BUS 355 Final
If an inventory manager is required to make a daily decision about parts inventory levels, and the estimated value to the firm of a single improved decision by that manager is $2,500, what is the annual business value of that enhanced decision? $2,500 $30,000 $130,000 $300,000 $912,500
$912,500
The interaction between information technology and organizations is influenced: By many factors, including structure, politics, culture, and environment By the development of new information technologies Solely by the decision making of middle and senior managers By two main macroeconomic forces: capital and labor
By many factors, including structure, politics, culture, and environment
Which of the following best illustrates the advertising revenue model? Apple accepts micropayments for single music track downloads Facebook provides a social network for free but shows sponsored content in users' News Feed Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase Netflix charges customers a monthly fee for access to its library of movies eBay receives a small fee from a seller if a seller is successful in selling an item
Facebook provides a social network for free but shows sponsored content in users' News Feeds
Which of the following is a grouping of characters into a word, a group of words, or a complete number? file table entity field tuple
Field
Which of the following best describes Immanuel Kant's categorical imperative? If an action cannot be taken repeatedly, then it is not right to be taken at any time One should take the action that produces the least harm or incurs the least cost If an action is not right for everyone to take, it is not right for anyone to take One can put values in rank order and understand the consequences of various courses of action
If an action is not right for everyone to take, it is not right for anyone to take
An information system can enable a company to focus on a market niche through: enabling new products and services producing products and services at a lower price than competitors developing intimacy with customers intensive customer data analysis
Intensive customer data analysis
Which of the following best describes the effect that new information technology has on society? it has a ripple effect, raising new ethical, social, and political issues it has a waterfall effect in raising ever more complex ethical issues it is beneficial for society as a whole, while raising dilemmas for consumers it has a magnifying effect, creating increasing numbers of ethical issues
It has a ripple effect, raising new ethical, social, and political issues
Which of the following is not a major CRM application software vendor? SAP JDA software Oracle Salesforce.com Microsoft
JDA software
According to the ________ definition of organizations, an organization is seen as a means by which capital and labor are transformed by the organization into outputs to the environment behavioral macroeconomic sociotechnical microeconomic
Microeconomic
All of the following are, or were, file-sharing services except: The Pirate Bay Pandora Megaupload Grokster
Pandora
Which of the following statements about RFID is not true? microchips embedded in RFIDs are used to store data RFIDs use an antenna to transmit data RFIDs transmit only over a short range RFIDs require line-of-sight contact to be read
RFIDs require line-of-sight contact to be read
Which of the following is not an example of a next-generation enterprise application? Microsoft Dynamics 365 Salesforce.com's Einstein AI SAP S/4HANA Cloud SAP R/3 Social CRM
SAP R/3
______ modules in CRM systems help staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services customer SFA complex SOA marketing
SFA
Which of the following statements about Net marketplaces is not true? Some Net marketplaces support contractual purchases based on long-term relationships Some Net marketplaces serve vertical markets Some Net marketplaces sell direct good Some Net marketplaces are owned by a single firm and used to link solely to the firm's suppliers and key business partners Some Net marketplaces sell indirect goods
Some Net marketplaces are owned by a single firm and used to link solely to the firm's suppliers and key business partners
Which of the following best illustrates the relationship between entities and attributes? The entity CUSTOMER with the attribute PRODUCT The entity CUSTOMER with the attribute PURCHASE The entity PRODUCT with the attribute PURCHASE The entity PRODUCT with the attribute CUSTOMER The entity PURCHASE with the attribute CUSTOMER
The entity CUSTOMER with the attribute PURCHASE
What event marked the beginning of e-commerce? The first product sold online The first email sent The first product advertised online The first domain name registered The first paid advertisements placed on a website
The first paid advertisements placed on a website
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called _______ systems DPI MSSP NSP PKI UTM
UTM
Which signal types are represented by a continuous waveform? analog RFID digital optical
analog
All of the following are types of information systems general controls except: application controls computer operations controls hardware controls software controls administrative controls
application controls
What are the four layers of the TCP/IP reference model? application, transport, internet, and network interface physical, application, internet, and network interface application, hardware, internet, and network interface physical, application, transport, and network interface
application, transport, internet, and network interface
A characteristic or quality that describes a particular database entity is called a(n): field tuple key field attribute relationship
attribute
Which of the following statements about passwords is not true: authentication cannot be established by the use of a password password systems that are too rigorous may hinder employee productivity passwords can be stolen through social engineering a user's actions with respect to passwords can compromise security passwords can be sniffed when being transmitted over a network
authentication cannot be established by the use of a password
Which of the following is not a part of business intelligence infrastructure? databases balanced scorecards data warehouses data marts analytic platforms
balanced scorecards
All of the following are physical components of an RFID system except: readers antennas bar codes radio transmitters
bar codes
The right to ________ is a feature of the GDPR that allows individuals to request that organizations delete their personal data a safe harbor opt-out of data collection be forgotten opt-in to data collection
be forgotten
The total amount of digital information that can be transmitted through any telecommunications medium is measured in: gigaflops bps hertz baud
bps
The traditional telephone system is an example of a _________ network peer-to-peer circuit-switched packet-switched wireless
circuit-switched
Computer forensics tasks include all of the following except: presenting collected evidence in a court of law securely storing recovered electronic data collecting physical evidence on the computer finding significant information in a large volume of electronic data recovering data from computers while preserving evidential integrity
collecting physical evidence on the computer
Which of the following Internet business models involved a merchant creating an online digital environment that enables people with like interesting to share information? service provider transaction broker market creator community provider portal
community provider
Which quality dimension of information is concerned that all the necessary data needed to make a decision is present? timeliness consistency completeness accessibility validity
completeness
The dimension of ______ describes whether data elements are consistently defined completeness accuracy validity consistency integrity
consistency
A(n) ______ is an activity for which a firm is a world-class leader? competitive advantage growth driver efficiency core competency
core competency
Pepsico using Super Bowl viewers to build an online video is an example of: social shopping behavioral targeting long-tail marketing crowdsourcing prediction markets
crowdsourcing
To achieve the maximum benefit of a new ERP system, Tasty Baking implemented an enterprise system by: customizing less than 5 percent of the enterprise system processes retaining its legacy systems to operate as a backup to the new enterprise syste using only the pre-defined processes in the ERP software that matched its own processes changing the ERP software as needed to match their own processes using a cloud-based version of the ERP
customizing less than 5 percent of the enterprise system processes
A(n) _____ is a BI feature that presents performance data defined by users ad hoc query parameterized report interface portal dashboard
dashboard
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? data normalization data accuracy data redundancy data inconsistency data duplication
data inconsistency
Which of the following occurs when the same attribute in related data files has different values? data redundancy data duplication data dependence data discrepancy data inconsistency
data inconsistency
_______ creates confusion that hampers the creation of information systems that integrate data from different sources batch procession data redundancy data independence online processing data distribution
data redundancy
From your reading of the chapter's opening case, which of the answers below is not a reason why Lenzing chose JDA's Sales and Operations Planning software? Develop a new business model minimize the environmental impact of its products create an end-to-end supply chain planning process eliminate manual processes improve sales forecast accuracy
develop a new business model
A(n) __________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits digital broadband analog modulated
digital
Client/server computing is a: network where centralized mainframe computers serve local devices distributed computing model where clients are linked to one another through a network that is controlled by a network server computer centralized model of computing for large corporations network that connects sensors to desktop computers
distributed computing model where clients are linked to one another through a network that is controlled by a network server computer
Which of the following statements about exchanges is not true? some exchanges enable a spot market exchanges are the most successful form of B2B commerce exchanges are independently owned third-party Net marketplaces Go2Paper is an example of an exchange some exchanges provide vertical markets
exchanges are the most successful form of B2B commerce
The Network Advertising Initiative is an industry association that: has established technical guidelines for ensuring privacy regulates the use of customer information by firms has developed privacy policies to help costumers opt out of advertising network programs and provide consumers redress from abuses protects user privacy during interactions with websites
has developed privacy policies to help consumers opt out of advertising network programs and provide consumers redress form abuses
Which of the following statements best describes the business value of improved decision making at all levels of the firm? improved decision making creates better products improved decision making results in a large monetary value for the firm as numerous small daily decision affecting efficiency, production, costs, and more add up to large annual values improved decision making enables senior executive to more accurately foresee future financial trends improved decision making strengthens customer and supplier intimacy, which reduces costs improved decision making creates a better organizational culture
improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values
All of the following are issues with the traditional file environment except: data inconsistency inability to develop specialized applications for functional areas lack of flexibility in creating ad-hoc reports poor security data sharing
inability to develop specialized applications for functional areas
Which of the following dimensions of e-commerce technology has the potential to raise the quality of information? customization richness interactivity global reach information density
information density
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors stateful inspections intrusion detection systems application proxy filtering technologies packet filtering technologies firewalls
intrusion detection systems
A Trojan horse: is software that appears to be benign but does something other than is expected is a virus installed as a drive-by download is malware named for a breed of fast-moving Near-Eastern horses installs spyware on users' computers is a type of sniffer used to infiltrate corporate networks
is a software that appears to be benign but does something other than is expected
All of the following are examples of supply chain inefficiencies except: high transportation costs excessive finished goods underused plant capacity just-in-time production parts shortages
just-in-time production
The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? program-data dependence lack of flexibility poor security lack of data sharing data redundancy
lack of flexibility
Compared to traditional markets, digital markets have: greater asymmetry higher menu costs higher transaction costs lower search costs weaker network effects
lower search costs
A well-designed ESS helps senior executive do all of the following except: monitor organizational performance track the activity of competitors recognize changing market conditions identify problems and opportunities make high-velocity automated decisions
make high-velocity automated decisions
________ involved placing ads in social network newsfeeds or within traditional editorial content, such as a newspaper article crowdsourcing lead generation marketing behavioral targeting demand prediction software native advertising
native advertising
The HIPAA Act of 1996: requires financial institutions to ensure the security of customer data specifies best practices in information systems security and control imposes responsibility on companies and management to safeguard the accuracy of financial information outlines medical security and privacy rules identifies computer abuse as a crime and defines abusive activities
outlines medical security and privacy rules
Most computer viruses deliver a: worm Trojan horse drive-by download keylogger payload
payload
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? LAN Windows domain network peer-to-peer wireless
peer-to-peer
Walmart's continuous replenishment system is an example of a(n) ________ model forecast-based build-to-stock push-based pull-based supply chain organization
pull-based
All of the following are specific security challenges that threaten corporate systems in a client/server environment except: theft of data copying of data alteration of data radiation hardware failure
radiation
A database ________ describes a data entity byte field record value file
record
Data _______ occurs when the same data is duplicated in multiple files of a database redundancy repetition independence partitions discrepancy
redundancy
Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address? router hub switch nic
router
Which of the following marketing formats is sales-oriented, rather than branding-oriented or a mix search engine rich media lead generation video display ads
search engine
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? security controls benchmarking algorithms identity management
security
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a(n): value chain supply chain distribution channel marketing channel information system
supply chain
The WMS that Haworth Incorporated uses is an example of which of the following? just-in-time strategy supply chain planning system supply chain execution system continuous replenishment system build-to-order model
supply chain execution system
Which of the following is a support activity in a firm's value chain? technology service operations sales and marketing
technology
Which of the following statements about DSS is not true? they rely more heavily on modeling than MIS they are BI delivery platforms for casual users they can support semistructured decision making they can be used to perform a sensitivity analysis they can be used to test specific hypotheses
they are BI delivery platforms for casual users
Which type of decision is deciding whether to introduce a new product line? structured unstructured recurring nonrecurring predictive
unstructured
The _______ includes a company's supplies, the suppliers' suppliers, and the processes for managing relationships with them? upstream portion of the supply chain downstream portion of the supply chain supplier's internal supply chain intermediate portion of the supply chain logistics supply chain
upstream portion of the supply chain
Which of the following is not an example of a BI predefined production report? workforce demographics order cycle time what-if scenario analysis church rate direct and indirect spending
what-if scenario analysis