BUS 355 Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

If an inventory manager is required to make a daily decision about parts inventory levels, and the estimated value to the firm of a single improved decision by that manager is $2,500, what is the annual business value of that enhanced decision? $2,500 $30,000 $130,000 $300,000 $912,500

$912,500

The interaction between information technology and organizations is influenced: By many factors, including structure, politics, culture, and environment By the development of new information technologies Solely by the decision making of middle and senior managers By two main macroeconomic forces: capital and labor

By many factors, including structure, politics, culture, and environment

Which of the following best illustrates the advertising revenue model? Apple accepts micropayments for single music track downloads Facebook provides a social network for free but shows sponsored content in users' News Feed Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase Netflix charges customers a monthly fee for access to its library of movies eBay receives a small fee from a seller if a seller is successful in selling an item

Facebook provides a social network for free but shows sponsored content in users' News Feeds

Which of the following is a grouping of characters into a word, a group of words, or a complete number? file table entity field tuple

Field

Which of the following best describes Immanuel Kant's categorical imperative? If an action cannot be taken repeatedly, then it is not right to be taken at any time One should take the action that produces the least harm or incurs the least cost If an action is not right for everyone to take, it is not right for anyone to take One can put values in rank order and understand the consequences of various courses of action

If an action is not right for everyone to take, it is not right for anyone to take

An information system can enable a company to focus on a market niche through: enabling new products and services producing products and services at a lower price than competitors developing intimacy with customers intensive customer data analysis

Intensive customer data analysis

Which of the following best describes the effect that new information technology has on society? it has a ripple effect, raising new ethical, social, and political issues it has a waterfall effect in raising ever more complex ethical issues it is beneficial for society as a whole, while raising dilemmas for consumers it has a magnifying effect, creating increasing numbers of ethical issues

It has a ripple effect, raising new ethical, social, and political issues

Which of the following is not a major CRM application software vendor? SAP JDA software Oracle Salesforce.com Microsoft

JDA software

According to the ________ definition of organizations, an organization is seen as a means by which capital and labor are transformed by the organization into outputs to the environment behavioral macroeconomic sociotechnical microeconomic

Microeconomic

All of the following are, or were, file-sharing services except: The Pirate Bay Pandora Megaupload Grokster

Pandora

Which of the following statements about RFID is not true? microchips embedded in RFIDs are used to store data RFIDs use an antenna to transmit data RFIDs transmit only over a short range RFIDs require line-of-sight contact to be read

RFIDs require line-of-sight contact to be read

Which of the following is not an example of a next-generation enterprise application? Microsoft Dynamics 365 Salesforce.com's Einstein AI SAP S/4HANA Cloud SAP R/3 Social CRM

SAP R/3

______ modules in CRM systems help staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services customer SFA complex SOA marketing

SFA

Which of the following statements about Net marketplaces is not true? Some Net marketplaces support contractual purchases based on long-term relationships Some Net marketplaces serve vertical markets Some Net marketplaces sell direct good Some Net marketplaces are owned by a single firm and used to link solely to the firm's suppliers and key business partners Some Net marketplaces sell indirect goods

Some Net marketplaces are owned by a single firm and used to link solely to the firm's suppliers and key business partners

Which of the following best illustrates the relationship between entities and attributes? The entity CUSTOMER with the attribute PRODUCT The entity CUSTOMER with the attribute PURCHASE The entity PRODUCT with the attribute PURCHASE The entity PRODUCT with the attribute CUSTOMER The entity PURCHASE with the attribute CUSTOMER

The entity CUSTOMER with the attribute PURCHASE

What event marked the beginning of e-commerce? The first product sold online The first email sent The first product advertised online The first domain name registered The first paid advertisements placed on a website

The first paid advertisements placed on a website

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called _______ systems DPI MSSP NSP PKI UTM

UTM

Which signal types are represented by a continuous waveform? analog RFID digital optical

analog

All of the following are types of information systems general controls except: application controls computer operations controls hardware controls software controls administrative controls

application controls

What are the four layers of the TCP/IP reference model? application, transport, internet, and network interface physical, application, internet, and network interface application, hardware, internet, and network interface physical, application, transport, and network interface

application, transport, internet, and network interface

A characteristic or quality that describes a particular database entity is called a(n): field tuple key field attribute relationship

attribute

Which of the following statements about passwords is not true: authentication cannot be established by the use of a password password systems that are too rigorous may hinder employee productivity passwords can be stolen through social engineering a user's actions with respect to passwords can compromise security passwords can be sniffed when being transmitted over a network

authentication cannot be established by the use of a password

Which of the following is not a part of business intelligence infrastructure? databases balanced scorecards data warehouses data marts analytic platforms

balanced scorecards

All of the following are physical components of an RFID system except: readers antennas bar codes radio transmitters

bar codes

The right to ________ is a feature of the GDPR that allows individuals to request that organizations delete their personal data a safe harbor opt-out of data collection be forgotten opt-in to data collection

be forgotten

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: gigaflops bps hertz baud

bps

The traditional telephone system is an example of a _________ network peer-to-peer circuit-switched packet-switched wireless

circuit-switched

Computer forensics tasks include all of the following except: presenting collected evidence in a court of law securely storing recovered electronic data collecting physical evidence on the computer finding significant information in a large volume of electronic data recovering data from computers while preserving evidential integrity

collecting physical evidence on the computer

Which of the following Internet business models involved a merchant creating an online digital environment that enables people with like interesting to share information? service provider transaction broker market creator community provider portal

community provider

Which quality dimension of information is concerned that all the necessary data needed to make a decision is present? timeliness consistency completeness accessibility validity

completeness

The dimension of ______ describes whether data elements are consistently defined completeness accuracy validity consistency integrity

consistency

A(n) ______ is an activity for which a firm is a world-class leader? competitive advantage growth driver efficiency core competency

core competency

Pepsico using Super Bowl viewers to build an online video is an example of: social shopping behavioral targeting long-tail marketing crowdsourcing prediction markets

crowdsourcing

To achieve the maximum benefit of a new ERP system, Tasty Baking implemented an enterprise system by: customizing less than 5 percent of the enterprise system processes retaining its legacy systems to operate as a backup to the new enterprise syste using only the pre-defined processes in the ERP software that matched its own processes changing the ERP software as needed to match their own processes using a cloud-based version of the ERP

customizing less than 5 percent of the enterprise system processes

A(n) _____ is a BI feature that presents performance data defined by users ad hoc query parameterized report interface portal dashboard

dashboard

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? data normalization data accuracy data redundancy data inconsistency data duplication

data inconsistency

Which of the following occurs when the same attribute in related data files has different values? data redundancy data duplication data dependence data discrepancy data inconsistency

data inconsistency

_______ creates confusion that hampers the creation of information systems that integrate data from different sources batch procession data redundancy data independence online processing data distribution

data redundancy

From your reading of the chapter's opening case, which of the answers below is not a reason why Lenzing chose JDA's Sales and Operations Planning software? Develop a new business model minimize the environmental impact of its products create an end-to-end supply chain planning process eliminate manual processes improve sales forecast accuracy

develop a new business model

A(n) __________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits digital broadband analog modulated

digital

Client/server computing is a: network where centralized mainframe computers serve local devices distributed computing model where clients are linked to one another through a network that is controlled by a network server computer centralized model of computing for large corporations network that connects sensors to desktop computers

distributed computing model where clients are linked to one another through a network that is controlled by a network server computer

Which of the following statements about exchanges is not true? some exchanges enable a spot market exchanges are the most successful form of B2B commerce exchanges are independently owned third-party Net marketplaces Go2Paper is an example of an exchange some exchanges provide vertical markets

exchanges are the most successful form of B2B commerce

The Network Advertising Initiative is an industry association that: has established technical guidelines for ensuring privacy regulates the use of customer information by firms has developed privacy policies to help costumers opt out of advertising network programs and provide consumers redress from abuses protects user privacy during interactions with websites

has developed privacy policies to help consumers opt out of advertising network programs and provide consumers redress form abuses

Which of the following statements best describes the business value of improved decision making at all levels of the firm? improved decision making creates better products improved decision making results in a large monetary value for the firm as numerous small daily decision affecting efficiency, production, costs, and more add up to large annual values improved decision making enables senior executive to more accurately foresee future financial trends improved decision making strengthens customer and supplier intimacy, which reduces costs improved decision making creates a better organizational culture

improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values

All of the following are issues with the traditional file environment except: data inconsistency inability to develop specialized applications for functional areas lack of flexibility in creating ad-hoc reports poor security data sharing

inability to develop specialized applications for functional areas

Which of the following dimensions of e-commerce technology has the potential to raise the quality of information? customization richness interactivity global reach information density

information density

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors stateful inspections intrusion detection systems application proxy filtering technologies packet filtering technologies firewalls

intrusion detection systems

A Trojan horse: is software that appears to be benign but does something other than is expected is a virus installed as a drive-by download is malware named for a breed of fast-moving Near-Eastern horses installs spyware on users' computers is a type of sniffer used to infiltrate corporate networks

is a software that appears to be benign but does something other than is expected

All of the following are examples of supply chain inefficiencies except: high transportation costs excessive finished goods underused plant capacity just-in-time production parts shortages

just-in-time production

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? program-data dependence lack of flexibility poor security lack of data sharing data redundancy

lack of flexibility

Compared to traditional markets, digital markets have: greater asymmetry higher menu costs higher transaction costs lower search costs weaker network effects

lower search costs

A well-designed ESS helps senior executive do all of the following except: monitor organizational performance track the activity of competitors recognize changing market conditions identify problems and opportunities make high-velocity automated decisions

make high-velocity automated decisions

________ involved placing ads in social network newsfeeds or within traditional editorial content, such as a newspaper article crowdsourcing lead generation marketing behavioral targeting demand prediction software native advertising

native advertising

The HIPAA Act of 1996: requires financial institutions to ensure the security of customer data specifies best practices in information systems security and control imposes responsibility on companies and management to safeguard the accuracy of financial information outlines medical security and privacy rules identifies computer abuse as a crime and defines abusive activities

outlines medical security and privacy rules

Most computer viruses deliver a: worm Trojan horse drive-by download keylogger payload

payload

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? LAN Windows domain network peer-to-peer wireless

peer-to-peer

Walmart's continuous replenishment system is an example of a(n) ________ model forecast-based build-to-stock push-based pull-based supply chain organization

pull-based

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: theft of data copying of data alteration of data radiation hardware failure

radiation

A database ________ describes a data entity byte field record value file

record

Data _______ occurs when the same data is duplicated in multiple files of a database redundancy repetition independence partitions discrepancy

redundancy

Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address? router hub switch nic

router

Which of the following marketing formats is sales-oriented, rather than branding-oriented or a mix search engine rich media lead generation video display ads

search engine

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? security controls benchmarking algorithms identity management

security

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a(n): value chain supply chain distribution channel marketing channel information system

supply chain

The WMS that Haworth Incorporated uses is an example of which of the following? just-in-time strategy supply chain planning system supply chain execution system continuous replenishment system build-to-order model

supply chain execution system

Which of the following is a support activity in a firm's value chain? technology service operations sales and marketing

technology

Which of the following statements about DSS is not true? they rely more heavily on modeling than MIS they are BI delivery platforms for casual users they can support semistructured decision making they can be used to perform a sensitivity analysis they can be used to test specific hypotheses

they are BI delivery platforms for casual users

Which type of decision is deciding whether to introduce a new product line? structured unstructured recurring nonrecurring predictive

unstructured

The _______ includes a company's supplies, the suppliers' suppliers, and the processes for managing relationships with them? upstream portion of the supply chain downstream portion of the supply chain supplier's internal supply chain intermediate portion of the supply chain logistics supply chain

upstream portion of the supply chain

Which of the following is not an example of a BI predefined production report? workforce demographics order cycle time what-if scenario analysis church rate direct and indirect spending

what-if scenario analysis


संबंधित स्टडी सेट्स

GRADE 8-UNIT 7 (PART 1 w/ 10 words)

View Set

Chinese Philosophies-- Buddhism, Confucianism, Daoism and Legalism

View Set