Jake's homemade Kentucky fried chicken
Computers and communication systems use _____ to represent information between computers and network systems. a. nanotubes b. servers c. source codes d. data codes
Data codes
Which decision is supported by a financial information system (FIS) a. Improving routing and delivery schedules b. Analyzing sales personnel c. Choosing the best job candidate d. Determining portfolio structures
Determining portfolio structures
A network model is similar to a hierarchical data model because in both data models' records are organized in the same way. True or false.
False
A patent protects product names and identifying marks. True or false.
False
An effective financial information system should provide timely, accurate, and integrated information about the marketing mix-4Ps: price, promotion, place, and product. True or false.
False
Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment. True or false.
False
Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions. True or false.
False
E-wallets and smart cards increase the risks of exposing consumers' information on the Web. True or false.
False
In network-attached storage (NAS), as the number of users increases, its performance increases. True or false.
False
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings. True or false.
False
Spreadsheet software is more powerful than financial planning software. True or false.
False
The threat of new entrants into the marketplace is high when duplicating a company's product or service is difficult. True or false.
False
Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers. True or false.
False
According to Michael Porter, which strategy can be followed by an organization to successfully compete in the marketplace? a. Groupthink b. Simulation c. Brainstorming d. Focus
Focus
Transaction-processing systems a. require extensive managerial judgment b. involve operations that are repetitive c. require maximum human involvement d. involve low volumes of data
* involve operations that are repetitive*
Identify an advantage of a mouse over a trackball. a. A mouse processes more information than a trackball. b. A mouse is more precise in positioning the pointer than a trackball. c. A mouse occupies less space than a trackball. d. A mouse is stationary, whereas a trackball has to be moved around.
A mouse is more precise in positioning the pointer than a trackball.
When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met. a. NOR operator b. NOT operator c. AND operator d. OR operator
AND operator
The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management. a. definition b. manipulation c. administration d. generation
Administration
In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number. a. Extended ASCII b. Unicode c. American Standard Code for Information Interchange (ASCII) d. Extended Binary Code Decimal Interchange Code (EBCDIC)
American Standard Code for Information Interchange (ASCII)
_____ are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive. a. Kernels b. Applets c. Firewalls d. Cookies
Cookies
_____ make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases. a. Kernels b. Applets c. Cookies d. Trojans
Cookies
Which protects contents of an HTML code? a. Copyright laws b. Industrial property laws c. Laws governing trademarks d. Patent laws
Copyright laws
The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions. a. cache b. data c. process d. kernel
Data
The first step in database design is defining a _____, which determines how data is created, represented, organized, and maintained. a. data dictionary b. data mart c. data warehouse d. data model
Data Model
Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.
false
involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment. a. Mobile computing b. Cloud computing c. Green computing d. Natural computing
Green computing
A data _____ is the structure and organization of data, which involves fields, records, and files. a. mart b. mine c. hierarchy d. warehouse
Hierarchy
Java and C++ are examples of a. machine language b. compiler languages c. High level languages d. assembly language
High level languages
Which can help offset the digital divide? a. Increasing the number of computers in public places b. Reducing the Internet bandwidth for the information poor c. Increasing the speed of the Internet for the information rich d. Reducing the number of computer equipment at schools
Increasing the number of computers in public places
In the context of using information technologies for a competitive advantage, which statement is true of a bottom-line strategy? a. It focuses on helping different market segments achieve a cost advantage. b. It focuses on improving efficiency by reducing overall costs. c. It focuses on enhancing rivalry among existing competitors. d. It focuses on generating new revenue by offering new products and services.
It focuses on improving efficiency by reducing overall costs.
Identify a true statement about information and communications technology (ICT). a. It helps organizations save energy costs. b. It generates approximately six percent of the world's greenhouse gases. c. It generates approximately two percent of the world's carbon dioxide emissions. d. It improves the quality of the environment in which you work.
It generates approximately two percent of the world's carbon dioxide emissions.
Identify a true statement about information technology. a. It has cut down production costs. b. It has eliminated more jobs than it has created. c. It has reduced consumers' purchasing power. d. It has increased clerical jobs.
It has cut down production costs.
In the context of information privacy, which of the following is true of spam? a. It is solicited e-mail sent for business purposes. b. It can only be send to a small number of people. c. It can only be used to provide access to legitimate e-mails. d. It is sent in bulk using automated mailing software.
It is sent in bulk using automated mailing software.
Which is a potential drawback of telecommuting? a. Increased interruptions from coworkers b. Increased employee turnover and absenteeism c. Lack of necessary supplies or equipment d. Difficult work environment for employees with disabilities
Lack of necessary supplies or equipment
_____, which are generated by Web server software, record a user's actions on a Web site. a. Viruses b. Junk e-mails c. Log files d. Worms
Log files
Which is a key factor that has contributed to the growth and popularity of big data? a. Exponential decay of organizational data b. Mobile and wireless technology c. Implosion in data growth d. Brick and mortar businesses
Mobile and wireless technology
UNIX is a type of a. remote access server b. operating system c. storage area network d. application software
Operating system
In the context of storage devices, CD-ROMs and DVDs are examples of a. magnetic disks b. magnetic tape c. main memory devices d. optical discs
Optical discs
A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. a. serial port b. control unit c. arithmetic logic unit d. parallel port
Parallel port
Microsoft PowerPoint is the most commonly used _____ software. a. presentation b. project management c. graphics d. desktop publishing
Presentation
Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)? a. Protecting patients' computer records b. Safeguarding conversations between patients and their families c. Protecting patients' credit information d. Safeguarding patients' billing information
Safeguarding patients' billing information
In a relational database model, which operation searches data in a table and retrieves records based on certain criteria? a. join operation b. insert operation c. find operation d. select operation
Select operation
_____, also known as virtual work, has enabled some people to perform their jobs from home. a. Offshoring b. Telecommuting c. Outsourcing d. Urbanizing
Telecommuting
_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews. a. The Fair Use Doctrine b. IT code of conduct c. The Copyright Act of 1790 d. Uniform Civil Code
The Fair Use Doctrine
Which is true of virtual organizations? a. They let independent suppliers share skills and have access to each other's markets via information technologies. b. They need an organizational hierarchy for participants to contribute their expertise. c. They are networks of dependent companies and manufacturers connected via information technologies. d. They need central offices for participants to contribute their expertise.
They let independent suppliers share skills and have access to each other's markets via information technologies.
In the context of information privacy, which is true of cookies? a. They get saved on a computers' primary memory. b. They make it impossible for Web sites to customize pages for users. c. They provide information about users' location. d. They record users' actions on a Web site.
They provide information about users' location.
ENIAC is an example of a first-generation computer. True or false.
True
Green computing helps an organization save on energy costs. True or false.
True
In a management information system (MIS) application, processes are usually methods for performing a task. True or false.
True
In contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods, which are called by sending a message to an object True or false.
True
Information systems are broader in scope than information technologies. True or false.
True
The most common personal digital assistant (PDA) is a smartphone. True or false.
True
In a relational database model, the rows are called a. tuples b. roots c. attributes d. branches
Tuples
To minimize the invasion of privacy, users should be barred from reviewing their records. True or false.
false
A _____ is an intellectual property that protects product names and identifying marks. a. registration b. patent c. trademark d. copyright
trademark
In the context of the major components of an information system, which is a difference between information and data a. Unlike data, information by itself is difficult to use for making decisions. b. Unlike data, information can be collected in aggregated and disaggregated forms. c. Unlike data, information is considered the input to an information system. d. Unlike data, information consists of facts that have been analyzed by the process component.
Unlike data, information consists of facts that have been analyzed by the process component.
_____ are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets. a. Merged organizations b. Collated organizations c. Virtual organizations d. Pool organizations
Virtual organizations
A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. a. dictionary b. pattern c. mine d. warehouse
Warehouse
To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____. a. article ownership policy b. standard data policy c. acceptable use policy d. user content policy
acceptable use policy
In the context of computer operations, division is a(n) a. arithmetic operation b. storage operation c. retrieval operation d. logical operation
arithmetic operation
According to the 1980 revisions to the Copyright Act of 1976, _____. a. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs b. copyright protection extends to original works of authorship in architectural fields c. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers d. copyright holders can perform a copyrighted work by means of digital audio transmission
both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____. a. discriminate data based on content b. start blocking data traffic to specific users c. cease charging different rates on data d. treat data based on the types of application
cease charging different rates on data
In the context of ethical issues of information technologies, restricting access to the Web is a type of _____. a. copyright b. spamming c. cybersquatting d. censorship
censorship
In designing a management information system (MIS), the first task is to a. clearly define the system's objectives b. provided information in a useful format c. analyze data d. collect data
clearly define the system's objectives
E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data. a. kernels b. log files c. applets d. cookies
cookies
In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for a. create, repeat, undo, and develop b. create, read, update, and delete c. copy, read, update, and define d. copy, revise, undo, and define
create, read, update, and delete
In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark. a. spamming b. phishing c. cybersquatting d. sniffing
cybersquatting
In the context of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools. a. web strategist b. database administrator c. data design officer d. systems mining analyst
database administrator
A _____, identified by Michael Porter, helps organizations make their products and services distinct from their competitors. a. simulation strategy b. differentiation strategy c. leadership strategy d. focus strategy
differentiation strategy
Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____. a. data junction b. information barrier c. digital divide d. domain squat
digital divide
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed. a. e-checks b. debit cards c. credit cards d. e-wallets
e-wallets
In the context of the input component of a data warehouse, _____ collect, integrate, and process data that can be used by all functional areas in an organization. a. enterprise resource planning systems b. online transaction management systems c. data mining analysis systems d. online analytical processing systems
enterprise resource planning systems
Job deskilling occurs when: a. fragmented jobs are combined as a whole. b. experienced labor is eliminated by high technology. c. a job is carried out manually. d. a worker is promoted from a semiskilled to a skilled position.
experienced labor is eliminated by high technology.
A ____ is typically used to support decisions related to managing an organization's cash flows. a. logistics information system b. financial information system c. manufacturing information system d. marketing information system
financial information system
In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the: a. Fifth Amendment to the United States Constitution. b. Fourth Amendment to the United States Constitution. c. self-defense provisions of the Second Amendment. d. freedom of speech provisions of the First Amendment.
freedom of speech provisions of the First Amendment.
URL _____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser. a. opening b. hijacking c. parsing d. decoding
hijacking
Aaron bought a photo-editing software package for personal use. He makes two copies of the software, in case the original software fails and he needs a backup. In this scenario, Aaron's action is considered _____. a. legal, but unethical b. illegal, but ethical c. legal and ethical d. illegal and unethical
illegal, but ethical
The advantage of the _____ access method is that both sequential and random access can be used to access records, depending on the number being accessed. a. direct random b. random-serialized c. indexed sequential d. progressive
indexed sequential
A(n) _____ enables communication between a video card and memory. a. internal bus b. floppy drive c. optical disc d. keyboard
internal bus
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____. a. illegal and unethical b. legal, but unethical c. illegal, but ethical d. legal and ethical
legal and ethical
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____. a. illegal and unethical b. illegal but ethical c. legal but unethical d. legal and ethical
legal but unethical
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____. a. legal, but unethical b. legal and ethical c. ethical, but illegal d. unethical and illegal
legal, but unethical
In the context of intellectual property, _____ are categorized as industrial property. a. music albums b. copyrights c. novels d. logos
logos
In the context of Web and network privacy, _____ is a method for binding all the parties to a contract. a. phishing b. encapsulation c. cybersquatting d. nonrepudiation
nonrepudiation
A _____ is an intellectual property that protects new processes. a. registration b. copyright c. trademark d. patent
patent
Decisions related to scheduling and assigning employees can be supported by a a. manufacturing information system b. financial information system c. logistics information system d. personnel information system
personnel information system
In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media. a. logical view b. rational view c. physical view d. analytical view
physical view
Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on. a. application generators b. predictive modeling c. dashboards d. query reports
predictive modeling
The purpose of an information system's _____ component is generating the most useful type of information for making decisions. a. process b. database c. internal data d. external data
process
To be useful, information systems should a. produce information in different formats b. not use rumors, unconfirmed reports, and stories c. use command line user interfaces d. generate raw data, which can be used for decision making
produce information in different formats
A potential benefit of telecommuting is that it _____. a. regulates work routine b. increases interaction with coworkers c. reduces employee turnover d. separates work and home life
reduces employee turnover
In a(n) _____, records in files are organized and processed in numerical order. a. random access file structure b. direct access file structure c. indexed access file structure d. sequential access file structure
sequential access file structure
The cost of hiring additional employees in virtual organizations is reduced because: a. skills are shared among the participating companies. b. companies hire candidates with minimum experience. c. there is less emphasis on hiring new talent. d. training costs are reduced because of the absence of training programs.
skills are shared among the participating companies.
In the context of information privacy, junk e-mail is also known as _____. a. spam b. bookmark c. cookie d. draft
spam
In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called _____. a. a virus b. abug c. spam d. a cookie
spam
For the past 60 years, _____ have been applied to structured tasks such as record keeping, simple clerical operations, and inventory control. a. procedural-programming systems b. business-analysis systems c. transaction-processing systems d. object-oriented-modelling systems
transaction-processing systems
When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____. a. spamming b. phishing c. cyberstalking d. typosquatting
typosquatting
To minimize the invasion of privacy, users and organizations should: a. provide wrong data to unauthorized users. b. use verification procedures to ensure data accuracy. c. keep collected information even after the stated purpose is over. d. provide access to one's personal information to all interested parties.
use verification procedures to ensure data accuracy.
Green computing can be achieved by: a. replacing meetings over computer networks with actual face-to-face meetings. b. using video conferencing, electronic meeting systems, and groupware. c. using computing devices that are nonbiodegradable. d. replacing one large server with several underutilized smaller servers.
using video conferencing, electronic meeting systems, and groupware.
The principle of _____ is the idea that several organizations working together can do what one organization cannot. a. pool organization b. virtual organization c. merged organization d. collated organization
virtual organization