chapter 4, chapter 5 , chapter 6 , chapter 7 - telecommunications, the internet, and wireless technology, chapter 8, Chapter 9 , chapter 10 , chapter 11, chapter 12 , Chapter 14
your company, an online discount pet supply store, has calculated that a loss of internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occuring each year. what is the annual expected loss from this exposure?
$1,250
according to Accenture and Ponemon Institute's ninth annual cost of cybercrime study, the average annualized cost of cybercrime in 2018 for benchmarked organizations was approximately:
$13 million
according to the 2020 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2019?
$16.9 billion
if an inventory manager is required to make a daily decision about parts inventory levels, and the estimated value to the firm of a single improved decision bby that manager is $2,500, what is the annual business value of the enhanced decision?
$912,500
___ uses individual atoms and molecules to create computer chips and other devices.
. B. nanotechnology
what are the steps in conducting an ethical analysis?
1. ID and describe the facts clearly 2. define the conflict or answer 3. ID stakeholders 4. ID the options that you can reasonably take 5. ID the potential consequences of your options
when did e-commerce bbegin?
1995
According to Gartner, more than ____ percent of the critical data in large Fortune 1000 companies' databases are inaccurate or incomplete.
25
supply chain inefficiencies waste as much as ____ percent of a company's operating costs?
25
the WiMax standard can transmit up to a distance of approximately:
30 miles
what perent on top retailers now have m-commerce websites?
47 percent
on average, private sector IT projects are underestimated by ____ percent in terms of bbudget and time required to deliver the complete system promised by the system plan.
50
which of the following statements about 5G is true?
5G will be able to transmit data in the gigabit range
according to small world theory, you are only _____ links away from any other person on earth.
6
according to a 2020 survey of 181 ERP users conducted by Panorama consulting Group, 38 percent of ERP projects experienced cost overuns, and these overrun averaged ____ percent over budget
66
hardware and software acquisitions costs account for about ___ percent of TCO.
A. 20
___ are small, specialized software programs that run on the internet, on a computer, or on a mobile phone or tablet and are generally delivered other the internet.
A. Apps
which of the following statements about cookies is NOT true?
A. Cookies are installed only at the user's request
which of the following adjusts copyright laws to the internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
A. Digital Millennium Copyright Act
which of the following U.S. laws gives patients access to personal medical records and the right to authorize this information can be used to disclosed?
A. HIPPA
a colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. you tell her that if everyone were to take office supplies, then the loss would no longer be minimal. your rationale expresses which of the following ethical principles?
A. Kant's Categorical Imperative
____states that the value or power of a network grows exponentially as a function of the number of network members.
A. Metcalfe's
which of the following is a multitasking, multiuser, operating system developed by ell Laboratories that operates on a wide variety of computers from different manufacturers?
A. Unix
which of the following refers to a set of loosely coupled software components that exchange information with each other using standard web communication standards and languages?
A. Web services
which of the following became the standard PC in the personal computer era?
A. Wintel PC
which of the following is the foundation technology for web services?
A. XML
the introduction of the minicomputer:
A. allowed computers to be customized to the specific needs of departments or business units.
all of the following are steps in the process for analyzing an ethical issue except:
A. assigning responsibility
advertisers use ___ in order to display more relevant ads based on a user's search and browsing history.
A. behavioral targeting
the internet hardware server marketplace:
A. has become increasingly concentrated in top firms
the Network Advertising Initiative is an industry association that:
A. has developed privacy policies to help consumers opt out of advertising network programs and provide consumers redress from abuses
redesigning and automating business processes can be seen a double-edged sword because:
A. increases in efficiency may be accompanied by job losses
a ___ is an intergraded circuit which contains two or more processors to enhance performance and reduce power consumption.
A. multicore and reduce power consumption
which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?
A. on-demand
which of the following is not an IT infrastructure service component?
A. operating system software services
in the ____ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.
A. opt-in
the use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
A. profiling
which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve?
A. quality of life
_____ means that you accept the potential costs and obligations for the decisions you make.
A. responsibility
which ethical rule states that is an action cannot be taken repeatedly, it is not right to take all?
A. slippery-slope rule
prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:
A. software package
which of the following regulates the U.S federal government collection, use, and disclosure of information?
A. the Privacy Act
which of the following is an example of a legacy system?
A. transaction processing system running on a mainframe
CVS refers to:
A> eyestrain related to computer display screen use
_____ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.
Administrative
Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing era, 2. client/server, 3. enterprise era, 4. personal computer; and 5. mainframe and minicomputer.
B. 5,4,2,3,1
___ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.
B. Accountability
___ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
B. Due process
a formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a:
B. SLA
Nanotubes are about 10,000 times thinner than:
B. a human hair
which of the following is the most popular smartphone operating system?
B. android
a man steals from a grocery store in order to feed his starving family. which of the following best expresses the utilitarian principle in evaluating this situation?
B. his action is acceptable, because the higher social value is the survival of the family
which of the following best describes the effect that new I.T has on society?
B. it has a ripple effect, raising new ethical, social, and political issues
when a cookie is created during a website visit, it is stored:
B. on the hard drive of the vistor's computer
The NAI is an industry association formed to help with which of the following?
B. online privacy issues
which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?
B. scalability
"look and feel" copyright infringement lawsuits are concerned with:
B. the distinction between an idea and it expression
in a multitiered network:
B. the work of the entire network is balanced over several levels of servers
which one of the following best describes how new I.S. can result in legal gray areas?
B. they work with networked, digital which are more difficult to control than information stored manually.
which of the following is a recent addition to the mobile digital platform?
B. wearable computing devices
which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet?
B2C e-commerce
which of the following is a management methodology that attempts to systematically translate a firm's strategy into generate operational targets?
BPM
which of the following is the popular name for the 802.15 wireless networking standard?
Bluetooth
which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of clients/server computing and local area networks and further stimulated the adoption of personal computers?
C. Ethernet
which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?
C. Green computing
which of the following statements about Java is NOT true?
C. Java programs cannot be used on mobile phones
which of the following statements about Linux is NOT true?
C. Linux is the leading operating system for desktop systems.
which of the following is a data analysis technology that finds obscure connections between data in disparate sources?
C. NORA
which of the following runs an antipiracy hotline for individuals to report piracy activities?
C. SIIA
which of the following refers to a set of self-contained services that communicate with each other to create a working software application?
C. SOA
Linux is:
C. an example of open-source software
the right to ___ is a feature of the GDPR that allows individuals to request that organizations delete their personal data.
C. be forgotten
which of the following is NOT a principle cause of poor system performance?
C. computer abuse
which of the following terms refers to significant disparities in access to computers and the internet among different social groups and different locations?
C. digital divide
how would yo determine the market demand for your firms IT services?
C. hold focus groups to asses whether your services are meeting the needs of your customers.
which of the following is NOT one of the current key technology trends that raises ethical issues?
C. increase in data quality
which of the following are the leading operating systems for corporate servers?
C. microsoft window server, Unix, and Linux
FIP principles are based on a belief in which of the following?
C. mutuality of interest between the record holder and the individual
_____ grants the owner exclusive ownership of the ideas behind an invention for 20 years.
C. patent law
which of the following is NOT an example of a wearable computing device?
C. smartphones
all of the following are factors in U.S. federal sentencing guidelines with respect to business executives except:
C. the use of technology to commit the crime
which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as a multiple logical resources?
C. virtualization
which of the following is an easy-to-use software program with a graphical user interface for displaying web pages and for accessing the web and other internet resources?
C. web browser
craiglist is an example of:
C2C e-commerce
all of the following are examples of machine learning EXCEPT:
CAD systems
a network that spans a college or corporate facility is called a:
CAN
which metric is bbased on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and serving that customer, and the expected life of the relationship between the customer and the company?
CLTV
firms that allow employees to use their own devices are embracing which one of the following?
D. BYOD
which of the following is NOT an example of the mobile digital platform?
D. SDS devices
all of the following are current hardware platform trends except:
D. SOA
ZipRealty, which combines Google Maps with real estate data, is an example of:
D. a web mashup
what percent of global internet users use Google search and other Google services?
D. about 80 percent
A____ is used to communicate between a user and an organizations back-end systems.
D. application server
all of the following laws apply to actions by the federal government EXCEPT the:
D. children's online privacy protection act
all of the following are FTC privacy guidelines EXCEPT:
D. firms should limit the length of time that any personal data is stored to six months or less
which of the following best describes Immanuel Kant's categorical imperative?
D. if an action is not right for everyone to take, it is not right for anyone to take.
the ethical no-free-lunch rule states state:
D. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
the windows operating systems:
D. is an operating system used by nearly 88 percent of PCs
Which of the following is a primary drawback to the "do anything anywhere" computing environment?
D. it blurs the traditional boundaries between work and family time
which type of software is created and uploaded by a worldwide community of programmers and available for free?
D. open source
which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?
D. the golden rule
which of the following statements about trademarks is NOT true?
D. trademark laws are designed solely to protect consumers
a client computer networked to a server computer, with processing split between the two types of machines, is called a ___.
D. two-tiered client/server architecture
which of the following is NOT one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?
D. your firms organizational culture
all of the following are, or were, file-sharing services EXCEPT:
D.pandora
Dyn suffered which of the following types of attacks?
DDoS
using numerous computers to inundate and overwhelm the network from numerous lanch points is called a(n) ____ attack.
DDoS
Microsoft SQL server is a(n):
DMS for midrange computers
what service converts natural language names to IP addresses?
DNS
which of the following information systems supports a manager's role as a resource allocator?
DSS
amazon.com is known primarily for its use of which of the following business models?
E-tailer
at what percent of capacity do most servers operate?
E. 15-20%
which of the following is NOT an example of the consumerization of IT?
E. Amazon web services
which of the following is a leading networking hardware provider?
E. Cisco
which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data?
E. Data Management
which of the following involves hosting and managing access to software applications delivered over the internet to clients on subscription basis?
E. Saas
which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
E. Trade secret
all of the following have multitouch capabilities EXCEPT:
E. Unix
___ provides a standard format for data exchange, enabling web services to pass data from one process to another.
E. XML
which of the following were involved in what has been called the patent trial of the century?
E. apple and samsung
which of the following is NOT a U.S. federal law affecting private institutions?
E. computer matching and privacy protection act
interpretations of Moore's law assert that:
E. computing power doubles every 18 months
which of the following is by far the most common source of business system failure?
E. data quality
all of the following are technical solutions to protecting user privacy EXCEPT:
E. data use policies
during which era did business firms begin seriously to use TCP/IP?
E. enterprise computing
which of the five moral dimensions of the information age do the central business activities of Google Marketing Platform involve?
E. information rights and obbligations
which of the following is NOT a feature of the General Data Protection Regulation (GDPR)?
E. it prevents firms from using cookies
which of the following allows the EU to enforce GDPR requirements with non-EU countries?
E. privacy shield agreement
which of the following statements about mobile devices is NOT true?
E. qualcomm has a monopoly on manufacture of processors for mobile devices.
the obligation that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?
E. quality of life
the ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of:
E. quantum computing
which of the following is NOT one of the characteristics of cloud computing, as defined by the US national institute of standard and technology?
E. reduced elasticity
which of the following is NOT one of the current software platform trends?
E. software-defined storage
which of the following statements about spam is NOT true?
E. spamming is more tightly regulated in the US than in Europe
all of the following are cloud computing services EXCEPT:
E. system integration services
all of the following are typically factors in a firm's decision to engage consulting and system integration services EXCEPT:
E. the firms staff knows more about the firms IT infrastructure than service providers.
____ allows an organization to collect personal information without the user's explicit consent.
E. the opt-out model
which of the following is NOT a difficulty in establishing patent protection?
E. the requirement that the work must be a secret
which model can be used to analyze the direct and indirect cots to help firms determine the actual cost of specific technology implementations?
E. total cost of ownership
the FIP principle of Notice/Awareness states that:
E. websites must disclose their information practices before collecting data
which of the following is NOT a technology driver transforming IT infrastructure?
E. widespread rejection of technology standards
which of the following types of systems enables organizations to digitize, index, and tag structured and instructured knowledge and docuements according to a coherent framework?
ECM
which of the following statements about an ECM system is NOT true?
ECM systems only enable users to access internal sources of information
____software modules deal with setting employee objectives, performance, and compensation
ERM
which of the following provides a suite of integrated software modules and a common central database that allows data to be used by multiple functions and business process?
ERP systems
an information system that combines data from internal MIS with informaiton form financial systems and external sources to deliver reports such as profit-loss statements and impact analyses, is an example of:
ESS
which of the following types of system woulf be used to present senior marketing executives with high-level information about customer retention, satisficatiom, and quality performance?
ESS
which of the following is an example of a company primarily engaged in B2B e-commerce?
Elemica
which of the following is the largest mobile advertising market?
Facebook/ Instagram
In N-tier computing, significant parts of website content, logic, and processing are performed by a single web server. true or false?
False
Quantum computing is a common method of reducing technology costs by providing the ability to host multiple systems on a single physical machine.
False
identifying the stakeholders- people who have a vested interest in the outcome of the decision- is the last step in analyzing an ethical issue. true or false?
False
in todays legal environment, managers who are convicted for the misuse of I.S. are unlikely to be given a prison sentence. True or False?
False
web services can exchange information between two different systems only if the operating systems and programming languages upon which of the systems are based are identical.
False
which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitzed maps?
GIS
geoadvertising sends ads to users based on their:
GPS location
which digital cellular standard is used widely throughout the world EXCEPT the Unted States
GSM
which type of planning tool shpws each task as a horizontal bar whose length is proportional to the time required to compete it?
Gantt chart
web browser software requests web pages from the internet using which of the following protocols?
HTTP
which of the following technologies would you use to analyze the social media data collected by a major online retailer?
Hadoop
which of the following statements about Hadoop is NOT true?
Hadoop is propriety software sold by the Apache Software FOundation
which organization manages the domain name system of the internet?
ICANN
a (n) ____ is a commerical organization with a permament connection tothe internet that sells temporary connections to retail subscriers.
ISP
as described in the text, which of the following statement about runaway or failed IT projects is NOT true?
IT projects often fail because they lack sufficient computing capacity
the NHL Puck and Player Tracking system described in the chapter opening case is an example of which of the following?
IoT application
which of the following is not a major CRM application software vendor?
JDA software
specialized systems that enables scientists and engineers to create and discover new knowledge for a company called:
KWS
which of the following provides tools for the management, delivery, tracking, and assessment of various types of employee learning?
LMS
4G networks use which of the following standards?
LTE and WiMax
which type of network is used to connect digital devices within a city or metropolitan area?
MAN
which of the following technologies is used to reduce WiFi network interference from nearby systems in the same spectrum?
MIMO
an information system for a building company that tracks construction costs for varius projects across the United States would be cateforized as a type of:
MIS
which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?
Modem
which of the following statements about natural language processing (NLP) is NOT true?
NLP relies on the use of an expert system
which of the following companies uses the subscription revenue model?
Netflix
which of the following is NOT an example of location-based services?
Netflix
to review a project;s tasks and their interrelationships, you would use which of the following?
PERT chart
______ software modules seek to enhance collaboration between a company and its selling partners>
PRM
which of the following technologies does Walmart use to track for sale on store shelves?
RFID
which of the following statements about RFID is NOT true?
RFIDs require line-of-sight contact to be read
which of the following pulls content from websites and feeds it automatically to users' computers?
RSS
which of the following is NOT an example of a next-generation enterprise application?
SAP R/3
which of the following can be used to help a website achieve a higher ranking with the major search engines?
SEO
____ modules in CRM systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services.
SFA
which of the following is the most prominent data manipulation language today?
SQL
currently, the protocols used for secure information transfer over the internet are:
SSL, TLS, and S_HTTP
which of the following is an example of a NoSQL database?
SimpleDB
Big Tech firms are facing increasing scrutiny with respect to alleged anticompetitive and unfair practices. True or False?
True
Ethics describe the principles of right and wrong that can be used by individuals to make choices to guide their behavior. true or false?
True
HTML5 makes it easier for web pages to function across different display devices.
True
Whereas HTML is limited to describing how data should be presented in the form of web pages, XML can be performed presentation , communication, and data storage tasks.
True
because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. true or false?
True
malicious software that can secretly install itself on an internet users computer by piggybacking on other applications and then report the users movements on the internet to other computers, is called spyware. True or False?
True
one of the key concepts in patent law is originality. true or false?
True
routine violation of individual privacy are made easier by advances in data storage. True or False?
True
some forms of illegal sharing of music files have declined as legitimate online music stores and streaming services have expanded. true or false?
True
the decisions to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.
True
today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace.
True
trade secret laws grant a monopoly on the idea behind a work product. True or false?
True
websites using cookie technology cannot directly obtain visitors names and addresses from the cookie. true or false?
True
comprehensive security managment products, with tools for firewalls, VPNs, intrusion, detection systems, and more, are called ____ systems.
UTM
which of the following is an example of a private industrial network?
VW Group Supply
which of the following is the most recent specification of the security standard developed for Wi_fi?
WPA3
the 802.11 set of standards is known as:
Wi-Fi
which of the following is an example of a keylogger?
Zeus
a one-to-many relationship between two entities is symbolized in a diagram by a line the ends with:
a crow's foot topped by a short mark
which of the following is NOT a true statement about performing a data quality audit?
a data quality audit can be performed by surveying data definition and query files
which of the following is a type of ambient data?
a file deleted from a hard disk
____ is spyware that logs and transmits everything a user types.
a keylogger
all of the following are directly correlated with increased risk EXCEPT:
a large amount of technical expertise from project team and information team staff
two_factor authentication utilizes a(n):
a multistep process of authentication
an expert system would bbe an appropriate application for making decisions for all of the following EXCEPT:
a recommender systems
which of the following is the best description of a protocol in a telecommunications network architecture?
a standard set of rules and procedures for control of communications in a network
an inference engine is:
a strategy used to search through an expert system's collection of rules and formulate conclusions
a MOOC is:
a type of online course
when a hacker discovers a security hole in software that is unknown to the software's creator, it is an example of:
a zero-day vulnerability
the practice of contracting custom software development to an outside firm is commonly referred to as:
a. outsourcing
the obligations that individuals and organizations have concerning rights to intellectual property involves which one of the following moral dimensions of the information age?
a. property right and obligations
which of the following enables a DBMS to reduce data redundancy and inconsistency
ability to minimize isolated files with repeated data
which of the following is NOT a major benefit of expert systems?
ability to scale to deal with very large data sets
a (n) _____ is a box consisting of a radio receiver/transmtter and antennas that links to a wired network, router, or hub.
access point
which of the following is the first value-adding step of information system activities in the knowledge management value chain?
acquire
which of the following statements about project management is NOT true?
acquiring human and material resources is not considered to be part of project management
to eliminate excessively high inventories of its Pampers disposible diapers at various points along its upply cahin because of such distorted information, Procter & Gambble did all of the following EXCEPT:
add safety stock
which of the following revenue models generates almost all of Yahoo's revenue?
advertising
you are creating a database to store temperature and wind data from various airports. which of the following fields is the most likely candidate to use as the basis for a primary key in the Aiport table?
airport code
which of the following describes how the SImon framework of decision-making works in high-velocity decision envirnoments?
all four steps of the process are handled by software algorithms; humans are eliminate from the decisions because they are too slow
which of the following is an intelligent personal assistant
amazons alexa
which of the following defines acceptable uses of a firm's information resources and computing equipment?
an AUP
which signal types are represented by a continuous waveform?
analog
which of the following applications provides analysis of customer data?
analytical CRM
which of the following tools is used to analyze customer bbuyer patterns?
analytical CRM
which of the following best illustrates the sales revenue model?
apple accepts micropayments for single music track downloads
all of the following are types of information systems general controls EXCEPT:
application controls
which of the following technizques stops data packets originating outside the organization, inspects them, and uses a proxy to pass packet information to the other side of an organization's firewall?
application proxy filtering
which of the following is software the handles all application operations between browser-based computers and a company's back-end business applications or databases?
application server software
what are the four layers of the TCP/IP reference model?
application, transport, internet, and network interface
genetic algorithm:
are a form of machine learning
T1 and T3 lines:
are high-speed, leased data lines providing guaranteed service levels
All of the following are typical components or capabilities of an ECM system EXCEPT:
artifical intelligence tools
customer service modules in CRM systems provide tools for:
assigning and managing customer service requests
information ____ exists when one party in a transaction has more information that is important for the transaction than the other party.
asymmetry
a characteristic or quality that describes a particular database entity is called a(n):
attribute
implementation controls:
audit the systems development process at various points to ensure that the process is properly controlled and managed.
which of the following seeks to enhance human perception by combining a love direct view of the physical world with computer-generated images?
augmented reality
which of the following statements abbout augment reality is NOT true?
augmented reality is a method of orgnaizing expert system knowledge into chunks
which of the following statements about passwords is NOT true?
authentication cannot be established by the use of a password
The US CAN-SPAM act:
b. requires commercial email senders to identify themselves
according to ______, you should take the action that produces the least harm.
b. the risk aversion principle
the leading methodology for understanding the really important information needed by a firm's executives is called the ____ method.
balanced scoreboard
which of the following is not a part of business intelligence infrastructure?
balanced scorecards
all of the following are physical components of an RFID system except:
bar codes
which of the following is NOT one of the six main analytic functionalities of BI systems for helping decision makers understand information and take action?
bbusiness case archives
Entripe software is built around thousands of predefined business process excellence:
best practices
which of the following BI tools or abilities has been driving the movement toward "smart cities"?
big data analytics
which of the following statements about big data is NOT true?
big data refers solely to data in the petabyte range
which of the following statements about wireless security is NOT true?
bluetooth is the only wireless technology that is not susceptible to hacking by eavesdropper
all of the following are currently being used as human traits that can bbe profiled by biometric authentican EXCEPT:
body oder
evil twins are:
bogus wireless network access points that look legitimate to users
the total amount of digital information that can be transmitted through any telecommunications medium is measured in:
bps
a distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ____ effect.
bullwhip
Resource efficiency is a KPI for which of the following dimensions?
business processes
which of the following occurs when muscles groups are forced through tens of thousands of repetitions under low-impact loads?
c. RSI
which of the following protects the author of a book from having their work copied by others?
c. copyright laws
operational CRM applications include tools for all of the following EXCEPT:
calculating CLTV
____ methods rely on measures of cash flows into and out of the firm.
capital budgeting
which of the following is NOT something you would use to control risk factors in an information systems project?
capital budgeting models
succeddful system building requries careful ___ management to minimize organizational resistance.
change
instant messaging is a type of _____ service.
chat
the measurement of the number of customers who stop using or purchasing products or services form a company called:
churn rate
the traditional telephone system is an example of a ___ network
circuit-switched
in data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules?
classification
you work for a car rental agency and wamt to determine what charactericitics are shared among your most loyal customer. to do this, you will want to use the data mining software you are using to do which of the following?
classify data
a salesperson clicks. repeatedly on the online ads of a competitor in order to drive the competitor;s advertising costs up. this is an example of:
click fraud
the internet is based on which three key technologies
client/server computing, packet switching, and the development of communications standards for linking networks and computers
an environment where consumers can share their shopping experiences with one another by viewing products, chatting, or texting about brands, products, and services is an example of:
collaborative shopping
computer forensics tasks include all of the following EXCEPT:
collecting physical evidence on the computer
the join operation:
combines relational tables to provide the user with more information than is otherwise available.
which of the following Internet business models involves a merchant creating an online digital environment that enables people with like interests to share information?
community provider
which of the following statments abbout enterprise applications is NOT true?
companies adopting enterprise applications can also save time and money bby extensively customizing their applications to fit their business processes
which quality dimension of information is concerned that ll the necessary data needed to make a decision is present?
completeness
GumGum;'s system relies on which of the following?
computer vision systems
which of the following is a worm that uses flaws in Windows software to take over a computer remotely?
conficker
which of the following enables a company to tailor a particular aspect of enterprise software to the way a company does business?
configuration tables
external integration tools:
consist of ways to link the work of the implementation team with users at all organization levels
the dimension of ____ describes whether data elements are consistently defined.
consistency
which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
controls
which of the following is NOT one of four types of presence to be considered when building an e-commerce presence?
corporate
which of the following would NOT be considered semistructured knowledge?
corporate annual report
all of the following are intangible benefits of information systems EXCEPT:
cost reduction
IPv6 has been developed in order to:
creat more IP addresses
the project operation:
creates a subset consisting of columns in a table
the select operation:
creates a subset consisting of rows in a tabble that meet stated criteria.
which of the following is NOT one of the five classical functions of managers?
creating
selling a customer with a checking account a home improvement laon is an example of:
cross-selling
pepsico using SUper Bowl viewers to build an online video is an example of;
crowdsourcing
which of the following would NOT be covered in the Strategic Business Plan Rationale section of an information systems plan?
current infrastructure capabilities
all of the following are long-term strategic factors that should be considered in making the business case for a new information system EXCEPT:
current relationships with suppliers
which of the following is the last entity in the downstream portion of a supply chain?
customers
to achieve the maximum benefit of a new ERP system, Tasty Baking implemented an enterprise system by:
customizing less than 5 percent of the enterprise system process
a foreign country attempting to access government networks in order to disabble a national power grid is an example of:
cybberwarefare
the intentional defacement or destruction of a website is called:
cybervandalism
the total time it takes to complete a buisness process, from start to finish, is called its ____ time
cycle
a ____ is a BI feature that presents performance data defined by users.
dashboard
____ are visual tools for presenting performance data is a BI system.
dashboards and scorecards
the test defines ____ as flows of events or transactions captured by an organization's systems
data
detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:
data cleansing
which of the following is an automated or manual file that stores information about data elements and data characterictics such as usage, physical representation, ownership, authorization, and security.
data dictionary
____ established an organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information.
data governance
which of the following occurs when the same attributes in related data files has different values?
data inconsistency
which common database challenge is illustrated by a person recieving multiple copies of an LL Bean catalog, each addressed to a slightly different variation of his or her full name?
data inconstancy
which of the following is a specialized language that programmer use to add and change data in the database?
data manipulation language
___ creates confusion that hampers the creation of information systems that integrate data from different sources.
data redundancy
the role of negotiator falls into which of Mintzberg's managerial classifications?
decisional
some commentators believe which of the following comes closest to the "Grand Vision" of AI?
deep learning networks
counterimplementation is best defined as:
deliberate attempts to thwart the implementation of a system
which supply chain planning function determines how much products is needed to satisfy all customer demands?
demand planning
the ____ phase of decision making invloves identifying and exploring various solutions to a problem.
design
a business case does all of the following EXCEPT:
details the specific hardware and software needed to implement the investment
location analytics can be used for all of the following EXCEPT:
determining call center resolution rates
from your reading of the chapter's opening case, which of the answers below is NOT a reason why Lenzing chose JDA's Sales & operation Planning software?
develop a new business model
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel
a ____ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits
digital
coca-cola uses a _____ in order to classify, store and distribute all the images of the brand.
digital asset management system
you are advising a video production company on the best type of knowledge management system to help them archive digital video and sound clips. which of the following will best suit their needs?
digital asset management system
in TCP/IP, IP is responsible for which of the following?
disassembling and reassembling packets during transmission
which of the following focueses primarily on the technical issues of keeping systems up and running?
disaster recovery planning
removing the business process layers in a distribution channel is called:
disintermediation
DBMSs typically include report generating tools in order to:
display data ina more structured and polished format than would be possible just by querying
client/server computing is a:
distributed computing model where clients are linked to one another through a network that is controlled by a network server computer
the process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called:
distribution
all of the following managerial roles can be supported by information systems EXCEPT:
disturbance handler
distribution and delivery of products to retailers is part of the:
downstream portion of the supply chain
changing the prices of products based on the level of demand characteristics of the customer is called ____ pricing.
dynamic
digital media differs from a physical book in all of the following ways except:
e. ease of establishing uniqueness
which of the following best illustrates the transaction fee revenue model?
eBay receives a small fee from a seller if a seller is successful in selling an item.
bluetooth can be used to link up to ___ devices within a 10-meter area using low-power, radio-based communication.
eight
which of the following is NOT a bbusiness intelligenece feature of SAP's next generation business intelligence applications?
employee relationship management
all of the following are indications of a failed information systems project EXCEPT:
employees require training to properly use the system
formal planning and control tools:
enable a project manager to properly document and monitor project plans
CAD workstations:
enables designed specification for tooling and manufacturing processes to be easily tested and changed
data cleansing not only corrects errors but also:
enforces consistency among different sets of data that originated in a separate information systems
CRM systems help businesses achieve which of the following business objectives?
enhanced customer intimacy
which of the following is NOT true about enterprise systems?
enterprise software is expressly built to allow companies to support their existing business practices
which of the following are the three major types of knowledge management systems?
enterprise-wide knowledge management systems, KWS, and intelligent technique
a schematic of the entire database that describes the relationships in a database is called a(n):
entity-relationship diagram
which of the following statements about exchanges is NOT true?
exchanges are the most successful form of B2B commerce
according to the project management institute, what is the leading factor in project success?
executive sponsors who are actively engaged
all of the following are considered to be knowledge workers EXCEPT:
executives
which of the following would NOT be classified as a KWS?
expert system
which of the following statements about expert systems is NOT true?
expert system development has grown rapidly in the last decade
which of the following best illustrates the advertising revenue model?
facebbook provides a social network for free but shows sponsered content in users' News Feed.
which of the following is NOT one of the top five search engines?
which of the following is NOT a factor in the high failure rate of reengineering systems projects?
failures of the new technologies to perform according to plan
Apple's iOS is the mobile platform targeted by most hackers
false
COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. true or false?
false
ESS typically produce fixed, regulalry scheduled reports based on data extracted and summarized from the firms underlying transaction processing systems.
false
GIS are useful for bbusinesses, bbut not as much for state and local governments
false
IT infrastructure consists of only those physical computing devices and software required to operate the enterprise. true or false
false
MOOCs are designed to serve a limited number of participants.
false
NFC tags are always passive
false
Quantum computing is not yet available to the general public.
false
S-HTTP is a protocol used to establish a secure connection between two computers.
false
SEM saves consumers cognitive energy and increases search costs.
false
TCO refers just to the original cost of purchased technology: both hardware and software.
false
VoIP technology delivers voice information in digital form using circuit switching.
false
a Gantt chart portrays a project as a network diagram consisting of numbered nodes representing project tasks.
false
a NOS must reside on all the local computers in a network. true or false
false
a PRM module in CRM software helps organizations identify high-value customers for preferential treatments.
false
a benefit of using TCO analysis to evaluate an information technology investment is that it is able to incorporate intangible and "soft" factors such as benefits and complexity costs.
false
a computer network consists of at least three computers. true or false
false
a computer virus replicates more quickly than a computer worm.
false
all CRM packages contain models for PRM and ERM
false
an expert system cannot consider multiple rules at the same time.
false
an information systems plan focuses solely on the technology needed to implement the propsed new information system
false
apple music is an example of the market creator buinsess model.
false
behavioral targeting cannot be used id a consumer is using a mobile app.
false
clusters are occurrences linked to multiple events
false
computer networks are based on the same principles as traditional telephone networks. true or false?
false
computer networks that use packet switching are less efficient than telephone networks that use circuit switching. true or false
false
contemporary supply chain managment systems are driven by a push-based model in which production master schedules are based on forecats of demand for products
false
cross-selling is the marketing of products to different customers
false
data scrubbing is a more intensive corrective process than data cleansing.
false
digitial resiliency focuses solely on the resiliency of the IT function
false
disintermediation does not benefit the consumer.
false
due process is a feature of political systems and allows individuals to recover damages done to them by others. true or false?
false
eBay is an example of the portal business model
false
enterprise applications reduce switching costs
false
enterprise database management software is used to manage the software applications used in business activities. true or false?
false
enterprise systems are built around a small number of predefined business processes.
false
enterprise systems do not require fundamental changes in the way the buisness operates.
false
exchanges have become one of the most popular types of Net marketplace because they encourage competitve bidding that drives prices down.
false
experts systems work by applying a set of decision cases against a knowledge base, both of which are extracted from human experts.
false
firms in the supply chain develop safety stocks in order to reduce the cost of inventory.
false
implementing a web interface for an organization's internal database usually requires substantial change to be made to the database.
false
in 2020, B2C e-commerce revenues are expected to grow at single-digit rates.
false
in a client/ server environment, a DBMS is located on a dedicated computer called a web server.
false
in a client/server network, the client sets the rules of communication for the network. true or false
false
in a database, a bit represents a single character, which can be a letter, a number, or another symbol. true or false?
false
in push-based models, transactions to produce and deliver only what customers have ordered move up the supply chain from retailers to distribtutors to manufacttures and eventually to suppliers
false
in-memory computing relies primarily on a computer's disk drives for data storage.
false
information asymmetry exists when there is more information about one product than there is about a similar product .
false
knowledge workers include all of a company's workers who are tasked with managing or creating knowledge, from top-level scientists to clerical and data workers.
false
malicious software programs referred to as spyware include a variety of threats such as computer ciruses, worms, and Trojans horses.
false
mandatory use of a system is one effective way of overcoming user resistance to an information system.
false
microsoft is no longer the market leader in client/server networking. true or false
false
mobile devices typically features state-of0the-art encryption and security features, making them highly secure tools for businesses, and therefore do not require any special protections.
false
mobile search makes up less than 50% of all Internet searches.
false
more than 80 percent of the audience for BI consits of power users
false
most IoT devices support sophisticated security approaches.
false
multiple data marts are combined and streamlined to create a data warehouse
false
neural network applications explain why they arrive at a particular solution.
false
neural networks are not well-suited for diagnostic systems in medicine.
false
one apt slogan of the knowledge management field is "Effective knowledge management is 80 orecent technological and 20 percent managerial and organizational."
false
operational managment face primarily semistructured decision.
false
packet filtering catches most types of network attacks
false
public key encryption uses one key.
false
relational DBMSs use key field rules to ensure the relationships between coupled tables remain consistent. t or f?
false
semistructured information is all of the knoweldge in a firm that resides in the heads of experienced employees.
false
sensitivity analysis predicts outcomes from constant inputs.
false
smartphones are not vulnerable to malicious software or penetration from outsiders
false
social marketing enables firms to tightly control their brands.
false
software can never be considered to be a trade secret. true or false ?
false
software programs were unprotected by copyright law until the early 1990s. true or false
false
structured data accounts for the majority of organizational information and is one of the major sources of big data.
false
symmetric encryption is more secure than public key encryption
false
the CEO and Board of Directors of a company are responsible for developing a corporate-wide information systems plan.
false
the bullwhip effects leads to declining inventory costs across the entire supply chain.
false
the classical model of management describes what managers fo when they plan, decide things, and control the work of others.
false
the cost of a project is based solely on the time to complete a project multiplied by the cost of computer resources required to complete the project.
false
the design phase of decision maing consists of discovering, identifying, and understanding the problems occuring in the organization.
false
the foal of sociotechnical design is to create systems where the organization changes to fit the requirements of the technology.
false
the impacts of knowledge-based investments are easy to measure.
false
the internet increases information asymmetry
false
the term SWITCHING COSTS refers to a merchant's costs of changing prices.
false
the third stage in SImon's description of decision-making is implementation.
false
the upstream portion of the suppply chain consists of the organizationsa and processes for distributing and delivering products to the final customers.
false
the way an information systems project is executed is likely to be the least important factor influencing its success or failure
false
to reap the maximum benefits from enterprise software, companies should customize it to conform. totheir existing business processes
false
transaction and clerical systems that displace labor and save space typically produce less tangible benefits than management information systems.
false
unstructured decison makin is most prevalent at lower organizational levels.
false
use of standalone server computers is increasing as organizations transition to cloud computing services. true or false?
false
user concerns and designer concerns are usually the same at the beginning of the project but may diverge later as the system is built.
false
which of the following is a grouping of characters into a word, a group of words, or a complete number?
field
the concept of management ____ involves situation in which managers act on preconceived notions that reject information that does not conform to their prior conceptions.
filters
data mining allows users to:
find hidden relationships in a large database
MIS typically produce:
fixed, regularly scheduled reports bbased on data extracted from the organization's TPS
in data mining, which of the following involves using a series of existing values to determine what other future values will be?
forecasting
a common field that links two different tables and serves as a primary key to one of these tables is called the:
foreign key
which of the following helps project managers identify bottlenecks in project development?
formal planning and control tools
which of the following is NOT one of the activities of the systems analyst?
formulating of capital budgeting models
in the ____ revenue models, a firm offers some services for free but charges a subbscription fee for premium services.
free/freemium
supply chain execution systems provide all of the following functions EXCEPT:
generating demand forecasts for products
which of the following statements about genetic algorithms is NOT true?
genetic algorithm discover knowledge by using hardware and software that parallel the processing patterns of the biological or human brain
which of the following best describes a difference between neural networks and genetic algorithms?
genetic algorithms ar eused to evaluate alternative solutions to problems, whereas neural netowrks are used to discover patterns in data
a new social mobile app you are deceloping allows users to find friends who are logged in and within a 10-mile radius. This would be categorized as a ____ service.
geosocial
which of the following companies is NOT indentified in the text as one of the leading producers of business intelligence and analytics products?
a drawbcak to high-velocity, automated decision-making systems is that:
great care needs to be taken to ensure the proper operation of the systems, since they are making decisions faster than managers can monitor or conrtrol
you are using a capital budgeting method to assess the worth of your company's new information system. which of the following costs would you include in measuring the cash outflow?
hardware, software, and labor expenditures
a firm in the finance industry should do which of the following to ensure that it stays current with technology?
have a few high-risk, high-benefit projects
you have been hired by a firm in a non-information-intensive industry to evaluate its inventory of systems and IT projects. which types of projects should the firm focus on?
high-benefit, low-risk projects
google's search engine is an example of which of the following types of decision?
high-velocity
compared to digital goods, traditional goods have:
higher costs of distribution
which of the following is an example of using an internal integration tool?
holding frequent project team meetings
which of the following would NOT be covered in the New Developments section of an information systems plan?
human resources strategy
which of the following stratagies represents the proper approach to a low risk, high reward project?
identify and develop
you work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. you wish to find out if there are any particular activities that your customer engages in, or the types of purchases made in the month before or after purchasing select items from your store. to do this, you will use the data mining software you are using to do which of the following?
identify sequence
project management software typicaly has all of the following capabilities EXCEPT:
identifying and quantifying project risk
when hackers gain access to a database containing your personal private information, this is an example of:
identity thieft
which of the following is NOT an example of a computer used as a target of crime?
illegally accessing stored electronic communication
which of the following refers to all organizational activities working toward the adoption, management, and routinization of a new information system?
implementation
the sarbanes-oxley act:
imposes responsibility on companies and management to safeguard the accuracy of financial information
which of the following statements best describes the business value of improved decision making at all levels of a firm?
improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values
which of the following is NOT a tangible benefit of information systems?
improved resource control
Enterprise systems improve management decision making in all of the following ways EXCEPT:
improving forecasts of consumer behavior
which of the following is a limitation of using a financial approach to evaluate information systems?
inability to assess costs from organizational disruption
all of the following are issues with the tradition file environment EXCEPT:
inability to develop specialized applications for functional areas
which of the following is an example of using an external integration tool?
inclusing user representatives as active memebers of the project team
the business value of an effective supply chain management system includes all of the following EXCEPT:
incresed inventory levels
which of the following dimensions of e-commerce technology has the potential to raise the quality of information?
information density
as discussed in the chapter text, the three main reasons that investments in information technology do NOT always produce prositive result are:
information quality, organizational culture, and management filters
which of the following serves as a road map indicating the direction of systems development, the rationale, the current systems, new developments to consider, the management strategy, the implementation plan, and the budget?
information systems plan
which of the following statements about the user-designer communication gap is NOT true?
information systems specialists prefer systems that are oriented toward solving business problems or facilitating organizational tasks.
all of the following are intangible assets of a firm EXCEPT its:
information technology
the role of spokesperson falls into which of Mintzberg's managerial classifications?
informational
___ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
instrusion detection systems
enhanced employee goodwill falls under what category of costs and benefits of information systems?
intangible benefits
the dimension of ___ in information quality describes whether the structure of data is consistent
integrity
a chatbot is an example of which of the following?
intelligent agent
apple's siri application is an example of which of the following?
intelligent agent
software programs that work withoutdirect human intervention to carry out specific tasks for individual users, business processes, or software applications, are called:
intelligent agents
which of the following dimensions of e-commerce technology involves engaging consumers in a dialogue that dynamically adjusts the experience to the individual?
interactivity
in the supply chain, components or parts are referred to as:
intermediate products
the principle capital budgeting models for evaluating information technology projects are the payback method, the accounting rate of return on investment (ROI), net present value, and the:
internal rate of return
when managers represent their company in the outside world and perform symbolic duties, they are acting in their:
interpersonal role
Mintzberg outlined three categories of managerial roles:
interpersonal, informational, and decisional
which of the following would NOT be considered a contact point?
intranet
a distributed database:
is a database that is stored in multiple physical locations
a trojan horse:
is a software that appears to be benign but does something other than expected
a VPN:
is an encrypted private network configured within a public network
which of the following is NOT one of the benefits of a blockchain database?
it eneables the ability to use relational databases
which of the following statments about botnet is NOT true?
it is not possible to make a smartphone part of a botnet
which of the following statements about 3-D printing is NOT true?
it often results in wasted materials
in a ____ strategy, componenets arrive exactly at the moment they are needed and finished goods are shipped as soon as they leave assembly line.
just-in-time
all of the following are examples of supply chain inefficiencies except:
just-in-time productions
a field identified in a record as holding the unique identifier for a record is called the:
key field
what is meant by the statement "knowledge is sticky'?
knowledge is hard to move
which of the following statements about knowledge is NOT true?
knowledge is not subject to network effects
which of the following statements is NOT an accurate description of the importance of knowledge to a firm?
knowledge is subject to the law of diminishing returns
which of the following is NOT one of the main four dimensions of knowledge described in the chapter?
knowledge is timeless
which of the following statements best describes the relationship between collaboration and knowledge management?
knowledge that cannot be communicated and shared with other is in nearly useless
the fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems?
lack of flexibility
which of the following statements about Internet security vulnerabilities is NOT true?
large public networks, such as the internet, are less vulnerable than internal network
major CRM software products include whihc of the following capabilities to support the sale process?
lead management
using the internet to find potential customers inexpensively for products that have low demand is an example of:
long tail marketing
what is the primary benefit to consumers of disintermediation?
lower costs
compared to traditional goods, digital goods have:
lower marginal cost of production on a per unit basis
compared to traditional markets, digital markets have:
lower search costs
which of the following statements about machine learning is NOT true?
machine learning is based on computer code that reflects rules underlying an expert's understanding
a well-designed ESS helps senior executives do all of the following EXCEPT:
make high-velocity automated decisions
the differentce between push- and pull-based models is summarized by which of the following slogans?
make what we sell, not sell what we make
SFA modules in CRM systems provide tools for all of the following EXCEPT:
managing customer service requests
based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?
managing the supply chain
Airbnb uses the _____ business model.
market creator
the universal standards of the internet and e-commerce lower which of the following?
market entry costs
CRM systems typically procide software and online tools for sale, customer service, and:
marketing
a marketplace extended beyond traditional boundaries and removed from a temporal and geographical location is called:
marketspace
in digital markets:
menu costs are lower
content providers use ____ systems to process large amount of very small monetary transactions cost-effectively.
micropayment
which of the following is a DBMS for desktop computers?
microsoft access
which of the following is the most widely used project management software today?
microsoft project
behavioral models of management see managers as being ___ than does the classical model.
more informal
which of the following is NOT one of the five observed ways in whcih managerial behavior differs from the classical description of managers?
most managerial activities take at least one hour to perform
which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?
national information infrastructure protection act
____ involves placing ads in social network newfeeds or within traditional editorial content, such as a newspaper article.
native advertising
according to Mintzberg, managers in their informational role act as:
nerve centers of the organization
each computer on a network must contain which of the following?
network interface device
facebook's "like" button is an example of which of the following?
network notification
companies that own internet backbone networks are called:
network service providers
a ____ is a type of intelligent technique that finds patterns and relationships in massive data sets too large for a human to analyze.
neural network
which of the following has a hidden layer that processes inputs?
neural network
which of the following is NOT a major entity in Nike's supply chain?
nikes employees
the process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
normalization
in the context of data minging, the term associations refers to:
occurrences linked to a single event
digital subscriber lines:
operate over existing telephone lines to carry voice, data, and video
decisions regarding managing and monitoring day-to-day business activities are referred to as ____ intelligence
operational
information systems specialists often tend to seek solutions that:
optimize hardware and software efficiency at the expense of ease of use.
major CRM products typically have all of the following services capabbilities EXCEPT:
order management
the set of business processes, culture, and behavior required to obtain value from investments in information systems is one type of:
organizational and management capital
which of the following is NOT one of the six main elements in the business intelligence environment discussed in this chapter?
organizational culture
you have been hired to implement an enterprise system that will automate mush of the billing and accounting work for a statewide HVAC services company. which of the following would you prepare to describe how the new system will affect a firm's structure and operations?
organizational impact analysis
changing organizational behavior by sensing and responding to new experience and knowledge is called:
organizational learning
The HIPAA ACT of 1996:
outlines medical security and privacy rules.
Microsoft Access's data dictionary displays all of the following information about a field EXCEPT the:
ownership of the field
which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination?
packet switching
which of the following is NOT a characteristic of packet switching?
packet switching requires point-to-point circuits
a ____ report is produced when a user enters various values in a pivot table to filter data.
parameterized
most computer viruses deliver a:
payload
in the domain name "https://books.pearson.com", which element is the second_level domain?
pearson.com
which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
peer-to-peer
which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?
peer-to-peer network
predictive analytics is used for all of the following EXCEPT:
performing a bills of meterial analysis
which of the following best describes the central method used in a scoring model?
performing a weighted compariosn of the criteria used to evaluate a system
which of the following best describes the central method used in a portfolio analysis?
performing an inventory of all of the organization's information systems projects and assets
what is the difference between personalization and customization, as applied to e-commerce technologies?
personalization refers to adjusting marketing messages for a specific consumer; customization refers to adjusting a product or service based on a user's preferences
all of the following are specific security challenges that threaten the communications lines in a client/server environment EXCEPT:
phising
a DBMS makes the:
physical database available for different logical views
Supply chain software can be classified as either supply chain ___ systems or supply chain ___ systems.
planning; execution
which method would you use to develop risk profiles for a firm;s information system projects and assets?
portfolio analysis
informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of:
practice
which of the following is NOT one of Simon's four stages of decision making?
prediction
BI that is designed to determine the most likely effects of changes in the business environment is called:
predictive analytics
as discussed in the chapter texrt, Slack Technologies uses which of the following to identify customers who are most likely to uses it products frequently and upgrade to its paid services?
predictive analytics
predictive search in Google's search engine:
predicts what you are looking for as you enter words into the query box
the logical view database:
presents data as they would be perceived by end users
a firewall allows the organization to:
prevent unauthorized communication into and out of its netork
selling the same goods to different target groups at different prices is called:
price discrimination
a secure website that links a large firm to its suppliers and other key business partners is called:
private industrial network
wireless sensor networks(WSNs) are used for the following tasks EXCEPT:
processing consumer transaction
Procurement involves all of the following EXCEPT:
production scheduling
which of the following would OT be convered in the Management Strategy section of an information systems plan?
profess reports
unsupervised machine learning involves:
programs that can "teach themselves" without human intervention.
which of the following statements best describes the effect that project structure has on overall project risk?
projects with relatively undefined goals are more likely to be subjected to users changing requirements and to run a higher risk of not satifying project goals.
market creators:
provide a digital environment where buyers and sellers can establish prices for products
a supply chain driven by actual customer orders is called a ___ model>
pulled-based
walamrt's continuous replenishment system is an example of a (n) ++++ model.
pulled-bbased
a supply chain driven bby forecastes or bbest guesses of consumer demand follows a (n) ____ model
push-based
which of the following variables in project management is an indicator of how well the project satisfies management objectives?
quality
all of the following are specific security challenges that threaten corporate systems in a client/server environment EXCEPT:
radiation
_____ is malware that hijacks a user's computer and demands payment in return for giving back access.
ransomware
cryptoLocker is and example of which of the following?
ransomware/trojan
a database ___ describes a database entity.
record
pharming involves:
redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser
according to the chapter text, BDO Canada obtained all of the following benefits from implementing a new system EXCEPT:
reduced workforce
as discussed in the chapter, which of the following is NOT one of the immediate consequences of inadequate software project management?
reduced workforce
the bullwhip effect can be countered by:
reducing information uncertainty
coca-cola implemented enterprise software from SAP that enabled it to achieve all of the following EXCEPT:
reducing the number of employees
data_____ occurs when the same data is duplicated in multiple files of a database.
redundancy
fault tolerant information systems create an environment designed to provide continuous, uninterrupted services by using:
redundant hardware, software, and pwer supplies
a ___ represent data as two-dimensional tables.
relational DBMS
all of the following are technologies used to analyze and manage big data EXCEPT:
relational DBMS
The Gramm-Leach-Bliley Act:
requires financial institutions to ensure the security of customer data
which of the following is NOT one of the seven major factors that should be addressed when making the business case for a specific new information system?
results of a portfolio analysis of alternative solutions
the value of systems from a financial perspective essentially revolves around the issues of:
return on invested capital
which of the following is NOT an organizational factor to be addressed when designing a new system to fit the organization?
return on investment
which of the following dimensions of e-commerce technology invloves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience?
richness
an analysis of an information system that rates the likelihood of a security incident occuring and its cost would be included in which of the following?
risk assessment
which of the following statements about robotics is NOT true?
robotics does not require programming but instead relies solely on AI
which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?
router
in a relationship database table for customers, the information about a single customer resides in a single:
row
expert systems use real-time data to guide their deicisions.
salse
transaction brokers:
save users money and time by processing transactions normally handled in person, by phone, or by mail online
which of the following project management variables defines what work is or is not included in a project?
scope
which method is used to assign weights to various features of a system?
scoring model
the effort required to locate a suitable product is called:
search costs
which of the following marketing formats is sales-oriented, rather than branding-oriented or a mix?
search engine
which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
security
a statement ranking information risks and identifying security goals would be included in which of the following?
security policy
you have been asked to implement enterprise software for a manufacturer of kitchen appliances. what is the first step you should take?
select the functions of the system you wish to use
in a relational database, the three basic operations used to develop useful sets of data are:
select, project, and join
if you can follow a definite procedure to make a business decision, you are making a _____ decision.
semistructured
the decisions involved in creating and producing a corporate intranet can be classified as ___ decisions
semistructured
which of the following typically makes the unstructured decision for a firm?
senior management
a household appliances manufacturer has hired you to help analyze its social media data sets to determine which of its refrigerators are seen as the most reliable. which of the following tools would you use to analyze this data.
sentiment analysis software
in sociotechnical design:
separate sets of technical and social design solutions are developed and compared
in data mining, which of the following involves events linked over time?
sequences
which of the following is NOT one of the techniques used in web mining?
server mining
which of the following is an example of a direst good in the automobile industry?
sheet steel
all of the following are specific security challenges that threaten corporate servers in a client/server environment EXCEPT:
sniffing
which of following enables a business to connect customer conversations and relationships from social networking sites to CRM processes?
social CRM
in planning a robust e-commerce presence, you will want to consider the blog platform as part of you ____ presence.
social media
which of the following statements about Net marketplaces is NOT true?
some Net marketplaces are owned by a single firm and used to link solely to the firm's suppliers and key business partners
VR systems:
sometimes require the user to don special clothing, headgear, or equipment
an employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website which asks for personal information is an example of:
spear phishing
a pivot table is a:
spreadsheet tool that displays two or more dimensions of data in a convenient fromat
what is the second value-adding step in information system activities in the knowledge management value chain?
store
_____knowledge exists in formal documents, as well as in formal rules that ogranizations derive by observing experts and their decisons-making behaviors.
structured
checking store inventory is an example of a ___ decision
structured
which type of decision is determinging vacation eligibility for an employee?
structured
a network of organizations and business processes for procuring raw materials, tranforming these materials into intermediate finshed products, and distributing the finished products to customers ic alled a(n).
supply chain
a company having a difficulty with timely deliverly of parts to its manufacturing plants should implement a ___ system
supply chain execution
the WMS that Haworth Incorporated uses is an example of which of the following?
supply chain execution system
which of the following manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner?
supply chain execution system
which of the following enables a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product?
supply chain planning systems
in which methon of encryption is a single encryption key sent to the receiver so bboth sender and receiver share the same key?
symmetric key encryption
which of the following best describes the relationship between system implementation and user involvement and management support?
system implementation generally benefits from high levels of user involvement and management support
the test defines ____ as expertise of organizational members that has not been formally documented.
tacit knowledge
a key problem in managing knowledge is the creation of a _____ to organize the information into meaningful categories.
taxonomy
which of the following systems support a managers role as figurehead of an organization?
telepresence systems
which of the following internet services enables logging on to one computer system and doing work on another?
telnet
_____ tools can used to rapidly analyze large unstructured data sets, such as email, memos, and survey responses to discover patterns and relationships.
text mining
measures defined by managment and used to internally evaluate the success of a firm's financial, buisiness process, customer, and learning and growth are called:
the balanced scorecard method
as described in the text, which of the following does NOT have an impact on the level of risk in information systems projects?
the capital budgeting model chosen to evaluate the system
which of the following statements about blockchain is NOT true?
the data represented in a bblockchain is maintained in a central database
which of the following best illustrates the relationship between entities and attributes?
the entity CUSTOMER with the attributes PURCHASE
what event marked the beginning of e-commerce?
the first paid advertisments placed on a website
which of the following statements about project risk is NOT true?
the higher the number of implementation staff on a project, the lower the risk
all of the following have contributed to an increase in software flaws EXCEPT:
the increase in the number of computer hackers in the world
which of the following statements best describes the term BUSINESS INTELLIGENCE?
the infrastructure for warehousing, integrating, reporting, and analyzing business data
in an expert system, the set of rules that models human knowledge is called:
the knowledge base
which of the following statements about scoring models is NOT true?
the most important outcome of a scoring model is the score
which of the following statments about neural networks is NOT true?
the strength of the connections between neurons in a neural network cannot bbe altered
which of the following statements is NOT true about search engines?
there are hundreds of search engines vying for user attention, with no clear leader having yet emerged
which of the following is NOT true about the evolution of AI technologies?
there have been many fundamental conceptual bbreakthrough in AI during the last decade
which of the following statements about DSS is NOT true?
they are BI delivery platforms for casual users
which of the following is not a true statement about ESS?
they support the structured decision making of senior executives
Schneider national is an example of which fo the follwoing?
third-party logistics provider
which of the following statements abbout EDI is NOT true?
today, EDI is only used for document automation
marketing modules in CRM systems provide tools for all of the following EXCEPT:
tools for assessing its selling partners' performance
the domain .gov is a(n):
top-level domain
information density refers to the:
total amount and quantity of information available to all market participants
a ___ is an interaction with a customer.
touch point
Supply chain planning systems perform all of the following functions EXCEPT:
track the physical status of goods
supervised machine learning involves:
training a system by provding specific examples of desired inputs and outputs identified by humans in advance.
all of the following are unique features of e-commerce technology, EXCEPT:
transparency
3-D printers can produce fully functioning components, such as working bbatteries and LEDs.
true
AI applications are used by search engines and social networks to target ads.
true
BBPM uses ideas similar to the balanced scorecard frameword with a stronger emphasis on strategy.
true
Biometric authentication uses systems that read and interpret individual human traits
true
CAD and virtual reality are both types of KWS.
true
COPs can make it easier for people to reuse knowledge.
true
CRM software incorporates hundreds of business processes.
true
DBMS has a data defination capability to specify the structure of the content of the database. t or f
true
DNS has a hierarchical structure
true
DoS attacks flood a network server with thousands of requests for service.
true
EDI can be used as a system for continuous replenishment.
true
GIS software ties location data about the distribution of people or other reources to points, lines, and areas on a map.
true
KPIs are used both in the balanced scorecard framework and BPM.
true
Most internet businesses do very little to protect the privacy of their customers. true or false?
true
NoSQL technologies are useful for accelerating simple queries against large volumes of structured and unstructured data. t or f
true
OLAP can manage and handle queries with very large sets of data
true
SaaS business models are one of the trends leading toward a future web
true
The DMCA requires ISP's to take down sites of copyright infringers they are hosting when the ISP's are notified of the problem. true or false?
true
The European Parliament has banned unsolicited commercial messaging. true or false?
true
The term data governance encompasses policies and procedures through which data can be managed in an organization.
true
a NAT conceals the IP addresses of the organization's internal hot computer(s) to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems:
true
a computer worm is a program that can copy itself to other computers on the network.
true
a data entry screen is an example of a user interface:
true
a firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic
true
a hub is a networking device that sends packets of data to all other devices on the network. true or false
true
a majority of Americans want a Do Not Track option in browsers that will stop websites from collecting information about their online behavior
true
a physical view shows data as it is actually organized and structured on the data storage media. t or f
true
a query is a request for data from a database.. true or false?
true
a semistructured decision is one in which only part of the problem has a clear-cut answer provided by an accepted procedures.
true
a structured decision is repetitive and routine.
true
a web server is responsible for locating and managing stored web pages. true or false
true
according to experts, at least 80 percent for an organization's business content is semistructured or unstructured.
true
advertising networks such as microsoft advertising, yahoo, and google's marketing platform are capable of tracking personal browsing behavior across thousands of websites. true or false?
true
advertising networks track a user's behavior at thousands of websites.
true
all previous mass media in modern history, including the printing press, use a broadcast model where content is created in a central location by experts.
true
an acceptable use defines acceptale uses of the firm's information resources and computing equipment .
true
an application server may reside on the same computer as a web server or on its own dedicated computer. true or false?
true
an information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals.
true
an unnormalized relation contains repeating groups. t or f
true
an unstructured decision is novel and important and requires the decision maker to provide judgment, evaluation, and insight.
true
analytical CRM uses tools to analyze customer data collected from the firms customer touch points and from other sources
true
apple pay uses an RFID-related technology called near field communication
true
authentication refers to verifying that people are who they claim to bbe.
true
babies have a huge computational advantage over even the biggest machine language research systems.
true
behavioral targeting refers to targeting ad messages to a person's clickstream behavior.
true
big data is used to analyze consumer preferences for both in-store and online purchases
true
business intelligence and analytics can deliver nearly real-time information to decision makers.
true
chrun rate is an important indicator of the growth or decline of a company's customer base
true
client/server computing has largely replaced centralized mainframe computing. true or false
true
cloud computing is the fastest growing form of computing. true or false
true
coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire
true
complex groupings of data is a relational database need to be adjusted to minimize awkward many-to-many relationships. t or f
true
computer abuse refers to acts involving a computer that may not be illegal but are considered unethical. true or false?
true
computers using Chrome OS store both programs and user data on Internet cloud servers. true or false
true
core operational transaction systems provide data to date warehouses.
true
cost transparency refers to the ability of consumers to discover what merchants actually pay for products.
true
data visualization technologies are used to help human users see patterns and relationships in large amounts of data.
true
deep learning neural netwprks are used almost exclusively for pattern detection on unlabled data.
true
document management systems are essentially large databases.
true
downtime is a component of TCO.
true
e-commerce refers to the use of the Internet and the web to transact business.
true
encryption is a key feature of a blockchain database. T or F
true
enterprise applications are based on organization-wide definitions of data
true
enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business. true or false?
true
ergonomics is the interaction of people and mcahines in the work environment, including the design of jobs, health issues, and the end-user interface of information systems
true
expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization.
true
experts from a variety of fields have found that managers are poor at assessing risk.
true
exponential growth in the number of transistors and the power of processors is expected to decrease in the foreseeable future. true or false
true
facebaook's deepface is an example of a computer vision system.
true
fiber-optic cable is more expensive and harder to install than other physical transmission media
true
high-speend analytics platforms use both relational and non-relational tools to analyze large data sets.
true
hypertext markup language specifies how text, graphics, video, and sound are placed on a webpage.
true
if an intended benefit of an IT project is improved decision making, managers should develop a set of metrics to quantify the value of an improved decision.
true
in a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks. true or false
true
in addition to being an online retailer, Amazon is also a powerful product search engine.
true
in cloud computing, accountability and repsonsibility for protection of sensitive data resides with the company owning the data.
true
in cloud computing, accountability and responsiility for protection of sensitive data resides witht eh company owning the data
true
in financial services firms, investments in IT infrastructure represents more than half of all capital investment. true or false
true
in general, for digital goods, the marginal cost of producing another unit is about zero.
true
in some industries, total supply chain costs can approach 75 percent of a company's operating budget.
true
in the affiliate revenue model, firms derive revenue by referring consumers to other firms
true
increased error rates may be a sign of user resistance to a new system
true
indirect goods that are not directly involved in the production process
true
inefficicencies in a supply chain are caused by inaccurate or untimely information
true
intangible benefits may lead to quantifiable gains in the long run.
true
knowledge is conditional.
true
knowledge work systems require strong links to external knowledge bbases.
true
legislation requiring private or governmental entities to notify individals of secuirty breaches invloving personally identifiable information has been enacted in all 50 states.
true
managaing a global supply chain is more complex than managing a domestic supply chain.
true
many back-end databases cannot interpret commands written in HTML
true
middleware is an application that transfers information from an organization's internal database to a web server for delivery to a user as part of a web page.
true
mobile is the leading digital platform, with total activity on smartphones and tablets accounting for two-thirds of digital media time spent.
true
more than 80 percent of mobile minutes in the United States are generated through apps.
true
more timely information is an intangible benefit of information systems
true
net marketplaces may either support contractual purchasing based on long-term relationships with designated suppliers or short-term spot purchasing.
true
oligopolies and monopolies dominate the Web and mobile platform. true or false?
true
organizations can rewrite enteprise systems software to support their existing business process.
true
phising is a form of spoofing.
true
podcasting allows subscribers to listen to live, streaming radio and other audio content.
true
privacy protection in Europe has historically been much stronger than in the US. True or False?
true
procter & gambble experienced a growth in its pampers diapers inventory due to the bullwhip effect.
true
program-data dependence refers to the coupling of data stores in files and the specific programs required to update and maintain those files such that changes in programs require chaes to the data. true or false?
true
project management refers to the application of knowledge, skills, tools, and techniques to achieve specific targets within specified budget and time constraints.
true
projects with many undefined requirements must involve users fully at all stages
true
risk is an important variable that project management must deal with.
true
ruby is an object-oriented programming language known for speed and ease of use in building we applications.
true
sniffers enabbles hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.
true
some decision scenarious made by middle managers may have unstructured components.
true
some experts believe that exposure to computers reduces intelligence and cognitive abilities. true or false?
true
some intelligent agent systems are capable of learning from experience and adjusting their bbehavior.
true
spanner is an example of a distributed database. t or f
true
stand-alone enterprise systems are becoming a thing of the past
true
streaming is a publishing method for music and video files that flows a continuous stream of content to a user's device without being stored locally on the device.
true
studies have found that firms systematically bblame performance on the external bbusiness environment.
true
supply chain planning systems enables the firm to model its existing supply chain
true
the Mirai botnet infected numerous IoT devices and then used them to launch a DDoS attack
true
the Term cracker is used to identify a hacker with criminal or malicious intent.
true
the claim to privacy is protected by the US constitution. true or false?
true
the data-driven farming systems described in the chapter-opening case are an example of operational intelligence.
true
the design of jobs, health issues, and the end-user interface of information systems are all consideration in the field of ergonomics
true
the difference between cash outflows and cash inflows is used for calculating the financial worth of an investment.
true
the emerging internet-driven supply chain provides multidirectional communication amon firms, networks of firms, and e-marketplaces.
true
the first stage in Simon's decision-making process model is the intelligence stage.
true
the internet is the largest implementation of client/server computing. true or false
true
the internet is the most universal and powerful WAN.
true
the internet of things is based on billions of internet-connected sensors throughout the physical world.
true
the relationship between users and information systems specialists has traditionally been a problem area for information systems implementation efforts
true
the systems analyst is the catalyst for the entire change process and is responsible for making sure that everyone invloved accepts the changes created by a new system.
true
the yellow firs-down markers shown on televised football games are examples of AR.
true
thee is a very high failure rate among information systems projects because organizations have incorrectly assessed their business value.
true
todays 3-D printers can create objects out of human cartilage.
true
two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. true or false
true
using the number of unique visitors a website produces as a measure of marketing success is a carryover from the world of television.
true
viral marketing is like traditional word-of -mouth marketing except that it is spread via online communities.
true
virtualization has become one of the principal technologies for promoting green computing.
true
web beacons are tiny, invisible software programs embedded in email messages and web pages that are used to track and report a user's online behavior. true or false?
true
web hosting services maintain a large web server, or series of servers, and provide fee-paying subscribers with space to maintain their websites. true or false?
true
what-if analysis works forward from known or assumed conditions
true
wikis allows visitors to change or add to the original posted material
true
you can use OLAP to perform multidimensional data analysis.
true
zero defects cannot be achieved in larger software programs because fully testing prgrams that contain thousands of choices and millions of paths would require thousands pf years
true
before the internet, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes.
true q
the choice phase of SImon's decision-making model includes choosing among solution alternative.
trues
in a relational database, a record is referred to in technical terms as a(n):
tuple
an authenticication system in which a user must provide two types of identification, such as a bank card and PIN, is called:
two-factor authentication
all of the following are examples of social commerce companies EXCEPT:
uber
______ integrates disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience.
unified communication
together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):
uniform resource locator
establishing a firm's long-term goals is an example of a ___ decision.
unstructured
when there is no well-understood or agreed-on procedure for making a decison, it is said to be:
unstructured
which type of decision is deciding whether to introduce a new product line?
unstructured
a data lake is composed of:
unstructured and structured data that has not been analyzed
the seminal research effort often referred to as "the cat paper" involved which of the following?
unsupervised learning
the ____ includes a company's suppliers, the suppliers' suppliers, and the processes for managing relationships witht them>
upstream portion of the supply chain
neutral networks:
use Learning Rules to identify the optimal path through the network
deep learning networks:
use mulitple layers of neural networks to detect patterns in input data
which of the following is the single greatest cause of network security breaches?
user lack of knowledge
the differing background between users and information systems specialists is referred to as the:
user-designer communications gap
OLAP enables:
users to quickly generate reports using multidimensional views of data
bblockchain refers to a technology that:
uses a chain of digital 'blocks' that contain records of transaction
a digital certificate system:
uses third party CAs to validate a user's identity
which of the following types of projects have a higher likelihood of failure?
very large-scale or complex systems project
which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?
war driving
which of the following would you use to find patterns in user interaction data recorded by a wen server?
we usage mining
which of the following is a milestone for the Phase 1: Planning phase of developing an e-commerce presence?
web mission statement
a (n) _____ is software for locating and managing stored web pages.
web server
which of the following is a milestone for the website development phase of building an e-commerce presence?
website plan
while users are concered about an information system delivering the information needed for work, designers might be concerned about:
what demands the system will place on the company servers
which of the following is NOT an example of a BI predefined production report?
what-if scenario analysis
a data governance policy specifies all of the following EXCEPT: which type of business intelligence tool should be used
which type of business intelligence tool should be used
a network that covers entire geographical regions is most commonly referred to as a(n):
wide area network
which of the following involves where, when, and how to apply knowledge?
wisdom