BCIS Chp 1,4, & 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is an​ open-source operating system designed for mobile​ devices? Question content area bottom Part 1 A. Android Your answer is correct. B. Chrome C. OS X D. Apache HTTP E. iOS

A. Android Your answer is correct.

Which of the following types of software directs a computer to complete a specific task for an end​ user? Question content area bottom Part 1 A. Application software Your answer is correct. B. Data management software C. System software D. Network software E. Web services software

A. Application software Your answer is correct.

Which of the following is the​ fastest-growing form of​ computing? Question content area bottom Part 1 A. Cloud computing Your answer is correct. B. Enterprise computing C. Nanocomputing D. Wearable computing E. Green computing

A. Cloud computing Your answer is correct.

Which of the following is the most common reason that business systems​ fail? Question content area bottom Part 1 A. Data quality Your answer is correct. B. Software bugs C. Facilities failures D. Software errors E. Hardware failures

A. Data quality Your answer is correct.

Which of the following terms refers to significant disparities in access to computers and the Internet among different​ racial, ethnic, and social groups and different​ locations? Question content area bottom Part 1 A. Digital divide Your answer is correct. B. CTS C. RSI D. Technostress E. CVS

A. Digital divide Your answer is correct.

Which of the following statements about edge computing is not​ true? Question content area bottom Part 1 A. Edge computing increases delays in the transmitting and processing of data. Your answer is correct. B. Edge computing reduces the amount of data flowing between local computers and devices and the central cloud data center. C. Edge computing is a key technology for smart cities. D. Edge computing is helpful for online gaming services firms. E. Edge computing is a method of optimizing cloud computing systems.

A. Edge computing increases delays in the transmitting and processing of data. Your answer is correct.

Which of the following is not a type of input​ device? Question content area bottom Part 1 A. Flat panel​ (LCD) display screen Your answer is correct. B. Digital scanner C. Trackball D. Keyboard E. Sensor

A. Flat panel​ (LCD) display screen Your answer is correct.

Which of the following best describes Immanuel​ Kant's categorical​ imperative? Question content area bottom Part 1 A. If an action is not right for everyone to​ take, it is not right for anyone to take. Your answer is correct. B. One should take the action that produces the least harm or incurs the least cost. C. One can put values in rank order and understand the consequences of various courses of action. D. You should act toward others as you would like them to act toward you. E. If an action cannot be taken​ repeatedly, then it is not right to be taken at any time.

A. If an action is not right for everyone to​ take, it is not right for anyone to take. Your answer is correct.

As discussed in the​ chapter-opening case, AWM Smart Shelf can help brands and retailers achieve which of the​ following? Question content area bottom Part 1 A. Increased customer intimacy This is the correct answer. B. Development of new products C. Improved employee morale D. Survival E. Increased supplier intimacy

A. Increased customer intimacy This is the correct answer.

Which of the following is a primary drawback to the​ "do anything​ anywhere" computing​ environment? Question content area bottom Part 1 A. It weakens the traditional boundaries that separate work from family and leisure. Your answer is correct. B. It makes work environments less pleasant. C. It leads to employees being paid less for the total amount of work performed. D. It creates a digital divide. E. It centralizes power at corporate headquarters.

A. It weakens the traditional boundaries that separate work from family and leisure. Your answer is correct.

Which of the following is an integrated circuit to which two or more processors have been​ attached, and which features enhanced performance and reduced power​ consumption? Question content area bottom Part 1 A. Multicore processor Your answer is correct. B. Scalable processor C. Hybrid processor D. Edge processor E. Virtualized processor

A. Multicore processor Your answer is correct.

Which of the following is one of the management and people changes posing a major management challenge in the business use of information​ systems? Question content area bottom Part 1 A. Online collaboration and social networking Your answer is correct. B. Big Data C. The mobile platform D. Cloud computing E. The Internet of Things

A. Online collaboration and social networking Your answer is correct.

All of the following​ are, or​ were, file-sharing services except​: Question content area bottom Part 1 A. Pandora. Your answer is correct. B. Morpheus. C. Grokster. D. Megaupload. E. The Pirate Bay.

A. Pandora. Your answer is correct.

Which of the following is known for its flexibility in scaling web​ applications, its ability to run on most​ platforms, and its ease of​ use? Question content area bottom Part 1 A. Python Your answer is correct. B. Ruby on Rails C. Java D. COBOL E. Visual Basic

A. Python Your answer is correct.

Which of the five moral dimensions of the information age does the increase in screen time and time spent with digital devices​ involve? Question content area bottom Part 1 A. Quality of life This is the correct answer. B. System quality C. Property rights and obligations D. Accountability and control E. Information rights and obligations

A. Quality of life This is the correct answer.

Which of the following harnesses the ability to be in multiple states simultaneously to dramatically increase processing​ power? Question content area bottom Part 1 A. Quantum computing Your answer is correct. B. Edge computing C. Grid computing D. Cloud computing E. Utility computing

A. Quantum computing Your answer is correct.

Data storage in smartphones and​ tablets, as well as many​ PCs, is based on which of the following​ technologies? Question content area bottom Part 1 A. SSDs Your answer is correct. B. ​CD-ROM C. Magnetic tape D. SANs E. RAID

A. SSDs Your answer is correct.

Which of the following devices detects and collects data directly from the physical environment for input into a computer​ system? Question content area bottom Part 1 A. Sensor Your answer is correct. B. Trackball C. Audio input D. Touch screen E. Digital scanner

A. Sensor Your answer is correct.

Which of the following types of computers would you use to support a computer​ network? Question content area bottom Part 1 A. Server Your answer is correct. B. PC C. Workstation D. Supercomputer E. Tablet

A. Server Your answer is correct.

Which ethical rule states that if an action cannot be taken​ repeatedly, it is not right to take at​ all? Question content area bottom Part 1 A. Slippery slope rule Your answer is correct. B. Lemming rule C. Utilitarian principle D. ​High-failure cost rule E. Golden Rule

A. Slippery slope rule Your answer is correct.

Which of the following statements about spam is not​ true? Question content area bottom Part 1 A. Spamming is more tightly regulated in the United States than in Europe. Your answer is correct. B. Spamming has mushroomed because it is so inexpensive and can reach so many people. C. Spam costs for business are high. D. Mobile phone spam usually comes in the form of SMS text messages. E. Most spam originates from bot networks.

A. Spamming is more tightly regulated in the United States than in Europe. Your answer is correct.

Which business objective were competitors seeking when they rushed to provide ATMs after Citibank introduced the first ATMs in New​ York? Question content area bottom Part 1 A. Survival This is the correct answer. B. Improved decision making C. Competitive advantage D. Operational excellence

A. Survival This is the correct answer.

A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business​ objectives? Question content area bottom Part 1 A. Survival Your answer is correct. B. Customer intimacy C. Competitive advantage D. Operational excellence E. Improved decision making

A. Survival Your answer is correct.

​________ is aimed at preventing gatekeeper platforms from exploiting interlocking products and services to lock in users and squash potential rivals. Question content area bottom Part 1 A. The DMA Your answer is correct. B. The DMCA C. The Sherman Antitrust Act D. The GDPR E. Section 230

A. The DMA Your answer is correct.

Which of the following is a global network that uses universal standards to connect millions of different networks around the​ world? Question content area bottom Part 1 A. The Internet Your answer is correct. B. ​AT&T C. The World Wide Web D. An intranet E. An extranet

A. The Internet Your answer is correct.

Which of the following regulates the U.S. federal​ government's collection,​ use, and disclosure of​ information? Question content area bottom Part 1 A. The Privacy Act Your answer is correct. B. The​ Gramm-Leach-Bliley Act C. HIPAA D. The Freedom of Information Act E. COPPA

A. The Privacy Act Your answer is correct.

Which of the following is an example of a legacy​ system? Question content area bottom Part 1 A. Transaction processing system running on a mainframe Your answer is correct. B. Web services running on a cloud computing platform C. Quantum computing system D. MDM software E. Scalable grid computing system

A. Transaction processing system running on a mainframe Your answer is correct.

The ability of a person booking a flight on​ Southwest.com's website to reserve a car from Dollar​ Rent-A-Car without having to leave the​ airline's website is an example of the usage by Dollar​ Rent-A-Car and Southwest Airlines of which of the​ following? Question content area bottom Part 1 A. Web services Your answer is correct. B. PaaS C. Nanotechnology D. Cloud computing E. SaaS

A. Web services Your answer is correct.

What would be a reason for using a workstation rather than a personal​ computer? Question content area bottom Part 1 A. When you need more powerful computational abilities Your answer is correct. B. When you need to serve applications and data to client computers C. When you need to connect to a cloud computing platform D. When you need to share resources E. When you need to access a network

A. When you need more powerful computational abilities Your answer is correct.

Linux​ is: Question content area bottom Part 1 A. an example of​ open-source software. Your answer is correct. B. the operating system for the Macintosh computer. C. especially useful for processing numeric data. D. designed for specific machines and specific microprocessors. E. primarily concerned with the tasks of end users.

A. an example of​ open-source software. Your answer is correct.

The right to​ ________ is a feature of the GDPR that allows individuals to have their personal information removed from social network and search sites. Question content area bottom Part 1 A. be forgotten Your answer is correct. B. do not track C. a safe harbor D. ​opt-in to data collection E. ​opt-out of data collection

A. be forgotten Your answer is correct.

The failure of​ NASA's initial solution to preventing the space shuttle shedding foam illustrates​ the: Question content area bottom Part 1 A. continuous nature of problem solving. Your answer is correct. B. importance of training employees on new business processes. C. importance of organizational change in problem solving. D. need to quickly adapt to new technological innovations. E. need to prepare for measuring outcomes of a business solution.

A. continuous nature of problem solving. Your answer is correct.

All of the following can be considered managerial responsibilities except​: Question content area bottom Part 1 A. designing new information systems. Your answer is correct. B. making action plans to solve organizational problems. C. creating new products and services. D. allocating human resources to coordinate the work to be done. E. setting strategy for responding to business challenges in the environment.

A. designing new information systems. Your answer is correct.

The use of multiple computers linked by a communications network for processing is​ called: Question content area bottom Part 1 A. distributed processing. Your answer is correct. B. supercomputing. C. decentralized computing. D. centralized processing. E. network computing.

A. distributed processing. Your answer is correct.

Digital media differs from a physical book in all of the following ways except​: Question content area bottom Part 1 A. ease of establishing uniqueness. Your answer is correct. B. ease of global distribution. C. ease of transmission. D. ease of alteration. E. ease of replication.

A. ease of establishing uniqueness. Your answer is correct.

The first step in the model of the​ problem-solving process discussed in the chapter​ is: Question content area bottom Part 1 A. identifying the problem. Your answer is correct. B. evaluating possible solutions to the problem. C. outlining the​ problem's causes. D. assigning the problem to a problem solver. E. interviewing the people involved in the problem.

A. identifying the problem. Your answer is correct.

Software applications that integrate functionality and data from multiple applications to create a​ new, customized application are referred to​ as: Question content area bottom Part 1 A. mashups. Your answer is correct. B. grid computing. C. web browsers. D. web services. E. widgets.

A. mashups. Your answer is correct.

The average number of airline tickets sold at a particular price is an example​ of: Question content area bottom Part 1 A. meaningful information. Your answer is correct. B. feedback. C. raw data. D. input. E. output.

A. meaningful information. Your answer is correct.

La​ Creperie, a traditional French crepe​ restaurant, is having difficulty implementing a new automated crepe batter measurement system because its chefs prefer to use traditional methods. This is a business problem that falls into​ the: Question content area bottom Part 1 A. people dimension. This is the correct answer. B. cultural dimension. C. organizational dimension. D. management dimension. E. technical dimension.

A. people dimension. This is the correct answer.

In choosing the best solution for a business​ problem, all of the following are important considerations except​: A. the ability to forget about the problem once it has been solved. This is the correct answer. B. the cost of the solution. C. the length of time to implement the solution. D. the feasibility of the solution given existing resources and skills. E. the attitudes of employees.

A. the ability to forget about the problem once it has been solved. This is the correct answer.

All of the following are​ technology-related challenges in MIS except​: Question content area bottom Part 1 A. ​co-creation of business value. Your answer is correct. B. IoT. C. cloud computing. D. Big Data. E. the mobile platform.

A. ​co-creation of business value. Your answer is correct.

​________ consists of​ detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. Question content area bottom Part 1 A. Enterprise applications B. Computer software Your answer is correct. C. Programming D. Business intelligence E. Data management technology

B. Computer software Your answer is correct.

Which of the following protects the authors of a book from having their work copied by​ others? Question content area bottom Part 1 A. Fair Use Doctrine B. Copyright law Your answer is correct. C. Patent protection D. Due process E. Trade Secret law

B. Copyright law Your answer is correct.

A company that implements a​ cloud-based supply chain system that enables its suppliers to​ track, report, and reduce their carbon impact is seeking to achieve which of the following business​ objectives? Question content area bottom Part 1 A. Survival B. ESG leadership Your answer is correct. C. Improved decision making D. Competitive advantage E. Creation of new products

B. ESG leadership Your answer is correct.

Which of the following would not be considered part of the implementation phase of problem​ solving? Question content area bottom Part 1 A. Change management B. Evaluating a selection of software packages for implementing a new business process Your answer is correct. C. Training an employee on new systems software D. Purchasing hardware for an information systems solution E. Determining the attitude of employees about the solution

B. Evaluating a selection of software packages for implementing a new business process Your answer is correct.

​________ refers to practices and technologies used to minimize the environmental effects of manufacturing and using computing devices. Question content area bottom Part 1 A. Utility computing B. Green computing Your answer is correct. C. ​On-demand computing D. Cloud computing E. Capacity planning

B. Green computing Your answer is correct.

Which of the following takes advantage of the fact that most computers in the United States only use their central processing units on average about 25 percent of the​ time, leaving 75 percent of their capacity available for other​ tasks? Question content area bottom Part 1 A. ​Client/server computing B. Grid computing Your answer is correct. C. Cloud computing D. ​Co-location E. Centralized processing

B. Grid computing Your answer is correct.

You are a manager at a package delivery service in a major metropolitan area that has been losing customers for several years. You have been asked to find a solution to this problem. What is the correct way to​ proceed? Question content area bottom Part 1 A. Look for​ solutions, evaluate the​ solutions, identify the problem more​ clearly, and then implement the solution. B. Identify the​ problem, design alternative​ solutions, choose the best​ solution, and then implement the solution. Your answer is correct. C. Think about what solutions can be​ implemented, look for solution​ designs, evaluate the​ designs, and then implement the solution. D. Identify relevant information​ technologies, interview​ employees, choose a​ technology, and implement the technology. E. Design​ solutions, evaluate and identify the​ problems, choose the best​ solution, and then implement the solution.

B. Identify the​ problem, design alternative​ solutions, choose the best​ solution, and then implement the solution. Your answer is correct.

Which of the following is not one of the current key technology trends that raises ethical​ issues? Question content area bottom Part 1 A. Advances in data analysis B. Increase in data quality Your answer is correct. C. Decline in data storage costs D. Increase in reliance on artificial intelligence E. Increase in use of mobile devices

B. Increase in data quality Your answer is correct.

Which of the five moral dimensions of the information age do the central business activities of Google Marketing Platform​ involve? Question content area bottom Part 1 A. Quality of life B. Information rights and obligations Your answer is correct. C. Accountability and control D. System quality E. Property rights and obligations

B. Information rights and obligations Your answer is correct.

What type of device gathers data and converts them into digital form for use by the​ computer? Question content area bottom Part 1 A. Optical storage B. Input device Your answer is correct. C. SSDs D. Output device E. Magnetic storage

B. Input device Your answer is correct.

Which of the following statements best describes organizational​ culture? Question content area bottom Part 1 A. It allows a company to achieve greater operational efficiency. B. It is a fundamental set of​ assumptions, values, and ways of doing things that has been accepted by most members of the organization. Your answer is correct. C. It reflects the senior​ management's perspective on the organization and goals. D. It enables the organization to transcend the different levels and specialties of its employees. E. It encompasses the sum of beliefs and assumptions by all members.

B. It is a fundamental set of​ assumptions, values, and ways of doing things that has been accepted by most members of the organization. Your answer is correct.

Which of the following is not a feature of the General Data Protection Regulation​ (GDPR)? Question content area bottom Part 1 A. It applies to all firms doing business in the EU. B. It prevents firms from using cookies. Your answer is correct. C. It creates a single EU privacy policy. D. It requires unambiguous consent for using personal data to construct profiles. E. It imposes fines on companies for violating the regulation up to 4 percent of a​ firm's global revenue.

B. It prevents firms from using cookies. Your answer is correct.

Which of the following statements about JavaScript is not​ true? Question content area bottom Part 1 A. All major web browsers have a​ built-in JavaScript engine. B. JavaScript is the foundation technology for web services. This is the correct answer. C. JavaScript can be used to instruct a computer on how to interact with a user on receiving user input. D. The majority of websites use JavaScript for​ client-side page behavior. E. A JavaScript Virtual Machine is used to interpret JavaScript programming code.

B. JavaScript is the foundation technology for web services. This is the correct answer.

Which of the following is an example of raw data from an automobile​ manufacturer? Question content area bottom Part 1 A. ​1,300 Subaru Outbacks sold during the first quarter 2023 in New York B. One Subaru Outback sold January​ 7, 2023 in Mount​ Kisco, New York for​ $25,000 Your answer is correct. C. An average of 130 Subarus sold daily in New York in 2023 D. An average sale price of​ $26,000 for all Subaru Outbacks sold during January 2023 in Mount​ Kisco, New York E. Annual sales of Subaru Outbacks increased 4.5 percent

B. One Subaru Outback sold January​ 7, 2023 in Mount​ Kisco, New York for​ $25,000 Your answer is correct.

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information​ age? Question content area bottom Part 1 A. Accountability and control B. Quality of life Your answer is correct. C. System quality D. Property rights and obligations E. Family and home

B. Quality of life Your answer is correct.

In order to manage their relationship with an outsourcer or technology service​ provider, firms need a contract that includes​ a(n): Question content area bottom Part 1 A. API. B. SLA. Your answer is correct. C. SOA. D. capacity plan. E. TCO.

B. SLA. Your answer is correct.

Which of the following statements is not​ true? Question content area bottom Part 1 A. Innovative new​ products, services, and systems are rarely outsourced. B. Software outsourcing of routine IS work to​ low-wage countries increases the cost of building and maintaining systems in the United States. Your answer is correct. C. The most common and successful offshore outsourcing projects involve production programming and system maintenance programming​ work, along with call center work related to customer relationship management systems. D. Management and organizational tasks required in systems development usually are not outsourced. E. Inflation in Indian and Chinese wages for technology work is leading to a counter movement of some IT jobs back to the United States.

B. Software outsourcing of routine IS work to​ low-wage countries increases the cost of building and maintaining systems in the United States. Your answer is correct.

An example of a business using information systems for supplier intimacy​ is: Question content area bottom Part 1 A. ​Citibank's ATM system. B. TAL​ Apparel's information system that helps its clients manage their supply chains. Your answer is correct. C. ​Coca-Cola Bottling Company​ Consolidated's digital dashboard that provides managers with metrics that consolidate data from hundreds of disparate sources. D. ​Apple's creation of iTunes. E. The​ Ritz-Carlton hotel​ chain's use of computers to keep track of​ guests' preferences.

B. TAL​ Apparel's information system that helps its clients manage their supply chains. Your answer is correct.

Which of the following statements about​ client/server computing is not​ true? Question content area bottom Part 1 A. The client provides the user interface. B. The bulk of processing occurs on the client. Your answer is correct. C. The server provides​ security, remote​ access, and user authentication. D. Computing on the Internet is based on the​ client/server model. E. The client can be a desktop or laptop computer or mobile device.

B. The bulk of processing occurs on the client. Your answer is correct.

As described in the Spotlight on Technology​ case, which of the following constitutes a people element of the UPS tracking​ system? Question content area bottom Part 1 A. The DIAD device used by drivers B. The decision to use automation This is the correct answer. C. The implementation of​ in-house package tracking software D. The ability to provide package status reports to customers E. The ability to embed UPS functions in external sites

B. The decision to use automation This is the correct answer.

Which of the following is not a difficulty in establishing patent​ protection? Question content area bottom Part 1 A. Length of time required to receive protection B. The requirement that the work must be a secret Your answer is correct. C. The requirement that the work reflect some special understanding and contribution D. The requirement that the work must be original E. The requirement that the work must be novel

B. The requirement that the work must be a secret Your answer is correct.

As described in the Spotlight on Technology​ case, which of the following constitutes an organizational element in the UPS tracking​ system? Question content area bottom Part 1 A. The use of handheld computers and networks for managing package delivery B. The specification of procedures for identifying packages with sender and recipient information Your answer is correct. C. Promoting the company strategy of​ low-cost, superior service D. Routing software that creates the most efficient delivery route for each driver E. The monitoring service levels and costs by management

B. The specification of procedures for identifying packages with sender and recipient information Your answer is correct.

Which of the following best describes how new information systems can result in legal gray​ areas? Question content area bottom Part 1 A. They are implemented by technicians rather than managers. B. They result in new situations that are not covered by existing laws. Your answer is correct. C. They are little understood by politicians or lawyers. D. They are created from sets of logical and technological rules rather than social or organizational mores. E. They work with​ networked, digital​ data, which are more difficult to control than information stored manually.

B. They result in new situations that are not covered by existing laws. Your answer is correct.

Which of the following has become one of the principal technologies for promoting green​ computing? Question content area bottom Part 1 A. Wearable computing B. Virtualization Your answer is correct. C. Nanotechnology D. Mobile computing E. Quantum computing

B. Virtualization Your answer is correct.

Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating​ systems? Question content area bottom Part 1 A. Java B. Visual Basic Your answer is correct. C. ​C++ D. XML E. COBOL

B. Visual Basic Your answer is correct.

​ZipRealty, which combines Google Maps with real estate​ data, is an example​ of: Question content area bottom Part 1 A. a widget. B. a mashup. Your answer is correct. C. SOA. D. cloud computing. E. a web service.

B. a mashup. Your answer is correct.

Advertisers use​ ________ in order to display more relevant ads based on a​ user's search and browsing history. Question content area bottom Part 1 A. intelligent agents B. behavioral targeting Your answer is correct. C. NORA D. adware E. FIP principles

B. behavioral targeting Your answer is correct.

All of the following are FTC privacy guidelines except​: Question content area bottom Part 1 A. firms should build products and services that protect privacy. B. firms should limit the length of time that any personal data is stored to six months or less. This is the correct answer. C. consumers should be able to review and contest the accuracy and completeness of data. D. firms should require consumer consent and provide clear options to opt out of data collection. E. firms should increase the transparency of their data collection.

B. firms should limit the length of time that any personal data is stored to six months or less. This is the correct answer.

All of the following are important business objectives of information system investment except​: Question content area bottom Part 1 A. ESG leadership. B. improved employee morale. Your answer is correct. C. survival. D. improved decision making. E. competitive advantage.

B. improved employee morale. Your answer is correct.

In a hierarchical​ organization, the lower levels consist​ of: Question content area bottom Part 1 A. managerial workers. B. operational workers. Your answer is correct. C. technical workers. D. professional. E. knowledge workers.

B. operational workers. Your answer is correct.

Work environment is an example of the​ ________ dimension of business problems. Question content area bottom Part 1 A. cultural B. people Your answer is correct. C. organizational D. management E. technology

B. people Your answer is correct.

Converting raw data into a more meaningful form is​ called: Question content area bottom Part 1 A. capturing. B. processing. Your answer is correct. C. feedback. D. organizing. E. inputting.

B. processing.

Journalist Thomas​ Friedman's description of the world as​ "flat" refers to​ the: Question content area bottom Part 1 A. use of social media for instantaneous communication. B. reduction of economic and cultural advantages of developed countries. Your answer is correct. C. reduction in travel times and the ubiquity of global exchange and travel. D. flattened hierarchies in digital firms. E. increased use of global currencies.

B. reduction of economic and cultural advantages of developed countries. Your answer is correct.

Perhaps the most frequent error in problem solving​ is: Question content area bottom Part 1 A. not being aware of personal limitations. B. rushing to judgment about the nature of a problem. Your answer is correct. C. being too doubtful. D. following a rote pattern of decision making. E. failing to consider all dimensions of a problem.

B. rushing to judgment about the nature of a problem. Your answer is correct.

As discussed in the​ chapter-opening case,​ AWM's Smart Shelf uses all of the following technologies except​: Question content area bottom Part 1 A. content management software solutions. B. social networks. Your answer is correct. C. LED digital displays. D. proximity sensors. E. the mobile platform.

B. social networks. Your answer is correct.

An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except​: Question content area bottom Part 1 A. lost productivity if hardware or software failures cause the system to be unavailable for processing and user tasks. B. the minimum response time for processing business transactions. Your answer is correct. C. the purchase or license of software for each user. D. the cost to provide training to information systems specialists and end users. E. real estate and utility costs for housing and providing power for the technology.

B. the minimum response time for processing business transactions. Your answer is correct.

An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except​: Question content area bottom Part 1 A. the minimum response time for processing business transactions. B. the purchase price of new computer hardware equipment. Your answer is correct. C. the impact of existing and future software applications. D. the volume of transactions. E. the maximum number of users a system can accommodate at one time.

B. the purchase price of new computer hardware equipment. Your answer is correct.

The FIP principle of​ Notice/Awareness states​ that: Question content area bottom Part 1 A. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B. websites must disclose their information practices before collecting data. Your answer is correct. C. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. D. there must be a mechanism in place to enforce FIP principles. E. consumers should be able to review the data collected about them.

B. websites must disclose their information practices before collecting data. Your answer is correct.

Microsoft Word is an example​ of: Question content area bottom Part 1 A. ​open-source software. B. word processing software. Your answer is correct. C. software productivity suite. D. data management software. E. presentation graphics software.

B. word processing software. Your answer is correct.

A colleague at work takes small amounts of office supplies for her own personal​ use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office​ supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical​ principles? Question content area bottom Part 1 A. The Risk Aversion Principle B. ​Kant's Categorical Imperative Your answer is correct. C. The​ slippery-slope rule D. The​ "no-free-lunch" rule E. The Golden Rule

B. ​Kant's Categorical Imperative Your answer is correct.

Which of the following is not an essential characteristic of cloud​ computing, as defined by the US National Institute of Standards and Technology​ (NIST)? Question content area bottom Part 1 A. Measured service B. ​Open-source software Your answer is correct. C. Ubiquitous network access D. Rapid elasticity E. ​On-demand self-service

B. ​Open-source software Your answer is correct.

​________ provides users with free access to its program code. Question content area bottom Part 1 A. Office software B. ​Open-source software Your answer is correct. C. A web service D. An app E. ​Cloud-based software

B. ​Open-source software Your answer is correct.

Which of the following is the best definition of an information​ system? Question content area bottom Part 1 A. Physical devices and software that can be connected to share​ voice, data,​ images, sound, and video B. ​Computers, keyboards,​ printers, and telecommunications devices C. A set of interrelated components that collect​ (or retrieve),​ process, store, and distribute information to support decision making and control in an organization Your answer is correct. D. A global network that uses universal standards E. A set of detailed programmed instructions that transform raw data into information

C. A set of interrelated components that collect​ (or retrieve),​ process, store, and distribute information to support decision making and control in an organization Your answer is correct

Which of the following is an important skill for a marketing​ major? Question content area bottom Part 1 A. An understanding of supplier management enterprise systems B. An understanding of financial reporting systems C. An understanding of product management enterprise systems Your answer is correct. D. An understanding of online transaction and reporting systems E. An understanding of enterprise systems that enhance leadership

C. An understanding of product management enterprise systems Your answer is correct.

Which of the following is used to predict when a computer hardware system becomes​ saturated? Question content area bottom Part 1 A. SLAs B. Localization C. Capacity planning This is the correct answer. D. Virtualization E. TCO Your answer is not correct.

C. Capacity planning This is the correct answer.

Which of the following is not a U.S. federal law affecting private​ institutions? Question content area bottom Part 1 A. Video Privacy Protection Act B. HIPAA C. Computer Matching and Privacy Protection Act Your answer is correct. D. ​Gramm-Leach-Bliley Act E. COPPA

C. Computer Matching and Privacy Protection Act Your answer is correct.

To make sure it stocks products that its customers will​ purchase, an apparel retailer implements a new application that analyzes consumer spending at its physical store locations and​ cross-references this data to determine inventory levels of various products for each location. Which of the following business objectives is this information intended to​ support? Question content area bottom Part 1 A. New services B. Survival C. Customer intimacy Your answer is correct. D. New products E. Supplier intimacy

C. Customer intimacy Your answer is correct.

Which of the following types of software organizes and manages​ data, such as data concerned with​ inventory, customers, and​ vendors? Question content area bottom Part 1 A. Web services software B. Network software C. Data management software Your answer is correct. D. Productivity software E. System software

C. Data management software Your answer is correct.

​________ is a feature of​ law-governed society and involves having laws that are known and​ understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. Question content area bottom Part 1 A. Liability B. Responsibility C. Due process Your answer is correct. D. Accountability E. The judicial system

C. Due process Your answer is correct.

Which of the following is not an element of critical​ thinking? Question content area bottom Part 1 A. Being aware of organizational and personal limitations B. Maintaining doubt and suspending judgment C. Following a rote pattern of decision making Your answer is correct. D. Being aware of different perspectives E. Testing alternatives and letting experience guide

C. Following a rote pattern of decision making Your answer is correct.

Question content area top Part 1 Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or​ disclosed? Question content area bottom Part 1 A. Freedom of Information Act B. Privacy Protection Act C. HIPAA Your answer is correct. D. ​Gramm-Leach-Bliley Act E. COPPA

C. HIPAA Your answer is correct.

Which of the following statements about Linux is not​ true? Question content area bottom Part 1 A. Linux has largely supplanted UNIX. B. Ninety percent of the​ world's cloud computing infrastructure runs on Linux. C. Linux is widely used for desktop computer systems. Your answer is correct. D. Linux is a robust alternative to Windows operating systems. E. Linux runs on many types of computer hardware.

C. Linux is widely used for desktop computer systems. Your answer is correct.

Which of the following would an IT department use to​ monitor, manage, and secure mobile devices deployed across the​ enterprise? Question content area bottom Part 1 A. An SLA B. TCO analysis C. MDM software Your answer is correct. D. SOA software E. Capacity planning tools

C. MDM software Your answer is correct

Which of the following is the largest single group in the US labor​ force? Question content area bottom Part 1 A. Finance B. Information systems professionals C. Management Your answer is correct. D. Accountants and auditors E. Marketing

C. Management Your answer is correct.

The NAI is an industry association formed to address issues with respect to which of the​ following? Question content area bottom Part 1 A. Trade secret protection B. Copyright protection C. Online privacy issues Your answer is correct. D. Trademark protection E. Patent protection

C. Online privacy issues Your answer is correct.

Walmart exemplifies the power of information systems coupled with sophisticated business practices and supportive management to achieve which of the​ following? Question content area bottom Part 1 A. New business models B. Survival C. Operational efficiency Your answer is correct. D. Customer intimacy E. Competitive advantage

C. Operational efficiency Your answer is correct.

Which of the following allows the EU to enforce GDPR requirements with​ non-EU countries? Question content area bottom Part 1 A. ​None, because the EU cannot enforce GDPR requirements in​ non-EU countries B. Privacy by design agreements C. Privacy shield agreements Your answer is correct. D. Treaties E. FIP agreements

C. Privacy shield agreements Your answer is correct.

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information​ age? Question content area bottom Part 1 A. Information rights and obligations B. Accountability and control C. Property rights and obligations Your answer is correct. D. System quality E. Quality of life

C. Property rights and obligations Your answer is correct.

​________ means that you accept the potential costs and obligations for the decisions you make. Question content area bottom Part 1 A. Due process B. Accountability C. Responsibility This is the correct answer. D. Duty E. Liability

C. Responsibility This is the correct answer.

________ refers to the ability of a​ computer, product, or system to expand to serve a larger number of users without breaking down. Question content area bottom Part 1 A. TCO B. Capacity planning C. Scalability Your answer is correct. D. Guaranteed levels of service E. SLA

C. Scalability Your answer is correct.

Which of the following is not true about the​ GDPR? Question content area bottom Part 1 A. The GDPR requires companies to obtain explicit consent from consumers for the use of their personal data. B. The GDPR protects biometric and facial data. C. The GDPR does not allow consumers to have their data removed from company servers. Your answer is correct. D. The GDPR enables individuals to sue providers for damages or abuse of their PII. E. The GDPR requires companies to delete information at the​ user's request.

C. The GDPR does not allow consumers to have their data removed from company servers. Your answer is correct.

Which of the following is not protected by copyright​ law? Question content area bottom Part 1 A. Motion pictures B. Musical compositions C. The ideas underlying a work Your answer is correct. D. Maps E. Artwork

C. The ideas underlying a work Your answer is correct.

Which of the following is a​ multiuser, multitasking operating system developed by Bell Laboratories to be highly supportive of communications and​ networking? Question content area bottom Part 1 A. COBOL B. Linux C. UNIX Your answer is correct. D. OS X E. Chrome

C. UNIX Your answer is correct.

Virtualization: Question content area bottom Part 1 A. facilitates decentralization of hardware administration. B. uses the principles of quantum physics to represent data. C. allows multiple physical resources such as storage devices or servers to appear as a single logical resource. Your answer is correct. D. allows smartphones to run​ full-fledged operating systems. E. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.

C. allows multiple physical resources such as storage devices or servers to appear as a single logical resource. Your answer is correct.

Using grid computing provides all of the following benefits except​: Question content area bottom Part 1 A. speed of computation. B. increased computational power. C. centralized maintenance. Your answer is correct. D. cost savings. E. agility.

C. centralized maintenance. Your answer is correct.

All of the following are technological solutions to protecting user privacy except​: Question content area bottom Part 1 A. message encryption apps. B. anonymous surfing. C. data use policies. Your answer is correct. D. cookie managers. E. anonymous remailers.

C. data use policies. Your answer is correct.

CVS refers​ to: Question content area bottom Part 1 A. carpal vision syndrome. B. a business practice that attempts to evaluate the intangible values of computer systems. C. eyestrain related to computer display screen use. Your answer is correct. D. a type of antivirus protection software. E. wrist injuries brought about by incorrect hand position when using a keyboard.

C. eyestrain related to computer display screen use. Your answer is correct.

​Coca-Cola Bottling Company Consolidated uses a digital dashboard to provide managers with metrics that consolidate data from hundreds of disparate sources in order​ to: Question content area bottom Part 1 A. pursue ESG leadership. B. gain competitive advantage. C. improve decision making. Your answer is correct. D. create a new business model. E. create supplier intimacy.

C. improve decision making. Your answer is correct.

All of the following describe the effects of globalization except​: Question content area bottom Part 1 A. significant decreases in operating costs. B. ability to reliably obtain price and quality information worldwide. C. increases in transaction costs. Your answer is correct. D. increased ability to find​ low-cost suppliers. E. significant dislocations in labor markets.

C. increases in transaction costs. Your answer is correct.

Question content area top Part 1 In​ colocation, a​ firm: Question content area bottom Part 1 A. utilizes an​ external, distributed computing grid. B. contracts with an external vendor to run its computer center and networks. C. owns its web server but locates the server in the physical facility of a hosting service. Your answer is correct. D. uses only​ open-source software to operate its computer systems. E. ​off-loads peak demand for computing power to​ remote, large-scale data centers.

C. owns its web server but locates the server in the physical facility of a hosting service. Your answer is correct.

Financial managers work directly with​ ________ to ensure investments in information systems help achieve corporate goals. Question content area bottom Part 1 A. marketing managers B. knowledge workers C. senior managers Your answer is correct. D. accounting managers E. operations managers

C. senior managers Your answer is correct.

Data management technology consists of​ the: Question content area bottom Part 1 A. universally accepted standards for storing data. B. physical hardware and media used by an organization for storing data. C. software governing the organization of data on physical storage media. Your answer is correct. D. ​detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. E. hardware and software used to transfer data.

C. software governing the organization of data on physical storage media. Your answer is correct.

Microsoft Excel is an example​ of: Question content area bottom Part 1 A. word processing software. B. presentation graphics. C. spreadsheet software. Your answer is correct. D. presentation graphics software. E. data management software.

C. spreadsheet software. Your answer is correct.

The owners of Artful​ Graphics, which creates graphics for local business​ owners, has just discovered that the updated​ cloud-based version of the graphics program that Artful​ Graphics' uses requires the Windows 11 operating​ system, but some of Artful​ Graphics' computers cannot run Windows 11. This is a business problem that falls into​ the: Question content area bottom Part 1 A. management dimension. B. organizational dimension. C. technology dimension. Your answer is correct. D. people dimension. E. cultural dimension.

C. technology dimension. Your answer is correct.

According to​ ________, you should take the action that produces the least harm. Question content area bottom Part 1 A. ​Kant's categorical imperative B. the Golden Rule C. the risk aversion principle Your answer is correct. D. the​ no-free-lunch rule E. the utilitarian principle

C. the risk aversion principle Your answer is correct.

Output: Question content area bottom Part 1 A. is feedback that has been processed to create meaningful information. B. transforms raw data into processed information. C. transfers processed information to the people who will use it or to the activities for which it will be used. Your answer is correct. D. is a stream of raw facts representing events occurring in organizations or the physical environment. E. is information that is returned to appropriate members of the organization to help them evaluate the input stage.

C. transfers processed information to the people who will use it or to the activities for which it will be used. Your answer is correct.

​Intranets: Question content area bottom Part 1 A. are typically used to communicate with the​ business's trusted vendors. B. are based on mainframe technology. C. use Internet technology for an internal corporate network. Your answer is correct. D. are multiple networks joined together. E. provide the platform on which a firm builds its information systems.

C. use Internet technology for an internal corporate network. Your answer is correct.

All of the following are techniques being used to make data centers more​ "green" except​: Question content area bottom Part 1 A. cloud computing. B. use of hydropower. C. use of backup generators. Your answer is correct. D. ​air-cooling. E. use of wind power.

C. use of backup generators. Your answer is correct.

Digital advertising is expected to reach​ $________ billion in​ 2022, with more than​ ________ of this spending for mobile advertising. Question content area bottom Part 1 A. ​$2.5 billion;​ one-quarter B. ​$250 million;​ two-thirds C. ​$250 billion;​ two-thirds Your answer is correct. D. ​$25 billion;​ one-half E. ​$25 million;​ three-quarters

C. ​$250 billion;​ two-thirds Your answer is correct.

Which of the following is an example of a business using information systems to create new products and​ services? Question content area bottom Part 1 A. TAL​ Apparel's information system that helps its clients manage their supply chains B. ​Coca-Cola Bottling Company​ Consolidated's digital dashboard that provides managers with metrics that consolidate data from hundreds of disparate sources C. ​Apple's creation of iTunes Your answer is correct. D. The​ Ritz-Carlton hotel​ chain's use of computers to keep track of​ guests' preferences E. ​Walmart's Retail Link system

C. ​Apple's creation of iTunes Your answer is correct.

Which of the following prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and​ use? Question content area bottom Part 1 A. ​Opt-out model B. Privacy shield C. ​Opt-in model This is the correct answer. D. FIP principles E. Safe harbor

C. ​Opt-in model This is the correct answer.

In the​ ________ model of informed​ consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. Question content area bottom Part 1 A. ​opt-in B. ​self-regulation C. ​opt-out Your answer is correct. D. privacy shield E. safe harbor

C. ​opt-out Your answer is correct.

Which of the following is not an example of the consumerization of​ IT? Question content area bottom Part 1 A. BYOD B. Dropbox C. Facebook D. Amazon Web Services Your answer is correct. E. Gmail

D. Amazon Web Services Your answer is correct.

Which of the following is an important skill for an accounting​ major? Question content area bottom Part 1 A. An understanding of enterprise systems that enhance leadership B. An understanding of enterprise systems for customer relationship management C. An understanding of product management enterprise systems D. An understanding of online transaction and reporting systems Your answer is correct. E. An understanding of supplier management enterprise systems

D. An understanding of online transaction and reporting systems Your answer is correct.

Question content area top Part 1 Which of the following is the basis for organizational​ politics? Question content area bottom Part 1 A. Technology B. Business processes C. Organizational hierarchy D. Conflict This is the correct answer. E. Culture

D. Conflict This is the correct answer.

Which type of software can be used to create​ professional-looking documents,​ brochures, or​ books? Question content area bottom Part 1 A. Data management software B. Personal information management software C. Spreadsheet software D. Desktop publishing software Your answer is correct. E. Presentation graphics software

D. Desktop publishing software Your answer is correct.

Which of the following best describes the effect that new information technology has on​ society? Question content area bottom Part 1 A. It has a dampening effect on the discourse of business ethics. B. It has a magnifying​ effect, creating increasing numbers of ethical issues. C. It is beneficial for society as a​ whole, while raising dilemmas for consumers. D. It has a ripple​ effect, raising new​ ethical, social, and political issues. Your answer is correct. E. It has a waterfall effect in raising ever more complex ethical issues.

D. It has a ripple​ effect, raising new​ ethical, social, and political issues. Your answer is correct.

Which of the following deals with behavioral​ issues, as well as technical​ issues, surrounding the​ development, use, and impact of information systems used by managers and employees in the​ firm? Question content area bottom Part 1 A. Computer information systems B. Information technology infrastructure C. Information systems architecture D. Management information systems Your answer is correct. E. Information systems literacy

D. Management information systems Your answer is correct.

FIP principles are based on a belief in which of the​ following? Question content area bottom Part 1 A. Privacy of the individual B. Responsibility of the record holder C. Difference between the interests of the individual and commercial organizations D. Mutuality of interest between the record holder and the individual This is the correct answer. E. Accountability of the record holder

D. Mutuality of interest between the record holder and the individual This is the correct answer.

Which of the following statements is not​ true? Question content area bottom Part 1 A. A growing percentage of the economy in the United States depends on imports and exports. B. From 2020 to​ 2030, employment in the United States is expected to grow by almost 12 million new jobs. C. Manufacturing is now a much smaller part of US employment than it once was. D. Outsourcing has decreased the development of new information systems. Your answer is correct. E. In​ 2021, job openings in information systems and technologies exceeded the supply of applicants.

D. Outsourcing has decreased the development of new information systems. Your answer is correct.

​________ grants the owner exclusive ownership of the ideas behind an invention for a period of​ time, typically 20 years. Question content area bottom Part 1 A. Trade secret protection B. Copyright law C. Trademark law D. Patent law Your answer is correct. E. Privacy law

D. Patent law Your answer is correct.

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the​ following? Question content area bottom Part 1 A. Spyware B. Phishing C. Spamming D. Profiling Your answer is correct. E. Targeting

D. Profiling Your answer is correct.

Which of the following runs an antipiracy hotline for individuals to report piracy​ activities? Question content area bottom Part 1 A. FTC B. NAI C. WIPO D. SIIA Your answer is correct. E. FCC

D. SIIA Your answer is correct.

Which of the following types of computers is traditionally used for scientific exploration and​ simulations? Question content area bottom Part 1 A. PC B. Server C. Mainframe D. Supercomputer Your answer is correct. E. Minicomputer

D. Supercomputer Your answer is correct.

A firm that must invest in a new information system in order to comply with federal legislation is doing so to achieve which of the following business​ objectives? Question content area bottom Part 1 A. Customer intimacy B. Operational excellence C. Improved decision making D. Survival Your answer is correct. E. New products

D. Survival Your answer is correct.

Which of the following types of software manages the resources and activities of a​ computer? Question content area bottom Part 1 A. Network software B. Data management software C. Application software D. System software Your answer is correct. E. Web services software

D. System software Your answer is correct.

Which of the following can be used to analyze direct and indirect costs to help determine the actual cost of a specific technology​ implementation? Question content area bottom Part 1 A. Cost benefit analysis B. ROI model C. ​Break-even point D. TCO model Your answer is correct. E. SLA

D. TCO model Your answer is correct.

Which of the following forms of intellectual property protection requires that the property be the subject of a nondisclosure​ agreement? Question content area bottom Part 1 A. Patent B. Copyright C. Trademark D. Trade secret Your answer is correct. E. All forms of intellectual property protection

D. Trade secret Your answer is correct.

Which of the following provides a standard format for data​ exchange, enabling web services to pass data from one process to​ another? Question content area bottom Part 1 A. HTML5 B. Java C. Chrome OS D. XML Your answer is correct. E. HTML

D. XML Your answer is correct.

A database into which employees manually input customer names and addresses is riddled with errors and you have been charged with rectifying the situation. In considering the organizational dimensions of this​ problem, you should consider​ the: Question content area bottom Part 1 A. training given to the employees inputting the data. B. storage capacity of the database. C. skill levels of the employees inputting the data. D. business processes in place governing the manual input of the data. Your answer is correct. E. types of automatic error checking provided by the input software.

D. business processes in place governing the manual input of the data. Your answer is correct.

All of the following are traditional storage technologies except​: Question content area bottom Part 1 A. magnetic tape. B. storage networks. C. optical drives. D. cloud computing. Your answer is correct. E. magnetic disks.

D. cloud computing. Your answer is correct.

Inadequate resources are an example of the​ ________ dimension of business problems. Question content area bottom Part 1 A. infrastructure B. management C. cultural D. organizational Your answer is correct. E. people

D. organizational Your answer is correct.

All of the following are examples of wearable computing devices except​: Question content area bottom Part 1 A. smart badges. B. activity trackers. C. smart glasses. D. smartphones. Your answer is correct. E. smartwatches.

D. smartphones. Your answer is correct.

Translating software to different languages is commonly referred to​ as: Question content area bottom Part 1 A. open sourcing. B. ​service-oriented architecture. C. outsourcing. D. software localization. Your answer is correct. E. scaling.

D. software localization. Your answer is correct.

A website that uses cookies to monitor and track visitors to the​ website: Question content area bottom Part 1 A. does not store​ cookies, because the cookie is only used during the visit and is discarded once the visitor leaves the website. B. stores the cookie on the​ website's server. C. stores the cookie in the​ browser's application settings. D. stores the cookie on the​ visitor's computer or mobile device. Your answer is correct. E. stores the cookie on the​ ISP's servers.

D. stores the cookie on the​ visitor's computer or mobile device. Your answer is correct.

Question content area top Part 1 Outdated software is an example of the​ ________ dimension of business problems. Question content area bottom Part 1 A. cultural B. organizational C. people D. technology Your answer is correct. E. management

D. technology Your answer is correct.

​"Look-and-feel" copyright infringement lawsuits are concerned​ with: Question content area bottom Part 1 A. using the creative elements of another product. B. violation of a monopoly on the ideas behind a product. C. the distinction between tangible and intangible ideas. D. the distinction between an idea and its expression. Your answer is correct. E. using the graphical elements of another product.

D. the distinction between an idea and its expression. Your answer is correct.

All of the following are factors in U.S. federal sentencing guidelines with respect to business executives except​: Question content area bottom Part 1 A. the monetary value of the crime. B. the presence of a conspiracy to prevent discovery of the crime. C. the failure to cooperate with prosecutors. D. the use of technology to commit the crime. This is the correct answer. E. the use of structured financial transactions to hide the crime.

D. the use of technology to commit the crime. This is the correct answer.

Cookie banners are a form of which type of informed​ consent? Question content area bottom Part 1 A. ​Opt-out B. Safe harbor C. Privacy shield D. ​Opt-in This is the correct answer. E. ​Self-regulation

D. ​Opt-in This is the correct answer.

The metaverse poses the highest risks with respect to which of the​ following? Question content area bottom Part 1 A. Concentration of economic and political power B. Equity and access C. Job loss D. ​Physical, mental, and cognitive health risks Your answer is correct. E. Creation of a​ just-in-time society

D. ​Physical, mental, and cognitive health risks Your answer is correct.

A client computer networked to a server​ computer, with processing split between the two types of​ machines, is called​ a(n) ________ architecture. Question content area bottom Part 1 A. ​service-oriented B. grid C. ​on-demand D. ​two-tiered client/server Your answer is correct. E. multitiered​ client/server

D. ​two-tiered client/server Your answer is correct.

In​ 2021, approximately how many people in the United States bought something​ online? Question content area bottom Part 1 A. 230 million Your answer is not correct. B. 190 million C. 180 million D. 150 million E. 210 million This is the correct answer.

E. 210 million This is the correct answer.

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. Question content area bottom Part 1 A. The judicial system B. The courts of appeal C. Due process D. Liability E. Accountability

E. Accountability

Which of the following statements about the Internet of Things​ (IoT) is not​ true? Question content area bottom Part 1 A. Certain types of IoT devices have enough intelligence to make simple decisions and remember particular patterns and routines to be carried out without any human involvement. B. IoT involves a network of physical objects for the purpose of connecting and exchanging data with other devices and systems over the Internet. C. IoT devices can range from ordinary household objects to sophisticated industrial tools. D. Traditional retailers are beginning to use IoT. E. Connected IoT devices are not an important source of Big Data. Your answer is correct.

E. Connected IoT devices are not an important source of Big Data. Your answer is correct.

Which of the following makes it illegal to circumvent​ technology-based protections of copyrighted​ materials? Question content area bottom Part 1 A. Freedom of Information Act B. Electronic Communications Privacy Act C. Privacy Act D. Computer Software Copyright Act E. Digital Millennium Copyright Act

E. Digital Millennium Copyright Act

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this​ situation? Question content area bottom Part 1 A. His action is​ wrong, because if everyone were to do​ this, the concept of personal property is defeated. B. His action is​ acceptable, because the grocer suffers the least harm. C. His action is​ wrong, because the grocery store owner is harmed. D. His action is​ wrong, because the man would not want the grocer to steal from him. E. His action is​ acceptable, because the higher social value is the survival of the family.

E. His action is​ acceptable, because the higher social value is the survival of the family.

Which of the following statements is not true about cloud​ computing? Question content area bottom Part 1 A. It is the​ fastest-growing form of computing. B. It relies primarily on the Internet as the platform for delivering services to users. C. Charges for cloud resources are based on resources actually used. D. It allows smaller firms to use resources previously unaffordable. E. It removes the concern about data and systems security for businesses. Your answer is correct.

E. It removes the concern about data and systems security for businesses. Your answer is correct.

Which of the following is a data analysis technology that finds hidden connections between data in disparate​ sources? Question content area bottom Part 1 A. HIPAA B. COPPA C. FIP D. Spyware E. NORA

E. NORA

Which are the three major dimensions of business problem​ solving? Question content area bottom Part 1 A. People​ dimensions, technology​ dimensions, and environmental dimensions B. Organizational​ dimensions, people​ dimensions, and environmental dimensions C. Organizational​ dimensions, technology​ dimensions, and cultural dimensions D. Technology​ dimensions, organizational​ dimensions, and environmental dimensions E. Organizational​ dimensions, people​ dimensions, and technology dimensions

E. Organizational​ dimensions, people​ dimensions, and technology dimensions

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under​ low-impact loads? Question content area bottom Part 1 A. CVS B. Technostress C. CTS D. RSS E. RSI

E. RSI

A(n) ________ is a set of​ self-contained services that communicate with each other to create a working software application. Question content area bottom Part 1 A. hybrid cloud B. ERP C. mashup D. web service E. SOA

E. SOA

Which of the following software tools would you use to prepare a​ what-if analysis? Question content area bottom Part 1 A. Presentation graphics B. Desktop publishing C. Word processing D. Personal information management E. Spreadsheet

E. Spreadsheet

Which of the following ethical guidelines suggests that you put yourself in the place of​ others, and think of yourself as the object of the​ decision? Question content area bottom Part 1 A. The risk aversion principle B. The utilitarian principle C. ​Kant's categorical imperative D. The​ no-free-lunch rule E. The Golden Rule

E. The Golden Rule

Which of the following is a service provided by the Internet that uses universally accepted standards for​ storing, retrieving,​ formatting, and displaying information in a page format. Question content area bottom Part 1 A. FTP B. Email C. An extranet D. HTML E. The World Wide Web

E. The World Wide Web

All of the following are steps in the process for analyzing an ethical issue except​: Question content area bottom Part 1 A. identifying the stakeholders. B. identifying the potential consequences of your options. C. identifying the options you can reasonably take. D. identifying and clearly describing the facts. E. assigning responsibility.

E. assigning responsibility.

All of the following are examples of environmental actors in an information system except​: Question content area bottom Part 1 A. regulatory agencies. B. stockholders. C. suppliers. D. competitors. E. employees. Your answer is correct.

E. employees. Your answer is correct.

In a​ ________ computing​ model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. Question content area bottom Part 1 A. private cloud B. quantum C. scalable D. grid E. hybrid cloud Your answer is correct.

E. hybrid cloud Your answer is correct.

The ethical​ no-free-lunch rule states​ that: Question content area bottom Part 1 A. if an action cannot be taken​ repeatedly, then it is not right to be taken at any time. B. one should take the action that produces the least harm or incurs the least cost. C. one can put values in rank order and understand the consequences of various courses of action. D. if an action is not right for everyone to​ take, it is not right for anyone to take. E. if something someone else has created is useful to​ you, it has​ value, and you should assume the creator wants compensation for this work.

E. if something someone else has created is useful to​ you, it has​ value, and you should assume the creator wants compensation for this work.

The final step in the​ four-step model of business problem solving​ is: Question content area bottom Part 1 A. change management. B. feedback. C. employee retraining. D. outcome. E. implementation

E. implementation

Redesigning and automating business processes can be seen as a​ double-edged sword​ because: Question content area bottom Part 1 A. increases in efficiency may be accompanied by poor data quality. B. it can concentrate power in the hands of senior executives. C. reliance on technology results in the loss of​ hands-on knowledge. D. support for​ middle-management decision making may be offset by poor data quality. E. increases in efficiency may be accompanied by job losses. Your answer is correct.

E. increases in efficiency may be accompanied by job losses. Your answer is correct.

The U.S.​ CAN-SPAM Act: Question content area bottom Part 1 A. does not outlaw the use of fake return addresses. B. makes spamming illegal. C. has dramatically cut down spamming. D. makes it difficult for recipients to remove their names from email lists. E. requires commercial email senders to identify themselves. Your answer is correct.

E. requires commercial email senders to identify themselves. Your answer is correct.

All of the following have contributed to the reduction in piracy except​: Question content area bottom Part 1 A. development of devices such as the Amazon Kindle. B. legitimate online music stores. C. streaming services. D. the efforts of US and European authorities. E. the development of digital networks.

E. the development of digital networks.

In a multitiered​ network: Question content area bottom Part 1 A. users interface with the server rather than the client. B. processing is split equally between clients and servers. C. the work of the entire network is centralized. D. processing is handled by​ multiple, geographically remote clients. E. the work of the entire network is balanced over several levels of servers. Your answer is correct.

E. the work of the entire network is balanced over several levels of servers. Your answer is correct.

All of the following laws apply to actions by the federal government except​: Question content area bottom Part 1 A. the​ E-Government Act. B. the Computer Security Act. C. the Freedom of Information Act. D. the Privacy Act. E. the​ Children's Online Privacy Protection Act.

E. the​ Children's Online Privacy Protection Act.

Which of the following is a type of optical drive​ storage? Question content area bottom Part 1 A. USB flash drive B. Magnetic tape C. Hard drive D. SSD E. ​Blu-ray Your answer is correct.

E. ​Blu-ray Your answer is correct.

The three activities in an information system that produce information​ are: Question content area bottom Part 1 A. data​ analysis, processing, and feedback. B. ​data, input, and feedback. C. ​input, output, and feedback. D. ​data, research, and analysis. E. ​input, processing, and output. Your answer is correct.

E. ​input, processing, and output. Your answer is correct.

Apple's App Tracking Transparency initiative monitors and disables​ cross-site tracking cookies and blocks​ trackers' ability to identify users by IP address. Question content area bottom Part 1 True False

False

Business processes are logically related tasks for accomplishing work that have been formally encoded by an organization. Question content area bottom Part 1 True False

False

Computer literacy focuses primarily on knowledge of information systems. Question content area bottom Part 1 True False

False

IT managerial jobs are outsourced easily because of the universal standards used by the Internet. Question content area bottom Part 1 True False

False

Identifying the stakeholdersdash-people who have a vested interest in the outcome of the decisiondash-is the last step in analyzing an ethical issue. Question content area bottom Part 1 True False

False

Intranets are private corporate networks extended to authorized users outside the organization. Question content area bottom Part 1 True False

False

SaaS focuses on the provision of infrastructure and programming tools that allow customers to develop their own applications. Question content area bottom Part 1 True False

False

Software piracy is no longer a major​ concern, with the number of visits to software piracy sites worldwide declining in 2021. Question content area bottom Part 1 True False

False

The Internet can only be used to connect a​ firm's computers to networks external to the firm. Question content area bottom Part 1 True False Your answer is correct.

False

There are two types of​ outsourcing: offshore outsourcing and foreign outsourcing. Question content area bottom Part 1 True False

False

Whereas marketing and financial careers have been transformed by the growth in information​ systems, thus far managerial positions have remained relatively unaffected. Question content area bottom Part 1 True False

False

A​ company's data use policy details​ consumers' rights with respect to data collected by the company. Question content area bottom Part 1 True False This is the correct answer.

False This is the correct answer.

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. Question content area bottom Part 1 True False This is the correct answer.

False This is the correct answer.

Client/server computing is the most widely used form of centralized processing. Question content area bottom Part 1 True False This is the correct answer.

False This is the correct answer.

Data is information that has been shaped into a form that is meaningful to human beings. Question content area bottom Part 1 True False This is the correct answer.

False This is the correct answer.

Equipping employees with mobile devices reduces IT infrastructure integration and technical support costs. Question content area bottom Part 1 True False This is the correct answer.

False This is the correct answer.

Quantum computing tools are not yet available to the general public. Question content area bottom Part 1 True False This is the correct answer.

False This is the correct answer.

Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

An unsupportive culture is an example of the people dimension of business problems. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Apple's iOS is the most popular smartphone platform worldwide. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Differential privacy software increases the ability to merge different files and​ de-anonymize consumer data. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Due process is a feature of political systems and allows individuals to recover damages done to them by others. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Information systems literacy is solely a technical approach to studying information systems. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Moving workloads from​ on-premises to the cloud always results in lower computing costs. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

One way to reduce ethical concerns is to use artificial intelligence to substitute for human judgment in making decisions. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Software programs were unprotected by copyright law until the early 1990s. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Software used to create an invoice is an example of systems software. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Today, most system software is custom built by​ in-house programmers. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

XML is limited to describing how data should be presented in the form of web​ pages, while HTML can perform​ presentation, communication, and storage of data. Question content area bottom Part 1 True False Your answer is correct.

False Your answer is correct.

Employee attitudes about their​ jobs, employers, or technology can have a powerful effect on their abilities to use information systems productively. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Encouraging employees to adapt to new business processes is an important factor in change management. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Feedback is output returned to appropriate members of the organization to help them evaluate or correct the input stage. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Firms typically have little understanding of how much benefit they receive from investments in information systems and services. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Identifying a problem includes agreeing that a problem exists. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

If a search engine firm copied​ Google's icon,​ colors, and​ images, it would be infringing on​ Google's trademark. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

In cloud​ computing, rapid elasticity refers to the ability of computing resources to be quickly​ obtained, increased, or decreased to meet demand. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

In order to successfully implement a new information system​ worldwide, software may have to be built with local language interfaces. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Information systems are central in enabling companies to achieve ESG goals. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Information systems contain information about significant​ people, places, and things within the organization or in the environment surrounding it. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Mainframes today can be used as giant servers for​ large-scale enterprise networks. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Microsoft 365 is an example of SaaS. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

More than 90 percent of Internet users access the web with mobile devices. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Most Internet businesses do very little to protect the privacy of their customers. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

One of the key concepts in patent law is originality. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

People, organizations, and information technology are all dimensions of information systems. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Question content area top Part 1 An understanding of​ enterprise-wide systems for customer relationship management is one of the skills relevant to careers in marketing. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Routine violations of individual privacy are made easier by advances in data storage. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Ruby on Rails is a programming language that provides a framework with tools for building​ feature-rich websites. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Software-defined storage is an example of virtualization. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Some experts believe information technology may be harming our cognitive​ functions, preventing people from focusing and thinking clearly on their own. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Systems integration means ensuring the legacy systems work with new elements of the infrastructure. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

The history and culture of business firms affects how it uses information technology. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

The intent behind copyright law is to encourage creativity and authorship by ensuring that creators receive the financial and other benefits of their work. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Trademark laws protect consumers by ensuring that they receive what they paid for. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Web beacons are​ tiny, invisible software programs hidden in email messages and web pages that are used to track and report a​ user's online behavior. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

​Apple's A16 processor is an example of a multicore processor. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Which of the following is the foundation technology for web​ services? Question content area bottom Part 1 A. XML Your answer is correct. B. UDDI C. Java D. HTML E. SOAP

XML Your answer is correct.

Cloud computing has enabled organizations to create more robust IT infrastructures for managing and analyzing Big Data. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Costs for​ downtime, training, and support should be included when calculating total cost of ownership. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Developing a new​ product, fulfilling an​ order, and hiring a new employee are all examples of business processes. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Dropbox is an example of a public cloud service. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

What percent of the Fortune 500 companies uses a social network to communicate with their​ customers? Question content area bottom Part 1 A. 57 percent B. 97 percent Your answer is correct. C. 67 percent D. 87 percent E. 47 percent

B. 97 percent Your answer is correct.

Which of the following was developed in the 1960s but can still be found in large legacy​ systems? Question content area bottom Part 1 A. Java B. COBOL Your answer is correct. C. XML D. SOA E. HTML

B. COBOL Your answer is correct.

Management is the largest single group in the US labor force. Question content area bottom Part 1 True This is the correct answer. False

True This is the correct answer.

A private cloud is operated for the benefit of a single organization but may be managed by a third party and located​ off-premises. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

A service level agreement specifies the nature and level of services provided by service providers. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Accessing a computer system without authorization is a federal crime. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

An extranet is a private intranet extended to authorized users outside the organization. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Any intellectual work product used for a business purpose that​ isn't based on public knowledge can be classed as a trade secret. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Apple's Safari and​ Mozilla's Firefox web browsers block​ third-party cookies by default. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

A​ firm's IT infrastructure provides the foundation for supporting all the information systems in the business. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Because of their special claims to​ knowledge, wisdom, and​ respect, professionals take on special rights and obligations. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.

Big Tech firms are facing increasing antitrust scrutiny with respect to alleged anticompetitive and unfair practices. Question content area bottom Part 1 True Your answer is correct. False

True Your answer is correct.


Set pelajaran terkait

Basic Big Data Interview Questions

View Set

Тестовые вопросы по Истории медицины

View Set

Financial Statements and Year-End Accounting for a Merchandising Business

View Set

Web-based Applications Exam 1 (IS 4460)

View Set

AP GOV! Chapter One True and False (Can't Use Scatter :/)

View Set

soc 101 chapter 12--gender, sex, and sexuality

View Set

Clinical Research Coordinator Exam

View Set