ISA 235 Class Prep Quiz Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following value chain activities involves transforming raw materials into goods and services? -Outbound Logistics -Marketing and Sales -Services -Inbound Logistics -Operations

Operations

True or False: The critical path in a Program Evaluation and Review Technique (PERT) is the longest path through the project ensuring all critical tasks are completed from start to finish.

False

True or False: https://www.miami.miamioh.edu/ (Links to an external site.) is an example of a domain name while miami.miamioh.edu is an example of a Universal Resource Locator (URL)

False

I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." The competitor made significant in-roads into this market by offering three varieties of ice creams. I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of "Orange peel ice cream." Which competitive strategy is I-scream-4 Ice Cream implementing?

Focused product differentiation

RFID technology can be used in which of the following situations? -In toll roads to collect payments from passing cars -In cars as antitheft system -To track patient locations to facilitate emergency situations and ensure safety -In large retailers to speed customer checkout process

In all situations listed here

True or False: A satellite communication system uses wireless WAN technology to provide worldwide communication capabilities, including voice, videoconferencing, and Internet access.

True

True or False: Adwords such as "denim shorts" or "coding classes" are keywords that advertisers choose to pay for and appear as sponsored links on the search engine results pages.

True

True or False: Buying a computer from Dell using their online portal is an example of Ecommerce while Dell collaborating with its retailers online is referred as Ebusiness.

True

True or False: Information silo occurs when there is a lack of communication between the business units (functions and departments), making it difficult to work cross-functionally.

True

True or False: It is not necessary for a database table to have a foreign key.

True

True or False: Metadata provides details about data such as date created and data type of each field.

True

True or False: Reading the bar code of each purchased product in a check-out counter is an example of Online Transaction Processing (OLTP).

True

True or False: Secure sockets layer (SSL) ensures that all data transmission remains private by establishing an encrypted link between a web server and a browser.

True

True or False: Service oriented architecture (SOA) promotes a scalable and flexible enterprise architecture that can implement new or reuse existing MIS components, creating connections among disparate applications and systems.

True

True or False: Skype relies on peer-to-peer (P2P) network to make calls without using an expensive centralized infrastructure.

True

True or False: Sustainable, or green, MIS describes the production, management, use, and disposal of technology in a way that minimizes damages to the environment.

True

True or False: The number of daily ATM transactions is an example of efficiency while the number of new customers joined due to the ATM's ease of use can be considered as the effectiveness of the ATM initiative.

True

Name and define the Five Forces from Porter's Five Forces Model:

-Buyer Power: the power of customers to drive down prices -Supplier Power: the power of suppliers to drive up prices of materials -Threat of Substitute Products or Services: the power of customers to purchase alternatives -Threat of New Entrants: the power of competitors to enter a market -Rivalry Among Existing Competitors: the power of competitors

Authentication

A method for confirming users' identities

Information Silo

An information management system that is unable to freely communicate with other information management systems. Communication within an information silo is always vertical, making it difficult or impossible for the system to work with unrelated systems.

A marketing project requires the sales team to be able to forecast the customer demand however, adding this application will overshoot the project budget by 30%. At what phase of the system development life cycle (SDLC) will the project manager realize that this project is infeasible given the current budget and business requirement? -Development -Planning -Design -Implementation -Analysis -Testing -Maintenance

Analysis

Which of the following does NOT correctly represent the disruptive technology in the supply chain? -Drones use electronic tags and labels to identify objects wirelessly and supports material management -RFID finds its use in container tracking and highway toll collection -Robotics focusses on creating artificial intelligence devices that can be used in warehouses for picking, packing, and managing materials. -3D printing has a potential to disrupt manufacturing and procurement processes by bringing production closer to users.

Drones use electronic tags and labels to identify objects wirelessly and supports material management

True or False: A sales representative generated the sales information for each product, for each customer, at each location, for each day while a general manager created a quarterly sales report by each department, across all products. The general manager report consists of a fine granular data while the report created by sales representative is of coarse granular data.

False

True or False: A worm must attach to something such as an executable file, to spread; while a virus do not need to attach to anything to spread from computer to computer.

False

True or False: Authentication is the process of providing a user with permission including access levels and abilities such as file access, file sharing , hours of access etc.

False

True or False: Deleting your sent email from your computer also deletes it from your email provider's server.

False

True or False: Emoticons used by the users in social media are examples of structured data.

False

True or False: Ethernet is a wireless connection with speed ranging from 1 Mbps to 10 Mbps.

False

True or False: In the context of Porter's Five Forces Model, the bargaining power of customers of medicinal drugs is enhanced when pharmaceutical companies patent their products.

False

True or False: Inventory cycle time is the agreed upon time between the purchase of a product and the delivery of the product.

False

True or False: Order fulfillment is a Business-facing process or front-office processes which involves dealing with external customers.

False

True or False: Single-tenancy in the cloud means that a single instance of a system serves multiple customers.

False

True or False: The core ERP components primarily focus on external operations such as business intelligence and Ebusiness.

False

Which of the following is NOT an advantage of a relational database over a text document or a spreadsheet? -Increased information redundancy -Increased flexibility -Increased scalability and performance -Increased information integrity -Increased information security

Increased information redundancy

Which of the following is NOT an issue related to the waterfall methodology? -Any problem in a phase flows onward to the next phase -It is inflexible, any unexpected contingency may sabotage the plan -It assumes that users can specify all business requirements in advance -It does not require all the steps to be performed in sequence. One can skip a step and perform it in later phases.

It does not require all the steps to be performed in sequence. One can skip a step and perform it in later phases.

Which of the following is NOT true about Digital subscriber line (DSL)? -It works over a limited physical distance like homes and small businesses -It can transmit and receive data much faster than dial-up access -It uses standard telephone lines with broadband modem technology -It ties up the telephone line so the user cannot receive and make phone calls while online

It ties up the telephone line so the user cannot receive and make phone calls while online

Which of the following is NOT a benefit of integrated systems? -Limited information for decision making -Smooth flow of information and process -Automated business processes -Collective decision making

Limited information for decision making

Which of the following is NOT true for transmission control protocol/Internet protocol (TCP/IP)? -It provides technical foundation for the public Internet as well as for large numbers of private networks -One of the disadvantage of TCP/IP is that it does not allow diverse or differing networks to connect and communicate with each other -TCP part of TCP/IP verifies the correct delivery of data ensuring the size of the data packet remains same throughout its transmission -IP part of TCP/IP verifies the data are sent to the correct IP address

One of the disadvantage of TCP/IP is that it does not allow diverse or differing networks to connect and communicate with each other

Which of the following is a customer relationship management metric? -Number of items damaged during production -Inventory turnover time -Percentage of service calls resolved per day -Percentage of suppliers who supplies product on time

Percentage of service calls resolved per day

Which of the following is NOT a common type of Hackers? -Cyberterrorist -Hactivist -Black-hat -Pink-hat

Pink-hat

Which of the following is NOT a problem associated by low-quality data? -In one of the records, customer's first name is switched with the last name -10% of the records are populated by mm/dd/yyyy format in the Date field while rest of the records have yyyy-mm-dd formats in the Date field -A default value of (999) 999-9999 is automatically populated for Phone field when the phone number is missing -Primary keys are automatically generated by the system -In one of the records, the Customer_Age field has a value of -300

Primary keys are automatically generated by the system

Which of the following is typically NOT considered as an example of Key Performance Indicators (KPIs)? -Retain customers -Average number of transactions per day -Percentage of manufactured products with defects -Average time spent by a customer in an online queue

Retain customers

Which of the followings does not require a business intelligence solution? -Select the customers who purchased product X from location Y. -Why are sales below target? -Predict claim amount and medical coverage costs related to COVID cases for next quarter. -What is the probability that sales of a product will increate by 10% in next month?

Select the customers who purchased product X from location Y.

Which of the following is not an example of data cleansing? -Sort the revenue column in Sales table -Populate the missing date in the Last_Edit_Date column by system date as per the company rules -Remove duplicate records from Customer table -Fix inconsistencies in the customer name format

Sort the revenue column in Sales table

Online Transaction Processing (OLTP)

The capturing of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information

True or False: Unlike cluster analysis, a classification analysis requires that all groups or classes are defined before the analysis begins. For example, in a loan prediction analysis two customer classes are predefined: one who default on loan, and one who did not default on loan.

True

Adwords such as "denim shorts" or "coding classes" are keywords that advertisers choose to pay for and appear as sponsored links on the search engine results pages. -Weather data collected by probes -Wikipedia articles edited by its readers -Feedback provided by Airbnb guests -YouTube video uploaded by its subscribers

Weather data collected by probes

WAP

Wi-Fi Protected Access: enables devices to connect to a wireless network to communicate with each other

WAN

Wide Area Network: spans a large geographic area such as a state, province, or country.

WLAN

Wireless Local Area Network: a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

WMAN

Wireless Metropolitan Area Network: a metropolitan area network that uses radio signal to transmit and receive data

WWAN

Wireless Wide Area Network: a wide area network that uses radio signals to transmit and receive data

Program Evaluation and Review Technique (PERT) Chart

a graphical network model that depicts a project's tasks and the relationships between them

Porter's Five Forces Model

a model for analyzing the competitive forces within the environment in which a company operates, to assess the potential for profitability in an industry

Multi-tenancy

a single instance of a system serves multiple customers

Black-hat hacker

criminals who break into computer networks with malicious intent

Which of the following is an example of a consumer-to-business (C2B) commerce? -consumer selling items in eBay -Walmart buying confectionaries from Nestle -Government providing medicare to eligible households -customers providing helpful reviews in Yelp about Chipotle

customers providing helpful reviews in Yelp about Chipotle

Structured Data

data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address

Moore's law refer to the computer chip performance per dollar ___________ every ___________.

doubling; 18 months

Single-tenancy

each customer or tenant must purchase and maintain an individual system

A _____________ site is separate and fully equipped facility where the company can move immediately after a disaster and resume business.

hot

Former CEO of Turing Pharmaceuticals Martin Shkreli increased the price of the drug Daraprim from $13.50 per pill to $750 per pill overnight. Daraprim is used to treat toxoplasmosis, which can affect pregnant women, people with HIV and others with weakened immune systems. Shkreli's decision may be considered as _______________________ business practice. -legal but unethical -illegal but ethical -legal and ethical -illegal and unethical

legal but unethical

Alibaba, a Chinese multinational e-commerce company hired developers from the U.S. to create a website that would appeal to both the audience at home (China) and across the English-speaking world. This is an example of _______________________.

offshore outsourcing

Key Performance Indicators (KPIs)

quantifiable metrics a company uses to evaluate progress towards critical success factors

Granularity

refers to the level of detail in the model or the decision-making process

An activity or task in a Business Process Model and Notation is represented by a/an _________________.

rounded-corner rectangle

Virus

software written with malicious intent to cause annoyance or damage

White-hat hacker

someone who exploits computer systems or networks to identify security flaws and make improvement recommendations

Worm

spreads itself not only from file to file but also from computer to computer

Which of the following is NOT a benefit of Cloud Computing? -users share pooled computing resources which reduces the cost of the service -computing capacity can be increased or decreased immediately, allowing for optimal scalablility -user can increase storage and processing power as needed -users have full control over data location

users have full control over data location


Ensembles d'études connexes

Newtons first and Second law of motion

View Set

2.01-2.03 Entrepreneurial Discovery Review

View Set

Management application questions

View Set