DAC1 WGU Business Driven Technology Study Guide with Chapter and Practice Tests
If a supplier has high power, what can it do to influence its industry? -Charge higher prices. -Shift costs to industry participants. -Limit quality or services. -All of these.
All of these: (Charge higher prices, Shift costs to industry participants, Limit quality or services.) (If the supplier power is high, the supplier can influence the industry by (1) charging higher prices, (2) limiting quality or services, or (3) shifting costs to industry participants.)
Steve Jobs and Apple created a big advantage in the technology industry with the introduction of the iPod, iPhone, and iPad. What are these all examples of? -Competitive advantage -Competitive intelligence -First-mover advantage -All of these
All of these: (Competitive advantage, Competitive intelligence, First-mover advantage) (Steve Jobs and Apple created a big advantage in the technology industry with their products the iPod, iPhone, and iPad. These are examples of competitive advantage, competitive intelligence, and first-mover advantage.)
Which of the following is an ebusiness marketing technique? -Cookies -Pop-up ad -Banner ad -All of these
All of these: (Cookies, Pop-up ad, Banner ad) (Ways of marketing through ebusiness include (1) associate programs, (2) banner ads, (3) click-through, (4) cookies, (5) pop-up ads, and (6) viral marketing.)
Which of the following are the influential driver(s) affecting the growth of outsourcing markets? -Core competencies -Rapid growth -Industry changes -All of these
All of these: (Core competencies, Rapid growth, Industry changes) (All of these are the influential drivers affecting the growth of outsourcing.)
Which of the following is a type of SCM metric? -Customer order promised cycle time -Customer order actual cycle time -Inventory replenishment cycle time -All of these
All of these: (Customer order promised cycle time, Customer order actual cycle time, Inventory replenishment cycle time) (All of these are SCM metrics.)
Warm Sites (Disaster recovery):
A "preventative" warm site allows a business to pre-install hardware and pre-configure their bandwidth needs. In the event of a disaster, the business can then load their software and restore their business systems.
Hot Sites (Disaster recovery):
A "proactive" hot site allows a business to keep servers and a live backup site up and running in the event of a disaster. The production environment is replicated in a data center, allowing for immediate access in the event of a disaster at the primary site.
Cold Sites (Disaster recovery):
A "recovery" cold site is essentially data center space, with power, and network connectivity that is available when needed. In the event of a disaster, teams can move and install a business's hardware at the cold site in order to get the systems back up and running.
Which of the following is an example of a clickstream data metric? -Dates and times of visits -Number of customers with shopping carts -The number of page views -All of these
All of these: (Dates and times of visits, Number of customers with shopping carts, The number of page views) (Examples of clickstream data metrics include (1) number of page views, (2) pattern of websites visited, including most frequent exit page and prior website, (3) length of stay on the website, (4) dates and times of visits, (5) number of registrations filled out per 100 visitors, (6) number of abandoned registrations, (7) demographics of registered visitors, (8) number of customers with shopping carts, and (9) number of abandoned shopping carts.)
Which of the following is a business-related consequence of software failure? -Decreased productivity -Damage to brand reputation -Incurred liabilities -All of these
All of these: (Decreased productivity, Damage to brand reputation, Incurred liabilities) (All of these are consequences of software failure.)
Which of the following is an outsourcing challenge caused by contract length? -Difficulties in getting out of a contract -Problems in foreseeing future issues -Problems in reforming an internal IT department -All of these
All of these: (Difficulties in getting out of a contract, Problems in foreseeing future issues, Problems in reforming an internal IT department) (All of these are challenges associated with contract length.)
What is the best way to measure a company's ebusiness success? -Effective MIS metrics -Interactivity -Clickstream data -All of these
All of these: (Effective MIS metrics, Interactivity, Clickstream data) (The best way to measure a company's ebusiness success is by using different effective MIS metrics, such as interactivity and clickstream data.)
Which of the following was the original design for the Internet? -Email -Document exchange -Display of static content -All of these
All of these: (Email, Document exchange, Display of static content) (All of these were the original design for the Internet.)
Both individuals and organizations have embraced ebusiness to do which of the following? -Enhance productivity. -Maximize convenience. -Improve communications. -All of these.
All of these: (Enhance productivity, Maximize convenience, Improve communications.) (Both individuals and organizations have embraced ebusiness to enhance productivity, maximize convenience, and improve communications.)
Which of the following is a benefit a business can receive by deploying the latest in security technology? -Fewer disruptions to organizational systems -Increased productivity of employees -Greater advances in administration -All of these
All of these: (Fewer disruptions to organizational systems, Increased productivity of employees, Greater advances in administration) (All of these are benefits from security.)
Which of the following is a benefit an organization can receive from outsourcing? -Financial savings -Increased technical abilities -Market agility -All of these
All of these: (Financial savings, Increased technical abilities, Market agility) (All of these are benefits an organization can receive from outsourcing.)
Which of the following is an issue related to the waterfall methodology? -Flaws in accurately defining and articulating the business problem. -Managing costs, resources, and time constraints. -Assumes users can specify all business requirements in advance. -All of these.
All of these: (Flaws in accurately defining and articulating the business problem, Managing costs, resources, and time constraints, Assumes users can specify all business requirements in advance.) (All of these are issues related to the waterfall methodology, according to the related figure in the text.)
Which of the following is a fundamental of the RAD methodology? -Focus initially on creating a prototype that looks and acts like the desired system. -Actively involve system users in the analysis, design, and development phases. -Accelerate collecting the business requirements through an interactive and iterative construction approach. -All of these.
All of these: (Focus initially on creating a prototype that looks and acts like the desired system, Actively involve system users in the analysis, design, and development phases, Accelerate collecting the business requirements through an interactive and iterative construction approach.) (All of these are fundamentals of the RAD methodology.)
Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information? -Identify trends. -Make projections. -Decide key business issues. -All of these.
All of these: (Identify trends, Make projections, Decide key business issues.) (Businesses use data warehouses for all of these.)
Which of the following are challenges of Business 2.0? -Information vandalism -Technology dependence -Violations of copyright and plagiarism -All of these
All of these: (Information vandalism, Technology dependence, Violations of copyright and plagiarism) (The challenges of Business 2.0 are (1) technology dependence, (2) information vandalism, and (3) violations of copyright and plagiarism.)
What is the primary problem with redundant information? -It is difficult to determine which values are the most current. -It is often inconsistent. -It is difficult to determine which values are the most accurate. -All of these.
All of these: (It is difficult to determine which values are the most current, It is often inconsistent, It is difficult to determine which values are the most accurate.) (All of these are problems with redundant information.)
Which of the following is a type of metric based on website data? -Number of visits to a website -Number of abandoned registrations -Number of abandoned shopping carts -All of these
All of these: (Number of visits to a website, Number of abandoned registrations, Number of abandoned shopping carts) (All of these are website data metrics.)
Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers? -Organization agility -A focus on core competencies and processes -Instantaneous business response -All of these
All of these: (Organization agility, A focus on core competencies and processes, Instantaneous business response) (All of these are part of the new series of business success factors.)
Which of the following is a quantitative model typically used by a DSS? -Sensitivity analysis -What-if analysis -Goal-seeking analysis -All of these
All of these: (Sensitivity analysis, What-if analysis, Goal-seeking analysis) (A DSS can perform all of these.)
Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using? -A cookie -A banner ad -A pop-up ad -A click-through ad
A banner ad (A banner ad is a box running across a website that advertises the products and services of another business, usually another ebusiness. The banner often contains a link to the advertiser's website.)
What is Mozilla Firefox? -A competitor to Microsoft Word. -A competitor to Microsoft Excel. -A competitor to Adobe Photoshop. -A competitor to Internet Explorer.
A competitor to Internet Explorer. (Mozilla Firefox is a web browser and is a competitor to Internet Explorer.)
Nonrepudiation:
A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions.
CSF:
A critical success factor is a management term for an element that is necessary for an organization or project to achieve its mission. It is a critical factor or activity required for ensuring the success of a company or an organization. CSF's must be vital to the organization's success, must benefit the company or department as a whole, be synonymous with a high-level goal, and must link directly to the organizational strategy. Critical success factors are best stated as action phrases and may include the means and/or desired results, as well as the action. Here are a few critical success factor examples: •Increase Market Share Through Current Customers •Be Service-Oriented •Achieve Order Fulfillment Excellence Through On-Line Process Improvement •Align Incentives & Rewards With Employee Roles For Increased Employee Satisfaction
Digital certificate:
A data file that identifies individuals or organizations online and is comparable to a digital signature.
DSS:
A decision support system (DSS) is a computer program application that analyzes business data and presents it so users can make business decisions more easily.
DDoS:
A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.
Which of the following offers an example where Porter's five forces are mostly strong and competition is high? -A dog walking business. -A ski resort. -A professional hockey team. -All of these.
A dog walking business. (With Porter's Five Forces Model, the following are all examples of situations with strong forces and, therefore, increased competition: (1) a single consumer purchasing milk, (2) a company that makes pencils, (3) coffee from McDonalds, (4) a dog-walking business, and (5) a coffee shop.)
Which of the following decisions does a firm need to make as soon as it has identified the activities from the value chain that are bringing the highest added value to their customers? -Target high value-adding activities to further enhance their value. -Target low value-adding activities to increase their value. -Perform some combination of the two. -All of these.
All of these: (Target high value-adding activities to further enhance their value, Target low value-adding activities to increase their value, Perform some combination of the two.) (After a firm has identified the activities from the value chain that are bringing the highest added value to their customers, they need to make decisions regarding the competitive advantage by determining whether to (1) target high value-adding activities to further enhance their value, (2) target low value-adding activities to increase their value, or (3) perform some combination of the two.)
Which of the following is a characteristic of information? -Type -Quality -Timeliness -All of these
All of these: (Type, Quality, Timeliness) (All of these are characteristics of information.)
Foreign key:
A foreign key in one table points to a primary key in another table.
Zombie farm:
A group of computers on which a hacker has planted zombie programs.
Hardware key logger:
A hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
What is a project milestone? -Measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. -A key date by which a certain group of activities must be performed. -An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget. -An internal department that oversees all organizational projects.
A key date by which a certain group of activities must be performed. (This is the definition of a project milestone.)
KPI:
A key performance indicator (KPI) is a business metric used to evaluate factors that are crucial to the success of an organization. KPI's must be well-defined and quantifiable, be thoroughly communicated throughout an organization, be crucial to achieving a goal, and be applicable to the line of business. Here are a few KPI examples: •Number Of Customers •Percentage Of Product Defects •Sales By Region
Phishing expedition:
A masquerading attack that combines spam with spoofing.
What is wireless fidelity? -Commonly used to transmit network signals over great distances -An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together -A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers -A means of linking computers using infrared or radio signals
A means of linking computers using infrared or radio signals (This is the definition of wireless fidelity.)
Mesh network topology:
A mesh network topology is a decentralized design in which each node on the network connects to at least two other nodes.
Information governance:
A method or system of government for information management or control.
At a local marketing firm, Steve is the lead web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job? -Understanding that he must create a unique domain name for each client. -Being able to work with HTML. -Understanding the World Wide Web and how hyperlinks work. -All of these.
All of these: (Understanding that he must create a unique domain name for each client, Being able to work with HTML, Understanding the World Wide Web and how hyperlinks work.) (At a local marketing firm, Steve is the lead web developer. Among his responsibilities are working with customers, web design and development, and graphic design techniques. More than likely, he will be required to utilize URLs, domain names, HTML, World Wide Web knowledge, web browsers, and HTTP.)
Which of the following is a question a company should ask when creating a global website? -Which country will the server be located in to support local user needs? -Will the site require new navigational logic to accommodate cultural preferences? -Will content be translated? -All of these are correct.
All of these: (Which country will the server be located in to support local user needs, Will the site require new navigational logic to accommodate cultural preferences, Will content be translated?) (All of the above are questions companies should ask when creating global websites.)
Ring network topology:
A network topology is set up in a circular fashion in such a way that they make a closed loop.
According to Porter's three generic strategies for entering a market, if you have a focused strategy what market should you target? -A niche market. -A broad market. -Neither niche or broad markets. -Both niche and broad markets.
A niche market. (According to Porter's three generic strategies for entering a market, if you have a focused strategy you should target a narrow market, niche market, or a unique market.)
Data is useful for understanding individual sales, but to gain deeper insight into a business, data needs to be turned into information. Which of the following offers an example of turning data into information? -Who are my best customers? -What is my best-selling product? -What is my worst-selling product? -All of these
All of these: (Who are my best customers, What is my best-selling product, What is my worst-selling product) (Questions outlined in the book include: Who are my best customers? Who are my least-profitable customers? What is my best-selling product? What is my slowest-selling product? Who is my strongest sales representative? Who is my weakest sales representative?)
Which of the following occurs during data cleansing? -Clean missing records. -Clean redundant records. -Clean inaccurate data. -All of these.
All of these: Clean missing records, Clean redundant records, Clean inaccurate data.) (The figure on information cleansing activities highlights the steps that occur during information cleansing.)
Spear phishing:
A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Vishing:
A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
What is information redundancy? -Duplication of information. -Storing the same information in multiple places. -Storing duplicate information in multiple places. -All of these.
All of these: Duplication of information, Storing the same information in multiple places, Storing duplicate information in multiple places.) (Redundancy is all of these.)
Typosquatting:
A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
What is a competitive advantage? -A service that an organization's customers value more highly than similar offerings from a supplier -A product or service that an organization's customers value more highly than similar offerings from a competitor -A product that an organization's customers value the same as an identical offer from a competitor -A product or service that an organization's customers value more highly than similar offerings from a supplier
A product or service that an organization's customers value more highly than similar offerings from a competitor (This is the definition of competitive advantage.)
Key logger, or key trapper, software:
A program that records every keystroke and mouse click.
Zombie:
A program that secretly takes over another computer for the purpose of launching attacks on other computers.
Cookie:
A small file deposited on a hard drive by a website containing information about customers and their web activities.
Sensitivity analysis:
A technique used to determine how different values of an independent variable will impact a particular dependent variable under a given set of assumptions.
What is a project? -A temporary endeavor undertaken to create a unique product, service, or result. -The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project. -Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. -Key dates when a certain group of activities must be performed.
A temporary endeavor undertaken to create a unique product, service, or result. (This is the definition of a project.)
TPS:
A transaction processing system is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise.
Tree network topology:
A tree topology is essentially a combination of bus topology and star topology.
Certificate authority:
A trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
In the bookstore industry, some of today's businesses compete with different business strategies and cost strategies. Which of the following is using a broad market competitive scope along with a low cost strategy? -Amazon.com. -Any local independent bookstore that specializes in antique books. -Barnes & Noble. -Borders Books.
Amazon.com (Amazon.com competes by offering a broad range of differentiated products at low prices.)
Teergrubing:
An anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Business process reengineering:
(BRP) is the analysis and redesign of workflow within and between enterprises.
Enterprise architecture:
(EA) is a conceptual blueprint that defines the structure and operation of an organization. The intent of an enterprise architecture is to determine how an organization can most effectively achieve its current and future objectives.
Information architecture:
(IA) focuses on organizing, structuring, and labeling content in an effective and sustainable way.
The ________characteristic of high-quality information ensures that all the values are correct.
Accuracy
Achieving perfect information is almost impossible. The more complete and accurate an organization wants its information to be, the more it costs. Which two variables are used to determine the trade-off for perfect information? -Accuracy versus completeness. -Accessibility versus completeness. -Accuracy versus complexity. -Accessibility versus complexity.
Accuracy versus completeness. (Accuracy versus completeness determines the trade-off for perfect information.)
Which of the following does not draw a parallel between the challenges in business and the challenges of war? -Collecting information. -Discerning patterns and meaning in the information. -Accurate and complete information. -Responding to the resultant information.
Accurate and complete information. (Accurate and complete information is not one of the parallels between the challenges in business and those of war.)
What does enterprise resource planning integrate? -All departments and functions throughout an organization -All customers with product development -All suppliers with manufacturers -All business processes with external manufactures
All departments and functions throughout an organization (Enterprise resource planning integrates all departments and functions throughout an organization into a single IT system.)
Which of the following describes ETL? -A process that transforms information using a common set of enterprise definitions -A process that loads information into a data warehouse -A process that extracts information from internal and external databases -All of these are correct.
All of these are correct: (A process that transforms information using a common set of enterprise definitions, A process that loads information into a data warehouse, A process that extracts information from internal and external databases.) (All of the above describe ETL.)
Which of the following can a CRM system collect information from? -Accounting system -Order fulfillment system -Inventory system -All of these are correct.
All of these are correct: (Accounting system, Order fulfillment system, Inventory system) (A CRM system can collect information from accounting, order fulfillment, and inventory systems.)
Which of the below represents a challenge facing many businesses? -Collecting information -Discerning patterns and meaning in the information -Responding to the resultant information -All of these are correct.
All of these are correct: (Collecting information, Discerning patterns and meaning in the information, Responding to the resultant information.) (All of the above are challenges facing businesses today.)
What is the primary difference between the different types of backup/recovery media? -Cost -Speed -Expense -All of these are correct.
All of these are correct: (Cost, Speed, Expense) (All of the above are the differences between the different types of media.)
Which of the following is an organizational result from an effective and efficient supply chain management system? -Decrease the power of its buyers -Create entry barriers, thereby reducing the threat of new entrants -Increase efficiencies while seeking a competitive advantage through cost leadership -All of these are correct.
All of these are correct: (Decrease the power of its buyers, Create entry barriers, thereby reducing the threat of new entrants, Increase efficiencies while seeking a competitive advantage through cost leadership.) (All of these are results from an effective and efficient SCM system.)
Which of the following is a potential business impact from the world's population doubling in the next 40 years? -Developed nations will begin to increase immigration limits. -Developed nations will find that retirees will have to remain on the job to remain competitive. -Global agriculture will be required to supply as much food as has been produced during all of human history. -All of these are correct.
All of these are correct: (Developed nations will begin to increase immigration limits, Developed nations will find that retirees will have to remain on the job to remain competitive, Global agriculture will be required to supply as much food as has been produced during all of human history.) (All of the above are potential business impacts resulting from the world's population growth.)
Information property:
An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
What is a backup? -Restoring the information backup -The ability to get a system up and running in the event of a system crash or failure -An exact copy of a system's information -All of the above
An exact copy of a system's information. (This is the definition of backup.)
Which of the follow represents a trait of disruptive technology? -Enters the marketplace at the low end -Is a new way of doing things that initially doesn't meet the needs of existing customers -Tends to open new markets and destroy old ones -All of these are correct.
All of these are correct: (Enters the marketplace at the low end, Is a new way of doing things that initially doesn't meet the needs of existing customers, Tends to open new markets and destroy old ones.) (Disruptive technology (1) is a new way of doing things that initially doesn't meet the needs of existing customers, (2) tends to open new markets and destroy old ones, (3) enters the marketplace at the low end and eventually evolves to displace high-end competitors and their reigning technologies.)
Which of the following is a common use for GIS? -Finding what is nearby -Routing information -Information alerts -All of these are correct.
All of these are correct: (Finding what is nearby, Routing information, Information alerts) (All of the above are common uses for GIS.)
Which of the following is a fundamental of the RAD methodology? -Focus initially on creating a prototype that looks and acts like the desired system. -Accelerate collecting the business requirements through an interactive and iterative construction approach. -Actively involve system users in the analysis, design, and development phases. -All of these are correct.
All of these are correct: (Focus initially on creating a prototype that looks and acts like the desired system, Accelerate collecting the business requirements through an interactive and iterative construction approach, Actively involve system users in the analysis, design, and development phases.) (All of these are fundamentals of the RAD methodology.)
Which of the following is a benefit an organization can receive from outsourcing? -Increase technical abilities -Financial savings -Market agility -All of these are correct.
All of these are correct: (Increase technical abilities, Financial savings, Market agility) (All of these are benefits an organization can receive from outsourcing.)
Which of the following is an example of acting unethically? -Individuals copy, use, and distribute software. -Employees search organizational databases for sensitive corporate and personal information. -Individuals hack into computer systems to steal proprietary information. -All of these are correct.
All of these are correct: (Individuals copy, use, and distribute software, Employees search organizational databases for sensitive corporate and personal information, Individuals hack into computer systems to steal proprietary information.) (All of the above are examples of acting unethically.)
Which of the following does a database maintain information on? -Inventory -Transactions -Employees -All of these are correct.
All of these are correct: (Inventory, Transactions, Employees) (A database maintains information on inventory, transactions, and employees.)
Which of the following is a challenge of outsourcing? -Length of contract -Threat to competitive advantage -Loss of confidentiality -All of these are correct.
All of these are correct: (Length of contract, Threat to competitive advantage, Loss of confidentiality) (All of the above are challenges of outsourcing.)
What is a project manager? -The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project. -Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. -Represents key dates when certain groups of activities must be performed. -An individual who is an expert in project planning and management.
An individual who is an expert in project planning and management. (A project manager is an individual who is an expert in project planning and management.)
Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption? -Only authorized individuals can access applications for which they are entitled. -Only authorized individuals can gain access to the network. -Individuals cannot understand or alter information while it is in transit. -All of these are correct.
All of these are correct: (Only authorized individuals can access applications for which they are entitled, Only authorized individuals can gain access to the network, Individuals cannot understand or alter information while it is in transit.) (All of these are reasons why businesses want to have the appropriate levels of authentication, access control, and encryption.)
Input device:
An input device is any hardware device that sends data to a computer, allowing one to interact with and control the computer, such as a keyboard or mouse.
Which of the following are the primary challenges to the ebusiness models? -Protecting customers -Adhering to taxation rules -Providing security -All of these are correct.
All of these are correct: (Protecting customers, Adhering to taxation rules, Providing security.) (All of the above are challenges to the ebusiness models.)
Which of the following is a common DSS analysis technique? -What-if analysis -Sensitivity analysis -Optimization analysis -All of these are correct.
All of these are correct: (What-if analysis, Sensitivity analysis, Optimization analysis) (All of the above are DSS analysis techniques.)
Which of the following is an example of a semistructured decision? -Who are our best customers by region? -Who are our best customers by sales representative? -Who are our best customers by product? -All of these are correct.
All of these are correct: (Who are our best customers by region? Who are our best customers by sales representative? Who are our best customers by product?) (All of the above are examples of semistructured decisions.)
Which of the following is considered an epolicy? -Acceptable use policy -Internet use policy -Ethical computer use policy -All of these are epolicies.
All of these are epolicies: (Acceptable use policy, Internet use policy, Ethical computer use policy) (All of the above are epolicies.)
Which of the following represents a form of disruptive technology? -Enters the marketplace at the low end. -Is a new way of doing things that initially does not meet the needs of existing customers. -Tends to open new markets and destroy old ones. -All of these are included.
All of these are included: (Enters the marketplace at the low end, Is a new way of doing things that initially does not meet the needs of existing customers, Tends to open new markets and destroy old ones.) (Disruptive technology (1) is a new way of doing things that initially doesn't meet the needs of existing customers, (2) tends to open new markets and destroy old ones, and (3) enters the marketplace at the low end and eventually evolves to displace high-end competitors and their reigning technologies.)
What can a model accomplish? -Calculate risks -Understand uncertainty -Manipulate time -All of these
All of these: (Calculate risks, Understand uncertainty, Manipulate time) (A model can do all of these.)
The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
Analysis
Which of the following is a phase in the SDLC? -RUP -Agile -Analysis -RAD
Analysis (Analysis is a phase in the SDLC.)
Which phase of the SDLC gathers business requirements? -Plan -Analysis -Test -Design
Analysis (Analysis phase gathers business requirements.)
What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks? -Transactional information -Quality -Analytical information -Timeliness
Analytical information (This is the definition of analytical information.)
What is a project deliverable? -A temporary endeavor undertaken to create a unique product or service. -The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project. -Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. -Represents key dates when a certain group of activities must be performed.
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. (This is the definition of project deliverables.)
What is an asset? -A distribution of earnings to shareholders -Refers to the amount earned resulting from the delivery or manufacture of a product or from the rendering of a service -Refers to the costs incurred in operating and maintaining a business -Anything owned that has value or earning power
Anything owned that has value or earning power (This is the definition of asset.)
Service-oriented __________ supports organizational computing needs with utility-based computing concepts.
Architecture
Intelligent systems:
Are a machines with an embedded, Internet-connected computer that has the capacity to gather and analyze data and communicate with other systems. Some examples of intelligent systems are digital signs, traffic signals and point of sale terminals.
Intelligent agents:
Are applications that perform repetitive tasks without being managed by a human, and can also referred to as robots, bots, or crawlers. Examples of intelligent agents can include email filters or automated online assistants.
Neural networks:
Are designed to imitate the physical thought process of the biological brain. Applications of neural networks can be found in medicine, science, and business. These networks help address problems with pattern classification, prediction and financial analysis, and control and optimization.
Genetic Algorithms:
Are programs designed for problem solving based off the evolution (survival of the fittest) process. An application of genetic algorithms would be to design the best jet turbine aircraft engine, where the process involves changing and reorganizing component parts of the engine in a computer simulation, after parts are changed or reorganized, the computer would measure which design yielded the best engine, then, the new design will repeat this evolution process again, continually, until the computers designs don't yield better results.
AI:
Artificial intelligence is the intelligence exhibited by machines or software. It is also the study of how to create computers and computer software that are capable of intelligent behavior.
What is a method for confirming users' identities? -Response -Prevention -Detection -Authentication
Authentication (This is the definition of authentication.)
What applies to businesses buying from and selling to each other over the Internet? -C2B -C2C -B2B -B2C
B2B (This is the definition of B2B.)
What applies to any business that sells its products or services to consumers over the Internet? -C2B -C2C -B2B -B2C
B2C (This is the definition of B2C.)
Which is a virus that opens a way into the network for future attacks? -Distributed denial-of-service attack -Worm -Denial-of-service attack -Backdoor programs
Backdoor programs (This is the definition of backdoor programs.)
Which of the following is a management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action? -Benchmarks -Efficiency IT metrics -Effectiveness IT metrics -Balanced scorecard
Balanced scorecard (The balanced scorecard is a management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action.)
What types of BI decisions include forecasting levels of bad loans and fraudulent credit card use, credit card spending by new customers, and which kinds of customers will best respond to new loan offers? -Retail and sales BI decisions -Banking BI decisions -Operations management BI decisions -Insurance BI decisions
Banking BI decisions (These are all types of banking BI decisions.)
Pilot implementation:
Begins with the small pilot groups of user on the new system.
__________ are baseline values the system seeks to attain.
Benchmarks
A(n) _____________ is another term for an online journal that allows users to post their own comments, graphics, and video.
Blog
What is an online journal that allows users to post their comments, graphics, and video? -Microwiki -Wiki -Blog -Mashup
Blog (A blog is an online journal that allows users to post their comments, graphics, and video.)
Which of the following identifies Business 2.0 communication and collaboration tools? -Microblogs, Tweets, RSS -API, RSS, tacit knowledge -Blogs, wikis, mashups -Tags, web logs, RSS
Blogs, wikis, mashups (Business 2.0 communication and collaboration tools include blogs, wikis, and mashups.)
What is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants can be easily interconnected using a short-range wireless connection? -WiMAX -Bluetooth -GIS -GPS
Bluetooth (This is the definition of Bluetooth.)
Where is the position of IT infrastructure within the organization? -Top -Middle -Bottom -Depends on the company as to the position of the IT infrastructure
Bottom (The IT infrastructure is on the bottom as displayed in the figure: the position of infrastructure within the organization.)
What is the point at which revenues equal costs? -Break-even point -Cash flow analysis -ROI -IRR
Break-even point (This is the definition of break-even point.)
Your boss, Tom Repicci, has asked you to analyze the airline industry using Porter's three generic strategies. Which of the following companies are using a differentiation strategy? -Southwest, Horizon, Frontier, and JetBlue. -British Airways, Singapore Airlines, and Virgin Atlantic. -Sky Taxi, a rent-by-the-hour personal plane service. -All of these.
British Airways, Singapore Airlines, and Virgin Atlantic. (British Airways, Singapore Airlines, and Virgin Atlantic all compete using differentiation strategies.)
Which of the following is one of Porter's three generic strategies? -Buyer power -Broad cost leadership -Value chain analysis -All of these are correct
Broad cost leadership (Cost leadership is one of Porter's three generic strategies.)
Which of the following is a business-facing process? -Marketing process -Sales process -Billing process -Budget forecasting
Budget forecasting (Budget forecasting is a business-facing process.)
Lands' End created an organization-wide data warehouse so all its employees could access organizational information. Lands' End soon found out that there could be "too much of a good thing." Many of its employees would not use the data warehouse, because it was simply too big, too complicated, and had too much irrelevant information. Lands' End knew there was valuable information in its data warehouse, and it had to find a way for its employees to easily access the information. What was Lands' End's solution? -Build a better, more efficient data warehouse. -Build a better, more efficient transactional database. -Build a data mart. -Build a data-driven website.
Build a data mart. (Lands' End chose to build data marts to fix its problem with too much information.)
An API is a set of routines, protocols, and tools for ______________. -building software applications -providing a visual interface for a web mashup -describing how products in a network work -writing and editing HTML
Building software applications (This is the definition of an API, or application programming interface.)
What is information that people use to support their decision-making efforts? -Information cleansing and scrubbing -Data-mining tools -Data mining -Business intelligence
Business intelligence (Business intelligence can provide managers with the ability to make better decisions.)
Information technology can enable departments to more efficiently and effectively perform their core _____________. -facts -feedback mechanisms -business operations -media issues
Business operations (Information technology can enable departments to more efficiently and effectively perform their business operations.)
Which of the following forces is commonly reduced through the use of a loyalty program? -Threat of new entrants -Rivalry among existing competitors -Supplier power -Buyer power
Buyer power (To reduce buyer power, an organization must make it more attractive for customers to buy from them than from their competition. One of the best IT-based examples is the loyalty program that many organizations offer.)
John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline, where they are allowed to set their own price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using? -C2C -B2B -C2B -B2C
C2B (C2B applies to any consumer who sells a product or service to a business on the Internet.)
The __________ is the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together.
CPU
What type of metrics includes number of prospective customers, number of new customers, and number of retained customers? -CRM metrics -SCM metrics -BPR metrics -ERP metrics
CRM metrics (CRM metrics or sales metrics include number of prospective customers, number of new customers, and number of retained customers.)
Virtual reality:
Can also be known as a virtual environment, and is essentially a three-dimensional computer generated environment which can be explored and interacted with by a person. A business application of virtual reality could include simulating business environments for training and orientation.
Value __________________ analysis is a highly useful tool in that it provides hard-and-fast numbers for evaluating the activities that add value to products and services.
Chain
Opt-out:
Choosing to deny permission to incoming emails.
Information _____________ activities include removing redundant records, fixing erroneous relationships, and fixing inaccurate data.
Cleansing
Information _____________ or scrubbing is the process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.
Cleansing
Which website metric measures the count of the number of people who visit a site, click on an ad, and are taken to the site of the advertiser? -Conversion rate -Unique visitors -Click-through -Page exposures
Click-through (This is the definition of the click-through metric.)
__________ computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Cloud
Which company was the victim of a distributed denial-of-service (DDoS) attack that forced the company to close operations and to eventually transfer over 2,500 customers to a rival organization? -Marks & Spencer -Public Broadcasting Service -CloudNine Communications -The Gap
CloudNine Communications (CloudNine Communications was the victim of a DDoS.)
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's Five Forces Model. Which of the following represents rivalry in the soft drink industry? -Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. -Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. -Zevia Natural Diet Soda begins selling directly over the Internet. -Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games.
Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games. (The rivalry between Coke and Pepsi is famous in the soft drink industry.)
Which of the following is not one of the four gates in the RUP methodology? -Inception -Collaboration -Construction -Transition
Collaboration (Elaboration is the other gate in RUP, not collaboration.)
What is the act of conforming, acquiescing, or yielding? -Governance -Geopolitical -Compliance -HIPPA
Compliance (This is the definition of compliance.)
Time bombs:
Computer viruses that wait for a specific date before executing their instructions.
What is one of the primary reasons for the increase in Internet use? -Reorganization -Reorganization restructuring -Organizational restructuring -Connectivity technology
Connectivity technology (One of the primary reasons for the increase in Internet uses is the increase in connectivity technology.)
Which of the following implies that aggregate or summary information is in agreement with detailed information? -Consistency -Accuracy -Uniqueness -Completeness
Consistency (This is the definition of consistency.)
Web log:
Consists of one line of information for every visitor to a website and is usually stored on a web server.
Which gate in the RUP methodology includes building and developing the product? -Inception -Elaboration -Construction -Transition
Construction (Construction includes building and developing the product.)
Internet use policy:
Contains general principles to guide the proper use of the Internet.
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information? -Biometrics -Encryption -Firewalls -Content filtering
Content filtering (This is the definition of content filtering.)
Cheryl Steffan is the operations manager for Nature's Bread Company, which specializes in providing natural products for health-conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of a piece of data Cheryl would be using to successfully perform her job? -Craig Newmark customer number is 15467. -Compare the costs of supplies, including energy, over the last five years to determine the best-selling product by month. -Best-selling product by day. -Best-selling product changes when Tony, the best baker, is working.
Craig Newmark customer number is 15467. (Data are raw facts that describe the characteristics of an event or object. Data for Cheryl would include 'Craig Newmark customer number is 15467'.)
(Porter's Generic Strategies for Competitive Advantage) Differentiation (Broad scope):
Creating uniquely desirable products and services.
Successful companies operate ______________, integrating the operations of all departments. -independently -cross-functionally -departmentally -dependently
Cross-functionally (Successful companies operate cross-functionally, integrating the operations of all departments.)
A ________ is the common term for the representation of multidimensional information.
Cube
Which of the following is not a valid way that a CRM system can collect information? -Accounting system. -Order fulfillment system. -Inventory system. -Customer's personal computer.
Customer's personal computer. (A CRM system cannot collect information from a customer's personal computer.)
Which of the following is not one of the four primary information technology areas where businesses are focusing in the 21st century? -IT infrastructures -Security -DBMS -Ebusiness
DBMS (DBMS is not the primary focus for IT in the 21st century.)
Which of the below represents a variable? -Data converted into a meaningful and useful context -Data characteristic that stands for a value that changes or varies over time -Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making -Skills, experience, and expertise, coupled with information and intelligence that creates a person's intellectual resources
Data characteristic that stands for a value that changes or varies over time (A variable is a data characteristic that stands for a value that changes or varies over time.)
Which of the below represents information? -Data converted into a meaningful and useful context -Data characteristic that stands for a value that changes or varies over time -Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making -Skills, experience, and expertise, coupled with information and intelligence that creates a person's intellectual resources
Data converted into a meaningful and useful context (Information is data converted into a meaningful and useful context.)
What is the primary problem most organizations face today concerning information? -Business intelligence rich, information rich -Data poor, information rich -Business intelligence poor, information rich -Data rich, information poor
Data rich, information poor (Data rich, information poor is the primary problem most organizations face today concerning information.)
What type of website is best to build for a continually changing information, including press releases, new product information, and updated pricing? -Data-driven website -Static website -Relational website -All of these
Data-driven website (For a website with continually changing information, such as press releases, new product information, and updated pricing, it is best to build a data-driven or dynamic website.)
What is an interactive website that is kept constantly updated and relevant to the needs of its customers using a database? -Data-driven website -Data warehouse -Data mart -Data cube
Data-driven website (This is the definition of data-driven website.)
The Victory Wireless store in Denver is currently offering a fabulous marketing strategy for potential new iPhone customers. Victory Wireless offers customers who purchase an iPhone with a two-year subscription a free OtterBox phone case, car charger, ear phones, and speakers. In terms of Porter's Five Forces, what is Victory Wireless attempting to achieve with this marketing strategy? -Increase buyer power. -Increase substitute products. -Decrease supplier power. -Decrease buyer power.
Decrease buyer power. (Victory Wireless is attempting to decrease buyer power by offering products at a lower price or competing on price.)
Project ___________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
Deliverables
Which company is expected to gain the majority of its returns on new investments? -General Motors -Sears Roebuck -Dell -Phillips Petroleum
Dell (According to the disruptive versus sustaining technologies figure, Dell is expected to gain the majority of its returns from new investments.)
What floods a website with so many requests for service that it slows down or crashes the site? -Denial-of-service attack -Spoofing -Sniffer -Trojan-horse virus
Denial-of-service attack (This is the definition of denial-of-service attack.)
Operating cross-functionally means integrating the operations of all ________. -knowledge workers -managers -computers -departments
Departments
What is a geographic information system (GIS)? -A device that determines current latitude, longitude, speed, and direction of movement -Contains a microchip and an antenna, and typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag -Designed to work with information that can be shown on a map -Commonly used to transmit network signals over great distances
Designed to work with information that can be shown on a map (This is the definition of GIS.)
Which computer offers both a horizontal and vertical system box and is usually placed on a desk or on the floor within a work area? -Minicomputer -Mainframe computer -Desktop computer -None of the above
Desktop computer (This is explained in the desktop computer category.)
Which of the following represents the different information granularities? -Detail, summary, aggregate -Document, presentation, spreadsheet, database -Individual, department, enterprise -None of these
Detail, summary, aggregate (The different information granularities include detail, summary, and aggregate.)
Information security plan:
Details how an organization will implement the information security policies.
Email privacy policy:
Details the extent to which email messages may be read by others.
An output _________ is equipment used to see, hear, or otherwise accept the results of information processing requests.
Device
Product __________________ occurs when a company develops unique differences in its products with the intent to influence demand.
Differentiation
Which of the following is not a reason for the explosive growth of the WWW? -Basic web pages are easy to create and extremely flexible. -The microcomputer revolution made it possible for an average person to own a computer. -Digital Darwinism. -The speed, convenience, and low cost of email.
Digital Darwinism (Following are some of the reasons for the growth of the World Wide Web. (1) The microcomputer revolution made it possible for an average person to own a computer. (2) Advancements in networking, hardware, software, and media made it possible for business computers to be connected to larger networks at a minimal cost. (3) Browser software gave computer users an easy-to-use interface to download, find, and display web pages. (4) Email is fast, convenient, and cheap. (5) Basic web pages are easy to create and extremely flexible. **Digital Darwinism implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.)
What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs? -What-if analysis -Sensitivity analysis -Digital dashboard -Drill-down dashboard
Digital dashboard (This is the definition of digital dashboard.)
What integrates information from multiple components and tailors the information to individual preferences? -Drill-down -Sensitivity analysis -What-if analysis -Digital dashboard
Digital dashboard (This is the definition of digital dashboards.)
What is the innovator's dilemma? -A new way of doing things that initially does not meet the needs of existing customers -Produces an improved product that customers are eager to buy, such as a faster car or larger hard drive -Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction -Discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders
Discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders (This is the definition of innovator's dilemma.)
The Innovator's Dilemma suggests that established companies can take advantage of ___________ without hindering existing relationships with customers, partners, and stakeholders. -sustaining technologies -existing investments -collective intelligence -disruptive technologies
Disruptive technologies (The book "The Innovator's Dilemma" discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders.)
Walmart and Procter & Gamble implemented a tremendously successful SCM system. The system linked Walmart's _____________ centers directly to Procter & Gamble's _____________ centers. -manufacturing; distribution -distribution; manufacturing -stores; distribution -distribution; retail
Distribution; manufacturing (Walmart's distribution centers are linked directly to Procter & Gamble's manufacturing centers.)
Dumpster ___________ is a form of social engineering when a hacker looks through people's trash to find personal information.
Diving
Which of the following is not one of the tenets in the Agile Alliance's manifesto? -Satisfy the customer through early and continuous delivery of valuable software. -Do not allow changing requirements, especially late in development. -Business people and developers must work together daily throughout the project. -All of these.
Do not allow changing requirements, especially late in development (The manifesto states that projects should welcome changing requirements, even late in development.)
Which of the following represents the different information formats? -Detail, summary, aggregate -Document, presentation, spreadsheet, database -Individual, department, enterprise -None of these
Document, presentation, spreadsheet, database (The different information formats include document, presentation, spreadsheet, and database.)
What company monitors the operation of its vending machines via wireless technology? -United Parcel Service -Amazon -FedEx -Dr Pepper/Seven Up Inc.
Dr Pepper/Seven Up Inc. (Dr Pepper/Seven Up Inc. monitors the operation of its antenna-equipped vending machines via wireless technology.)
Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems? -TPS, DSS, EIS -DSS, TPS, EIS -EIS, DSS, TPS -None of these. It varies from organization to organization.
EIS, DSS, TPS (Executive information systems, decision support systems, and transaction processing systems are the top-down organizational levels of information technology systems.)
What is the buying and selling of goods and services over the Internet? -Emarket -Emall -Ebusiness -Ecommerce
Ecommerce (This is the definition of ecommerce.)
What is the difference between ecommerce and ebusiness? -Ecommerce includes Internet network effects. Ebusiness includes ecommerce and all activities related to internal and external business operations. -Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations. -Ecommerce includes ecommerce and all activities related to internal and external business operations. Ebusiness includes all of the of knowledge management systems. -Ebusiness is buying and selling of goods or service online. Ecommerce includes ecommerce and all activities related to internal and external business operations.
Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations. (Ecommerce is the buying and selling of goods and services over the Internet and refers only to online transactions. Ebusiness includes ecommerce along with all activities related to internal and external business operations, such as servicing customer accounts, collaborating with partners, and exchanging real-time information.)
Which of the following measures the impact IT has on business processes and activities including customer satisfaction, conversion rates,and sell-through increases? -Benchmarks -Efficiency IT metrics -Effectiveness IT metrics -Key performance indicators
Effectiveness IT metrics (Effectiveness IT metrics measure the impact IT has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases.)
_________ focuses on the extent to which an organization is using its resources in an optimal way.
Efficiency
Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it. -Inception -Elaboration -Construction -Transition
Elaboration (Elaboration provides a rough order of magnitude.)
The __________ Communications Privacy Act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
Electronic
What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards? -Telematics -Electronic tagging -Mobile commerce -None of these are correct.
Electronic tagging (This is the definition of electronic tagging.)
Which of the following is one of the six ebusiness tools for connecting and communicating? -Email -Disintermediation -Universal resource locator -Web personalization
Email (Email is one of the six ebusiness tools for connecting and communicating.)
Which of the following is not an example of explicit knowledge? -Patent -Trademark -Employee opinion -Marketing research
Employee opinion (Examples of explicit knowledge include patents, trademarks, business plans, marketing research, and customer lists.)
What is drill-down capability? -Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information. -The ability to look at information from different perspectives. -Enables users to get details, and details of details, of information. -Finds the inputs necessary to achieve a goal, such as a desired level of output.
Enables users to get details, and details of details, of information. (This is the definition of drill-down.)
Susan teaches many individuals and business professionals how and why to use social media, and the benefits and challenges to using social media. Of the four ebusiness challenges, which of the following is the most crucial challenge to consider before engaging in social media? -Adhering to taxation rules -Ensuring consumer protection -Identifying limited market segments -Managing consumer relationships
Ensuring consumer protection (Of the four ebusiness challenges, ensuring consumer protection is the most crucial challenge to consider before engaging in social media sites.)
___________ resource planning systems integrate all departments and functions throughout an organization into a single IT system.
Enterprise
What in the relational database model is a person, place, thing, transaction, or event about which information is stored? -Attribute -Attribute class -Entity -Entity class
Entity (This is the definition of entity.)
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents supplier power in the music industry? -Established record labels like EMI, Sony, and Universal. -Walmart, Target, iTunes. -Game systems like Wii and social networks like Facebook. -Taylor Swift, Beyonce, The Beatles, and The Rolling Stones.
Established record labels like EMI, Sony, and Universal (An example of supplier power in the music industry includes established record labels like EMI, Sony, and Universal.)
___________ are the principles and standards that guide our behavior toward other people.
Ethics
Information management:
Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
Daisy chain network topology:
Except for star-based networks, the easiest way to add more computers into a network is by daisy-chaining, or connecting each computer in series to the next.
Which of the following is the most commonly used form of AI in the business arena? -Intelligent system -Artificial intelligence -Expert system -Neural network
Expert system (Expert systems are the most common.)
What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS department? -Tacit knowledge -Explicit knowledge -Pure knowledge -Virtual knowledge
Explicit knowledge (This is the definition of explicit knowledge.)
What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete? -RAD methodology -Agile methodology -Waterfall methodology -Extreme programming
Extreme programming (This is the definition of extreme programming.)
XP:
Extreme programming breaks a project into tiny phases and develops cannot continue on to the next phase until the current phase is complete. XP divides its phases into a set of instructions that are to be repeated.
Copyright laws protect collaborative websites like blogs and wikis, allowing users to reuse material freely and easily. -True -False
False (Copyright infringement is a challenge of the online world, and business 2.0 is seeing more cases and problems with it online.)
Web 3.0 refers to static text-based information websites. -True -False
False (Web 1.0 refers to static text-based information websites, Web 2.0 is about user-contributed content, and Web 3.0 is based on "intelligent" web applications using natural language processing, machine-based learning and reasoning, and intelligent applications.)
What refers to the technology associated with the transmission of information as light impulses along a glass wire or fiber? -Twisted pair -Coaxial cable -Fiber optic -All of these are correct.
Fiber optic (This is the definition of fiber optic.)
What website was the primary catalyst for growing electronic government and is the official U.S. gateway to all government information? -Government.gov -TheUnitedStatesofAmerica.org -TheWhiteHouse.com -FirstGov.gov
FirstGov.gov (The website that was the primary catalyst for growing electronic government and is the official U.S. gateway to all government information is FirstGov.gov.)
Which of the following is one of Porter's three generic strategies? -Supplier power -Focused strategy -Value chain analysis -Business process
Focused strategy (Focused strategy is one of Porter's three generic strategies.)
Organizational information comes in different levels, ___________, and granularities.
Formats
Which act allows any person to examine government records unless it would cause an invasion of privacy? -Freedom of Information Act -Bork Bill -Privacy Act -USA Patriot Act
Freedom of Information Act (The Freedom of Information Act allows any person to examine government records unless it causes an invasion of privacy.)
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents the threat of substitute products or services in the music industry? -Established record labels like EMI, Sony, and Universal. -Independent record labels. -Game systems like Wii and social networks like Facebook. -Taylor Swift, Beyonce, The Beatles, and The Rolling Stones.
Game systems like Wii and social networks like Facebook. (Game systems like Wii and social networks offer alternatives or substitute products to purchasing music for a consumer.)
Adware software:
Generates ads that install themselves on a computer when a person downloads some other program from the Internet.
What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem? -Intelligent system -Artificial intelligence -Neural network -Genetic algorithm
Genetic algorithm (This is the definition of genetic algorithm.)
What refers to the effects of geography on the economic realities of international business activities? -Geoeconomic -Geopolitical -Virtual -All of the above
Geoeconomic (This is the definition of geoeconomic.)
GIS:
Geographical Information Systems are software programs that use the mapped information collected from the GPS satellites and can capture, store, manipulate, analyze, manage, and present all types of spatial or geographical data.
GPS:
Global Positioning Systems use satellites that orbit the Earth to collect and send information to GPS receivers on the ground. The information helps others to determine their location.
What finds the inputs necessary to achieve a goal, such as a desired level of output? -Drill-down -Sensitivity analysis -What-if analysis -Goal-seeking analysis
Goal-seeking analysis (This is the definition of goal-seeking analysis.)
Which of the following companies is an example of a pure-play or virtual business? -Barnes & Noble -Google -T. J. Maxx -All of these are correct.
Google (Google is an example of a pure-play business.)
What is a method or system of government for management or control? -Governance -Geopolitical -Compliance -HIPPA
Governance (This is the definition of governance.)
Internet censorship:
Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
__________ refers to the level of detail in the model or the decision-making process.
Granularity
Social engineering:
Hackers use their social skills to trick people into revealing access credentials or other valuable information.
All of the following are scientific methods organizations use to anticipate, forecast, and assess the future, except: -computer simulation. -historical simulation. -trend analysis. -historical analysis.
Historical simulation. (Trend analysis, trend monitoring, trend projection, computer simulation, and historical analysis are the scientific methods organizations use to anticipate, forecast, and assess the future.)
(Porter's Five Forces Analysis) Threat of Substitutes:
How easy it is for consumers to switch from a business's product or service to that of a competitor.
(Porter's Five Forces Analysis) Threat of New Entrants:
How easy or difficult it is for competitors to join the marketplace in a given industry.
(Porter's Five Forces Analysis) Competitive Rivalry:
How intense the competition currently is in the marketplace.
(Porter's Five Forces Analysis) Supplier Power:
How much power a business's supplier has and how much control it has over the potential to raise its prices.
Hybrid network topology:
Hybrid networks use a combination of any two or more topologies, in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).
What allows web browsers and servers to send and receive web pages? -File transfer protocol (FTP) -Simple mail transfer protocol (SMTP) -Hypertext transfer protocol (HTTP) -Simple network management protocol (SNMP)
Hypertext transfer protocol (HTTP) (This is HTTP.)
________ infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
IT
Information security policies:
Identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.
The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.
Implementation
Phased implementation:
Implements the new system in phases.
One hundred percent complete and accurate information is _____________.
Impossible
Which of the following is true in regard to eliminating redundant information? -Uses additional hard disk space. -Makes performing information updates harder. -Improves information quality. -All of these.
Improves information quality. (Eliminating redundant information improves the quality of the information, uses less hard disk space, and makes performing updates easier.)
Node:
In communication networks, a node is either a connection point, a redistribution point, or a communication endpoint (e.g. data terminal equipment).
Bus network topology:
In local area networks where bus topology is used, each node is connected to a single cable, by the help of interface connectors. This central cable is the backbone of the network and is known as the bus.
Star network topology:
In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.
What can effective and efficient supply chain management systems enable an organization to accomplish? -Increase the power of its buyers. -Increase its supplier power. -Increase switching costs to increase the threat of substitute products or services. -All of these.
Increase its supplier power. (Answer A should state "decrease" the power of its buyers, and answer C should state "reduce" the threat of substitute products or services.)
All of the following are advantages of database-stored information, except: -Increased information redundancy -Increased scalability and performance -Increased information integrity -Increased flexibility
Increased information redundancy (Database-stored information reduces information redundancy.)
Which of the following is a business-related consequence of successful software? -Increased revenues -Damage to brand reputation -Incurred liabilities -All of these
Increased revenues (Increased revenues is a consequence of software success.)
Customer relationship management involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention. How does CRM ultimately impact an organization? -Changes the manufacturing process -Improves employee satisfaction -Increases profitability -Improves the supply chain
Increases profitability (Customer relationship management involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.)
Kevin Campbell is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses, and he also needs to purchase a rather expensive laptop. In an effort to save money, Kevin begins a Facebook group finding other college students who need to purchase laptops. Soon, Kevin's Facebook group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops? -Collecting business intelligence. -Decreasing entry barriers. -Purchasing a substitute product. -Increasing buyer power.
Increasing buyer power. (Buyer power is one of Porter's Five Forces, which measures the ability of buyers to affect the price they must pay for an item. Kevin's group is attempting to increase their buyer power.)
Which of the following represents the different information levels? -Detail, summary, aggregate -Document, presentation, spreadsheet, database -Individual, department, enterprise -None of these
Individual, department, enterprise (The different information levels include individual, department, and enterprise.)
Analytical ____________ encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks.
Information
Management __________ systems is a business function, like accounting or human resources, that moves information about people, products, and processes across the company to facilitate decision making and problem solving.
Information
Which of the following is the key element supply chain management manages? -Products -Information -Competitors -Suppliers
Information (The key element supply chain management systems manage is information flows between and among stages in a supply chain.)
Which of the following represents business intelligence? -Data converted into a meaningful and useful context -Data characteristic that stands for a value that changes or varies over time -Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making -Skills, experience, and expertise, coupled with information and intelligence that creates a person's intellectual resources
Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making (Business intelligence is information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making.)
Which of the following is incorrect in reference to a database? -Can be relational or network. -Information is accessed by logical structure. -Information is accessed by physical structure. -Users can access different views of information.
Information is accessed by physical structure. (A database accesses information by logical structure and stores information by physical structure.)
A relational database contains information in a series of two-dimensional tables. How is data contained in a data warehouse and data mart? -Information is multidimensional, meaning it contains a single layer of data in a table format. -Information is two-dimensional, meaning it contains a single layer of data in a table format. -Information is two-dimensional, meaning it contains layers of columns and rows. -Information is multidimensional, meaning it contains layers of columns and rows.
Information is multidimensional, meaning it contains layers of columns and rows. (Information in a data warehouse is multidimensional, meaning it contains layers of columns and rows.)
Decryption:
Information is to decode it and is the opposite of encrypt.
Which policy contains general principles regarding information privacy? -Acceptable use policy -Information privacy policy -Internet use policy -None of these are correct.
Information privacy policy (This is the definition of information privacy policy.)
What measures the number of people a firm can communicate with all over the world? -Mass customization -Personalization -Information reach -Information richness
Information reach (This is the definition of information reach.)
Which of the following refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information? -Information richness -Information reach -Information system -Personalization
Information richness (Information richness refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.)
Which of the following is a key challenge associated with Business 2.0? -Technology independence -Information vandalism -Copyright independence -All of these are correct.
Information vandalism (Information vandalism, technology dependence, and violations of copyright are key challenges associated with Business 2.0.)
What is equipment used to capture information and commands? -Output device -Input device -Storage device -Telecommunications device
Input device (This is the definition of input device.)
Which of the following is not a form of outsourcing? -Onshore outsourcing -Offshore outsourcing -Nearshore outsourcing -Inshore outsourcing
Inshore outsourcing (Inshore outsourcing does not exist.)
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident? -Hactivists -Social engineering -Viruses -Insiders
Insiders (This is the definition of insiders.)
What allows separate systems to communicate directly with each other? -Relational database model -Data-driven website -DBMS -Integration
Integration (Integration allows separate systems to communicate directly with each other.)
What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users? -Artificial intelligence -Intelligent systems -Intelligent agent -Neural network
Intelligent agent (This is the definition of intelligent agent.)
What is a special-purpose, knowledge-based information system that accomplishes specific tasks on behalf of its users? -Intelligent system -Artificial intelligence -Neural network -Intelligent agent
Intelligent agent (This is the definition of intelligent agent.)
What are various commercial applications of artificial intelligence called? -Drill-down -Sensitivity analysis -Digital dashboard -Intelligent systems
Intelligent systems (This is the definition of intelligent systems.)
When evaluating the business value of disintermediation, the more ____________ that are cut from the distribution chain, the lower the product price. -technologies -customers -data streams -intermediaries
Intermediaries (When evaluating the business value of disintermediation, the more intermediaries that are cut from the distribution chain, the lower the product price.)
Which of the following is not a typical CRM metric? -Sales metrics -Service metrics -Marketing metrics -Inventory metrics
Inventory metrics (CRM metrics measure sales, services, and marketing metrics.)
What is the analysis phase in the SDLC? -Involves establishing a high-level plan of the intended project and determining project goals. -Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system. -Involves describing the desired features and operations of the system. -Involves placing the system into production so users can begin to perform actual business operations with the system.
Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system. (This is the definition of the analysis phase.)
What is the design phase in the SDLC? -Involves establishing a high-level plan of the intended project and determining project goals. -Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system. -Involves describing the desired features and operations of the system. -Involves placing the system into production so users can begin to perform actual business operations with the system.
Involves describing the desired features and operations of the system. (This is the definition of the design phase.)
What is the implementation phase in the SDLC? -Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation -Involves placing the system into production so users can begin to perform actual business operations with the system -Involves establishing a high-level plan of the intended project and determining project goals -Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system
Involves placing the system into production so users can begin to perform actual business operations with the system (This is the definition of the implementation phase.)
Hub:
Is a component of a network, a high- degree node. It refers to a node that has significantly bigger number of links in comparison with other nodes in the network.
Object-oriented database management system:
Is a database management system in which information is represented in the form of objects as used in object-oriented programming. Object databases are different from relational databases which are table-oriented.
Agile methodology:
Is a form of XP which aims for customer satisfaction through early and continuous delivery of useful software components.
Worm:
Is a standalone malware computer program that replicates itself in order to spread to other computers.
Infrastructure architecture:
Is a structured approach of shaping infrastructure to optimally support an organization.
Jitter:
Is a variation in packet transit delay caused by queuing, contention and serialization effects on the path through the network. In general, higher levels of jitter are more likely to occur on either slow or heavily congested links, and are often referenced in relation to a clock source.
Extranet:
Is a website which allows controlled access to partners, vendors and suppliers or to an authorized set of customers, normally to a subset of the information accessible from an organization's intranet.
Fuzzy logic:
Is able to create rules by inferring knowledge from imprecise, uncertain, or unreliable information and consist of a series of if-then rules. An application of fuzzy logic would to develop a system to detect possible fraud in medical claims submitted by healthcare providers.
Telecommunications device:
Is an electronic device used for communication via a telecommunications network, such as: cell phones, TVs, radios or computers.
Trojan horse:
Is any malicious computer program which misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it.
Output device:
Is any peripheral that receives data from a computer, usually for display, projection, or physical reproduction, such as a monitor or printer.
Bandwidth:
Is commonly measured in bits/second is the maximum rate that information can be transferred.
Explicit knowledge:
Is knowledge that can be readily searched, articulated, codified, accessed and verbalized.
Data mart:
Is the access layer of the data warehouse environment that is used to get data out to the users. The data mart is a subset of the data warehouse that is usually oriented to a specific business line or team. Data marts are small slices of the data warehouse.
Throughput:
Is the amount of material or items passing through a system or process.
Latency:
Is the delay from input into a system to desired outcome.
What is one of the biggest pitfalls associated with real-time information? -It continually changes. -It is only available to high-level executives due to the -expense. -It is only available in aggregate levels of granularity. -All of these are correct.
It continually changes. (Information continually changes, and this can cause issues with real-time information.)
Tacit Knowledge:
It is sometimes referred to as know-how or the knowledge found in people's heads and refers to intuitive, hard to define knowledge that is largely experience based.
One of the most famous examples of wiki vandalism occurred when a false biography entry stated which of the following? -Michael Jackson and Madonna were siblings. -JFK and Robert Kennedy were the same person. -John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy's assassination as well as JFK's. -Madonna and Britney Spears are sisters.
John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy's assassination as well as JFK's. (One of the most famous examples of wiki vandalism occurred when a false biography entry read that John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy's assassination as well as JFK's. Seigenthaler was an assistant to Robert, but was not involved in either of the assassinations.)
What kind of society is being created by the growth in information industries? -Knowledge-independent local society -Knowledge-independent global society -Knowledge-dependent local society -Knowledge-dependent global society
Knowledge-dependent global society (The growth in information industries is creating a knowledge-dependent global society.)
What is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home? -MAN -WAN -LAN -All of these are correct.
LAN (This is the definition of LAN.)
Insiders:
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership? -Limited partnership -Limited liability corporation -Limited proprietorship -Limited shareholder
Limited liability corporation (This is the definition of an LLC.)
Dumpster diving:
Looking through people's trash is another way hackers obtain information.
Which of the following is the most common function outsourced? -MIS -HR -Finance -Marketing/sales
MIS (MIS is the most common function outsourced.)
MIS can be an important enabler of business success and innovation. Which of the below statements is accurate when referring to MIS? -MIS equals business success and innovation. -MIS represents business success and innovation. -MIS is not a valuable tool that leverages talent. -MIS is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.
MIS is a valuable tool that can leverage the talents of people who know how to use and manage it effectively. (MIS does not equal or represent business success and innovation. It is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.)
Which of the following is typically performed by the sales or marketing department? -Manage enterprise-wide processes. -Maintain employment policies. -Manage cross-enterprise processes. -Maintain transactional data.
Maintain transactional data. (Sales and marketing departments focus on moving goods or services into the hands of the consumers and maintain transactional data.)
The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.
Maintenance
Supply chain ____________ involves managing information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability.
Management
MIS:
Management information systems focus on the management of information systems to provide efficiency and effectiveness of strategic decision making.
A project ___________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.
Manager
Which of the following is not one of Porter's Five Forces? -Manager power -Supplier power -Threat of substitute products or services -Threat of new entrants
Manager power (Manager power is not one of Porter's Five Forces.)
Which of the following is a type of decision support system? -Order processing -Inventory tracking -Manufacturing -All of these
Manufacturing (Manufacturing is a type of decision support system.)
Which of the following is the least common function outsourced? -IT -HR -Finance -Marketing/sales
Marketing/sales
M&M's offers people the opportunity to order the candy in special colors or with customized sayings. How would you classify M&M's ebusiness strategy? -Information richness -Mass customization -Personalization -Interactivity
Mass customization (M&M's offers people the opportunity to order the candy in special colors or with customized sayings, which is an example of mass customization.)
Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike's ebusiness strategy? -Information richness -Mass customization -Personalization -Interactivity
Mass customization (Nike's customized shoes are an example of mass customization.)
What is roughly 1 million bytes? -Megabyte -Terabyte -Kilobyte -Gigabyte
Megabyte (This is the definition of a megabyte.)
A(n) _____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
Methodology
A(n) __________ is a standard measure to assess performance in a particular area.
Metric
Which of the following is not an advantage of building a data-driven website? -Minimizes human error. -Cuts production and update costs. -Improves or maximizes stability. -Minimizes or reduces efficiency.
Minimizes or reduces efficiency. (A data-driven website adds more efficiency; it does not minimize or decrease efficiency.)
The terms ____________ and wireless are often used synonymously but actually denote two different technologies.
Mobile
What is the ability to purchase goods and service through a wireless Internet-enabled device? -Semantic Web -WWW -Egovernment -Mobile business
Mobile business (Mobile business is the ability to purchase goods and service through a wireless Internet-enabled device.)
What is the ability to purchase goods and services through a wireless Internet-enabled device? -Telematics -Electronic tagging -Mobile commerce -None of these are correct.
Mobile commerce (This is the definition of mobile commerce.)
What means a technology can travel with the user? -Mobile technologies -Wireless technologies -WiMax technologies -wLAN technologies
Mobile technologies (Mobile technologies can travel with the user, but it is not necessarily in real time.)
An ebusiness __________ is an approach to conducting electronic business by which a company can become a profitable business on the Internet.
Model
Which of the below is not a characteristic associated with Mozilla's Firefox? -Mozilla's Firefox holds over 20 percent of the web browser market. -Mozilla's Firefox offers a free email service called Thunderbird. -Mozilla's Firefox is a prime example of open source software. -Mozilla's Firefox is a prime example of a reputation system.
Mozilla's Firefox is a prime example of a reputation system. (The web browser Mozilla Firefox now holds over 20 percent of the web browser market, offers a free email service called Thunderbird, and is open source software.)
According to Christensen, companies may have placed too great an emphasis on satisfying customers' current ___________, while forgetting to adopt new disruptive technology that will meet customers' future needs.
Needs
A(n) ____________ is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together.
Network
What is a category of AI that attempts to emulate the way the human brain works? -Intelligent system -Artificial intelligence -Expert systems -Neural network
Neural network (This is the definition of neural network.)
Which of the following is similar to focused strategy versus broad strategy? -Large market versus leadership. -Large market versus uniqueness. -Niche market versus large market. -Niche market versus generic.
Niche market versus large market. (Focused strategies versus broad strategies is synonymous to niche market versus large market.)
(Porter's Generic Strategies for Competitive Advantage) Cost Leadership (Broad scope):
No frills, offering the lowest cost of operation in the industry.
What part of the CPU performs all arithmetic operations and all logic operations? -Control unit -RAM -Speed -None of the above
None of the above: (Control unit, RAM, Speed) (The control unit executes all instructions, whereas the ALU performs all mathematical and logical operations.)
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets? -Enterprise architect -Information architecture -Infrastructure architecture -None of these are correct.
None of these are correct: (Enterprise architect, Information architecture, Infrastructure architecture) (This is the definition of MIS architecture.)
What do data warehouses support? -OLAP -Analytical processing -OLTP -OLAP and analytical processing
OLAP and analytical processing (Data warehouses support analytical processing and OLAP is a type of analytical processing.)
OLAP (On-line Analytical Processing):
OLAP databases are suited for analytics and data mining (data warehouses).
OLTP (On-line Transaction Processing):
OLTP databases are used to perform many small transactions.
(Porter's Generic Strategies for Competitive Advantage) Focus (Narrow scope):
Offering a specialized service in a niche market. This area of narrow scope also includes Cost Focus, which means emphasizing cost-minimization within a focused market, and Differentiation Focus, which means pursuing strategic differentiation within a focused market.
What is it called when a company uses organizations from developing countries to write code and develop systems? -Insourcing -Outsourcing -Business process outsourcing -Offshore outsourcing
Offshore outsourcing (This is the definition of offshore outsourcing.)
What is using organizations from developing countries to write code and develop systems? -Outsourcing -Business process outsourcing -Insourcing -Offshore outsourcing
Offshore outsourcing (This is the definition of offshore outsourcing.)
Nonrepudiation is a contractual stipulation to ensure that ebusiness participants do not deny their ___________ actions.
Online
What is the outsourcing option that includes the closest location and direct customer control? -Offshore outsourcing -Nearshore outsourcing -Onshore outsourcing -None of these are correct.
Onshore outsourcing (Onshore outsourcing offers the closest location and direct customer control.)
What is it called when you engage another company within the same country for services? -Outsourcing -Business process outsourcing -Insourcing -Onshore outsourcing
Onshore outsourcing (This is the definition of onshore outsourcing.)
What refers to any source code made available freely for any third party to review or modify? -Open system -Open source -User-contributed content -Collaboration software
Open source (Open source software refers to any source code made available freely for any third party to review or modify.)
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system? -Management system -Reputation system -Knowledge system -Open system
Open system (This is the definition of an open system.)
Which type of software supports the application software and manages how the hardware devices work together? -System software -Utility software -Application software -Operating system software
Operating system software (This is the definition of operating system software.)
Greg works for Geneva Steel Corporation. Greg's duties include managing the overall processes for the company and transforming the steel resources into goods. Which department would Greg most likely work in? -Accounting Manager. -Operations Manager. -Marketing Manager. -CIO.
Operations Manager. (Operations management manages the process of converting or transforming resources into goods or services.)
Which of the following is a type of transaction processing system? -Order processing -Sales -Manufacturing -Transportation
Order processing (Order processing is a transaction processing system.)
Which of the following is a customer-facing process? -Strategic planning -Order shipping -Training -Tactical planning
Order shipping (Order shipping is a customer-facing process.)
___________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
Outsourcing
What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house? -Project management -Insourcing -Outsourcing -None of these are correct.
Outsourcing (This is the definition of outsourcing.)
RFID uses active or ________ tags in the form of chips or smart labels.
Passive
Which of the following is not a reason for the growth of decision-making information systems? -People need to analyze large amounts of information. -People must make decisions quickly. -People must apply sophisticated analysis techniques to make good decisions. -People no longer have to worry about protecting the corporate asset of organizational information.
People no longer have to worry about protecting the corporate asset of organizational information. (People must protect the corporate asset of organizational information; it is one of their competitive advantages.)
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's Five Forces Model. Which of the following represents supplier power in the soft drink industry? -Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. -Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. -Zevia Natural Diet Soda begins selling directly over the Internet. -Vitamin water, fruit juice, and coffee.
Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. (Supplier power in the soft drink industry is represented by Pepsi.)
What measures how quickly a system performs a certain process or transaction? -Redundancy -Information integrity -Scalability -Performance
Performance (This is the definition of performance.)
A __________ area network provides communication over a short distance that is intended for use with devices that are owned and operated by a single user.
Personal
___________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.
Personalization
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy? -Information richness -Mass customization -Personalization -Interactivity
Personalization (Amazon uses personalization to create unique recommendations for each customer.)
Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix's ebusiness strategy? -Information richness -Mass customization -Personalization -Interactivity
Personalization (Netflix uses personalization to create unique recommendations for each customer.)
Which company is expected to gain the majority of its returns on existing investments? -Dell -Johnson & Johnson -Procter & Gamble -Phillips Petroleum
Phillips Petroleum (According to the disruptive versus sustaining technologies figure, Phillips Petroleum is expected to gain returns on existing investments equal to 97 percent of its total.)
What is the unauthorized use, duplication, distribution, or sale of copyrighted software? -Ethics -Intellectual property -Copyright -Pirated software
Pirated software (This is the definition of pirated software.)
Which of the following represents the phases in the SDLC? -Plan, analyze, design, test, maintain, develop, implement -Analyze, plan, design, test, develop, maintain, implement -Plan, analyze, design, develop, test, implement, maintain -Analyze, plan, develop, design, test, implement, maintain
Plan, analyze, design, develop, test, implement, maintain (Plan, analyze, design, develop, test, implement, maintain is the SDLC order.)
Information security __________ identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.
Policies
What is the number one reason that IT projects fall behind schedule or fail? -Change in business goals during the project. -Lack of support from business management. -Poor planning or poor project management. -Change in technology during the project.
Poor planning or poor project management. (Poor planning or poor project management is the number one reason why IT projects fall behind schedule or fail.)
A global ____________ system is a device that determines current latitude and longitude, speed, and direction of movement.
Positioning
Which of the following is not a phase in the systems development life cycle? -Analysis phase -Prediction phase -Planning phase -Testing phase
Prediction phase (The prediction phase does not exist in the SDLC.)
Which of the following is not one of the three primary information security areas? -Authentication and authorization -Prevention and response -Detection and response -None of these are correct.
Prevention and response (Prevention and resistance is one of the three primary information security areas, not prevention and response.)
A foreign key in the relational database model is a ___________ key of one table that appears as an attribute in another table.
Primary
__________________ value activities acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services.
Primary
Which part of the value chain acquires raw materials and manufactures, delivers, markets, sells, and provides after-sales services? -Primary value activities -Secondary value activities -Support value activities -None of these are correct.
Primary value activities (This is the definition of primary value activities.)
A business __________ is a standardized set of activities that accomplish a specific task.
Process
Which of the following is an incorrect enterprise view of information technology? -Processes are analytical for executives and transactional for analysts. -Granularity is coarse for executives and fine for analysts. -Processing is OLTP for executives and OLAP for analysts. -None of these.
Processing is OLTP for executives and OLAP for analysts. (Processing is OLAP for executives and OLTP for analysts.)
The Long Tail:
Products that are in low demand or have a low sales volume can collectively make up a market share that rivals or exceeds the relatively few current bestsellers if the distribution channel is large enough.
What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements? -Project management -Project management software -Scope -None of these
Project management (This is the definition of project management.)
What is the science of making intelligent trade-offs between time, cost, and scope? -Project deliverable -Project management -Project -PMO
Project management (This is the definition of project management.)
What is a real-time system? -Provides immediate, up-to-date real-time information. -Provides real-time information in response to requests. -Encompasses all organization information, and its primary purpose is to support the performance of managerial analysis tasks. -Encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational tasks.
Provides real-time information in response to requests. (This is the definition of a real-time system.)
Which of the following is an example of transactional information? -Trends -Sales projections -Purchasing stocks -All of these
Purchasing stocks (Purchasing stocks is an example of transactional information.)
Which of the following is not one of the five characteristics common to high-quality information? -Accuracy -Completeness -Quantity -Consistency
Quantity (Accuracy, completeness, consistency, uniqueness, and timeliness are the characteristics of high-quality information.)
All of the following are characteristics of information except: -Transactional -Analytical -Timeliness -Quantity
Quantity (Quality is the characteristic of information, not quantity.)
Which of the following is the correct definition of RFID? -Radio frequency internal diagnostics -Radio frequency identification -Radio fast internal diagnostics -Radio frequency interoperability device
Radio frequency identification
RAD:
Rapid application development emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.
RUP:
Rational unified process is an iterative software development process which establishes four phases of development, each of which is organized into a number of separate iterations that must satisfy defined criteria before the next phase is undertaken: in the inception phase, developers define the scope of the project and its business case; in the elaboration phase, developers analyze the project's needs in greater detail and define its architectural foundation; in the construction phase, developers create the application design and source code; and in the transition phase, developers deliver the system to users.
Information __________ refers to the number of people a business can communicate with, on a global basis.
Reach
Clickstream:
Records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased.
All of the following are challenges of outsourcing except: -Contract length. -Competitive edge. -Confidentiality. -Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market.
Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market. (Reduced frustration is not a challenge of outsourcing. It is a benefit.)
Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a customer purchases their 100th cup of coffee at The Edgewater Café, they receive a free pound of coffee of their choice. What is Callie attempting to create with her unique "Free Pound of Coffee" marketing program? -Reducing buyer power with a loyalty program. -Increasing buyer power with a loyalty program. -Decreasing supplier power with a differentiated product. -Creating a substitute product.
Reducing buyer power with a loyalty program. (One way to reduce buyer power is with a loyalty program, which is a program to reward customers based on their spending.)
Information ___________ is the duplication of information or storage of the same information in multiple places.
Redundancy
eDiscovery:
Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Teleliving:
Refers to using information devices and the Internet to conduct all aspects of life seamlessly, which can include shopping, working, learning, or playing.
What uses the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways? -Content providers -Intermediaries -Reintermediation -Cybermediation
Reintermediation (This is the definition of reintermediation.)
Which database model is a type of database that stores information in the form of logically related two-dimensional tables? -Network database model -Relational database model -Hierarchical database model -All of these are correct.
Relational database model (The relational database model is a type of database that stores information in the form of logically related two-dimensional tables.)
What are the rules that enforce basic and fundamental information-based constraints? -Data redundancy -Information integrity -Scalability -Relational integrity constraints
Relational integrity constraints (This is the definition of relational integrity constraints.)
Pharming:
Reroutes requests for legitimate websites to false websites.
A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness? -Creating an online travel reservation. -Ordering a product online. -Researching products to find the lowest price and visiting the store to purchase the item. -All of these.
Researching products to find the lowest price and visiting the store to purchase the item. (These are some examples that demonstrate how a company can reduce costs by changing some of their business processes and utilizing ebusiness: (1) air travel reservations done online instead of over the phone and (2) the online ordering process of a product. Researching cost savings online does not help the company; it only helps the customer.)
What types of BI decisions include predicting sales, determining correct inventory levels, and distribution schedules among outlets, and loss prevention? -Retail and sales BI decisions -Banking BI decisions -Operations management BI decisions -Insurance BI decisions
Retail and sales BI decisions (These are all types of retail and sales BI decisions.)
Which topology has all devices connected to one another in the shape of a closed loop? -Ring topology -Bus topology -Star topology -None of these are correct.
Ring topology (This is the definition of ring topology.)
Some industries' competition is much more intense than others. Retail grocery stores, such as Kroger, Safeway, and Albertson's in the United States, experience fierce competition and offer similar marketing campaigns to compete. What is this an example of in terms of Porter's Five Forces? -Rivalry among new entrants. -Rivalry among existing competitors. -Threat of substitute products or services. -Buyer power.
Rivalry among existing competitors. (Some industries' competition is much more intense than others. Retail grocery stores, such as Kroger, Safeway, Albertson's, and Ralph's in the United States, have fierce competition and similar programs to compete with each other.)
Relational integrity constraints:
Rules that enforce basic and fundamental information-based constraints, such as: users cannot create an order for a nonexistent customer or an order cannot be shipped without an address.
Business-critical integrity constraints:
Rules that enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints, such as: product returns are not accepted for fresh product 15 days after purchase or a discount maximum of 20 percent.
Which act protects investors by improving the accuracy and reliability of corporate disclosures? -Bork Bill -Identity Theft and Assumption Deterrence Act -CAN-Spam Act -Sarbanes-Oxley Act
Sarbanes-Oxley Act (Sarbanes-Oxley Act protects investors by improving the accuracy and reliability of corporate disclosures.)
MIS can add value to both primary activities and support activities in the value chain. Which of the following is not an example of a company adding value by using MIS in a primary activity? -Scottrade Corp. creating an online system for employees to track paychecks, benefits, the wellness-rewards program, and other employee benefit items. -A system for the sales and marketing departments to track specific sales targets and follow-up processes. -An easy electronic survey to be sent to the customer right after a service is completed. -Royal Crest Dairy placing their order and delivery system on an easily accessible Web portal so customers can track delivery status.
Scottrade Corp. creating an online system for employees to track paychecks, benefits, the wellness-rewards program, and other employee benefit items. (MIS can add value to both primary and support activities within a business. All are primary activities except Scottrade Corp. creating an online system for employees to track paychecks, benefits, their wellness-rewards program, and other employee benefit items. This is a support value activity.)
Encryption:
Scrambles information into an alternative form that requires a key or password to decrypt.
Which methodology ends each day or begins with a stand-up meeting to monitor and control the development effort? -Scrum -XP -RUP -RAD
Scrum (Scrum methodology ends each day or begins with a stand-up meeting to monitor and control the development effort.)
Goal-seeking analysis:
Searches what components are needed in order to meet specific goals.
What is the study of the effect that changes in one (or more) part of the model has on other parts of the model? -Drill-down -Sensitivity analysis -Statistical analysis -Goal-seeking analysis
Sensitivity analysis (This is the definition of sensitivity analysis.)
What is the study of the impact that changes in one (or more) part of the model have on other parts of the model? -Sensitivity analysis -Drill-down -What-if analysis -Goal-seeking analysis
Sensitivity analysis (This is the definition of sensitivity analysis.)
Waterfall:
Sequential design process where progress can be seen as flowing steadily downward through the SDLC.
An SOA __________ is a business task.
Service (Service-oriented architecture (SOA) is an approach used to create an architecture based upon the use of services.)
Anti-spam policy:
Simply states that email users will not send unsolicited emails (or spam).
Which of the following represents knowledge? -Data converted into a meaningful and useful context -Data characteristic that stands for a value that changes or varies over time -Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making -Skills, experience, and expertise, coupled with information and intelligence that creates a person's intellectual resources
Skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources (Knowledge includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources.)
Which of the following is a program or device that can monitor data traveling over a network? -Denial-of-service attack -Spoofing -Sniffer -Trojan-horse virus
Sniffer (This is the definition of denial-of-service attack.)
_________ engineering is using one's social skills to trick people into revealing access credentials or other information valuable to the attacker.
Social
_____________ bookmarking allows users to share, organize, search, and manage bookmarks.
Social
Which of the following represents the classic example of unintentional information reuse? -Phone number -Driver's license number -Social Security number -None of these are correct.
Social Security number (The Social Security number is the classic example of unintentional information reuse.)
Which of the following is not a topic or feature that is included in Web 3.0? -A worldwide database -Intelligent applications -Social networking -Integration of legacy devices
Social networking (Topics or features that are sure to be included in Web 3.0 include (1) integration of legacy devices, (2) intelligent applications, (3) open ID, (4) open technologies, and (5) a worldwide database.)
Spyware (sneakware or stealthware):
Software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about.
Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique websites. Many of his daily tasks are heavily technical in nature and require a high level of computer programming and Internet knowledge. Which of the below would Erik primarily use when performing his daily tasks? -Source code -Brick-and-mortar -Information reach -Explicit knowledge
Source code (Source code contains instructions written by a programmer specifying the actions to be performed by computer software. This is his main role or responsibility.)
What type of website is best to build for a general informational website with static information? -Data-driven website -Static website -Relational website -All of these
Static website (For a general informational website with static information, it is best to build a "static" website, one that a developer can update on an as-needed basis, perhaps a few times a year.)
Which system differentiates an executive information system from a decision support system and a transaction processing system? -Order processing system -Manufacturing system -Stock market information system -Transportation system
Stock market information system (A stock market information system is found only in an executive information system, since it is an external source of information. The rest are internal sources of information.)
Which social media site works by allowing content to find the users, instead of the users having to search for the content? -MySpace -Facebook -Google -StumbleUpon
StumbleUpon (StumbleUpon represents a new social media networking model in which content finds the user instead of the other way around.)
For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual ebusiness that acts like a search engine but focuses on only the real estate industry. The main revenue source for Perry's ebusiness will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry's new business? -License fees -Advertising fees -Subscription fees -All of these
Subscription fees (This is an example of using the subscription fees ebusiness revenue model.)
__________________ value activities include firm infrastructure, human resource management, technology development, and procurement.
Support
EIS:
Supports the executive level of management, often used to formulate high level strategic or unstructured decisions impacting on the direction of the organization.
A(n) ___________ technology produces an improved product customers are eager to buy.
Sustaining
What is the overall process for developing information systems from planning and analysis through implementation and maintenance? -Systems development life cycle -Project management -Systems management -Project development life cycle
Systems development life cycle (This is the definition of SDLC.)
Social __________ describes the collaborative activity of marking shared online content with key words or tags as a way to organize it for future navigation, filtering, or search.
Tagging
What are specific key words or phrases incorporated into website content for means of classification or taxonomy? -Social media -Social networking analysis -Tags -All of these are correct.
Tags (Tags are specific key words or phrases incorporated into website content for means of classification or taxonomy.)
Which of the below is not a characteristic of Business 2.0? -Encourages user participation. -Technical skills are required. -Eliminates entry barriers to publishing on the web. -Provides an exciting and vibrant virtual environment.
Technical skills are required. (Business 2.0 (Web 2.0) encourages user participation and the formation of communities to contribute to the content. Technical skills are no longer required to use and publish information to the web, and new web technologies eliminate entry barriers for online business. Web 2.0 technologies also provide a virtual environment that is vibrant and important to many.)
A disruptive ___________ is a new way of doing things that initially does not meet the needs of existing customers.
Technology
Support activities (value chain):
The "overhead" activities that the organization performs to assist the primary activities to gain the competitive advantage. (Procurement, Technology Management, HR Management, Infrastructure.)
The balanced scorecard suggests that we view an organization from four perspectives, and to develop metrics, collect data and analyze it relative to each of these perspectives:
The Learning & Growth Perspective, The Business Process Perspective, The Customer Perspective, The Financial Perspective
What are the two basic functions that social networking sites provide? -The ability to create and publish your own software. -The ability to create and maintain a profile that is your online identity and create connections between other people within the network. -The ability to capture and create URLs and RSSs. -The ability to create URLs and edit RSS software.
The ability to create and maintain a profile that is your online identity and create connections between other people within the network. (The two basic functions that social networking sites provide are the ability to create and maintain a profile that is your online identity and the ability to create connections between other people within the network.)
What is slice-and-dice capability? -Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information. -The ability to look at information from different perspectives. -Enables users to get details, and details of details, of information. -Finds the inputs necessary to achieve a goal, such as a desired level of output.
The ability to look at information from different perspectives. (This is the definition of slice-and-dice.)
What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"? -The ability to use current devices such as iPhones and laptops as credit cards or tickets. -The design of websites and other software so they can be easily integrated and work together. -The ability for software to be distributed and accessed from anywhere. -The design of software to be easily integrated and work together.
The ability to use current devices such as iPhones and laptops as credit cards or tickets. (Web 3.0's feature "integration of legacy devices" means, or includes, the ability to use current devices such as iPhones, laptops, and so on, as credit cards, tickets, and reservation tools.)
Information compliance:
The act of conforming, acquiescing, or yielding information.
What is consolidation? -Enables users to view details, and details of details, of information. -Finds the inputs necessary to achieve a goal such as a desired level of output. -The aggregation of data from simple roll-ups to complex groupings of interrelated information. -The ability to look at information from different perspectives.
The aggregation of data from simple roll-ups to complex groupings of interrelated information. (This is the definition of consolidation.)
What is virtualization? -The creation of multiple "virtual" machines on a single computing device -The delivery of electricity using two-way digital technology -A collection of computers, often geographically dispersed, that are coordinated to solve a common problem -None of these are correct.
The creation of multiple "virtual" machines on a single computing device (This is the definition of interoperability,)
Cybervandalism:
The electronic defacing of an existing website.
A system is a collection of parts that link to achieve a common purpose. Systems thinking is a way of monitoring ________________. -the entire system -a division within the sales role -the executive team -the company's competitors
The entire system (A system is a collection of parts that link to achieve a common purpose. Systems thinking is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.)
Which trend has the following potential business impact? Demand for personnel in distant countries will increase the need for foreign language training, employee incentives suited to other cultures, and many other aspects of performing business globally. -The growth in information industries is creating a knowledge-dependent global society. -The global economy is becoming more integrated. -Pace of technological innovation is increasing. -The economy and society are dominated by technology.
The global economy is becoming more integrated. (That the global economy is becoming more integrated is the trend.)
Primary activities (value chain):
The goal of primary activities is to create value that exceeds the cost of providing the product or service, thereby generating a profit margin. (Inbound logistics, Operations, Outbound logistics, Sales & Marketing, Service)
Coarse granularity:
The large or broad details, the big picture.
The balanced scorecard views the organization from four perspectives, and users should develop metrics, collect data, and analyze their business relative to each of these perspectives. Which of the following is not one of the four perspectives in the balanced scorecard? -The leading perspective -The internal business process perspective -The customer perspective -The financial perspective
The leading perspective (The learning and growth perspective is missing, and the leading perspective is not valid.)
Which of the following statements is true? -The more complete an organization wants to get its information, the less it costs. -The more accurate an organization wants to get its information, the less it costs. -The less accurate an organization wants to get its information, the more it costs. -The more complete and accurate an organization wants to get its information, the more it costs.
The more complete and accurate an organization wants to get its information, the more it costs. (The more complete and accurate an organization wants to get its information, the more it costs.)
Error rate:
The number of corrupted bits expressed as a percentage or fraction of the total bits sent.
What is the systems development life cycle? -The overall process for developing information systems, from planning and analysis through implementation and maintenance -Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system -Involves establishing a high-level plan of the intended project and determining project goals -Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation
The overall process for developing information systems, from planning and analysis through implementation and maintenance (The SDLC is the overall process for developing information systems, from planning and analysis through implementation and maintenance.)
Ben Schultz decides to purchase an iPad on eBay. After the transaction completes and the money is withdrawn from Ben's PayPal account, the iPad never shows up and the email address of the seller bounces. What issue has Ben encountered? -The physical separation of buyer and seller -Adhering to taxation rules -Identifying limited market segments -All of these
The physical separation of buyer and seller (The physical separation of buyer and seller and the merchandise is always a risk that is taken into account when trying to improve the managing consumer trust ebusiness challenge.)
(Porter's Five Forces Analysis) Buyer Power:
The power of the consumer to affect pricing and quality.
What is data mining? -A particular attribute of information -The common term for the representation of multidimensional information -The process of analyzing data to extract information not offered by the raw data alone -Uses a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making
The process of analyzing data to extract information not offered by the raw data alone (Data mining is the process of analyzing data to extract information not offered by the raw data alone.)
Prototyping:
The process of building a model that demonstrates the features of a proposed product, service or system which allows end users to see, work with and evaluate a model and suggest changes to increase likelihood of success.
Cryptography:
The science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
Which statement below is incorrect? -The semantic web captures, organizes, and disseminates knowledge (i.e., know-how) throughout an organization. -The semantic web describes the relationships between things. -The semantic web describes the properties of things. -The semantic web is not about links between web pages.
The semantic web captures, organizes, and disseminates knowledge (i.e., know-how) throughout an organization. (To understand the semantic web, you need to understand that it is not about links between web pages. Rather, it describes the relationships between things, such as A is a part of B, and Y is a member of Z and the properties of things, such as size, weight, age, and price.)
Point-to-point network topology:
The simplest topology with a dedicated link between two endpoints.
Fine granularity:
The small or very precise details which the larger details are comprised of.
Which of the following is a business-critical integrity constraint? -The system will not allow an entry for an order for a nonexistent customer. -The system will not allow returns of fresh produce after 15 days past delivery. -The system will not allow shipping a product to a customer who does not have a valid address. -The system will not allow shipping a nonexistent product to a customer.
The system will not allow returns of fresh produce after 15 days past delivery. (Not allowing fresh produce to be returned after 15 days would be a business-critical integrity constraint. The other options represent relational integrity constraints.)
Website name stealing:
The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
Imagine you are creating a new product to sell in an up and coming market. Which of the following statements indicates that it would be difficult for you to enter this new market? -The threat-of-new-entrants is high in the up and coming market. -The threat-of-new-entrants is low in the up and coming market. -The threat-of-new-entrants is high during the summer months in the up-and-coming market. -All of these, depending on the time of year.
The threat-of-new-entrants is low in the up and coming market. (The threat of new entrants is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market.)
Plunge implementation:
The use of the legacy system is discontinued for that of the new system.
Core business relationships and models are dramatically changing, including shifts from which of the following? -Customer-centricity to product-centricity -Mass customization to mass production -The value in material things to the value of knowledge and intelligence -All of these
The value in material things to the value of knowledge and intelligence. (The value in material things to the value of knowledge and intelligence is one of the shifts. Customer-centricity to product-centricity and mass customization to mass production must be reversed to be shifts.)
Expert system:
These systems are the most commonly used form of AI, and are computer applications which performs tasks that would otherwise be performed by human experts. For example, there are expert systems that can diagnose human illnesses, make financial forecasts, and schedule routes for delivery vehicles. Some expert systems are designed to take the place of human experts, while others are designed to aid them.
Relational database:
This model organizes data into one or more tables (or "relations") of columns and rows, with a unique key identifying each row. Rows are also called records. Generally, each table/relation represents one "entity type" (such as customer or product). The rows represent instances of that type of entity (such as "Lee" or "iPhone") and the columns representing values attributed to that instance (such as address or price).
Which of the below is not one of Porter's Five Forces? -Buyer power -Supplier power -Threat of substitute products or service -Threat of managers
Threat of managers (Threat of managers is not one of Porter's Five Forces.)
Which of the below represents the three elements in the triple constraints of project management? -Plan, analysis, design -Deliverables, milestones, scope -Development, testing, implementation -Time, resources, scope
Time, resources, scope (Time, resources, and scope are the three elements in the triple constraint.)
What is the primary purpose of a data warehouse? -To aggregate information throughout an organization into multiple repositories in such a way that employees can make decisions and undertake business analysis activities. -To disaggregate information throughout an organization into multiple repositories in such a way that employees can make decisions and undertake business analysis activities. -To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities. -To disaggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.
To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities. (The purpose of a data warehouse is to aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.)
Why do relational databases use primary keys and foreign keys? -To create logical relationships -To create a database -All of these are correct. -None of these are correct.
To create logical relationships (Keys are used to create logical relationships.)
Paula Logston is the owner and operator of a high-end online custom clothing company. Paula has never heard of Porter's Five Forces Model, and she wants to understand why she should perform an analysis using it. If you were tasked with explaining Porter's Five Forces Model to Paula, what would be the primary reason she would want to use this type of analysis? -To help Paula choose a clothing business focus. -To help Paula evaluate the attractiveness of the clothing industry. -To help Paula evaluate and execute business goals. -All of these.
To help Paula evaluate the attractiveness of the clothing industry. (One of the three tools company executives often use when analyzing competitive intelligence is the Five Forces Model. This is used to evaluate industry attractiveness.)
Why is Noodles & Company using business intelligence? -To improve financial analysis. -To improve corporate processes. -To track store quality. -To change the corporate culture.
To improve financial analysis. (The closing case discusses how Noodles & Company is using BI to improve its financial analysis.)
Why is Ben & Jerry's using business intelligence? -To improve quality. -To create new flavors of ice cream. -To improve financials. -To manage distribution.
To improve quality. (The closing case discusses how Ben & Jerry's uses BI to track quality control.)
What is the primary purpose of business process reengineering? -To maximize the total supply chain effectiveness and profitability -To increase customer loyalty and retention -To integrate all departments and functions to enable decision making -To make all business processes best-in-class
To make all business processes best-in-class (The primary purpose of business process reengineering is to make all business processes the best-in-class.)
A social bookmarking site is dedicated to providing all of the following except ________. -to reconnect with colleagues for business progress -to share favorites -to store and categorize favorite sites -to annotate
To reconnect with colleagues for business progress (Social bookmarking sites provide users with a place to store, categorize, annotate, and share favorites. LinkedIn is primarily used to reconnect with colleagues for business progress.)
The three Business 2.0 communication and collaboration tools a business can use to harness the power of people include blogs, wikis, and mashups. -True -False
True (Blogs, wikis, and mashups are the three primary Business 2.0 communication and collaboration tools.)
Which of the following terms could you use synonymously when referring to the web? -Network, paradigm shift -URL, domain name -HTML, Internet -Web browser, blog
URL, domain name (When referring to the web, a URL or Universal Resource Locator and a domain name mean the same thing or are the most interchangeable.)
Primary key:
Uniquely identifies a record in the table.
What is it called when each transaction, entity, and event is represented only once in the information? -Uniqueness -Accuracy -Consistency -Timeliness
Uniqueness (This is the definition of uniqueness.)
Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com? -Digital bookmark -Internet bookmark -Universal resource locator -Web browser
Universal resource locator (Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. This address is also called a universal resource locator (URL).)
Spam:
Unsolicited email.
In the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate? -Upper left-hand corner -Lower right-hand corner -Upper right-hand corner -Lower right-hand corner
Upper right-hand corner (The upper right-hand corner is the ideal place for an organization to operate.)
What is the ease with which people perform transactions and/or find information? -Financial -Conversion rates -Usability -None of these are correct.
Usability (This is the definition of usability.)
Pharming attack:
Uses a zombie farm, often by an organized crime association, to launch a massive phishing attack.
Public key encryption:
Uses two keys: a public key that everyone can have and a private key for only the recipient.
Parallel implementation:
Using both the old and new system simultaneously.
___________ software provides additional functionality to an operating system.
Utility
Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect? -Cookies -Click-through -Viral marketing -Pop-up ad
Viral marketing (Viral marketing is a marketing technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect.)
What category of website metrics does stickiness, or visit duration time, belong to? -Service metric -Exposure metric -Visit metric -Hit metric
Visit metric (Stickiness is a visit metric according to the website metrics figure.)
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's Five Forces Model. Which of the following represents a substitute product in the soft drink industry? -Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. -Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. -Zevia Natural Diet Soda begins selling directly over the Internet. -Vitamin water, fruit juice, and coffee.
Vitamin water, fruit juice, and coffee (A threat of substitute products in the soft drink industry is represented by Vitamin water, fruit juice, and coffee.)
LAN, MAN, and _____ are the three types of networks.
WAN
What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called ----HTML? -WWW -URL -Ebusiness -Ecommerce
WWW (This is the definition of WWW.)
Which of the below would not be considered a company operating in the long tail of a typical sales curve? -Walmart -Netflix -iTunes -Zappos
Walmart (Niche markets that are excellent examples of long tail sales include Netflix, Amazon, Zappos, and iTunes.)
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's Five Forces Model. Which of the following represents buyer power in the soft drink industry? -Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. -Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. -Zevia Natural Diet Soda begins selling directly over the Internet. -Vitamin water, fruit juice, and coffee.
Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. (Buyer power in the soft drink industry is represented by Walmart.)
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents buyer power in the music industry? -Established record labels like EMI, Sony, and Universal. -Walmart, Target, and iTunes. -Independent record labels. -Game systems like Wii and social networks like Facebook.
Walmart, Target, and iTunes. (Buyer power in the music industry includes Walmart, Target, and iTunes, which purchase music from record labels to sell online and in their stores.)
Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness? -Auto industry -Retail industry -Travel industry -Waste or recycling industry
Waste or recycling industry (Industries that have been revamped by the disruption of ebusiness include (1) auto, (2) publishing, (3) education and training, (4) entertainment, (5) financial services, (6) retail, and (7) travel.)
The next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free—is known as ________. -Web 1.0 -Web 2.0 -Web 3.0
Web 2.0 (This is the definition of Web 2.0.)
Which of the below is not a characteristic of Business 2.0? -Knowledge management -Collaboration system -Web browser -Explicit knowledge
Web browser (Characteristics of Business 2.0 collaboration inside the organization include (1) a collaboration system, (2) collective intelligence, (3) knowledge management, (4) a knowledge management system, (5) explicit knowledge, and (6) tacit knowledge. A web browser is part of Business 1.0.)
As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals? -IMing -Webinar -Blog -Email
Webinar (Web conferencing blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants.)
Which of the following is not one of the questions asked during the analyzing phase of CRM? -What customers are at risk of leaving? -Why was customer revenue so high? -Why did sales not meet forecasts? -Who are our customers?
What customers are at risk of leaving? ("What customers are at risk of leaving?" is a question asked during the predicting phase.)
Which of the following provides an example of information? -Who is customer number 12345XX? -What is product number 12345XX? -What customer number is Bob Smith? -What is my worst-selling product?
What is my worst-selling product? (What is my worst-selling product is an example of taking data and turning it into information.)
Which of the following is not one of the questions asked during the predicting phase of CRM? -What is the total revenue by customer? -What products will the customer buy? -Who are the best candidates for a mailing? -What is the lifetime profitability of a customer?
What is the total revenue by customer? ("What is the total revenue by customer?" is a question asked during the reporting phase.)
_____________ analysis checks the impact of a change in a variable or assumption on the model.
What-if
What checks the impact of a change in a variable or assumption on the model? -Sensitivity analysis -Drill-down -What-if analysis -Goal-seeking analysis
What-if analysis (What-if analysis checks the impact of a change in a variable or assumption on the model.)
Which of the following is not one of the questions asked during the reporting phase of CRM? -What is the total revenue by customer? -How many units did we manufacture? -Where did we sell the most products? -Who are our customers?
Who are our customers? ("Who are our customers?" is a question asked during the analyzing phase.)
Which of the following provides an example of data? -Who are my best customers? -What is my best-selling product? -What is my worst-selling product? -Who is customer number 12345XX?
Who is customer number 12345XX? (Who is customer number 12345XX is an example of data.)
What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable? -WiMAX wireless broadband -Satellite television -Wireless local area network -Cellular phones and pagers
WiMAX wireless broadband (WiMAX wireless broadband enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable.)
A _____________is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.
Wiki
Which of the following is one of the largest wikis on the web and one of the 10 most popular web destinations? -Google -eBay -Wikipedia -Yahoo
Wikipedia (Wikipedia is one of the largest wikis on the web and one of the 10 most popular web destinations.)
____________ refers to any type of operation accomplished without the use of a hard-wired connection.
Wireless
What refers to any type of electrical or electronic operation that is accomplished without the use of a "hard-wired" connection? -Wireless -Mobile -GPS -RFID
Wireless (This is the definition of wireless.)
What technology uses radio waves rather than wires to transmit information across a local area network? -WiMAX wireless broadband -Satellite television -Wireless local area network -Cellular phones and pagers
Wireless local area network (Wireless local area network technology uses radio waves rather than wires to transmit information across a local area network.)
Knowledge __________ are individuals valued for their ability to interpret and analyze information.
Workers
Business process reengineering is the analysis and redesign of __________ within and between enterprises.
Workflow
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's Five Forces Model. Which of the following represents a threat of a new entrant in the soft drink industry? -Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. -Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. -Zevia Natural Diet Soda begins selling directly over the Internet. -Vitamin water, fruit juice, and coffee.
Zevia Natural Diet Soda begins selling directly over the internet. (A threat of new entrants in the soft drink industry is represented by Zevia Natural Diet Soda.)
Which of the following is the example of consumer-to-government (C2G) highlighted in the figure Extended Ebusiness Models? -egov.com -conisint.com -Google.org -export.gov
egov.com (The example of consumer-to-government highlighted in the figure Extended Ebusiness Models is egov.com.)
A data warehouse is a _________ collection of information - gathered from many different ___________ databases - that supports business-analysis activities and decision-making tasks. -physical; transactional -physical; operational -logical; transactional -logical; operational
logical; operational (This is the definition of data warehouse.)