and equipment B. they are not locked into an existing brand image C. they are more highly motivated D. they can establish new relationships with suppliers E. they can often hire younger, less expensive workers

D

Which of the following is not true about the GDPR? A. The GDPR requires Internet companies to obtain explicit consent from consumers for the use of their personal data. B. The GDPR requires Internet companies to delete information at the user's request. C. The GDPR requires Internet companies to retain information only as long as absolutely necessary. D. The GDPR rejects the right to be forgotten. E. The GDPR applies only to all companies providing services in Europe.

D

Which of the following is pursuing a transnational strategy? A. Caterpillar corporation B. Ford Motor co. C. Intel Corporation D. Nestle E. Starbucks

D

Which of the following statements about RFID is not true? A. RFIDs transmit only over a short range. B. RFIDs use an antenna to transmit data. C. Microchips embedded in RFIDs are used to store data. D. RFIDs require line-of-sight contact to be read. E. RFID tags and antennas come in a variety of shapes and sizes.

D

Which of the following statements about cycle time is not true? A. Cycle time refers to the total elapsed time from the beginning of a process to its end. B. Shorter cycle times mean that problems are caught earlier in the process. C. Finding ways to reduce cycle time often means finding ways to simplify production steps. D. The fewer steps in a production process, the more likely that an error will occur. E. Information systems can help reduce cycle time.

D

Which of the following statements about data warehouses is not true? A. They store supply data to be used across the enterprise for management analysis and decision making. B. Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities. C. They may include data from website transactions. D. Data warehouse systems provide easy-to-use tools for managers to easily update data. E. Data warehouses make data available for anyone to access as needed.

D

Which of the following statements about neural networks is not true? A. Neural network applications are used to address problems of control and optimization. B. Neural networks are being used to help detect credit card fraud. C. Neural networks are being used to screen patients for coronary artery disease. D. Neural networks are best used as a substitute for human decision makers. E. Neural networks are being used to predict the performance of equities.

D

Which of the following systems is designed to support organization-wide process coordination and integration? A. Decision support system (DSS) B. Management information system (MIS) C. Customer relationship management (CRM) D. Enterprise applications E. Executive support system (ESS)

D

Which of the following systems supports making decisions that are unique, rapidly changing, and not easily specified in advance? A. Management information system (MIS) B. Transaction processing system (TPS) C. Executive support system (ESS) D. Decision support system (DSS) E. KWM

D

Which of the following systems would you use to forecast the return on investment if you used new suppliers with better delivery track records? A. ESS B. TPS C. MIS D. DSS E. CRM

D

Which of the following types of computers are used for weather forecasting on a national or worldwide scale? A. Mainframe B. Server C. Minicomputer D. Supercomputer E. PC

D

Which of the following would not be considered part of the implementation phase of problem solving? A. Change management B. Purchasing hardware for an information systems solution C. Training an employee on new system software D. Evaluating a selection of software packages for implementing a new business process E. Determining the attitude of employees about the solution

D

ZipRealty, which combines Google Maps with real estate data, is an example of: A. cloud computing B. SOA C. a widget D. a mashup E. a web service

D

_______ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. A. Wireless networks B. Intranets C. Modems D. Unified communications

D

________ help users gain information from large amounts of geographically linked data. A. Data visualization tools B. GIS C. GDSS D. Location analytics tools E. CAD systems

D

________ is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the web. A. XML B. SOA C. HTML D. Java E. COBOL

D

an employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of: A. click fraud B. pharming C. identity theft D. spear phishing

D

A ________ provides information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention. A. Transaction processing system (TPS) B. Management information system (MIS) C. Executive support system (ESS) D. CPS E. Customer relationship management (CRM) system

E

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of: A. Phishing B. Pharming C. Spoofing D. Evil twins E. Click fraud

E

A schematic of the entire database that describes the relationships in a database is called a(n): A. data dictionary B. intersection relationship diagram C. field key diagram D. data definition diagram E. entity-relationship diagram

E

A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, usable by many parts of the business. A. TPS B. DSS C. automatic reporting system D. MIS E. enterprise system

E

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A. modulated B. Broadband C. T1 D. analog E. digital

E

According to the 2017 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2016? A. $1.6 million B. $16 million C. $160 million D. $1.6 billion E. $16 billion

E

All of the following are examples of wearable computing devices except: A. smartwatches B. smart badges C. activity trackers D. smart glasses E. smartphones

E

All of the following are new technology-related trends in MIS except: A. cloud computing B. big data C. IoT D. the mobile digital platform E. co-creation of business value

E

All of the following are techniques being used to make data centers more "green" except: A. Air cooling B. Virtualization C. Use of wind power D. Use of hydropower E. Use of backup generators

E

All of the following could be considered substitute products for industrial electricity generation except: A. solar B. wind C. coal D. hydro-power E. ethanol

E

All of the following have contributed to an increase in software flaws except: A. the growing complexity of software programs B. the growing size of software programs C. demands for timely delivery to markets D. the inability to fully test programs E. the increase in malicious intruders seeking system access

E

Common data quality problems include all of the following except: A. Misspelled names B. Transposed numbers C. Incorrect codes D. Missing codes E. Internet connectivity problems

E

Currently, the protocols used for secure information transfer over the Internet are: A. TCP/IP and SSL B. S-HTTP and CA C. HTTP and TCP/IP D. S-HTTP and SHTML E. SSL, TLS, and S-HTTP

E

DBMS typically include report-generating tools in order to: A. retrieve and display data B. display data in tables C. display data in graphs D. perform predictive analysis E. display data in an easier-to-read format

E

Data mining is a tool for allowing users to: A. Quickly compare transcription data gathered over many years B. Perform multidimensional data analysis C. Obtains online answers to ad hoc questions in a rapid amount of time D. Summarize massive amounts of data into much smaller, traditional reports E. Find hidden relationships in data

E

Deciding whether to introduce a new product line is an example of a(n): A. semi-structured decision B. procedural decision C. nonprocedural decision D. operational decision E. unstructured decision

E

Evil twins are A. Trojan horses that appears to the user to be a legitimate commercial software application. B. e-mail messages that mimic the e-mail messages of a legitimate business. C. fraudulent Web sites that mimic a legitimate business's Web site. D. computers that fraudulently access a website or network using the IP address and identification of an authorized computer. E. bogus wireless network access points that look legitimate to users.

E

GDSS are designed to: A. allow meeting attendees to share their thoughts in real time with their peers. B. manage knowledge using a global perspective. C. enable collaboration among geographically dispersed participants. D. enable executives to easily supervise senior management meetings. E. implement structured methods for organizing and evaluating ideas.

E

Identifying potential customers for the businesses' products or services is an activity associated with the ________ function. A. finance and accounting B. human resources C. manufacturing and production D. technology E. sales and marketing

E

Implementation controls: A. can be classified as input controls, processing controls, and output controls. B. govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C. apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D. include software controls, computer operations controls, and implementation controls. E. Audit the systems development process at various points to ensure that the process is properly controlled and managed.

E

In a table for customers, the information about a single customer would reside in a single: A. field B. entity C. column D. table E. row

E

Most computer viruses deliver a: A. worm B. Trojan horse C. driveby download D. keylogger E. payload

E

Predictive search in Google's search engine: A. maintains a history of your searches and then predicts what you will search on next. B. uses a tracking service and cookies on your browser to predict search results. C. uses a knowledge graph of what similar people searched on to predict your search interests. D. uses a semantic approach to predict what you are looking for. E. predicts what you are looking for as you enter words into the query box.

E

Telepresence is an example of which of the following? A. Business intelligence B. Social business C. IoT D. Mobile digital platform E. Virtual meeting

E

The FIP principle of Notice/Awareness states that: A. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C. there must be a mechanism in place to enforce FIP principles. D. consumers should be able to review the data collected about them. E. websites must disclose their information practices before collecting data

E

The backbone networks of the Internet are typically owned by long-distance telephone companies called: A. regional network providers B. enhanced service providers C. internet bulk providers D. backbone providers E. network service providers

E

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its: A. business process B. environment C. atmosphere D. values E. culture

E

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A. family and home B. property rights and obligations C. system quality D. accountability and control E. quality of life

E

The smallest unit of data a computer can handle is called a: A. file B. record C. field D. byte E. bit

E

What is the name of a decision support tool that asks what-if questions repeatedly to predict outcomes in a variety of situations? A. key performance indicators B. Predictive analytics C. Ad hoc query D. Sensitivity analysis E. Pivot table

E

What percent of the Fortune 500 companies uses Twitter to communicate with their customers? A. 20 percent B. 40 percent C. 50 percent D. 60 percent E. 80 percent

E

Which of the following defines acceptable uses of a firm's information resources and computing equipment? A. An information systems audit policy B. A CA policy C. A MSSP D. A UTM system E. An AUP

E

Which of the following enables users to view the same data in different ways using multiple dimensions? A. Hadoop B. SQL C. Big data D. Data mining E. OLAP

E

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A. Copyright B. Patent C. All forms of intellectual property protection D. Trademark E. Trade secret

E

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A. Multiplexing B. Packet shifting C. Packet routing D. ATM E. Packet switching

E

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A. Referential integrity module B. Data definition diagram C. Entity relationship diagram D. Relationship dictionary E. Data dictionary

E

Which of the following is an example of a company whose business model is based on access to large databases through the web? A. Gartner B. Fortune C. IBM D. Microsoft E. Facebook

E

Which of the following is considered to be the fastest-growing form of computing? A. Wearable computing B. Green computing C. Nanocomputing D. Enterprise computing E. Cloud computing

E

Which of the following is not a difficulty in establishing patent protection? A. Length of time required to receive protection B. The requirement that the work reflect some special understanding and contribution C. The requirement that the work must be original D. The requirement that the work must be novel E. The requirement that the work must be a secret

E

Which of the following is not an example of the consumerization of IT? A. Googles G suite B. BYOD C. Facebook D. Gmail E. Amazon web services

E

Which of the following is not an example of the potential dark side of big data? A. Police visits to individuals whom a computer system identified as likely to commit a crime in the future B. Use of a device installed in a car to analyze driving habits C. Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories D. Use of computerized systems to filter and hire job applicants E. Analyzing data from sensors installed in local parks to monitor soil moisture

E

Which of the following is the most common reason that business systems fail? A. software bugs B. software errors C. hardware failures D. facilities failures E. data quality

E

Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables? A. two-tiered DBMS B. pre-digital DBMS C. open source DBMS D. hierarchal DBMS E. relational DBMS

E

Which of the following statements about network economics is not true? A. eBay is an example of a business model that is based on the principle of network economics. B. The law of diminishing returns does not always apply to every situation. C. From a network economics perspective, the value of a community of people grows as the number of participants in the community increases. D. Information technology can be strategically useful from a network economics perspective. E. In network economics, the marginal cost of adding new members to the network is higher than the marginal gain.

E

Which of the following statements about wireless security is not true? A. SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs. B. Radio frequency bands are easy to scan. C. An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network. D. Intruders can force a user's NIC to associate with a rogue access point. E. Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

E

Which of the following systems is designed to summarize and report on the company's basic operations? A. Knowledge management system (KMS) B. Decision support system (DSS) C. Executive support system (ESS) D. Transaction processing system (TPS) E. Management information system (MIS)

E

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall? A. NAT B. Packet filtering C. Deep packet inspection D. Stateful inspection E. Application proxy filtering

E

Which of the following were involved in what has been called the patent trial of the century? A. Apple and Microsoft B. Apple and Hewlett-Packard C. Microsoft and Symantec D. Microsoft and Facebook E. Apple and Samsung

E

Which of the following would not be classified as a knowledge work system? A. Computer-aided design B. 3D visualization system C. Investment workstations D. Virtual reality system E. Digital asset management system

E

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A. MAN B. Wireless C. LAN D. Windows domain network E. Peer-to-peer

E

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods? A. Executive support system (ESS) B. Customer relationship management (CRM) system C. Management information system (MIS) D. Decision support system (DSS) E. Supply chain management (SCM) system

E

________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. A. Wireless networks B. Intranets C. Virtual private networks D. Modems E. Unified communications

E

________ monetizes the value of the data stored by search engines. A. TCP/IP B. RSS C. WiMax D. IoT E. Search Engine Marketing

E

Business processes that impede organizational responsiveness are a source of competitive strength for a company. True False

False

Enterprise systems do not utilize order transaction data. True False

False

Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue. True False

False

Intranets are private corporate networks extended to authorized users outside the organization. True False

False

Purchase of information systems hardware, software, and telecommunications equipment will constitute more than half of all capital investment in the United States in 2017. True False

False

Spam is a form of computer abuse True False

False

A DSS often uses information from external sources. True False

True

A TPS helps managers monitor the firm's relations with the external environment. True False

True

An ESS is designed to incorporate data about external events, but it also draws summarized information from internal MIS and DSS. True False

True

An understanding of enterprise-wide systems for customer relationship management is one of the skills relevant to careers in marketing. True False

True

Developing a new product, fulfilling an order, and hiring a new employee are all examples of business processes. True False

True

Encouraging employees to adapt to new business processes is an important factor in change management. True False

True

One of the key concepts in patent law is originality. True False

True

The efficiency of a business firm depends to a large extent on how well its internal and interorganizational business processes are designed and coordinated. True False

True


Ensembles d'études connexes

Promulgated Contracts (Course 6)

View Set

1st Amendment, Vagueness and Overbreadth

View Set

MENTAL HEALTH: CHAPTER 16: SCHIZOPHRENIA:

View Set