Info 360 Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Conversational marketing can take place in which of the following forums?

. e) All of the above

Cybercriminals can obtain the information they need in order to assume another person's identity by:

All of the above are strategies to obtain information to assume another person's identity.

Object-oriented development

Focuses on the processes that must be modeled to perform that task.

The reliability of the content in Wikipedia, the online encyclopedia, is questionable because

It is difficult to test the authenticity of the content due to the fact that anyone can contribute content.

Which of the following is not an advantage of radio?

Radio waves do not create electrical interference problems.

Refer to Closing Case 1 - Compliance: Which of the following is not an important component of a GRC framework?

Restricing employee use of Web sites.

Which of the following is false?

TPS need large computers to process the transactions

Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?

The site should be an almost exact replica of the IT configuration at headquarters

The forecast for your company's headquarters predicts the area hit head on by a hurricane,. The company sends you to their cold site to minimize downtime should such a disaster hit. Which of the following statements is false?

The site will have all of the company's applications

The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.

WiMAX

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources

a) Access

Routine reports are produced at scheduled intervals and have set data requirements. _____ reports are used when requirements are not routine.

a) Ad hoc

____ is a software development methodology that delivers functionality in rapid iterations, usually measured in weeks.

a) Agile development

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.

a) Alien software

) _____ is a wireless standard that enables temporary, short-range connection between mobile devices.

a) Bluetooth

_____ occurs when a business sells a group of products or services together at a lower price than the combined individual prices of the products.

a) Bundling

Which one of the following statements is false?

a) Businesses tend to view government regulations as expensive constraints on their activities. b) Government deregulation reduces competition. c) IT support is essential for compliance with many new regulations. d) IT has been used to identify patterns of behavior associated with terrorist activities. e) Information ethics can destroy the morale of a company's employees. Answer: b

A(n) _____ represents a single character, such as a letter, number, or symbol.

a) Byte

Which of the following statements is false?

a) Data consolidation and a 360-degree view mean the same thing.

_____ occurs when applications cannot access data associated with other applications.

a) Data isolation

Which of the following is not a response by organizations to business pressures?

a) Delay releases of innovated products.

) _____ portals automate the business processes involved in selling products from a single supplier to multiple buyers.

a) Distribution

_____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form.

a) Electronic checks

The major problem with RFID has been _______.

a) Expense

_____ attempt to duplicate the work of human experts by applying reasoning capabilities.

a) Expert systems

) Which of the following is not an advantage of the buy option for acquiring IS applications?

a) Few types of off-the-shelf software are available, thus limiting confusion.

) _____ connect buyers and sellers across many industries and are used mainly for indirect materials.

a) Horizontal exchanges

Systems design answers the question, _____:

a) How will the information system resolve the business problem?

_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.

a) IT components

Place the stages of the systems development life cycle in order:

a) Investigation - analysis - design - programming/testing - implementation - operation/maintenance

Potential problems with on-demand CRM include all of the following except:

a) It increases costs for the organization.

Which of the following is not an advantage of the joint application design approach to systems development?

a) It involves fewer users in the development process.

_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem.

a) Knowledge, information

_____ networks use multiple Wi-Fi access points to create a wide area network.

a) Mesh

The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________.

a) Mobility, broad reach

with the shortest range of any wireless network, is designed to be used with contactless credit cards.

a) Near-field communications

Which of the following is not a reason why managing data is difficult over time?

a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time. Answer: e

The information systems planning process proceeds in which order?

a) Organization mission - organization strategic plan - IS strategic plan - new IT architecture

Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly.

a) Phones, digital cameras

_____ tell the database management system which records are joined with others in related tables.

a) Primary keys

The greatest problem with GEO satellites is which of the following?

a) Propagation delay

Data dictionaries perform all of the following functions except:

a) Providing information on each record.

In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions

a) RF jamming

Which of the following was not included in early ERP systems?

a) Sales and Marketing

_____ specify how work is to be divided between the company and its vendors.

a) Service-level agreements

Refer to Closing Case #1 - Facebook Commerce: Which of the following is true about Facebook commerce?

a) Shoppers can make purchases without leaving Facebook..

34) Business pressures on organizations are created when there are changes in

a) Social factors b) Economic factors c) Legal factors d) Political factors e) Changes in all of the above will create business pressures. Answer: e

_____ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet.

a) Software-as-a-Service

The _____ that changes are made in the systems development life cycle, the _____ expensive these changes become)

a) Sooner, less

) _____ is the ability for all organizations in a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers' production processes and transportation networks to their receiving docks.

a) Supply chain visibility

) Which of the following systems acquisition methods is time consuming, costly, and may produce excessive documentation

a) Systems development life cycle

Which of the following systems acquisition methods requires staff to systematically go through every step in the development process and has a lower probability of missing important user requirements?

a) Systems development life cycle

_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station.

a) Telemetry

The data in a data warehouse have which of the following characteristics?

a) They are organized by subject.

Compared to data warehouses, data marts have which one of the following characteristics?

a) They cost less.

_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities

a) Transaction data, master data

Which of the following is not a mobile application in financial services?

a) Transaction processing systems

Refer to Closing Case 2 - Computer Espionage: Which of the following is not a technique used in electronic espionage?

a) VPN

_____ are segments of computer code that attach to existing computer programs and perform malicious acts.

a) Viruses

The FedEx extranet that allows customers to track the status of a package is an example of which type of extranet?

a) a company and its dealers, customers, and/or suppliers

In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n):

a) attribute.

In ________ e-commerce, an organization provides information and services to its workers.

a) business-to-employee

In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time

a) buy-side

An information system that analyzes credit card applications and suggests approval or denial is a(n):

a) expert system

eBay uses a _____ auction

a) forward

The primary goal of extranets is to ______

a) foster collaboration between and among business partners

Direct payment of Social Security benefits is an example of ______ ecommerce.

a) government-to-citizen

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.

a) keyloggers, screen scrapers

Unintentional threats to information systems include all of the following except:

a) malicious software

Explicit knowledge has which of the following characteristics?

a) objective

To effectively manage by exception (i.e., use exception reports), the company must first create:

a) performance standards

Crediting interest to your savings account at your bank once a month, it is called a:

a) process

Which of the following is an important enabler of CRM?

a) recognizing that there are many customer touch points

Returned products, recycled products, and disposal of materials or products are called:

a) reverse flows

Which of the following is not a characteristic of a transaction processing system?

a) small amounts of data are processed

The digital divide is an example of which type of societal pressure?

a) social responsibility

Market pressures include which of the following?

a) the global economy

When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data.

a) transaction processing system

You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-sized car of the same brand for you to drive. The salesperson is engaged in:

a) up-selling

An information system's _____ is the possibility that the system will be harmed by a threat.

a) vulnerability

You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is not on the ________________ list so it cannot be installed.

a) white

Social computing has allowed customers

a. a) To be advocates and influencers.

Which type of social network allows users to edit and contribute content posted to a particular site?

a. a) Wiki

Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services.

a. a) intermediaries

35) Which of the following statements concerning blogging is false?

b) A reader can believe all of the details in a blog.

_____ is a feature that must be offered by a competing organization in order to survive in the marketplace

b) An entry barrier

Which of the following is false?

b) An organization doesn't have to use the business processes coded into the ERP.

_____ creates statistical models of customer behavior and the value of customer relationships over time.

b) Analytical CRM

_____ examines customer data in detail for designing and executing targeted marketing campaigns

b) Analytical CRM

A(n) _____________ is a computer program designed to support a specific task or business process.

b) Application

Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except:

b) Benefits tend to be more tangible than costs.

_____ are the most successful solutions or problem-solving methods for achieving a business objective

b) Best practices

In the data hierarchy, the smallest element is the _____.

b) Bit.

_____ is a form of _____.

b) Bundling, cross-selling

Which of the following statements concerning customer relationship management is false?

b) CRM constitutes a specific use of technology.

) _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.

b) Cell phones

_____ systems provide interactive communication with the customer throughout the organization

b) Collaborative CRM

The computing skills necessary to be a hacker are decreasing for which of the following reasons?

b) Computer attack programs, called scripts, are available for download from the Internet.

The comments of consumers in the blogosphere concerning a company's products are called ____________________.

b) Consumer-generated media.

Refer to IT's About Business 8.5 - Scientific Discoveries: InnoCentive organizes online contests (challenges which are aimed at solving a business or scientific problem) with prize money. This is an example of

b) Crowdsourcing

) Electronic CRM applications are considered to be which type of CRM application?

b) Customer-touching

Not including alphabetic characters in a Social Security Number field is an example of _____

b) Data integrity.

Which of the following is the most difficult and crucial task in evaluating a vendor and a software package?

b) Determining the evaluation criteria

_____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.

b) Digital wallets

A firm shuts down its old COBOL legacy system and immediately starts up its new PeopleSoft ERP system. This process is called __________ conversion.

b) Direct

________ conversion is the riskiest type of conversion process.

b) Direct

Which of the following is false?

b) ERP systems look the same to users as functional information systems.

Which of the following statements is false?

b) Each functional area within an organization has only one application.

_____ feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project.

b) Economic

_____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer's and seller's banks.

b) Electronic credit cards

Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.

b) Evil twin

A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number

b) Field

Which of the following is not a process within an information system for Human Resource Management?

b) Firing decisions

Which of the following is false?

b) Functional area information systems easily communicate with each other.

A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.

b) Hotspot

IT personnel use _____ to produce _____.

b) IT components, IT services

The IT infrastructure is comprised of _______ and ________.

b) IT components, IT services

As an MIS analyst, you have decided to use a prototyping methodology for a small, Web-based design project. What is the order of steps that you will follow in the project?

b) Identify user requirements; develop the prototype; use the prototype; revise and enhance the prototype.

As systems age, maintenance costs _____.

b) Increase

_____ is (are) data that have been organized to have meaning and value to a recipient.

b) Information

Which of the following is false?

b) Information systems are only used by large organizations.

) _____ is the time between the receipt of incoming goods and the dispatch of finished, outbound products.

b) Inventory velocity

The _____ approach to systems development is a group-based tool for collecting user requirements.

b) Joint application design

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.

b) Knowledge management

Refer to Opening Case - Tiger Tans and Gifts: Which of the following is true about Lisa's use of Facebook to grow her business?

b) Lisa does not do online selling via Facebook

Which of the following is a problem that e-commerce can cause for the airline industry?

b) Mistakes in fares

Which of the following statements concerning technology pressures on modern businesses is true?

b) New technologies offer alternative service options.

_____ is a method for analyzing and reducing a relational database to its most streamlined form.

b) Normalization

With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________.

b) Passively receive information, participate with the site.

In the _____ stage of the systems development life cycle, the design specifications are translated into computer code.

b) Programming

Which of the following systems acquisition methods helps clarify user requirements, promotes genuine user participation, and may produce part of the final system?

b) Prototyping

Which of the following systems acquisition methods may encourage inadequate problem analysis, is not practical with large numbers of users, and may result in a company's purchasing a lower-quality system?

b) Prototyping

A _____ is sent to potential vendors inviting them to describe their product and how it would meet the firm's needs

b) Request for proposal

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.

b) Risk analysis

_____ reports are produced at scheduled intervals.

b) Routine

When users ask for added functionality during a systems development project, this is called:

b) Scope creep.

_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy.

b) Secondary keys

Which of the following is (are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

b) Spamware

______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary.

b) Stored-value money cards

What would be the best use of RFID in a business?

b) Supply chain management

The deliverable of the systems design stage is:

b) Technical system specifications.

_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets

b) Telematics

How does the Internet affect the way you purchase your textbooks?

b) The Internet increases your bargaining power.

Which of the following is an advantage of social commerce over traditional ecommerce?

b) The ability to predict buying habits based on real-time data

You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?

b) The message could be a phishing attack.

Which of the following is not a part of the typical IS operational plan?

b) The organizational mission

Which of the following statements about your future role as a manager is false?

b) The size of my team will likely be smaller than teams of today.

Organizations are turning to data governance for which of the following reasons?

b) They are responding to federal regulations.

Data dictionaries provide which of the following advantages to the organization?

b) They enable faster program development.

The most important benefit of knowledge management systems is:

b) They make best practices available to employees.

Sense networks track users via all of the following technologies except _______

b) Traffic cameras

_____ is a sales strategy which the business person will provide customers the opportunity to purchase higher-value related products.

b) Up-selling

Refer to IT's About Business 8.3 - Buying a Vehicle Takes Work: Cars.com integrates different types of data from different sources and presents it to customers. Which of the following is false about its Web 2.0 efforts?

b) Users need to join Cars.com in order to obtain pricing quotes from dealerships.

_____ is the strategy of purchasing upstream suppliers, in order to ensure availability of supplies.

b) Vertical integration

The act of locating wireless local area networks while moving around a city is called ____.

b) War driving

The main problem with radio transmission is which of the following?

b) When you travel too far from the source, the signal fades.

) Parking meters that you can pay via your mobile telephone are an example of _________.

b) Wireless electronic payment

You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?

b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines.

Which of the following is not an advantage of e-tailing?

b) You have only a few products to choose from.

A set of programs that enable the hardware to process data is _____.

b) application

Access controls involve _____ before _____.

b) authentication, authorization

You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is on the ________________ list so it cannot be installed.

b) black

Difficulties in order fulfillment are most closely associated with which type of electronic commerce?

b) business-to-consumer

In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism?

b) electronic tendering system

The process of moving data from various sources into the data warehouse is called:

b) extracting, transforming, and loading.

Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices.

b) high, low

Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.

b) high, repetitive, easy

Employees in which functional areas of the organization pose particularly grave threats to information security?

b) human resources, management information systems

For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry

b) increases, decreasing

The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________.

b) information

An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.

b) information technology infrastructure

The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?

b) innovation

Packaging, assembly, and manufacturing take place in which segment of the supply chain?

b) internal

Which of the following is not a benefit of EDI?

b) length of messages is longer

Which of the following allows customers to connect to a company representative and conduct an instant messaging session?

b) live chat

A _____ is a document that grants the holder exclusive rights on an invention for 20 years.

b) patent

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key

b) public, private

In a relational database, every row represents a(n) _____.

b) record

In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically

b) sell-side

The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer

b) sell-side

Which of the following is the most important enabler of the 360-degree view of the customer across an organization?

b) the organization's data warehouse

) In _____, direct and indirect materials in one industry are purchased on an asneeded basis

b) vertical exchanges

Which of the following is a type of collaborative consumption?

b. b) Craigslist

50) Which of the following is not an example of social shopping?

b. b) Going to Amazon.com to buy a book

Which of the following social shopping methods contributes to environmental sustainability?

b. b) Peer-to-peer shopping

The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________.

b. b) social intelligence

Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is false?

c) A hot site needs to be located close to the organization's offices

Which of the following is a true statement about the impact of social computing on a business?

c) A small minority of individuals contribute the majority of feedback and can provide skewed data

A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?

c) A trade secret

The cost of a stolen laptop includes all of the following except:

c) Backup costs

Which of the following is true about social commerce?

c) Businesses can easily learn about customers' experiences.

The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the

c) CIO

Which of the following statements is false?

c) Companies that purchase open-source software cannot modify it.

_____ includes those areas where customers directly interact with the company.

c) Customer-facing CRM

_____ occurs when various copies of the data agree.

c) Data consistency

Which of the following has (have) the broadest impact on an organization?

c) Decisions about data

Agile development

c) Delivers functionality in rapid interactions.

Which of the following is not an effect that E-commerce has had on organizations?

c) E-commerce is a costly medium for increasing market share.

) _____ refers to efforts by unauthorized users to access data traveling over wireless networks

c) Eavesdropping

Which of the following systems acquisition methods may eventually require maintenance assistance from the IT department, can produce inadequate documentation, and might result in a company's acquiring a system with inadequate interfaces to existing systems?

c) End-user development

) _____ systems are designed to correct a lack of communications among _____.

c) Enterprise resource planning systems, functional area information systems

_____ reports include only information that falls outside certain threshold standards

c) Exception

The area of the earth reached by a satellite's transmission is referred to as its

c) Footprint

_____ are simple tools for answering repetitive customer questions

c) Frequently asked questions

___________ include B2B and B2C.

c) Functional area information systems

Which type of satellite has the largest footprint?

c) Geostationary

Which of the following statements about the potential impact of IT on nonmanagerial workers is true?

c) IT could cause employees to experience a loss of identity.

Competitive advantage for an organization manifests itself as all of the following except:

c) Increased time to market

The development of mobile commerce is driven by all of the following factors except:

c) Increasing prices.

What does a systems analyst do?

c) Interfaces between end users and programmers

Internet advertising improves on traditional advertising in all of the following ways except:

c) Internet ads are always more effective than other types of advertising.

Which of the following is not a process within an information system for Accounting and Finance?

c) Inventory management

The benefits of open-source CRM include all of the following except:

c) It has more functionality than in-house CRM systems.

Which of the following statements is false?

c) It is easy to assess the value of a hypothetical attack.

Which of the following is not a limitation of EDI?

c) It is expensive, but ongoing operating costs are low.

_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem

c) Knowledge

Which of the following has not been identified as a reason for ERP implementation failure?

c) Lack of documentation

_____ are the physical products, raw materials, and supplies that flow along a supply chain.

c) Material flows

Business transactions that are processed as they occur is an example of

c) OLTP

_____ systems support the front-office business processes which directly interact with customers.

c) Operational CRM

_____ feasibility concerns a firm's policies and politics, power structures, and business relationships.

c) Organizational

) _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily.

c) Permission marketing

Refer to IT's About Business 7.3 - How to Fight a Botnet: A botnet is a collection of Intenet connected computers whose security defenses have been breached and control ceded to a malicious party. Which of the following types of software attacks did Rustock use to create its botnet.

c) Phishing attack

Which of the following is not an example of crowdsourcing?

c) Posting a call for out-pf-date textbooks

) _____ are typically used for unplanned B2B purchases for amounts under $2000.

c) Purchasing cards

Which of the following statements concerning the difficulties in protecting information resources is not correct?

c) Rapid technological changes ensure that controls are effective for years.

A(n) _____ is a logical grouping of related fields.

c) Record

Which of the following statements regarding the relationship between electronic commerce and search is not correct?

c) Retailers will provide fewer product details to avoid information overload for customers.

37) _____ auctions employ a request for quotation.

c) Reverse

_____ auctions are the most common auction model for large purchases.

c) Reverse

Which of the following statements about IT's role in society is false?

c) Robots can handle unfamiliar situations.

Refer to Closing Case #2 - Social Computing at Starbucks: Which of the following is not an example of how Starbucks is using social computing

c) Starbucks has not yet begun to use YouTube to increase its online presence.

Which of the following is false?

c) The POM function within an organization monitors sales.

Which of the following is not an example of business - IT alignment?

c) The company views IT as a way to support the business but not as a way to create new revenue streams.

Refer to IT's About Business 7.1 - "Anonymous" Attacks the Vatican: Which of the following statements about Anonymous' attack on the Vatican is true?

c) The final effort was a DDoS attack.

Which of the following is not inhibiting faster Wi-Fi expansion?

c) The growth of WiMAX

Of the following, which is the major problem with smart phones?

c) They can be used to compromise security.

Which of the following is not a limitation of barcodes?

c) They identify the manufacturer, product, and item.

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

c) Trojan horses

Which of the following is the most appropriate wireless technology for realtime location of caregivers and mobile equipment in healthcare environments?

c) Ultra-wideband

_____ networks collect data from many points over an extended space.

c) Wireless sensor

The advantages of electronic commerce for consumers include all of the following except:

c) You typically cannot access additional information, so you do not have information overload.

The complete data on a customer is called:

c) a 360-degree view

A collection of related files, tables, and so on that stores data and the associations among them is _____.

c) a database

Pinterest is:

c) a shareable online bulletin board.

Knowledge workers

c) advise middle managers

The data in a data warehouse:

c) are not updated.

The _____ refers to erratic shifts in orders up and down the supply chain.

c) bullwhip effect

AT&T sells telephone services that include local and long-distance service, voice mail service, caller ID, and digital subscriber line access to the Internet. This is a form of:

c) bundling

In _______ e-commerce, the sellers and buyers are organizations.

c) business-to-business

Which type of electronic commerce is the largest by volume?

c) business-to-business

Rank the following in terms of dollar value of the crime, from highest to lowest.

c) cybercrime - white collar crime - robbery

Which of the following is the correct hierarchy from the lowest level to the highest level?

c) data, information, knowledge

) The practice of using similar but not identical domain names is called _____.

c) domain tasting

Distribution or dispersal takes place in which segment of the supply chain?

c) downstream

Which information system is the most closely associated with the Internet?

c) electronic commerce systems

Two information systems that support the entire organization are:

c) enterprise resource planning systems, transaction processing systems

Which of the following is not an electronic commerce application?

c) evaluating an employee

Office automation systems

c) include report generators.

. A database management system is primarily a(n) _____.

c) interface between applications and a database

Supply chain systems are which type of information system?

c) interorganizational information systems

If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____.

c) knowledge

Trends that have led to the supply chain concept include all of the following except:

c) modern organizations are buying their suppliers in order to have more transparency along the supply chain

The sales, marketing, and service functions are part of:

c) operational CRM

You start a new job. You know that logging in with your password authenticates who you are. What actions, rights, or privileges you have based on

c) passphrase.

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a PostIt note and put it on your laptop screen. This is an example of

c) poor security.

When data are normalized, attributes in the table depend only on the _____.

c) primary key

36) In the _____, the production process begins with a customer order.

c) pull model

The _____ is known as make-to-order.

c) pull model

In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins

c) reverse

In _____, the organization takes concrete actions against risks.

c) risk mitigation

One of the problems that HR departments have with using social computing to recruit is

c) they receive many more applications than they can process.

Which of the following is not a goal of supply chain management?

c) to increase cycle time

A _____ is intellectual work that is known only to a company and is not based on public information.

c) trade secret

Data that have been processed by the organization's _____ are inputs into the organization's database.

c) transaction processing systems

Dumpster diving is:

c) typically committed for the purpose of identity theft.

Tacit knowledge has which of the following characteristics?

c) unstructured

The _____ is comprised of a company's suppliers, the suppliers' suppliers, and the processes for managing them.

c) upstream portion of the supply chain

Enterprise resource planning systems

c) use a common database for all functional areas.

When Walmart sells a package of diapers, the company captures data on that sale at its point-of-sale terminal and transmits those data to the company that makes the diapers. When inventory gets too low, the diaper company ships more diapers in that Walmart store. This process is called:

c) vendor-managed inventory

Which of the following is true about the impact of social computing on customer service?

c. c) Customers themselves can be used to reduce problems.

A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________.

c. c) Enterprise Social Networks

Groupon is an example of ________________

c. c) Group shopping

Which of the following is false about social advertising?

c. c) Social advertising removes peer pressure from the buying decision.

57) The monitoring, collection, and analysis of socially generated data is called

c. c) Social intelligence

Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet.

d) 802.11g

_____ systems study customer behavior and perceptions to provide business intelligence

d) Analytical CRM

Which of the following statements about scope creep is true?

d) Because scope creep is expensive, successful project managers limit it.

_____ feasibility addresses the human issues of an information systems project

d) Behavioral

Which of the following is not an example of social commerce?

d) Best Buy has a Web site which can be used to purchase products for pick up in a store.

Which of the following is the most appropriate wireless networking standard for creating personal area networks?

d) Bluetooth

Which of the following is not an example of the growing initiative called green IT?

d) Building computer applications that use less energy

_______ e-commerce is also known as e-tailing.

d) Business-to-consumer

Which of the following systems acquisition methods can result in a company's acquiring software that is controlled by another company, may be difficult to enhance or modify, and may not support the desired business processes?

d) Buy option

Which of the following systems acquisition methods saves the company's time, enables the company to select software that has been used for similar problems in other organizations, and allows the company to try out the software?

d) Buy option

Using social computing tools to do market research

d) Can foster closer customer relationships

33) Which of the following statements is false?

d) Competitive advantage requires the use of technology.

The capabilities of smart phones include all of the following except

d) Corporate transaction processing

_____ are applications and technologies with which customers interact and typically help themselves.

d) Customer-touching applications

) _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else

d) Cybersquatting

_____ is a formal approach to managing data consistently across an entire organization.

d) Data governance

_____ occurs when the same data are stored in many places.

d) Data redundancy

________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen

d) Disintermediation

_____ integrate the planning, management, and use of all of an organization's resources, and are designed to tightly integrate the functional areas of the organization.

d) Enterprise resource planning systems

A(n) _____ is a logical grouping of related records.

d) File

Which of the following statements concerning firewalls is false?

d) Firewalls filter messages the same way as anti-malware systems do.

Which of the following statements is false?

d) IT reduces stress by giving managers more time to make decisions.

Which of the following is not a part of systems analysis?

d) Identifying the technical specifications of the solution

Which of the follow statements concerning customer interaction centers (CIC) is false?

d) In inboard telesales, the customer calls the CIC.

_____ consist of data that are related to demand, shipments, orders, returns, and schedules.

d) Information flows

The workforce in developed countries is exhibiting all of the following trends except:

d) It includes fewer persons with disabilities.

All of the following are limitations of traditional payment methods in electronic commerce except:

d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer.

Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________.

d) Location-based advertising

Which of the following statements concerning the management of information resources is not true?

d) Managing mainframes has become more difficult.

_____ provide(s) companies with a single version of the truth for their data.

d) Master data management

_____ is a CRM system that is hosted by an external vendor in the vendor's data center.

d) On-demand CRM

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

d) Phishing

A firm implements a new information system in one of its plants, assesses the new system's performance, and then implements the new system in its other plants. This is an example of __________ conversion.

d) Pilot

Which of the following is not an example of a transaction?

d) Printing a report

The generic term for technologies that use radio waves to automatically identify individual items is __________.

d) Radio-frequency identification

Which of the following is not a strong password?

d) Rainer

_____ is the component of an operational CRM system that automatically records all the aspects in a sales transaction process.

d) Sales force automation

_____ contain a chip that can store information and be used for several purposes.

d) Smart cards

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

d) Social engineering

A standardized language used to manipulate data is _____.

d) Structured Query Language

When systems are created rapidly, without a formal development methodology:

d) Testing and documentation may be inadequate.

A company's IT architecture includes all of the following except:

d) The members of the IT staff

Which of the following statements about loyalty programs is false?

d) The purpose of loyalty programs is to reward past behavior

The forecast for your company's headquarters predicts the area hit head on by a hurricane,. The company sends you to their warm site to minimize downtime should such a disaster hit. Which of the following statements is true?

d) The site will not have any of the company's applications.

Companies use Web sites for commerce for all of the following reasons except:

d) To reduce the amount of actual cash they need to deal with.

LinkedIn is a _______________________ social networking site that makes money from advertising and services.

d) Video-upload

_____ refers to online word-of-mouth marketing.

d) Viral marketing

Which of the following is not a social networking site?

d) Wikipedia

You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen?

d) You will be notified of updates in the content areas you selected.

Which of the following best describes CRM?

d) a way of thinking and acting

Enterprise resource planning systems take a(n) _____ view of the overall organization

d) business process

Which type of electronic commerce does Amazon practice?

d) business-to-consumer

If you are an worker managing your fringe benefits over your company's intranet, you are engaging in _________ e-commerce.

d) business-to-employee

In the relational database model, related tables can be joined when they contain common _____.

d) columns

Over time, the customer relationship with vendors has become more impersonal for all of the following reasons except:

d) customer relationship management systems were developed

When customers help themselves, often through electronic touch points, this process is called:

d) customer-touching CRM

A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____.

d) data, information

Which of the following is not a problem along the supply chain?

d) decreased cycle times

) The ________ refers to a company's organization and processes for distributing and delivering products to its final customers.

d) downstream portion of the supply chain

In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention

d) group purchasing

Today's customers have

d) higher expectations

Which of the following is not a possible solution to supply chain problems?

d) horizontal integration

) Refer to IT's About Business 9.4 - The Future of Shopping: eBay purchased companies to strengthen itself as a _________________ company.

d) hybrid online/offline shopping experience

Interorganizational information systems result in all of the following except:

d) increased cycle time

The most overlooked people in information security are:

d) janitors and guards

Which of the following factors is not increasing the threats to information security?

d) limited storage capacity on portable devices

The threat of competitors' entering the automobile manufacturing industry is _____ because barriers to entry are so _____.

d) low, high

The Bodymetrics body scanner is best characterized as an example of:

d) mass customization.

Producing identical items in large quantities is called:

d) mass production.

Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes?

d) operational effectiveness

A _____ is automatically launched by some trigger and appears behind the active window

d) pop-under ad

) Which of the following is not a function of functional area information systems?

d) providing data from business events to the corporate database

Your friend works in the risk management department for a mid-size financial institution. She said it's an interesting job - she has to put a value on each asset (information included), determine a probability that it would get compromised, and compare that to the cost of protecting that asset. This process is called

d) risk analysis.

Passwords and passphrases are examples of:

d) something the user knows.

A(n) _____ refers to the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses to the end customer

d) supply chain

The degree of digitization relates to all of the following except:

d) the size of e-commerce transactions

A _____ is any danger to which an information resource may be exposed.

d) threat

) Information-based industries are most susceptible to which one of Porter's five forces?

d) threat of substitute products

When interest is credited to your savings account at your bank, it is called a:

d) transaction

The most fundamental information systems in an organization are

d) transaction processing systems

The characteristics of ERP systems include all of the following except:

d) typically fitting an organization's existing business processes

In a database, the primary key field is used to _____.

d) uniquely identify a record

Extranets use _____ technology to make communication over the Internet more secure.

d) voice-over IP

An organization's e-mail policy has the least impact on which of the following software attacks?

d) zero-day

Ratings, reviews, and recommendations

d. d) Are an aspect of social shopping.

All of the following are used to provide online market research except

d. d) Emails

A company's IT application portfolio is

e) A list of application to be added or modified.

Which of the following is not an example of Web 2.0 applications?

e) AJAX

Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?

e) All of the above

Which of the following are disadvantages of the buy option for acquiring IS applications?

e) All of the above

Which of the following statements about determining the costs and benefits of IT investments is false?

e) Benefits are hard to quantify because they are tangible.

_____ is the practice of marketing additional related products to customers based on a previous purchase.

e) Cross-selling

) _____ are interorganizational ERP systems that provide Web-enabled links between an organization's key business systems and its customers, suppliers, business partners, and others.

e) ERP II systems

_____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization.

e) Electronic business, electronic commerce

involve money transfers, payments, credit card information and authorization, payment schedules, e-payments, and credit-related data.

e) Financial flows

_____ is a satellite-based tracking system that enables users to determine a person's position

e) Global positioning system

Microwave transmission systems are used for _____ volume, _____ distance, _____ communications.

e) High, long, line-of-sight

The most common wireless technology for TV and DVD remote control devices is _______.

e) Infrared

Which of the following is not a strategy for mitigating the risk of threats against information?

e) Installing an updated operating system.

Cyberbanking offers all of the following advantages except:

e) It is more expensive for the customer.

56) _____ reports summarize the performance of critical activities.

e) Key indicator

Which of the following is not a cause of inadequate alignment between IT and business?

e) Lack of funds

With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services.

e) Localization of products and services

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.

e) Logic bombs

Refer to Opening Case -- Small Businesses in Danger; Which of the following is not a consequence of poor information security practices?

e) Loss of equipment

Web site that combines content from other Web sites to form new content is called a(n) ______

e) Mashup

_____ enable two individuals to transfer funds without using a credit card.

e) Person-to-person payments

_____ portals automate the business processes involved in purchasing products between a single buyer and multiple suppliers.

e) Procurement

In the traditional systems development life cycle, users:

e) Provide information requirements.

Which of the following models best describes the business model of large automobile manufacturers?

e) Push model

Which of the following tools are not used by marketing professionals to compile market research?

e) RSS

) A(n) _____ allows unauthorized entry into a wireless network.

e) Rogue access point

Refer to Closing Case 2: Kickbucks to Shop!: Which of the following statement about Shopkick is false?

e) Shopkick is only used by small boutiques.

Building relationships, anticipating needs, and providing special deals for the community's members is a function of which category of Web 2.0 applications?

e) Social commerce

Refer to IT's About Business 8.4 - So You Want to Find a Job: Which of the following is a benefit of searching for a job online?

e) Social networking can help personalize the search.

A ____________ collects and processes data to support the business functions.

e) TPS system

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?

e) The name of the company spelled backward

Which of the following is false about ERP II systems?

e) These ERP systems have no optional modules.

The drawbacks of ERP systems include all of the following except:

e) They consist of modules

Which of the following is not a characteristic of strong passwords?

e) They tend to be short so they are easy to remember.

Which of the following is true?

e) Transactions generate a small volume of data.

Which of the following statements about Wi-Fi is not correct?

e) Wi-Fi is expensive to set up.

Many companies are using ________ to capture updated product features and specifications.

e) Wikis

You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?

e) Wikis

If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________.

e) Wireless electronic payment system

Which of the following is not a benefit of being an informed user of IT?

e) Working in the IT side of the organization.

A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model?

e) affiliate marketing

The benefits of EDI include which of the following?

e) all of the above

The bullwhip effect results from which of the following?

e) all of the above

The goals of supply chain management include which of the following?

e) all of the above

In _____, company representatives use multiple communication channels to support their customers' communications preferences.

e) customer interaction centers

In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.

e) distributed denial-of-service

The threat of competitors' entering a market is very high in industries that perform a(n) _____ role and in industries where the primary product or service is _____.

e) intermediation, digital

The Bank of America extranet for commercial loans links lenders, loan brokers, escrow companies, title companies, and others. This is an example of which type of extranet?

e) joint venture

Producing customized items in large quantities is called:

e) mass customization.

Which of the following is not a customer touch point?

e) none of the above - all are touch points

The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel.

e) physical, digital

Which of the following is not responsible for the bullwhip effect?

e) poor supply forecast

Crowdsourcing

e) presumes that a large number of enthusiasts can outperform a small group of experienced professionals.

In the _____, the production process begins with a forecast.

e) push model

The _____ is known as make-to-stock.

e) push model

In _____, the organization purchases insurance as a means to compensate for any loss.

e) risk transference

Voice and signature recognition are examples of:

e) something the user does.

Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions.

e) structured, business processes

An organization's IT components include all of the following except:

e) users

HR departments use social computing applications to assist them in which of the following activities:

e. e) All of the above

Which of the following is a risk of social computing?

e. e) Consumer-generated content is not edited or filtered

Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge

explicit

Biometrics are an example of:

something the user is

When interest is credited to your savings account at your bank, it is called a:

transaction

In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved

whitelisting, blacklisting


संबंधित स्टडी सेट्स

Business Law II-Exam 5 (Chapters 36, 37, 44)

View Set

2.12 Unit Test : Theme and Characters

View Set

women's gender sexuality midterm

View Set

Descubre 1 Lección 8 Pronunciación p271 ll, ñ, c, and z

View Set

AP Gov- UNIT 5: Political Participation

View Set

Topic 3 Interest Groups: Organizing for Influence

View Set