MIS304 Exam 2, all available practice questions (book, in-class review, quizzes)
6-24. What is true about knowledge management? - As baby boomers retire at an increasing rate, knowledge management is helping organizations capture their knowledge. - A knowledge management system is not a single technology but a collection of technology-based tools. - Finding the right technology to manage knowledge assets is much easier than identifying what knowledge is needed, why it is needed, and who has this knowledge. - All of the above are true.
- All of the above are true.
5-19. ________ is the process of creating an online diary made up of chronological entries. - Wikiing - Tagging - Blogging - None of the above
- Blogging
4-18. __________ reflects the percentage of users for whom a particular page is the only page visited on the website. - Bounce rate - Exit rate - Click-through rate - Conversion rate
- Bounce rate
4-15. ___________ are those companies that operate in the traditional, physical markets and do not conduct business electronically in cyberspace. - Brick-and-mortars - Click-onlys - Both A and B - Dot-coms
- Brick-and-mortars
6-23. _________ agents keep track of key information such as inventory levels, notifying the users when conditions change. - User - Buyer - Monitoring and sensing - Data mining
- Monitoring and sensing
4-20. Trying to "outsmart" a search engine to improve a page's ranking is known as __________. - rank enhancement - SEO - search engine hacking - Google fooling
- SEO
5-23. _________ communication is when people are all meeting at the same time or in real time. - Synchronous - Asynchronous - Instantaneous - None of the above
- Synchronous
5-22. _________ is using the network effect to increase brand awareness. - Brand marketing - Shared marketing - Social marketing - Viral marketing
- Viral marketing
4-14. EC is the exchange of _______ among firms, between firms and their customers, and between customers, supported by communication technologies and, in particular, the internet. - goods - services - money - all of the above
- all of the above
4-21. To minimize fraud, e-tailers look for anomalies in __________. - email addresses provided - shipping and billing addresses - transaction patterns - all of the above
- all of the above
5-18. Successful enterprise-oriented social media initiatives consider __________. - organizational culture - organizational hierarchies - technological inertia - all of the above
- all of the above
5-21. A wiki _________. - allows users to add content - allows users to revert edits - allows anyone to read content - allows all of the above
- allows all of the above
6-25. Which of the following is an example of attribute data commonly used in GIS applications? - structured data - longitude - trade area - annual sales
- annual sales
6-19. To determine the likelihood of new customers to default on a loan, a manager in a bank would typically use _______. - association discovery - sequence discovery - classification - clustering
- classification
6-20. Web usage mining entails analyzing ________. - clickstream data - page content - associations among sets of items - unstructured data
- clickstream data
6-18. To swiftly respond to a highly competitive and rapidly changing environment, organizations utilize a _________. - continuous planning process - structured decision-making process - structured decision support process - continuous decision-making process
- continuous planning process
4-16. The ability to sell products directly to the end customers, without the need for distributors or retailers, is called _________. - disintermediation - disintegration - reintegration - reintermediation
- disintermediation
5-17. The process of adding metadata such as latitude and longitude to pictures, videos, or other content is called _______. - adding geodata - location tagging - geotagging - tagging
- geotagging
5-14. Collective intelligence is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of _________. - crowds - customers - individual experts - virtual teams
- individual experts
6-17. A(n) _______ report provides a summary of critical metrics on a recurring schedule. - scheduled - exception - key-indicator - drill-down
- key-indicator
4-17. Business models based on catering to niche markets in addition to (or instead of) purely selling mainstream products are said to center on the __________. - far ends - long ends - niches - long tails
- long tails
6-21. Sales growth evaluation is typically used by the ________ function of an organization. - marketing - accounting - production - management science
- marketing
5-16. Tagging is adding _________ to content such as maps, pictures, or web pages. - metadata - comments - blogs - knowledge
- metadata
4-19. Offering the customer different (independent) touchpoints, such as a retail store and a catalogue is referred to as . - mixed-channel retailing - cross-channel retailing - omni-channel retailing - multichannel retailing
- multichannel retailing
4-22. According to the Internet Tax Freedom Act, e-tailers must collect sales tax __________. - from all customers regardless of their location - based on the place of the customer's residence - based on the prevalent tax rate at the e-tailer's headquarters - only from customers residing in a state where the business has substantial presence
- only from customers residing in a state where the business has substantial presence
5-20. Webcasts are also known as _________. - podcasts - blogcasts - radiocasts - weblogs
- podcasts
5-15. Microblogging is used primarily for ________. - creating an online text diary - providing location information - short status updates - customer support functions
- short status updates
6-16. In an RDBMS, an entity is represented as a(n) ________. - attribute - table - row - association
- table
6-22. Big Data is characterized by all of the following except _______. - verifiability - velocity - variety - volume
- verifiability
(in-class review) It is possible for a database to consist of only a single file or table. A.True B.False
A
(in-class review) Which of the following is an example of synchronous communication? A.videoconferencing B.online reviews C.e-mail D.All of the above E.None of the above
A
(in-class review) A column is a collection of related attributes about a single instance of an entity. A.True B.False
B
(in-class review) A query is used to ________. A.prevent illegal or illogical entries from entering the database B.retrieve results from a database C.add primary key constraints to a table D.All of the above E.None of the other options are correct
B
(in-class review) BestBuy is an example of a "brick-and-mortar" only business A.True B.False
B
(in-class review) ________ is used in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people. A.Insourcing B.Crowdsourcing C.Nearshoring D.Disintermediation E.None of the above
B
(in-class review) Why is Blendtec Successful in Getting Marketing Videos to Go viral? A.They focus on big surprises and do not make sequels B.None of the other options are correct C.The videos do the unexpected / have shock value D.The videos are serious and focus on drama rather than humor E.Because of freeconomics. They charge for blenders but the youtube videos are free
C
(in-class review) _______ systems are designed to handle multiple concurrent transactions from customers. A.Product allocation B.Yield optimization management C.OLTP (online transaction processing) D.Viral marketing E.None of the other options are correct
C
(in-class review) to create an excel dashboard with dynamic filtering capability, you will likely use A.TRIM() B.RIGHT() C.Analytics D.Slicers E.None of the above
D
(in-class review) In our Tech Talk assignment, we learned to create a site that discussed a tech talk. Which of the following could we do with WordPress (and similar systems)? A.Normalize Data B.Add images C.Embed video D.All of the above E.Only B & C
E
T(in-class review) o list books priced between 10 and 20 (both inclusive), we need to: A.Add a Criteria under Title B.Enable the Totals Button C.Change the Sort under Price D.Both A and B E.None of the above
E
(ch6) The primary use of online transaction processing (OLTP) systems is to define a set of reachable and exploitable vulnerabilities present in a database. - True - False
False
(exam 2 practice quiz) One of the challenges for brick-and-mortars involves increasing IS complexity. - True - False
False
(exam 2 practice quiz) Sequence discovery is used to list procedures to follow when handling a security breach. - True - False
False
Data dictionaries restrict business rules. - True - False
False
Identify a true statement about the Internet of things. a) It defines a set of reachable and exploitable vulnerabilities present in a business model. b) It is defined as the percentage of visitors who leave the Web site after viewing that page. c) It enables companies to offer various innovative products and services that go beyond the initial purchase. d) It identifies the tasks that are critical within a business model and builds a network that depicts their interdependencies. e) It contains rules and guidelines that describe how security is to be enforced during system operation.
It enables companies to offer various innovative products and services that go beyond the initial purchase.
Which of the following is an example of consumer-to-consumer electronic commerce? a) Niobi makes an online deposit of $5,000 into her friend's account. b) Blanco, a manufacturer, conducts business over the Web with its retailers. c) Marty buys John's mountaineering equipment on Chieoke.com. d) Ashley buys a new pair of shoes on Fequette.com. e) Heath buys a gift for Vanessa on Aniocride.com.
Marty buys John's mountaineering equipment on Chieoke.com.
(ch6) Which of the following statements is true about ad hoc queries? - They are produced at predefined intervals to support routine decisions. - They answer unplanned information requests to support a non-routine decision. - They highlight situations that are out of the normal range. - They help analyze why a key indicator is not at an appropriate level or why an exception occurred. - They provide a summary of critical information on a recurring schedule.
They answer unplanned information requests to support a non-routine decision.
(exam 2 practice quiz) Data mining algorithms search for patterns, trends, or rules that are hidden in the data. - True - False
True
When organizations undergo disintermediation, they have to take on those activities previously performed by the middleman. - True - False
True
(exam 2 practice quiz) "Backward looking" budgets are typically based on ________. a) historical data b) current market conditions c) forecasts d) marketing research e) future trends
a) historical data
(ch6) When we consider entities as tables, each column is a(n) ________. - query - form - attribute - applet - record
attribute
(exam 2 practice quiz) Which of the following is an example of disintermediation? a) A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment. b) Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers. c) Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute as meals in order to provide competition to the other food chains in the area. d) Anister, a car-manufacturing company, markets most of its four-wheel drives in high altitude regions where vehicles require more power. e) Aubrey Thirst Quencher is a market leader in sports drinks. It expands its market by providing its drinks to working women in urban areas.
b) Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers.
(exam 2 practice quiz) Business intelligence tools are used by business users to analyze ________ data. a) unstructured b) operational c) both structured and unstructured d) semi-structured e) structured
c) both structured and unstructured
(exam 2 practice quiz) A major benefit of social software is the ability to harness the "wisdom of crowds" that is also referred to as ________. a) creative commons b) consensus democracy c) collective intelligence d) preference elicitation e) collaborative filtering
c) collective intelligence
In the context of pay-per-click models, inflating the revenue to a host or increasing costs for the advertiser by repeatedly clicking on a link is called ________ fraud. a) affiliate b) conversion c) disintermediation d) link e) click
click
A(n) ________ system allows users to publish, edit, version track, and retrieve digital content, such as documents, images, audio files, videos, or anything else that can be digitized. a) peer production b) collective intelligence c) content management d) social presence e) application sharing
content management
(exam 2 practice quiz) ________ are used to capture data to be added, modified, or deleted from a database. a) bots b) queries c) layers d) forms e) reports
d) forms
(exam 2 practice quiz) When an organization offers the customer both a retail store and Internet shopping experience, it is referred to as ________. a) all of the other options are correct b) cross-channel retailing c) omni-channel retailing d) multichannel retailing e) network retailing
d) multichannel retailing
(ch6) Once the data model is created, the format of the data is documented in a data ________. - warehouse - mart - dictionary - domain - entry
dictionary
________ emulate traditional bulletin boards and allow for threaded discussions between participants. a) blogs b) wikis c) online document systems d) discussion forums e) instant messages
discussion forums
(exam 2 practice quiz) ________ are comprised of members from different geographic areas assembled as needed to collaborate on a certain project. a) work groups b) task force teams c) non-core teams d) command groups e) virtual teams
e) virtual teams
When an organization offers the customer both a retail store and Internet shopping experience, it is referred to as ________. a) all of the other options are correct b) omni-channel retailing c) cross-channel retailing d) network retailing e) multichannel retailing
multichannel retailing
(ch6) Responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ________ level of an organization. - tactical - executive - operational - strategic - business
operational
(ch6) Which of the following is a risk associated with a database approach? - program-data independence - enforcement of standards - organizational conflict - minimal data redundancy - reduced program maintenance
organizational conflict
Business rules are captured by the designers of a database and included in a data dictionary to ________. a) make sure that each table contains only attributes that are related to an entity b) capture the structure of the database c) eliminate data duplication d) prevent illegal or illogical entries from entering the database e) organize and sort the data, complete calculations, and allocate storage space
prevent illegal or illogical entries from entering the database
(ch6) When we consider entities as tables, each row is a ________. - field - record - query - form - bot
record
(ch6) A(n) ________ is a compilation of data from a database that is organized and produced in printed format. - attribute - field - report - entity
report
(ch6) ________ are produced at predefined intervals to support routine decisions. - security reports - exception reports - drill-down reports - scheduled reports - key-indicator reports
scheduled reports
Which of the following is a basic concept associated with Web 2.0? a) shift in user's role from the passive consumer of content to its creator b) shift in user's lifestyle due to increased purchasing power c) shift in user's interest from sharing information to finding information d) shift in user's preference from online sites to encyclopedias as sources of unbiased information e) shift in user's preference to environment-oriented products
shift in user's role from the passive consumer of content to its creator
(ch6) In a database management system (DBMS), data are kept separate from the applications' programming code. This means that ________. - the database does not need to be changed if a change is made to an application - the database needs to be changed when a change is made to an application - an application cannot be changed without making changes to the database - an application's programming code needs to be updated continuously to keep up with the database - an application needs to be changed when the database is changed
the database does not need to be changed if a change is made to an application
Click-through rate reflects ________. a) the ratio of surfers who click on an ad divided by the number of people who make a purchase b) the ratio of surfers who visit a Web site divided by the number of people who make a purchase c) the ratio of surfers who visit a Web site divided by the number of surfers who clicked on an ad d) the percentage of visitors who actually perform the marketer's desired action e) the ratio of surfers who click on an ad divided by the number of times it was displayed
the ratio of surfers who click on an ad divided by the number of times it was displayed
Which of the following statements is a use of geotagging? a)to use avatars while chatting online b)to create folksonomies for social bookmarking c)to create categorization systems for social cataloging d)to know the location of a person sending out a breaking news update on Twitter e)to use syndicated feeds while sharing media
to know the location of a person sending out a breaking news update on Twitter