cis 21-25
Which of the following is the first value-adding step of information system activities in the knowledge management value chain? a. Disseminate b. Apply c. Acquire
Acquire
Craigslist is an example of: a. B2C e-commerce. b. B2B e-commerce. c. C2C e-commerce
C2C e-commerce
Which of the following is not one of four types of presence to be considered when building an e-commerce presence? a. Corporate b. Websites c. Offline media d. Email e. Social media
Corporate
Which of the following is not one of the five classical functions of managers? a.Deciding b. Creating c. Controlling
Creating
________ are visual tools for presenting performance data in a BI system. a. Scenarios and models b. Dashboards and scorecards c. Ad hoc report creation
Dashboards and scorecards
Which of the following type of system would be used to present senior marketing executives with high-level information about customer retention, satisfaction, and quality performance? a. TPS b. ESS c. MIS
ESS
Which of the following is the largest mobile advertising market? a. Yahoo b. Twitter c. Microsoft d. Facebook/Instagram e. Google
Facebook/Instagram
Symmetric encryption is more secure than public key encryption. True False
False
Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized maps? a. Location analytics b. DSS c. GIS
GIS
Which of the following is not one of the main four dimensions of knowledge described in the chapter? a. Knowledge has different forms. b. Knowledge is a firm asset. c. Knowledge is timeless.
Knowledge is timeless
What is the primary benefit to consumers of disintermediation? a. Lower costs b. Greater choices c. Higher quality d. Faster service
Lower costs
Which of the following companies uses the subscription revenue model? a. Netflix b. Facebook c. Expedia
Netflix
Which of the following is not one of Simon's four stages of decision making? a. Design b. Intelligence c. Prediction d. Choice
Prediction
Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience? a. Ubiquity b. Interactivity c. Richnes
Richness
What is the second value-adding step in information system activities in the knowledge management value chain? a. Acquire b. Disseminate c. Store
Store
Which type of decision is determining vacation eligibility for an employee? a. Structured b. Procedural c. Ad hoc
Structured
Authentication refers to verifying that people are who they claim to be. True False
True
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. True False
True
All of the following are examples of social commerce companies except: a. Twitter. b. Instagram. c. Uber. d. Facebook.
Uber
Which type of decision is deciding whether to introduce a new product line? a.Structured b. Unstructured c. Predictive
Unstructured
Which of the following involves where, when, and how to apply knowledge? a. Tacit knowledge b. Wisdom c. Data
Wisdom
Google's search engine is an example of which of the following types of decision? a. High-velocity b. Semi-structured c. Financia
a. High-velocity
Behavioral models of management see managers as being ________ than does the classical model. a. more informal b. more well organized c. more systematic
a. more informal
Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party. a. complexity b. transparency c. asymmetry
asymmetry
In the ________ revenue models, a firm offers some services for free but charges a subscription fee for premium services. a. transaction fee b. subscription c. free/freemium
free/freemium
Geoadvertising sends ads to users based on their: A) GPS locations. B) home addresses. C) shopping preferences. D) website behaviors. E) Google Maps settings.
gps locations
The Sarbanes-Oxley Act: a. requires financial institutions to ensure the security of customer data. b. imposes responsibility on companies and management to safeguard the accuracy of financial information. c. outlines medical security and privacy rules.
imposes responsibility on companies and management to safeguard the accuracy of financial information.
All of the following are intangible assets of a firm except its: a. brand. b. information technology. c. reputation. d. knowledge
information technology
Specialized systems that enable scientists and engineers to create and discover new knowledge for a company are called: . wikis. b. KWS. c. enterprise-wide knowledge management systems.
kWs
A firewall allows the organization to: a. create an enterprise system on the Internet. b. prevent unauthorized communication into and out of its network. c. check the accuracy of all transactions between its network and the Internet.
prevent unauthorized communication into and out of its network.
Selling the same goods to different targeted groups at different prices is called: a. cost optimization. b. price discrimination. c. price gouging.
price discrimination
Fault tolerant information systems create an environment designed to provide continuous, uninterrupted services by using: a. redundant hardware, software, and power supplies. b. high-capacity storage. c. a multitier server network.
redundant hardware, software, and power supplies.
A pivot table is a(n): a. spreadsheet tool that displays two or more dimensions of data in a convenient format. b. tool for performing sensitivity analysis. c. type of relational database.
spreadsheet tool that displays two or more dimensions of data in a convenient format.
Checking store inventory is an example of a(n) ________ decision. a. structured b. unstructured c. ad hoc
structured
In general, for digital goods, the marginal cost of producing another unit is about zero. true false
true
Knowledge is conditional. true false
true
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: a. biometric authentication. b. smart card authentication. c. two-factor authentication. d. token authentication.
two-factor authentication.
Establishing a firm's long-term goals is an example of a(n) ________ decision. a. structured b. unstructured c. analytic
unstructured