INFO 360 Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is the best definition of an information system? A) A set of detailed programmed instructions that transform raw data into information B) A global network that uses universal standards C) Computers, keyboards, printers, and telecommunications devices D) Physical devices and software that can be connected to share voice, data, images, sound, and video E) A set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization

A set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization

Why does improving a small, routine decision have business value for a company? A) Even small decisions affect the culture of the organization. B) Small, routine decisions typically do not have any business value for a company. C) A small decision may have a great economic impact on the company. D) Even a routine decision may have a "ripple" effect through a corporation. E) A small decision has business value when added with all the other small decisions made in the company.

A small decision has business value when added with all the other small decisions made in the company.

Data management technology consists of: A) the software governing the organization of data on physical storage media. B) the hardware and software used to transfer data. C) the universally accepted standards for storing data. D) the physical hardware and media used by an organization for storing data. E) the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.

A) the software governing the organization of data on physical storage media.

A relocation control system that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of a/an: A) CRM system B) KMS. C) TPS. D) MIS. E) ESS.

MIS

What technology allows people to have content pulled from websites and fed automatically to their computers? A) FTP B) Newsgroups C) Bluetooth D) RSS E) HTTP

RSS

Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers? A) SAN B) ASP C) Grid D) SSN E) LAN

SAN

________ modules in CRM systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services. A) CLTV B) ERM C) PRM D) Just-in-time E) SFA

SFA

A set of self-contained services that communicate with each other to create a working software application is called: A) Web services. B) SOA. C) ERP. D) enterprise integration.

SOA

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? A) Select the business processes you wish to automate. B) Select the functions of the system you wish to use. C) Map the software's business processes to the company's business processes. D) Rewrite the software to support the way the company's business processes work. E) Map the company's business processes to the software's business processes.

Select the functions of the system you wish to use.

A firm that locates all systems development and operations at its headquarters is using a ________ system configuration. A) networked B) decentralized C) centralized D) unilateral E) virtual

centralized

In order to achieve maximum benefit from an enterprise software package, a business should: A) change the way it works to match the software's business processes. B) customize the software to match all of its business processes. C) choose a cloud-based ERP package. D) use only the processes in the software that match its own processes. E) select only the software that best matches its existing business processes.

change the way it works to match the software's business processes.

In order to achieve maximum benefit from an enterprise software package, a business should: A) use only the processes in the software that match its own processes. B) customize the software to match all of its business processes. C) change the way it works to match the software's business processes. D) select only the software that best matches its existing business processes. E) choose a cloud-based ERP package.

change the way it works to match the software's business processes.

In a parameterized report, users can: A) view overall firm performance data. B) create their own reports based on custom queries. C) predict future outcomes according to changing circumstances. D) drill down to more finely grained information. E) view data according to different dimensions of the data.

create their own reports based on custom queries.

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A) Data dictionary B) Referential integrity module C) Relationship dictionary D) Entity-relationship diagram E) Data definition diagram

data dictionary

Which of the following is the most common source of business system failure? A) Data quality B) Software bugs C) Hardware failures D) Software errors E) Facility catastrophes

data quality

Employees that assist with paperwork at all levels of the firm are called: A) senior managers. B) data workers. C) knowledge workers. D) operational management. E) service workers.

data workers

U.S. businesses are allowed to use personal data from EU countries if they: A) create a safe harbor. B) make their privacy protection policies publicly available. C) have informed consent. D) develop equivalent privacy protection policies

develop equivalent privacy protection policies

The term "________" refers to large disparities in access to computers and the Internet among different social groups and different locations. A) digital divide B) technostress C) RSI D) CVS E) CTS

digital divide

In TCP/IP, IP is responsible for: A) moving packets over the network. B) establishing an Internet connection between two computers. C) disassembling and reassembling of packets during transmission. D) acknowledging the packets sent. E) sequencing the transfer of packets.

disassembling and reassembling of packets during transmission.

Which of the following focuses primarily on the technical issues of keeping systems up and running? A) Business continuity planning B) An AUP C) Security policies D) An information systems audit E) Disaster recovery planning

disaster recovery planning

Reducing the business process layers in a distribution channel is called: A) dynamic pricing. B) market segmentation. C) disintermediation. D) network effects. E) BPR.

disintermediation

A(n) ________ capability allows users to view more detailed views of data. A) query and reporting B) ad hoc C) VRML D) drill-down E) metrics

drill down

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called: A) due process. B) liability. C) the courts of appeal. D) responsibility. E) accountability.

due process

Which dimension of quality means that a decision should reflect a rational process? A) Coherence B) Fairness C) Comprehensiveness D) Due process E) Accuracy

due process

Varying a product's price according to the supply situation of the seller is called ________ pricing. A) asymmetric B) transparent C) flexible D) dynamic E) menu

dynamic

The use of digital technology and the Internet to execute the major business processes in the enterprise is called: A) enterprise applications. B) KWM. C) e-commerce. D) e-business. E) MIS.

ebusiness

The most common type of electronic evidence is: A) e-commerce transactions over the Internet. B) spreadsheets. C) instant messages. D) voice-mail. E) email.

email

In terms of the data relationships found by data mining, sequences refers to: A) undiscovered groupings. B) events linked over time. C) occurrences linked to a single event. D) patterns that describe a group to which an item belongs.

events linked over time

Which of the following types of systems could be used to enable different firms to work collaboratively on a product? A) Extranet B) CRM C) DSS D) KMS E) Intranet

extranet

You manage the Information Systems department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics, such as views and click-throughs, about their current display ads. Which type of system will most efficiently provide a solution? A) Extranet B) CRM C) Intranet D) KWM E) Enterprise system

extranet

Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties? A) Coherence B) Justice C) Accuracy D) Due process E) Fairness

fairness

For 100 percent availability, online transaction processing requires: A) dedicated phone lines. B) deep packet inspection. C) high-capacity storage. D) fault-tolerant computer systems. E) a multi-tier server network.

fault tolerant computer systems

A detailed list of questions submitted to external vendors to determine how well they meet the organization's specific requirements is called: A) a feasibility study. B) a request for proposal. C) process specifications. D) a systems analysis. E) a case study.

feasibility study

Data mining is a tool for allowing users to: A) find hidden relationships in data. B) quickly compare transaction data gathered over many years. C) perform multidimensional data analysis. D) obtain online answers to ad hoc questions in a rapid amount of time. E) summarize massive amounts of data into much smaller, traditional reports.

find hidden relationships in data

________ typically develop a single information system, usually at the home base, and then replicate it around the world. A) Domestic exporters B) Multinational firms C) Transnational firms D) Virtual companies E) Franchisers

franchisers

Backward sensitivity analysis software is used for: A) goal seeking. B) reverse forecasting. C) supply chain optimization. D) customer analysis. E) historical what-if analysis.

goal seeking

________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. A) Capacity planning B) Utility computing C) On-demand computing D) Cloud computing E) Green computing

green computing

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: A) centralized processing. B) cloud computing. C) client/server computing. D) co-location. E) grid computing.

grid computing

Specific security challenges that threaten corporate servers in a client/server environment include: A) unauthorized access, errors, and spyware. B) theft, copying, alteration of data, and hardware or software failure. C) tapping, sniffing, message alteration, and radiation. D) vandalism, message alteration, and errors. E) hacking, vandalism, and denial of service attacks.

hacking, vandalism, and denial of service attacks

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) hot points. B) hotspots. C) tunnels. D) wireless hubs. E) touch points.

hotspots

Which of the following is the first step in BPM? A) Improve design quality and precision. B) Reduce cycle time and simplify the production process. C) Identify processes for change. D) Extend the value chain. E) Identify synergies.

identify processes for change

The first step in the model of business problem solving discussed in the chapter is: A) evaluating possible solutions to the problem. B) interviewing the people involved in the problem. C) assigning the problem to a problem solver. D) identifying the problem. E) outlining the problem's causes.

identifying the problem

The ethical "no free lunch" rule states that: A) if an action is not right for everyone to take, it is not right for anyone to take. B) one can put values in rank order and understand the consequences of various courses of action. C) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. D) if an action cannot be taken repeatedly, then it is not right to be taken at any time. E) one should take the action that produces the least harm or incurs the least cost.

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

The final step in the four-step model of business problem solving is: A) outcome. B) feedback. C) implementation. D) employee retraining. E) change management.

implementation

All of the following are current key technology trends raising ethical issues except: A) data analysis advancements. B) advances in networking technology. C) data storage improvements. D) increase in use of mobile devices. E) increase in data quality.

increase in data quality

The three activities in an information system that produce the information organizations use to control operations are: A) data analysis, processing, and feedback. B) information, data, and processing. C) input, output, and feedback. D) input, processing, and output. E) information, research, and analysis.

input processing output

________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation. A) Web-based B) Social C) Analytical D) Operational E) Sales force

operational

________ is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format. A) The World Wide Web B) An extranet C) FTP D) Email E) HTML

world wide web

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. A) service-oriented B) grid C) two-tiered client/server D) multitiered client/server E) on-demand

two tiered client server

ogether, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) third level domain. B) IP address. C) root domain. D) uniform resource locator. E) VPN.

uniform resource locator (URL)

Which feature of Internet technology has had the most effect in the Internet's rapid spread across the globe? A) Universal standards B) Personalization C) Global reach D) Social technology E) Ubiquity

universal standards

Where there is no well-understood or agreed-on procedure for making a decision, it is said to be: A) undocumented. B) low-level. C) semistructured. D) documented. E) unstructured.

unstructured

Which of the following is the single greatest cause of network security breaches? A) Cyberwarfare B) Viruses C) User lack of knowledge D) Bugs E) Trojan horses

user lack of knowledge

A digital certificate system: A) is used primarily by individuals for personal correspondence. B) uses deep packet inspection to validate a user's identity. C) uses third-party CAs to validate a user's identity. D) uses tokens to validate a user's identity. E) uses digital signatures to validate a user's identity.

uses third-party CAs to validate a user's identity.

A ________ is a collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively. A) supply chain B) value web C) consortia D) value chain E) business network

value web

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as: A) cybervandalism. B) sniffing. C) driveby downloading. D) war driving. E) driveby tapping.

war driving

A data ________ stores current and historical data of potential interest to decision makers throughout the company. A) center B) warehouse C) mart D) mine E) archive

warehouse

An independent computer program that copies itself from one computer to another over a network is called a: A) bug. B) Trojan horse. C) pest. D) worm. E) sniffer.

worm

Which of the following types of e-commerce involves selling products and services directly to individual consumers via the Internet? A) G2B e-commerce B) B2B e-commerce C) B2G e-commerce D) M-commerce E) B2C e-commerce

B2C e commerce

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? A) Cost per sale B) CRM rate C) CLTV D) Churn rate E) Cost per lead

CLTV

________ provide information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention. A) CPS B) MIS C) ESS D) TPS E) CRM systems

CRM systems

Which of the following statements is not true about collaboration in a business setting? A) Collaboration may be a short-lived activity, lasting just a few minutes. B) Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity. C) Special types of information systems are available to support collaboration. D) The evidence of the business benefits of collaboration is largely anecdotal. E) Meaningful collaboration requires a supportive business firm culture and the right, decentralized structure.

Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity.

What is the most important benefit of an enterprise application? A) Enabling cost-effective, e-business processes B) Enabling managers to make better decisions C) Enabling speed of communicating D) Enabling business functions and departments to share information E) Enabling a company to work collaboratively with customers and suppliers

D) Enabling business functions and departments to share information

What service converts IP addresses into more recognizable alphanumeric names? A) URL B) HTML C) DNS D) IP E) HTTP

DNS

________ support making decisions that are unique, rapidly changing, and not easily specified in advance. A) MIS B) TPS C) DSS D) KWM E) ESS

DSS

The support activities of a firm include: A) sales and marketing, procurement, human resources, and technology. B) inbound logistics, technology, outbound logistics, sales and marketing, and service. C) inbound logistics, organization infrastructure, outbound logistics, technology, and procurement. D) organization infrastructure, human resources, sales and marketing, and technology. E) organization infrastructure, human resources, technology, and procurement.

E) organization infrastructure, human resources, technology, and procurement.

Which of the following is the best description of ubiquity as it relates to e-commerce technology? A) E-commerce technology is available everywhere and anytime. B) E-commerce technology reduces information costs. C) E-commerce technology employs the same set of standards across the globe. D) E-commerce technology allows personalized messages to be delivered to individuals as well as to groups. E) E-commerce technology permits commercial transactions to cross cultural and national boundaries.

E-commerce technology is available everywhere and anytime.

Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? A) CRM software B) Application software C) Process management software D) Groupware E) ERP systems

ERP systems

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy? A) Firms should build products and services that protect privacy. B) Firms should adopt privacy by design. C) Firms should require consumer consent and provide clear options to opt out of data collection. D) Firms should limit the length of time that any personal data is stored to six months or less. E) Firms should increase the transparency of their data collection.

Firms should limit the length of time that any personal data is stored to six months or less.

Geoadvertising sends ads to users based on their: A) website behaviors. B) user addresses. C) shopping preferences. D) GPS locations. E) social media presence.

GPS locations

Web browser software requests web pages from the Internet using which protocol? A) DNS B) URL C) HTML D) FTP E) HTTP

HTTP

What is the first step you should take in managing data for a firm? A) Cleanse the data before importing it to any database. B) Identify the data needed to run the business. C) Normalize the data before importing to a database. D) Audit your data quality. E) Remove redundancy.

Identify the data needed to run the business.

Why is the balanced scorecard method said to be "balanced"? A) It assesses both the internally focused and externally focused business processes. B) It measures performance along all major divisions of a firm, from production and manufacturing to human resources. C) It measures performance of more than just financial systems. D) It uses measurable dimensions for assessing performance. E) It measures performance of all levels of a firm, from executives to operational employees and data workers.

It measures performance of more than just financial systems.

A computerized system that performs and records the daily activities necessary to conduct business is classified as a(n): A) transaction processing system. B) management-level system. C) decision support system. D) executive support system. E) business intelligence system.

TPS

Seeing quality as the responsibility of all people and functions in an organization is central to the concept of: A) benchmarking. B) cycle time reduction. C) quality control. D) six sigma. E) TQM.

TQM

When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy. A) market niche B) mass customization C) process efficiency D) product differentiation E) market transparency

a market niche

The introduction of new information technology has: A) a dampening effect on the discourse of business ethics. B) a ripple effect, raising new ethical, social, and political issues. C) no impact. D) a beneficial effect for society as a whole, while raising dilemmas for consumers. E) a waterfall effect in raising ever more complex ethical issues.

a ripple effect raising new ethical social and political issues

In a telecommunications network architecture, a protocol is: A) a system by which packets are sent over different networks. B) a device that handles the switching of voice and data in a local area network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network. E) a standard set of rules and procedures for control of communications in a network.

a standard set of rules and procedures for control of communications in a network.

Software used to apply the computer to a specific task for an end user is called: A) system software. B) application software. C) data management software. D) network software. E) web services software.

application software

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? A) Identify the options you can reasonably take. B) Assign responsibility. C) Identify the stakeholders. D) Identify the potential consequences of your options. E) Identify and clearly describe the facts.

assign responsibility

Exposing an individual to ads that are chosen and based on the online behavior of the individual is referred to as: A) behavioral targeting. B) clickstream advertising. C) online profiling. D) long tail marketing. E) prediction marketing.

behavioral targeting

The most successful solutions or methods for achieving a business objective are called: A) benchmarks. B) best processes. C) best practices. D) core processes. E) value webs

best practices

The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as: A) IoT. B) big data. C) cloud computing. D) business intelligence. E) the mobile digital platform.

big data

Evil twins are: A) bogus wireless network access points that look legitimate to users. B) viruses that affect smartphones. C) email messages that mimic the email messages of a legitimate business. D) Trojan horses that appear to the user to be a legitimate commercial software application. E) fraudulent websites that mimic a legitimate business's website.

bogus wireless network access points that look legitimate to users.

Application controls: A) govern the design, security, and use of computer programs. B) govern the security of data files in general throughout the organization. C) can be classified as input controls, processing controls, and output controls. D) include software controls, computer operations controls, and implementation controls. E) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.

can be classified as input controls, processing controls, and output controls.

You use ________ to predict when a computer hardware system becomes saturated. A) measured service B) localization C) SLAs D) virtualization E) capacity planning

capacity planning

Intellectual property can best be described as: A) tangible or intangible property created from a unique idea. B) the expression of an intangible idea. C) intangible property created by individuals or corporations. D) unique creative work or ideas.

intangible property created by individuals or corporations

to automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management, a firm would most likely use: A) CAD systems. B) neural networks. C) genetic algorithms. D) intelligent agents. E) fuzzy logic systems.

intelligent agents

An information system can enable a company to focus on a market niche through: A) tightening linkages with suppliers. B) complex trend forecasting. C) intensive customer data analysis. D) tailoring products to the client. E) intensive product trend analysis.

intensive customer data analysis

Suppliers, customers, employees, products and services, and ________ are the five basic components with which businesses must deal. A) technology B) the environment C) sales and marketing D) manufacturing and production E) invoices and payments

invoices and payments

A VPN: A) formats web pages with dynamic links to other documents. B) is an encrypted private network configured within a public network. C) is more expensive than a dedicated network. D) is an Internet-based service for delivering voice communications. E) provides secure, encrypted communications using Telnet.

is an encrypted private network configured within a public network.

Why isn't overstocking warehouses an effective solution for a problem of low availability? A) It is an inefficient use of raw materials. B) It increases inventory costs. C) It does not speed product time to market. D) It increases sales costs. E) It increases production costs.

it increases inventory costs

Engineers and scientists are examples of: A) middle management. B) operational management. C) senior management. D) knowledge workers. E) production workers.

knowledge workers

________ is the ability to offer individually tailored products or services using the same production resources as bulk production. A) Demand customization B) Personalization C) CAD D) Mass customization E) Size customization

mass customization

The average number of baseball tickets sold at a particular price is an example of: A) meaningful information. B) feedback. C) input. D) output. E) raw data.

meaningful information

All of the following have been disruptive technologies except: A) the automobile. B) the PageRank algorithm. C) the flash drive. D) the iPod. E) minicomputers.

mini computers

To use the analog telephone system for sending digital data, you must also use: A) a router. B) twisted wire. C) coaxial cable. D) DSL. E) a modem.

modem

________ are designed to have a generalized capability to learn. A) Fuzzy logic systems B) Knowledge-based systems C) Genetic algorithms D) Expert systems E) Neural networks

neural networks

Which of the following database types would be best suited for storing multimedia? A) Open-source DBMS B) SQL DBMS C) Non-relational DBMS D) Cloud-based database

non relational DBMS

Which of the following database types would be best suited for storing multimedia? A) Open-source DBMS B) Cloud-based database C) SQL DBMS D) Non-relational DBMS E) NoSQL DBMS.

non relational DBMS

A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location is called a(n): A) e-hub. B) private industrial network. C) exchange. D) online marketplace. E) marketspace.

online marketplace

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: A) packet routing. B) software-defined networking. C) packet switching. D) ATM. E) multiplexing.

packet switching

A DBMS makes the: A) relational database available for different physical views. B) physical database available for different relational views. C) physical database available for different logical views. D) logical database available for different analytical views.

physical database available for different logical views

A DBMS makes the: A) logical database available for different analytical views. B) relational database available for different analytical views. C) physical database available for different logical views. D) relational database available for different physical views. E) physical database available for different relational views.

physical database available for different logical views.

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems. A) demand; continual B) planning; execution C) external; internal D) upstream; downstream E) push; pull

planning; execution

Selling the same goods to different targeted groups at different prices is called: A) cost customization. B) cost optimization. C) price discrimination. D) price optimization. E) price gouging.

price discrimination

A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) identifying field. D) foreign key. E) primary field.

primary key

Converting raw data into a more meaningful form is called: A) processing. B) capturing. C) inputting. D) organizing. E) feedback.

processing

Virtual reality systems: A) provide design engineers with precise, three-dimensional representations of their models. B) provide an important source of expertise for organizations. C) allow knowledge to be stored in simulated 3D environments. D) allow groups to work together on documents. E) provide simulations of walking through or manipulating a three-dimensional model or programmed real-world environment.

provide simulations of walking through or manipulating a three-dimensional model or programmed real-world environment.

A supply chain driven by actual customer orders or purchases follows a ________ model. A) push-based B) build-to-stock C) replenishment-driven D) pull-based E) continuous delivery

pull based

Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. A) foreign keys B) referential integrity rules C) one-to-one ordering D) intersection relations E) entity-relationship diagrams

referential integrity rules

Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables? A) Open source DBMS B) Hierarchical DBMS C) Relational DBMS D) Two-tiered DBMS E) Pre-digital DBMS

relational DBMS

Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience? A) Information density B) Ubiquity C) Personalization/customization D) Interactivity E) Richness

richness

Perhaps the most frequent error in problem solving is: A) being too doubtful. B) not being aware of personal limitations. C) following a rote pattern of decision making. D) rushing to judgment about the nature of a problem. E) failing to consider all dimensions of a problem.

rushing to judgment about the nature of a problem.

The U.S. Department of Commerce developed a(n) ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) FIP B) PGP C) P3P D) safe harbor E) COPPA

safe harbor

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? A) Just-in-time strategies B) Bullwhip effect C) Safety stock D) Continuous replenishment E) Demand planning

safety stock

A(n) ________ model is a method for deciding among alternative systems based on a system of ratings for selected objectives. A) scorecard B) object C) scoring D) CASE E) data definition

scorecard

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? A) Select the business processes you wish to automate. B) Select the functions of the system you wish to use. C) Rewrite the software to support the way the company's business processes work. D) Map the company's business processes to the software's business processes. E) Map the software's business processes to the company's business processes.

select the functions of the system you wish to use

The goal of social commerce applications is to: A) harness collective knowledge to generate new ideas. B) share opinions about purchasing products or services. C) upload and share business documents. D) connect through personal and business profiles. E) use social media to connect with customers.

share opinions about purchasing products or services.

________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. A) Programming B) Data management technology C) Software D) Enterprise applications E) Business intelligence

software

A networking approach where many control functions for managing the movement of data on a network are managed by a central program separately from the network itself is known as: A) cloud networking. B) software-as-a-service. C) service-oriented architecture. D) remote network management. E) software-defined networking.

software defined networking

Phishing is a form of: A) sniffing. B) war driving. C) spoofing. D) ransomware. E) logging.

spoofing

Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver?

stateful inspection

The primary storage technologies are: A) flash drives, SSDs, storage networks and magnetic disks. B) storage networks, magnetic disks, hard disks, and optical disks. C) hard drives, removable drives, storage networks, and magnetic tape. D) hard drives, magnetic tape, magnetic disk, and optical disk. E) storage networks, magnetic tape, magnetic disk, and optical disk.

storage networks, magnetic tape, magnetic disk, and optical disk.

A firm that must invest in a new information system in order to comply with federal legislation is investing to achieve which of the following business objectives? A) Customer intimacy B) Operational excellence C) Improved decision making D) Survival E) New products.

survival

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): A) switch. B) LAN. C) NIC. D) router. E) hub.

switch

When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, ________ are created. A) value webs B) core competencies C) benchmarks D) value chains E) synergies

synergies

Which process develops a detailed description of the functions that a new information system must perform? A) Systems design B) Feasibility study C) Requirements analysis D) PERT chart E) Test plan development

system design

Software that manages the resources of the computer is called: A) system software. B) application software. C) data management software. D) network software. E) web services software.

system software

________ refers to the application of knowledge, skills, tools, and techniques to achieve specific targets within specified budget and time constraints. A) Project scope B) Systems analysis C) Project implementation D) Project management E) Systems design

systems design

In order to search for and retrieve knowledge objects in an enterprise content management system, the objects themselves must be: A) indexed. B) associated with an in-house expert. C) tagged with a classification. D) organized into relevant directories. E) linked to their original sources.

tagged with classification

Specific security challenges that threaten the communications lines in a client/server environment include: A) theft, copying, alteration of data, and hardware or software failure. B) errors, vandalism, and malware. C) hacking, vandalism, and denial of service attacks. D) unauthorized access, errors, and spyware. E) tapping, sniffing, message alteration, and radiation.

tapping, sniffing, message alteration, and radiation.

Concurrent supply chains are made possible by which technology? A) ERP systems B) The Internet C) The mobile digital platform D) Just-in-time supply-chain technologies E) Supply-chain management systems

the internet

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as: A) supply and demand. B) virtual economics. C) the law of diminishing returns. D) the point of no return. E) inelasticity.

the law of diminishing returns

The entire system-building effort is driven by: A) senior managers. B) executive information requirements. C) the CIO. D) end-user user information requirements. E) the project management team.

the project management team

In a multitiered network: A) processing is handled by multiple, geographically remote clients. B) users interface with the server rather than the client. C) the work of the entire network is centralized. D) the work of the entire network is balanced over several levels of servers. E) processing is split between clients and servers

the work of the entire network is balanced over several levels of servers.

Legacy systems are still in use today because: A) they can only be run on the older mainframe computers. B) many integrate well using new Web services technologies. C) they contain valuable data that would be lost during redesign. D) they are too expensive to redesign.

they are too expensive to redesign

Information density refers to the: A) total amount and quantity of information available to all market participants. B) richness-complexity and content-of a message. C) amount of information available to reduce price transparency. D) ease with which consumers can find out the variety of prices in a market. E) total amount and quantity of information delivered to consumers by merchants.

total amount and quantity of information available to all market participants.

To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: A) break-even point. B) total cost of ownership model. C) capacity plan. D) return on investment model. E) cost benefit analysis.

total cost of ownership model

A ________ is a method of interaction with a customer, such as telephone or customer service desk. A) supply chain B) sales point C) client channel D) point of presence E) touch point

touch point

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A) All forms of intellectual property protection B) Trademark C) Trade secret D) Copyright E) Patent

trade secret

Which of the following can force a business and its competitors to compete on price alone? A) Multiple competing suppliers B) High product differentiation C) Poor process efficiency D) Transparent marketplace E) Demand control

transparent marketplace

Which of the following can force a business and its competitors to compete on price alone? A) Multiple competing suppliers B) High product differentiation C) Transparent marketplace D) Demand control E) Poor process efficiency

transparent marketplace


संबंधित स्टडी सेट्स

Ch. 25 Growth and Development of the Newborn and Infant

View Set

SIE U6 - Learning Checks, Checkpoints, etc.

View Set

Chapter 29: Infection Prevention and Control

View Set

MCB Chapter 19 genetic and epigenetic regulation

View Set