Midterm Review
33. Which of the following statements is true of retargeting? (Ch. 7)
"B) It employs personalized ads to direct shoppers back to a retailer's Website they previously
48. Which of the following statements is true of network-management software? (Ch. 6)
"B) With network-management software, a manager on a networked personal computer can scan for
50. Which of the following statements is true of product lifecycle management (PLM) software? (Ch. 8)
B) It provides documents required for FDA and environmental compliance.
41. is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results. (Ch. 6)
B) Search engine optimization
43. According to the classification of enterprise resource planning (ERP) vendors, vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations. (Ch. 8)
B) Tier II
37. consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes. (Ch. 6)
B) Web services
34. In terms of information systems, Wikipedia would be an example of . (Ch. 1)
B) a group IS
37. As an organization's purchasing systems generate purchase orders and the items ordered are received, information is sent to the system to manage the amounts owed by the organization. (Ch. 8)
B) accounts payable
48. Unlike B2C sites, some B2B sites . (Ch. 7)
B) allow price negotiations
28. The fiber-optic cables that span the globe over land and under sea make up the Internet . (Ch. 6)
B) backbone
43. In a __________ , all network devices are connected to a common backbone that serves as a shared communications medium. (Ch. 6)
B) bus network
29. Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only when . (Ch. 7)
B) buyers live in a state where the merchant has a physical presence
54. E-commerce sites are able to keep the amount of data entry errors to a minimum . (Ch. 7)
B) by having the buyers enter products information themselves
35. Which of the following is NOT one of the three basic components of a successful e-commerce model? capital commerce community content (Ch. 7)
B) capital
53. Suppose a business wishes to have access to servers, and storage devices, but does not want to buy them. What is their best choice? (Ch. 6)
B) cloud computing - infrastructure as a service
41. Information systems applications help sales and marketing professionals with all of the following EXCEPT . (Ch. 1)
B) computer-assisted manufacturing
43. The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization. (Ch. 5)
B) data administrator
54. At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________. (Ch. 5)
B) data lifecycle management
47. Starting from monthly sales data, if you wish to get weekly sales data, use the ___ feature. (Ch. 5)
B) drill down
30. A(n) is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business. (Ch. 8)
B) enterprise system
27. In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT: (Ch. 2)
B) finance and accounting
33. The value of information is directly linked to how it helps decision makers achieve their organization's . (Ch. 1)
B) goals
56. Calligraph Publishing Company has created a system for storing every piece of data about every one of its books, both those that have already published and those that are still in production. The production team can input and access information about each book's format, editors can specify which procedures are in use, salespeople can input and access information about each book's sales history and availability, and even some external partners are allowed to access some data. This is an example of a(n) . (Ch. 1)
B) knowledge management system
44. A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) . (Ch. 1)
B) management information system MIS)
48. Purchasing uses information from the to place purchase orders for raw materials with qualified suppliers. (Ch. 8)
B) materials requirement plan
56. Social journalism or citizen journalism . (Ch. 6)
B) may not be as reliable as mainstream media sources
36. A(n) ______ is an HTML code, not visible on a displayed Web page, that contains keywords representing the Website's content, which search engines use to build indexes pointing to the Website. (Ch. 7)
B) meta tag
49. In most large organizations, the IS department is divided into the following functions . (Ch. 2)
B) operations, development, and support
50. After entering data into a relational database, users can make all of the following basic data manipulations except: (Ch. 5)
B) organizing
40. All of the following are positive driving forces that influence chance according to Lewin's Theory of Force Field Analysis, EXCEPT: (Ch. 2)
B) past performance
33. In batch processing systems, data processing is done data capture. (Ch. 8)
B) some time later than
42. Which of the following is NOT one of the four main components in Leavitt's Diamond? (Ch. 2)
B) systems
46. Consumers prefer mobile commerce sites . (Ch. 7)
B) that are convenient and efficient to use
26. The ancestor of the Internet was . (Ch. 6)
B) the ARPANET
41. Which of the following is NOT one of the key website performance measures commonly used by online retailers? (Ch. 7)
B) total sales
52. Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database. In terms of the characteristics of big data, Haley is dealing with ________. (Ch. 5)
B) variety
51. To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties? (Ch. 5)
D) currency
51. To improve traffic to your e-commerce site, . (Ch. 7)
C) acquire links to your site on other sites
38. Java allows small programs, called , to be embedded with an Hypertext Markup Language (HTML) document. (Ch. 6)
C) applets
41. In the context of enterprise resource planning (ERP) systems, the most efficient and effective ways to complete a business process are called . (Ch. 8)
C) best practices
31. The smallest piece of data used by a computer is a(n) _____. (Ch. 5)
C) bit
52. Which of the following is NOT a task typically associated with the systems analyst role? (Ch. 2)
C) collaborating with others to build a software product from scratch
49. Suppose a new tech startup wants to define the data model. They would then ____. (Ch. 5)
C) create the entity-relationship model
58. Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are . (Ch. 1)
C) cybercriminals
42. A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database. (Ch. 5)
C) data definition language
48. A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making. (Ch. 5)
C) data mart
44. If you shop on Amazon.com, . (Ch. 7)
C) depending on which state you are in, you may or may not pay tax
. (Ch. 7)"
C) disintermediation
27. The elimination of organizations that operate between the producer and the consumer is called _____. (Ch. 7)
C) disintermediation
29. The performance levels of radically new 'high-tech' products usually improve with newer versions. Such types of products are known as (Ch. 2)
C) disruptive innovations
49. A customer relationship management (CRM) system helps a company in managing . (Ch. 8)
C) distribution and accounting
54. Suppose a small business is using the hosted model for its enterprise software. Which of the following will not be an issue they will he worried about? (Ch. 8)
C) employing full-time IT professionals to manage its resources
48. You might be an information systems worker if you . (Ch. 2)
C) enjoy learning new techniques and enjoy working with people
45. A(n) can replace many applications with one unified set of programs, making the system easier to use and more effective. (Ch. 1)
C) enterprise resource planning system
38. All of the following are potential drawbacks to outsourcing EXCEPT: (Ch. 2)
C) greater focus on core business
55. Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an online e-commerce site, Tom's has been able to enjoy the advantage of . (Ch. 7)
C) increasing accuracy
36. In the context of purchasing systems involved in the traditional transaction processing systems, when a(n) arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. (Ch. 8)
C) invoice
44. A key feature of an enterprise system is that . (Ch. 8)
C) it employs a database of key operational and planning data that can be shared by all
45. A satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles. (Ch. 6)
C) low earth orbit LEO)
34. A(n) _____ is a field or set of fields in a record that uniquely identifies the record. (Ch. 5)
C) primary key
37. The action of including only some columns for output while retrieving data is known as ____. (Ch. 5)
C) projecting
41. Suppose you wish to find what tables are in a database, what fields they have, and how they are related you would review the _____. (Ch. 5)
C) schema
59. All of the following are examples of ethical issues related to data and information systems EXCEPT . (Ch. 1)
C) the cost of system development
16. A telecommunications protocol is any material substance that carries an electronic signal to support communications between a sending and receiving device. (Ch. 6)
FALSE
17. A customer relationship management (CRM) system helps a company to plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. (Ch. 8)
FALSE
17. Smart card use is restricted to data associated with financial transactions. (Ch. 7)
FALSE
18. A designer would use computer aided manufacturing (CAM) to create, analyze, and modify the design of a component. (Ch. 8)
FALSE
19. "Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems. (Ch. 2)
FALSE
19. A personal area network (PAN) is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building. (Ch. 6)
FALSE
19. Product lifecycle management (PLM) typically includes customer relationship management (CRM) software. (Ch. 8)
FALSE
19. Smart cards are less protected from misuse that conventional credit, charge, and debit cards because the smart card information is not encrypted. (Ch. 7)
FALSE
2. An organization's structure is independent of its goals and approach to management. (Ch. 2)
FALSE
2. The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than that for a typical consumer-to-consumer (C2C) e-commerce. (Ch. 7)
FALSE
20. A procurement card is an attachment to an e-mail message or data embedded in a Web site that verifies the identity of a sender or a Web site. (Ch. 7)
FALSE
20. A wide area network (WAN) is a telecommunications network that connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits. (Ch. 6)
FALSE
20. One of the final steps in installing and using a large database involves "telling" the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user. (Ch. 5)
FALSE
16. The information systems operations group is responsible for the day-to-day running of IS hardware to process the organization's information systems workload. (Ch. 2)
TRUE
13. Consumers who have enrolled in mobile banking and downloaded the mobile application to their cell phones can check their credit card balances before making major purchases. (Ch. 7)
TRUE
13. Organizations invest heavily in information systems to improve customer service. (Ch. 1)
TRUE
15. In an organization, a transaction processing system (TPS) supports routine operations associated with its business processes. (Ch. 8)
TRUE
16. In the context of the relational database model, projecting involves eliminating columns in a table. (Ch. 5)
TRUE
16. Since the 1950s, computers have been used to perform common business applications. (Ch. 1)
TRUE
16. The bill of materials (BOM) serves as a recipe of ingredients needed to make each item an organization manufactures. (Ch. 8)
TRUE
1. A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market. (Ch. 7)
TRUE
1. A database, a database management system, and the application programs that use the data, make up a database environment. (Ch. 5)
TRUE
1. Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and knowledge management systems. (Ch. 8)
TRUE
1. While information systems were once primarily used to automate manual processes, they have transformed the nature of work and the shape of organizations themselves. (Ch. 2)
TRUE
10. A database must reflect the business processes of an organization. (Ch. 5)
TRUE
10. Large organizations were the first to take on the challenge of implementing enterprise resource planning (ERP). (Ch. 8)
TRUE
10. Perceived usefulness and ease of use of a system influence an individual's attitude toward the system. (Ch. 2)
TRUE
11. An integrated database for the entire organization makes it easier to share data among different business units. (Ch. 8)
TRUE
11. It is possible to restrict access to data depending on the database user's privileges. (Ch. 5)
TRUE
11. Video content can be placed on the Internet using the same approach as a blog. (Ch. 6)
TRUE
12. The diffusion of innovation theory can be useful in planning the rollout of a new information system. (Ch. 2)
TRUE
is a Visa-patented process that provides an instantaneous rating of a transaction's potential for fraud to the financial institution that issued the card. (Ch. 7)
Advanced Authorization
Specialized information systems include a wide range of artificial intelligence systems that can simulate intelligence processes. (Ch. 1)
human
Suppose we have a table that stores student data. In that table we have a field - Student ID - that uniquely identifies each student. This field is known as the ____. (Ch. 5)
primary key or key field
If you have classified your customers as 'college-grads', 'young parents', or 'singles,' you used a technique known as market . (Ch. 7)
segmentation
In business, SME stands for . (Ch. 8)
small and medium-sized enterprises
2. With an online transaction processing (OLTP) system, each transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions. (Ch. 8)
FALSE
43. Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system? (Ch. 1)
A) All of them
49. When you connect your computer to a printer using , the distance between them cannot be longer than 30 feet. (Ch. 6)
A) Bluetooth
to handle the business of registering domain names. (Ch. 6)"
B) accredited domain name registrars
36. is a markup language designed to transport and store data on the Web. (Ch. 6)
B) Extensible Markup Language XML)
33. is a visa program that allows skilled employees from foreign lands into the United States. (Ch. 2)
B) H-1B
. (Ch. 6)"
B) can use hosting services
39. A small business is currently using a paper-based system for billing, which is slow and error- prone. Which system upgrade will make the process faster and have fewer errors? (Ch. 8)
B) Source data automation
34. are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, and preparing input and output. (Ch. 2)
B) System operators
40. Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as . (Ch. 6)
B) Web browsers
. (Ch. 2)"
C) early majority
31. The process of defining relationships among data to create useful information requires . (Ch. 1)
C) knowledge
31. The information about invoices to customers is tracked by system. (Ch. 8)
C) transaction processing system
36. All of the following are functions of a knowledge management system EXCEPT: (Ch. 1)
D) designing information systems.
36. Each attribute in a relational database model can be constrained to a range of allowable values called a _____. (Ch. 5)
D) domain
47. When compared to traditional commerce . (Ch. 7)
D) e-commerce transactions can save money
35. Which of the following is NOT an organizational complement? (Ch. 1)
D) familiar processes
32. In a supply chain, involve the transformation, movement, and storage of supplies and raw materials. (Ch. 2)
D) physical flows
12. QuickBooks is an accounting application used by many large, multinational organizations. (Ch. 1)
FALSE
22. A management information system (MIS) is exactly the same as a transaction processing system (TPS); the two terms can be used interchangeably. (Ch. 1)
FALSE
22. It is safe to assume that personal information will be secure with businesses, because security breaches of information systems are not common. (Ch. 7)
FALSE
22. Network management software is a system software that controls the computer systems and devices on a network and allows them to communicate with each other. (Ch. 6)
FALSE
24. For someone to be a good CIO, technical ability is the most important characteristic. (Ch. 2)
FALSE
27. When a business finds that many of its business applications have to be updated or rewritten, it will be better if they replace them with an ERP system. (Ch. 1)
FALSE
3. A set of random or unrelated tasks performed to achieve a definite outcome is called a process. (Ch. 1)
FALSE
30. Cybercriminals are hackers who try to steal business information or government data related to a nation's infrastructure, all for personal gain. (Ch. 1)
FALSE
4. An attribute is a general class of people, places, or things for which data is collected, stored, and maintained. (Ch. 5)
FALSE
4. In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence. (Ch. 7)
FALSE
4. Reengineering and continuous improvement have the same definition. (Ch. 2)
FALSE
5. It is acceptable to for transaction processing systems to capture inaccurate data. (Ch. 8)
FALSE
5. Using a computer to forecast future sales and order more inventory before a shortage can occur is an example of information system feedback. (Ch. 1)
FALSE
6. A computer-based information system (CBIS) is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, and process data into information, but the CBIS does not include software. (Ch. 1)
FALSE
6. A sustaining innovation is one that initially provides a lower level of performance than the marketplace has grown to accept. (Ch. 2)
FALSE
is a popular programming language for client-side applications that enable a user to create interactive Web pages that respond to user actions. (Ch. 6)
JavaScript
is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision. (Ch. 1)
Knowledge
is a strategy by which an organization determinedly and systematically gathers, organizes, stores, analyzes, and shares its collective knowledge and experience. (Ch. 1)
Knowledge management
Sarah, as the head of a business division, wants to set up a network access account for a new employee. She should call the to get this done. (Ch. 2)
LAN administrator or
is a theory that proposes that every organizational system is made up of four components so that any change in one of these elements will necessitate a change in the other three elements. (Ch. 2)
Leavitt's diamond
Data defense is about __________. (What's Your Data Strategy )
Minimizing downside risk
Which company developed the hypertension digital medicine program given as example that helped 71% of participating patients lower their blood pressure to normal range within 90 days? (IT Transformation Health Care Needs)
Ochsner Health System
Optimizing data analytics, modeling, visualization, transformation, and enrichment are the core activities in the __________. (What's Your Data Strategy )
Offensive approach to data strategy
is a long-term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific function. (Ch. 2)
Outsourcing
is the process of tailoring Web pages to specifically target individual consumers. (Ch. 7)
Personalization
exchanges are owned and operated by a single company. (Ch. 7)
Private
convert a program design developed by a systems analyst or software developer using one of many computer languages. (Ch. 2)
Programmers
means the ability of a product or a service to meet or exceed customer expectations. (Ch. 2)
Quality
is the activity of building information systems to meet users' needs. (Ch. 1)
Systems development
13. The efficiency of processes for managing customer payments can vary; some processes are more efficient than others. (Ch. 8)
TRUE
14. A relational model splits the information up into many two dimensional data structures. (Ch. 5)
TRUE
14. Implementation of an enterprise resource planning (ERP) system provides an organization with an opportunity to also upgrade the information technology that it uses. (Ch. 8)
TRUE
14. Opportunities in information systems are available to people from different parts of the world. (Ch. 2)
TRUE
16. The three basic components of a successful e-commerce model include content, commerce, and community. (Ch. 7)
TRUE
17. One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically. (Ch. 5)
TRUE
18. 4G will deliver 3 to 20 times the speed of 3G networks for mobile devices. (Ch. 6)
TRUE
9. An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations. (Ch. 7)
TRUE
In the context of enterprise resource planning (ERP) system, a(n) is a set of coordinated and related activities that takes one or more types of input and creates an output of value to the customer of that process. (Ch. 8)
business process
Laptops are a good example of because they are gradually displacing desktop computers due to new and better performance characteristics. (Ch. 2)
disruptive innovation
Using , Web users can jump between Web pages stored on various Web servers, creating the illusion of interacting with one big computer. (Ch. 6)
hyperlinks
A(n) _____ is a database management system that stores the entire database in random access memorey (RAM). (Ch. 5)
in-memory database (IMDB)
Of the five categories of innovation adopters, are always the first to try new products and ideas. (Ch. 2)
innovators
Results from one TPS would become to other systems. (Ch. 8)
input
In any organization, such as raw materials, labor, facilities, equipment, and knowledge, are needed to transform them to outputs in a way that increases the input's value. (Ch. 2)
inputs
The technology used to create the Internet is also being applied within companies and organizations to create , which allow people within an organization to exchange information and work on projects. (Ch. 1)
intranets
Suppose a small business owner wishes to automate their reorder process. They will need to integrate the sales management system with their system. (Ch. 8)
inventory
Suppose a small business owner does not invest in implementing an expensive enterprise resource planning (ERP) systems, she can choose to use software and modify the code to suit her needs. (Ch. 8)
open source
The group of a typical information systems organization is responsible for the day-to-day running of IS hardware to process the organization's information systems workload. (Ch. 2)
operations
In a transaction processing system (TPS), the system is sometimes referred to as the lifeblood of an organization. (Ch. 8)
order processing
For each type of IS (personal, group, enterprise), there are that must be in place to ensure successful implementation and use of the system. (Ch. 1)
organizational complements
refers to organizational subunits and the way they relate to the overall organization. (Ch. 2)
organizational structure
A(n) _____ is a field or set of fields that uniquely identify a record. (Ch. 5)
primary key
A is a temporary endeavor undertaken to create a unique product, service, or result. (Ch. 1)
project
The is a credit card-sized device with an embedded microchip to provide electronic memory and processing capability. (Ch. 7)
smart card
In a transaction processing cycle, capturing data at its source and recording it accurately in a timely fashion with minimal manual effort and in an electronic or digital form so that it can be directly entered into the computer is known as . (Ch. 8)
source data automation
A(n) is a professional in a developmental group of an information systems department who assists in choosing and configuring hardware and software, matching technology to users' needs, monitoring and testing the system in operation, and troubleshooting problems (Ch. 2)
system analyst
Many organizations employ which capture and process the detailed data necessary to update records about the fundamental business operations of an organization. (Ch. 8)
transaction processing systems (TPSs)
While building a data warehouse, you are converting dates to months. This second step in the ETL process is known as ______. (Ch. 5)
transformation
. (Ch. 2)"
D) all of these
42. Payroll transactions and billing are typically done via . (Ch. 8)
D) batch processing
One zettabyte is exabytes of data. (Ch. 1)
1,000
. (Ch. 6)"
B) hot spot
47. In a manufacturing enterprise resource planning (ERP) system, demand management__________. (Ch. 8)
"D) refines a production plan by determining the amount of weekly or daily production needed to
All credit card customers are protected by law from paying more than __________ for fraudulent transactions. (Ch. 7)
$50
is an outsourcing arrangement where the organization providing the service is located in a country different from the firm obtaining the services.
(Ch. 2) Offshore outsourcing
In the technology acceptance model (TAM), is defined as the degree to which individuals believe that use of the system will improve their performance.
(Ch. 2) perceived usefulness
_______ is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets.
(Ch. 5) Hadoop
If an organization is taking a "store everything" approach to data, it will save all the data in its raw and unaltered form in a _____.
(Ch. 5) data lake
For m-commerce to work effectively, the interface must be so good that it is nearly as easy to make a purchase on a device as it is on a laptop or desktop computer.
(Ch. 7) mobile
Suppose two businesses (Alpha Inc. and Beta Inc.) are undertaking ERP implementation projects. Alpha Inc. has a host of other applications that need integration with the new ERP. Beta Inc. has users who are showing resistance to the new ERP system. Among these, the Inc. project is more likely to become a failure.
(Ch. 8) Alpha
Mobile commerce destinations, used to place orders and conduct business through mobile devices, are designated with a domain ending in . (Ch. 7)
.mobi
What is the labor productivity growth (%) in the healthcare industry according to the chart in the article? (IT Transformation Health Care Needs)
0.005
By using predictive analytics to identify high-risk patients and develop a proactive care-management program for them, Massachusetts General Hospital saw these patients' hospitalizations drop by __________. (IT Transformation Health Care Needs)
0.2
What is the average tenure of Chief Data Officers according to Gartner? (What's Your Data Strategy )
2.4 years
How much did the violation of privacy lower the interest in purchasing a product or service shown in the ad in the group exposed to unacceptable sharing than in the other groups? (Ads That Dont Overstep)
24%
The article refers to a study that found that less than __________ of an organization's structured data is actively used in making decisions (What's Your Data Strategy )
50%
32. Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites? (Ch. 7)
A) Business-to-business B2B) e-commerce
51. is the use of software to assist in the creation, analysis, and modification of the design of a component or product. (Ch. 8)
A) Computer-aided design
57. is a good site to develop your professional network. (Ch. 6)
A) LinkedIn
35. encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. (Ch. 2)
A) Supply chain management
30. consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. (Ch. 6)
A) The Web
39. Federal Express (FedEx) was one of the first large companies to empower customers to serve themselves at their convenience through the use of . (Ch. 1)
A) a corporate extranet
50. When you are looking for a 'hotspot', you are searching for . (Ch. 6)
A) a wireless access point
38. When the IS organization and its resources are focused on efforts that support the key objectives defined in the managers' strategic plan for the business, the organization is in . (Ch. 1)
A) alignment
51. Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of . (Ch. 1)
A) business analytics
55. Harrison works at a nationally known grocery store chain. He is analyzing sales data from the past five years to determine which low-selling products should be discontinued. Harrison is most likely a(n) . (Ch. 1)
A) data scientist
53. Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______. (Ch. 5)
A) data steward
31. Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization? (Ch. 2)
A) diffusion of innovation theory
39. A _____ is a simple database program whose records have no relationship to one another. (Ch. 5)
A) flat file
32. A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is . (Ch. 1)
A) flexible
58. The world-wide-web uses protocol for transmitting content. (Ch. 6)
A) hyper-text transfer
43. Conversion to an e-commerce or m-commerce system enables organizations to . (Ch. 7)
A) improve the level of customer service
47. A is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. (Ch. 6)
A) metropolitan area network MAN)
40. A _______ is a credit card issued to selected employees to streamline the traditional purchase order and invoice payment processes. (Ch. 7)
A) procurement card
33. A collection of fields all related to a single object, activity, or individual is a(n) _____. (Ch. 5)
A) record
47. Which of the following is NOT a potential drawback to downsizing? (Ch. 2)
A) reduced payroll costs
48. To keep information beyond reach of unauthorized users, is to keep the information . (Ch. 1)
A) secure
26. Providing value to a is the primary goal of any organization. (Ch. 2)
A) stakeholder
33. Domain names must always have at least parts, with each part separated by a dot (period). (Ch. 6)
A) two
38. A small and medium-sized enterprise (SME) is a legally independent enterprise with employees. (Ch. 8)
A) up to 500
44. You would use Query by Example, if _____. (Ch. 5)
A) you wish to use a visual approach to query building
What did a study related to the enforcement of the Dutch law requiring websites to inform visitors of covert tracking reveal? (Ads That Dont Overstep)
Advertisement click-through rates dropped.
37. Which of the following does not is NOT an application software? (Ch. 1)
B) Android
31. Which of the following is a markup language for defining the visual design of a Web page or group of pages? (Ch. 6)
B) Cascading Style Sheets CSS)
39. Suppose, you need to advise someone about getting a certification. Which of the following will be appropriate advice? (Ch. 2)
B) Certifications are vendor-specific
40. involves reentering data that was not typed or scanned correctly. (Ch. 8)
B) Data correction
45. With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet. (Ch. 5)
B) Database as a Service
35. _____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization. (Ch. 5)
B) Enterprise data modeling
is a subset of e-commerce where all the participants are organizations. (Ch. 7)
Business- to-business (B2B) e-commerce
is a form of e-commerce in which customers deal directly with an organization and avoid intermediaries. (Ch. 7)
Business-to-consumer (B2C) e-commerce
29. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses addresses to provide for many more devices. (Ch. 6)
C) 128-bit
46. _____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling. (Ch. 5)
C) Big data
53. Because of commerce sites, anyone can become a merchant online. (Ch. 7)
C) C2C
37. is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. (Ch. 7)
C) Explicit personalization technique
52. Which of these is an advantage of the hosted software model? (Ch. 8)
C) Faster system start-up
52. If your home air conditioner has an IP address, it is part of the . (Ch. 6)
C) Internet of Things
54. You wish to learn a programming language that can be used on any computer. What language would it be? (Ch. 6)
C) Java
31. divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics. (Ch. 7)
C) Market segmentation
42. _______ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards. (Ch. 6)
C) Near field communication NFC)
40. _____ is a special-purpose programming language for accessing and manipulating data stored in a relational database. (Ch. 5)
C) Structured Query Language SQL)
27. is a communication standard that enables computers to route communications traffic from one network to another as needed. (Ch. 6)
C) The Internet Protocol IP)
53. Suppose a business with annual sales revenue of $30 million wishes to use an ERP solution. Which ERP vendor will have the most appropriate solution for them? (Ch. 8)
C) Tier III vendors such as Abas or Bluebee software.
is a process for testing skills and knowledge, which results in a statement by the certifying authority that confirms an individual is capable of performing particular tasks. (Ch. 2)
Certification
Which organizational personnel have been historically responsible for the adoption and management of healthcare IT? (IT Transformation Health Care Needs)
Chief Information Officer
In the most successful e-commerce models, involves consumers and businesses paying to purchase physical goods, information, or services that are posted or advertised online. (Ch. 7)
Commerce
Which of the following technology is mentioned to have enabled passive data-collection systems to automatically identify customer purchases to the retail industry? (IT Transformation Health Care Needs)
Computer vision
is the use of software to analyze the robustness and performance of components and assemblies. (Ch. 8)
Computer-aided engineering (CAE)
is the use of software to control machine tools and related machinery in the manufacture of components and products. (Ch. 8)
Computer-aided manufacturing (CAM)
_____ is a method of dealing with a situation in which two or more users or applications need to access the same record at the same time. (Ch. 5)
Concurrency control
____________ electronic exchanges are run by a group of traditionally competing companies with common procurement needs. (Ch. 7)
Consortium-operated
is a set of major understandings and assumptions shared by a group, such as within an ethic group or country. (Ch. 2)
Culture
is used primarily by people in the sales, marketing, accounting, and service functions to capture and view data about customers and to improve communications. (Ch. 8)
Customer relationship management (CRM)
47. Ongoing research conducted by the Standish Group shows that % of very large, multimillion dollar software projects fail or are challenged. (Ch. 1)
D) 94
45. According to Lewin and Schein's 3-stage model of organizational change, which of the following tasks would be found in the 'unfreezing' stage? (Ch. 2)
D) Assign leaders and implementation team
26. Which of the following forms of e-commerce is more likely to offer a more customized product offering? (Ch. 7)
D) Business-to-consumer B2C) e-commerce
38. The is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards. (Ch. 7)
D) Card Verification Number
34. refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. (Ch. 6)
D) Cloud computing
28. is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. (Ch. 7)
D) Consumer-to-consumer C2C) e-commerce
30. involves reducing the number of employees to cut costs. (Ch. 2)
D) Downsizing
42. are people who work directly with information systems to get results. (Ch. 1)
D) End users
51. Which of the following systems can help identify your geolocation? (Ch. 6)
D) GPS
35. is the standard page description language for Web pages. (Ch. 6)
D) Hypertext Markup Language HTML)
30. Which of the following statements is true of a database? (Ch. 5)
D) It helps companies analyze information to open new market opportunities.
35. Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms? (Ch. 8)
D) Online transaction processing
39. is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant. (Ch. 7)
D) Payment Card Industry PCI)
40. is/are considered to be the most important element in computer-based information systems. (Ch. 1)
D) People
34. Which of the following transactions definitely require online transaction processing and cannot work on batch processing approach? (Ch. 8)
D) Stock investments
45. ________ includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers. (Ch. 8)
D) Supply chain management (SCM)
49. Suppose an oil exploration company wishes to collect, codify, and store knowledge that is used in the organization, they should use . (Ch. 1)
D) a knowledge management system
36. In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: . (Ch. 2)
D) all of these
44. Positive outcomes of continuous improvement include . (Ch. 2)
D) all of these
53. One method an IS professional might use to find a new job would be . (Ch. 2)
D) all of these
53. The Internet of Things connects wireless identifiable objects . (Ch. 1)
D) all of these
. (Ch. 1)"
D) all of these answers
45. Through e-government, . (Ch. 7)
D) any government unit, business or individual can interact with the government
32. With , business transactions are accumulated over a period of time for processing in a single unit. (Ch. 8)
D) batch processing systems
50. Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He . (Ch. 7)
D) can use a hosting service to set up the site
57. Authoritarian regimes sometimes limit citizens' access to certain Websites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals, which are all forms of . (Ch. 1)
D) censorship
42. Authentication technologies are used by many organizations to . (Ch. 7)
D) confirm the identity of a user requesting access to information or assets
28. The idea of is a form of innovation that constantly seeks ways to improve business processes and add value to products and services. (Ch. 2)
D) continuous improvement
46. Suppose a small manufacturing business wishes to have a system to manage all its vital business operations, they should go for a(n) . (Ch. 1)
D) enterprise resource planning ERP) system
32. A database is a collection of integrated and related _____. (Ch. 5)
D) files
37. Suppose you are assigned to manage a virtual team. Which of the following will you NOT do? (Ch. 2)
D) hold team meetings regularly - whether the team members like it or not
41. According to the diffusion innovation theory, are the risk takers, always the first to try new products and ideas. (Ch. 2)
D) innovators
52. The information necessary for personalizing web pages for individual customers . (Ch. 7)
D) is primarily gathered by analyzing users' past transactions on the website
38. For the ____ operation, it is required that the the two tables have a common attribute. (Ch. 5)
D) join
52. Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals to study, change, and improved it. Their software is an example of . (Ch. 1)
D) open source software
30. A reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a product. (Ch. 7)
D) personalized
46. Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with to develop an estimate of future customer demand. (Ch. 8)
D) sales forecasting
39. A is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. (Ch. 6)
D) search engine
46. A network is one in which all network devices are connected to one another through a single central device called the hub node. (Ch. 6)
D) star
49. If consumer data is stolen from a business's computers, . (Ch. 7)
D) the customers can file a class-action law suit agains the business
34. The number of mobile Websites worldwide is expected to grow rapidly because of . (Ch. 7)
D) the development of new and useful applications
51. In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is . (Ch. 2)
D) the information systems security analyst
15. The role of a systems analyst is narrowly defined and seldom involves communications with others. (Ch. 2)
FALSE
In a transaction processing cycle, involves updating one or more databases in an organization with new transactions. (Ch. 8)
Data storage
A(n) ______ is an individual responsible for defining and implementing consistent principles for a variety of data issues. (Ch. 5)
Database admin
Suppose your friend plans, designs, creates, operates, secures, monitors, and maintains databases. She must be a(n) ___________. (Ch. 5)
Database admin
design and set up databases to meet an organization's needs. (Ch. 2)
Database administrators
mySQL is a popular ____________. (Ch. 5)
Database management system, DBMS, database program, database software
is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. (Ch. 7)
E-government
Among ERP, PLM and CRM, is the most essential system a business should have. (Ch. 8)
ERP
Which industry has the highest employment growth according to the chart in the article? (IT Transformation Health Care Needs)
Education
50. Important functions of the chief information officer include (Ch. 2)
Employing an IS department's equipment and staff to help the organization reach its goals, monitoring the financial considerations of the IS department, such as return on investment, and ensuring the organization complies with laws and regulations
The use of social media in business is called . (Ch. 6)
Enterprise 2.0
is a set of integrated programs that manage a company's vital business operations for an entire organization; even a complex, multi-site, global organization. (Ch. 8)
Enterprise resource planning (ERP)
______ use basic graphical symbols to show an organization of and relationships between data. (Ch. 5)
Entity-relationship (ER) diagrams
1. Information is simply a collection of raw facts such as an employee number or the total hours worked in a week. (Ch. 1)
FALSE
1. The United States has high Internet penetration among its population constituting the majority of people online. (Ch. 6)
FALSE
10. A podcast is a video broadcast over the Internet. (Ch. 6)
FALSE
10. Either system software or application software, but not both, are needed for all types of computers. (Ch. 1)
FALSE
10. In the past, market segmentation has been easy for B2B marketers because firmographic data was easy to obtain. (Ch. 7)
FALSE
11. Application software, such as Microsoft Word, manages basic computer operations such as start- up. (Ch. 1)
FALSE
11. Consortium-operated exchanges are open to any set of buyers and sellers within a given market. (Ch. 7)
FALSE
11. The diffusion of innovation theory states that adoption of any innovation happens all at once for all members of the targeted population. (Ch. 2)
FALSE
12. An enterprise data model is created only for documentation, but is otherwise inconsequential. (Ch. 5)
FALSE
12. Enterprise systems use multiple databases aimed at different business units. (Ch. 8)
FALSE
12. In spite of the recent economic downturn, Website operators have shunned the idea of bartering for goods and services. (Ch. 7)
FALSE
12. There is no way a manufacturing firm would implement an Internet of Things because the risk of hacking is far too high. (Ch. 6)
FALSE
13. Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web browser. (Ch. 6)
FALSE
13. The activities that lead to getting the right product into the right consumer's hands in the right quantity at the right time at the right cost are known as value chain management. (Ch. 2)
FALSE
13. The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files. (Ch. 5)
FALSE
14. Bartering is a technique used by advertisers to recapture shoppers who abandoned a Website without making a purchase. (Ch. 7)
FALSE
14. The Internet is a hyperlink-based system that uses a client/server model. (Ch. 6)
FALSE
14. The World Wide Web (WWW) is a network of links on the Internet to documents containing text, graphics, video, and sound, but does not offer cloud computing capabilities. (Ch. 1)
FALSE
15. An intranet is a network based on Web technologies that allows selected outsiders, such as business partners and customers, to access authorized resources of a company's extranet. (Ch. 1)
FALSE
15. Implicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. (Ch. 7)
FALSE
15. In the context of the relational database model, selecting involves combining two or more tables. (Ch. 5)
FALSE
21. A database administrator (DBA) is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization. (Ch. 5)
FALSE
21. Suppose an organization wishes to change for the better. It can accomplish that just by changing people's roles, responsibilities, and lines of authorities. (Ch. 2)
FALSE
23. Systems development projects should always be outsourced in order to allow an organization to focus on what it does best. (Ch. 1)
FALSE
23. Today, many organizations can function and compete effectively without computer-based information systems. (Ch. 2)
FALSE
24. If you abandon an online shopping cart, the seller does not care what you were shopping for. (Ch. 7)
FALSE
24. Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system. (Ch. 5)
FALSE
24. The ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns is known as contact management. (Ch. 8)
FALSE
25. Using the hosted software model implies that a small business firm needs to employ a full-time IT person to maintain key business applications. (Ch. 8)
FALSE
26. Another name for the World Wide Web is the Internet of Things. (Ch. 1)
FALSE
26. Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal. (Ch. 5)
FALSE
27. Enterprise resource planning (ERP) systems work directly with manufacturing machines on the production floor. (Ch. 8)
FALSE
28. Legacy systems typically run on the latest hardware. (Ch. 8)
FALSE
29. Organizations can collect many types of data from a wide variety of sources, but typically they only collect structured data that fits neatly into traditional relational database management systems. (Ch. 5)
FALSE
3. A collection of data fields that are all related to one object, activity, or individual is called a file. (Ch. 5)
FALSE
3. Sensors that can monitor and report on data about traffic and parking conditions are part of a network of physical objects known as the Internet of Technology. (Ch. 6)
FALSE
4. The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet domain names. (Ch. 6)
FALSE
5. Organizations cannot have many value chains. (Ch. 2)
FALSE
6. Like other programs, Java software can run only on specific types of computers. (Ch. 6)
FALSE
6. The market for m-commerce in North America is maturing much earlier than in Western Europe and Japan. (Ch. 7)
FALSE
6. Two sets of fields can have a common primary key. (Ch. 5)
FALSE
7. Small and medium size organizations do not employ enterprise systems. (Ch. 8)
FALSE
7. The concept of a value chain is not significant to organizations unless they manufacture products. (Ch. 2)
FALSE
8. Increasingly, companies are no longer incorporating computer-based information systems into their products and services. (Ch. 1)
FALSE
8. Today, most organizations use the traditional approach to data management, where multiple information systems share a pool of related data. (Ch. 5)
FALSE
9. DBMSs are used primarily for modeling data. (Ch. 5)
FALSE
9. Over time, disruptive innovation tends to become less attractive to users in a new market. (Ch. 2)
FALSE
When companies adopt a SSOT-MVOT data architecture, teams across the organization store the data they use in siloed repositories. (What's Your Data Strategy )
FALSE
format the text or graphics that will be displayed. (Ch. 6)"
FALSE
Which healthcare companies are highlighted as examples of when IT systems were used in their strategy to improve quality, it also improved the financial performance? (IT Transformation Health Care Needs)
Geisinger Health System and NU Langone Health
electronic commerce applications support transactions between governments such as the federal government and state or local governments. (Ch. 7)
Government-to-government (G2G)
What is a key issue addressed by the framework for building a powerful data strategy by the authors? (What's Your Data Strategy )
Guide companies in strategic data management.
The is the primary method for interacting with the Internet. (Ch. 6)
Hypertext Transfer Protocol (HTTP)
occurs when someone steals a person's personal information and uses it without his or her permission; often to commit fraud or other crimes. (Ch. 7)
Identity theft
exchanges are open to any set of buyers and sellers within a given market and provide services and a common technology platform to their members. (Ch. 7)
Independent
__________ governs the processes and rules that convert data into useful information. (What's Your Data Strategy )
Information architecture
is online, real-time communication between two or more people who are connected to the Internet. (Ch. 6)
Instant messaging
Which healthcare organization do the authors name in the introduction to exemplify use of IT to improve quality and cut costs? (IT Transformation Health Care Needs)
Intermountain Healthcare
The is the world's largest computer network consisting of thousands of interconnected networks, all freely exchanging information. (Ch. 1)
Internet
is the control or suppression of the publishing or accessing of information on the Internet. (Ch. 6)
Internet censorship
The ARPANET was eventually broken into two networks, __________, which included all military sites, and a new, smaller ARPANET, which included all the nonmilitary sites. (Ch. 6)
MILNET
What does business-specific transformation of data into information, that is data permeated with relevance and purpose produce? (What's Your Data Strategy )
Multiple versions of truth
The radical redesign of business processes, organizational structures, information systems, and values of an organization to achieve a breakthrough in business results is known as (Ch. 2)
Reengineering
If you wish to develop expertise in database management, you must learn popular language known as ______. (Ch. 5)
SQL, Structured query language, system query language
is the term used to describe the information systems and solutions built and deployed by departments other than the information systems department. (Ch. 2)
Shadow IT
What is a logical repository that contains one authoritative copy of all crucial data, such as customer, supplier, and product details called in the article? (What's Your Data Strategy )
Single source of truth
What are web cookies? (Ads That Dont Overstep)
Small pieces of information websites store on computer when the computer visits the website
17. The Institute of Electrical and Electronics Engineers (IEEE) is a leading standards-setting organization whose IEEE network standards are the basis for many telecommunications devices and services. (Ch. 6)
TRUE
17. When an organization hires another firm in another country to perform a specific function on its behalf, it is known as offshoring. (Ch. 2)
TRUE
17. When you buy books from another consumer through an online auction site such as eBay.com, you are involved in e-commerce. (Ch. 1)
TRUE
18. Mobile commerce (m-commerce) is the use of mobile, wireless devices to place orders and conduct business. (Ch. 1)
TRUE
18. PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online. (Ch. 7)
TRUE
18. The relational database model is currently the most widely used. (Ch. 5)
TRUE
18. The successful implementation for change only happens when people accept the need for change and believe that it will improve factors such as productivity and/or customer satisfaction. (Ch. 2)
TRUE
19. A database is essential to the operation of a computer-based information system. (Ch. 1)
TRUE
19. A database management system (DBMS) serves as an interface between an application program and a database. (Ch. 5)
TRUE
2. A field is typically a name, number, or combination of characters that describes an aspect of a business object. (Ch. 5)
TRUE
2. Data represents real-world things including raw facts such as image and audio data. (Ch. 1)
TRUE
2. The Internet is the infrastructure on which the Web exists. (Ch. 6)
TRUE
20. According to Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job. (Ch. 2)
TRUE
20. Customer support, sales management, and contact management are key features of a customer relationship management (CRM) system. (Ch. 8)
TRUE
20. Electronic business (e-business) goes beyond e-commerce and e-procurement by using information systems and the Internet to perform business-related tasks and functions. (Ch. 1)
TRUE
21. A client is any computer on a network that sends messages requesting services from the servers on the network. (Ch. 6)
TRUE
21. External users of product lifecycle management (PLM) software include design partners and raw material suppliers. (Ch. 8)
TRUE
21. Smart cards can be used for a variety of purposes, including storing a user's financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending. (Ch. 7)
TRUE
21. When a customer buys products using the company's website, it results in transactions that are recorded for later use by management information systems. (Ch. 1)
TRUE
22. A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. (Ch. 5)
TRUE
22. Organizations frequently need to customize a vendor's enterprise resource planning (ERP) software to integrate other business systems. (Ch. 8)
TRUE
22. When organizational learning occurs, what is revealed can be small, incremental adjustments known as continuous improvement. (Ch. 2)
TRUE
23. A mobile advertiser can find how many people clicked on his ad and how many people bought his product or service. (Ch. 7)
TRUE
23. A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider. (Ch. 6)
TRUE
23. To successfully implement a supply chain management system, an organization must be able to integrate its systems with its suppliers. (Ch. 8)
TRUE
23. Unstructured data comes from sources such as word-processing documents and scientific research. (Ch. 5)
TRUE
24. Usability and user-interface design are key factors in delivering apps that business users will adopt and use. (Ch. 1)
TRUE
25. For each data item, a data dictionary usually contains information such as the name of the data item, the range of values that can be used, and the amount of storage needed for the item. (Ch. 5)
TRUE
25. In Kenya and Tanzania, it is not uncommon for citizens to carry out common financial transactions using mobile phones. (Ch. 7)
TRUE
25. One of the primary roles of a senior IS manager is to communicate with other areas of the organization to determine changing business needs. (Ch. 2)
TRUE
25. When an organization uses cloud computing, they do not have to buy and maintain expensive hardware. (Ch. 1)
TRUE
26. XYZ Inc. assigned a part-time mid-level manager to supervise the implementation of an enterprise resource planning (ERP) system. The project has a high risk of failure. (Ch. 8)
TRUE
27. Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database (Ch. 5)
TRUE
28. If a hotel wishes to determine where to spend resources on renovations - on interior decor or on curb appeal or on recreational facilities - they would use business intelligence to make the decision. (Ch. 1)
TRUE
28. Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing. (Ch. 5)
TRUE
29. Natural language processing involves the computer interacting in natural languages - like spoken English. (Ch. 1)
TRUE
29. Smaller lot sizes from vendors will help reduce the purchasing complexities for the consumer. (Ch. 8)
TRUE
3. An organization uses buy-side e-commerce to purchase goods and services from its suppliers. (Ch. 7)
TRUE
3. Suppose a retail business has an unwritten rule that "every sales person cooperates with others." This is an example of organizational culture. (Ch. 2)
TRUE
3. When there is a delay between an event and the eventual processing of the data, it is called batch processing. (Ch. 8)
TRUE
4. The main difference between batch processing and online transaction processing is in the timely update of data. (Ch. 8)
TRUE
4. The term data is used to label raw facts such as height and weight of a patient. (Ch. 1)
TRUE
5. Cascading Style Sheets (CSS) use special Hypertext Markup Language (HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a Web page. (Ch. 6)
TRUE
5. If "color" is an attribute, then "green" is a data item. (Ch. 5)
TRUE
5. The Asia-Pacific region has overtaken North America as the region with the largest B2C sales and now accounts for over one-third of total worldwide B2C sales. (Ch. 7)
TRUE
6. Entering textual data in place of numeric data will result in rejection of the transaction. (Ch. 8)
TRUE
7. Components of a computer-based information system include people such as the CIO (chief information officer) and end-users. (Ch. 1)
TRUE
7. Conversion to an e-commerce or m-commerce system enables organizations to increase the accuracy of order processing and order fulfillment. (Ch. 7)
TRUE
7. Organizations that are concerned about the security of their data should not use public cloud computing. (Ch. 6)
TRUE
7. The database approach to managing data is superior to the file-based approach. (Ch. 5)
TRUE
8. A traditional view of information systems holds that organizations use them to control and monitor processes and ensure effectiveness and efficiency. (Ch. 2)
TRUE
8. An enterprise system ensures that the information needed for a single business function and all levels of management within that function is isolated. (Ch. 8)
TRUE
8. JavaScript can be used to validate data entry in a Web form. (Ch. 6)
TRUE
8. Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online. (Ch. 7)
TRUE
9. An example of the concept of feedback is a factory information system that is programmed to alert the manager if there is any decrease in productivity so the manager can take corrective steps to improve productivity. (Ch. 1)
TRUE
9. If an organization is using several separate systems, they can be replaced with a single integrated set of applications for the entire enterprise. (Ch. 8)
TRUE
9. Twitter is a microblogging service. (Ch. 6)
TRUE
frequency. (Ch. 6)"
TRUE
network (LAN). (Ch. 6)"
TRUE
What incident backfired on Target stores when the retail chain started sending promotions to consumers based on individual shoppers' consumption data? (Ads That Dont Overstep)
Target sent coupons for maternity-related products to a teenager whose father was outraged.
In the relational database model, each row of a table represents a(n) _____. (Ch. 5)
entity or entity instance
How many treatment groups did the authors divide the participants into their research to find the effect of violating the privacy norms would have on ad performance? (Ads That Dont Overstep)
Three
Which researcher's work do the authors refer to in which personalized ads by a movie rental company were involved? (Ads That Dont Overstep)
Tiffany White
What is the primary challenge highlighted by the authors that will lead to a company's overall data strategy? (What's Your Data Strategy )
To establish the trade-offs between defense and offense to ensure the best balance.
is the process by which virtual private networks (VPNs) transfer information by encapsulating traffic in Internet Protocol (IP) packets over the Internet. (Ch. 6)
Tunneling
Which of the following is a technique of web marketers that consumers dislike? (Ads That Dont Overstep)
Using information obtained on a third-party website rather than the site on which the ad appears
The Web, as a computing platform that supports software applications and the sharing of information among users, is referred to as . (Ch. 6)
Web 2.0
Which is true regarding consumers' personal information changing hands? (Ads That Dont Overstep)
While people may be comfortable disclosing personal information directly, they may get upset when that information is shared without their knowledge.
In a transaction processing system (TPS), a(n) must track the flow of data related to all the cash flows that affect an organization. (Ch. 8)
accounting system
In the context of a database management system (DBMS), a(n) _____ interacts with other programs or applications and only indirectly interacts with people or users. (Ch. 5)
back-end application
With , transactions are accumulated for as long as necessary to meet the needs of the users of a system. (Ch. 8)
batch processing systems
Implementation of an enterprise resource planning (ERP) system ensures good work processes that are based on . (Ch. 8)
best practices
Process redesign, which is also known as , involves the radical redesign of business processes, organizational structures, information systems, and values. (Ch. 2)
business process reengineering
The authors contend that most healthcare organizations are using IT systems primarily to __________. (IT Transformation Health Care Needs)
capture transactions in billing, order entry, and such processes
A(n) _________ is responsible for guaranteeing that the people or organizations who are granted unique digital certificates are in fact who they claim to be. (Ch. 7)
certificate authority (CA)
According to Leavitt's theory, in one aspect of the information system element will necessitate changes in other elements also. (Ch. 2)
change
Usually measured in bits per second (bps), refers to the rate at which data is exchanged. (Ch. 6)
channel bandwidth
One of the main measures of success of a mobile ad is CTR, which stands for . (Ch. 7)
click through rate
The browsers are the in the worldwide web, whereas the web servers are the servers. (Ch. 6)
clients
With , a service provider organization owns and manages the hardware, software, networking, and storage devices, with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. (Ch. 1)
cloud computing
All of the hardware, software, databases, networks, people, and procedures that are configured to collect, manipulate, store, and process data into information is referred to as an organization's (Ch. 1)
computer-based information system (CBIS)
In a customer relationship management (CRM) system, the ability to track data on individual customers and sales leads and then access that data from any part of an organization is known as (Ch. 8)
contact management
"Kaizen" is the Japanese word for . (Ch. 2)
continuous improvement
_____ is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database. (Ch. 5)
data cleansing, data cleaning, or data scrubbing
A(n) _____ is a collection of instructions and commands used to define and describe data and relationships in a specific database. (Ch. 5)
data definition language (DDL)
A(n) _____ is a detailed description of all data used in a database. (Ch. 5)
data dictionary
The _____ is a specific language, provided with a database management system (DBMS) that allows users to access and modify the data, to make queries, and to generate reports. (Ch. 5)
data manipulation language (DML)
A(n) is an organized collection of facts and information, typically consisting of two or more related data files. (Ch. 1)
database
In enterprise resource planning (ERP) systems, retailers as well as manufacturers use to match production to consumer demand and to allocate products to stores. (Ch. 8)
demand forecasting
The theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. (Ch. 2)
diffusion of innovation
A(n) ________ is an attachment to an email message or data embedded in a Website that verifies the identity of a sender or Website. (Ch. 7)
digital certificate
The gulf between those who do and do not have access to modern information and communications technology is described as the . (Ch. 1)
digital divide
In a relational database model, the range of allowable values for a data attribute is called its ________. (Ch. 5)
domain
The Uniform Resource Locator (URL) www.cengage.com is an example of a(n) that identifies the Internet host site. (Ch. 6)
domain name
is the conducting of business activities electronically over computer networks. (Ch. 7)
e-commerce
Dylan was engaging in when he used his credit card to purchase a new snowboard from a website on the Internet. (Ch. 1)
electronic commerce (e-commerce)
Data modeling done at the level of an entire enterprise is called _____. (Ch. 5)
enterprise data modeling
A(n) is a set of integrated programs that manages the vital business operations for an entire multisite, global organization. (Ch. 1)
enterprise resource planning (ERP) system
George is in charge of ordering supplies for his employer, and he usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system so that he can see if they have what he needs without contacting the salesperson. George is using an . (Ch. 6)
extranet
is a network based on Web technologies that allows selected outsiders, such as business partners and customers, to access authorized resources of a company's intranet. (Ch. 1)
extranet
Together, bits, characters, fields, records, files, and databases form the ______. (Ch. 5)
hierarchy of data
According to the classification of product lifecycle management (PLM) software,
involves the production of products that are the result of a chemical process such as soda, laundry detergent, gasoline, and pharmaceutical drugs that cannot be easily decomposed back into its basic components. (Ch. 8) process manufacturing
A(n)
is a Website that people can create and use to write about their observations, experiences, and opinions on a wide range of topics. (Ch. 6) Web log
A(n)
is a company that acts as an intermediary between a Website and online merchants who have the products and retail expertise. (Ch. 7) storefront broker
A(n)
is an HTML code that tells the Web browser how to format text-such as a heading, as a list, or as body text-and whether images, sound, and other elements should be inserted. (Ch. 6) tag
In the context of product lifecycle management (PLM) software categories,
is the production of distinct items such as autos, airplanes, furniture, or toys that can be decomposed back into their basic components (Ch. 8) discrete manufacturing
In a relational database model, _____ involves combining two or more tables. (Ch. 5)
joining
Consumers may not object to information being used in a particular context, but they worry about their inability to have a say on how it will be used. This privacy related concern is __________. (Ads That Dont Overstep)
loss of control
The authors state that the billions of dollars healthcare organizations and the US government invested in information technology have produced productivity growth in the sector that is __________ than other industries. (IT Transformation Health Care Needs)
lower
A(n) is an organized collection of people, procedures, software, databases, and devices that provides routine information to managers and decision makers. (Ch. 1)
management information system (MIS)
The identification of specific markets to target them with tailored advertising messages is referred to as . (Ch. 7)
market segmentation
In supply chain management (SCM), the output of the demand management process is the , which is a production plan for all finished goods. (Ch. 8)
master production schedule
Enterprise resource planning (ERP) systems evolved from systems developed in the s. (Ch. 8)
materials requirement planning (MRP)
Online vendors use digital rights management to prevent illegal copying. (Ch. 6)
music
The process used to obtain the information system resources needed to provide the services necessary to meet a specific set of , no matter how broad or narrow, is known as system acquisition. (Ch. 1)
needs
is the principle that Internet service providers should be required to treat all Internet traffic running over their wired and wireless broadband networks the same, without favoring content from some sources and/or blocking or slowing content from others. (Ch. 1)
net neutrality
The computers and devices on a network are also known as . (Ch. 6)
network nodes
The ____ database is a newer model than the relational database model. (Ch. 5)
noSQL, in-memory database, IMDB, Hadoop
A local pizzeria that has been around for more than forty years, keeps adjusting to new conditions and altering their practices. Such behavior is known as . (Ch. 2)
organizational learning
An information system that improves the productivity of individual users in performing stand- alone tasks is called a(n) . (Ch. 1)
personal IS
Web such as Adobe Flash and Real Player, provide additional features to standard Web sites. (Ch. 6)
plug-ins
The author's research indicates that when the consumers highly trusted the website, disclosing that the ad shown has been tailored to the individual recipient's characteristics __________ click-through rates. (Ads That Dont Overstep)
raised
Oracle, IBM DB, Microsoft SQL Server, Microsoft Access, MySQL, and Sybas are databases based on the _____ model. (Ch. 5)
relational
The ____ model database makes it easy to develop queries that involve joining two tables. (Ch. 5)
relational
The _____ model has become the most popular database model. (Ch. 5)
relational
Messages on the Internet are typically sent through one or more _________ to reach their destination. (Ch. 6)
routers
In the context of supply chain management (SCM), the takes demand and current inventory levels into account and determines the specific product items that need to be produced as well as when to meet the forecast future demand. (Ch. 8)
sales and operations plan
In supply chain management (SCM), detailed is used to determine how long to make the production runs for each product. (Ch. 8)
scheduling
When engaging in e-commerce, consumers typically experience the sales life cycle, the first stage of which is _____ and identification. (Ch. 7)
search
The first stage of Lewin's change model, , means ceasing old habits and creating a climate that is receptive to change. (Ch. 2)
unfreezing
Most of the data that an organization must deal with is _____ data, meaning that it is not organized in any predefined manner. (Ch. 5)
unstructured
The attitude towards using an information system depends on its perceived ease-of-use and perceived . (Ch. 2)
usefulness
A manufacturing facility has a series of activities that converts the raw materials into valuable products. Such a series of activities make up the organization's chain. (Ch. 2)
value
Over time, decision support systems, executive information systems, online analytical processing, business intelligence, and business analytics have gained in capabilities and expanded in scope to add new functionality, but all have had the same goal of deriving the most from the data available (Ch. 1)
value
A business associate would complete a request for quotation to be submitted to a (Ch. 7)
vendor
A(n) is a group of individuals whose members are distributed geographically, but who collaborate and complete work through the use of information systems technology. (Ch. 2)
virtual team
A(n) is a telecommunications network that connects large geographic areas. (Ch. 6)
wide area