CIS Final Exam Chapter 12, Chapter 2, Chapter 11, Chapter 10, MIS CH 8, Capitolo 7, Chapter 6, chpt 6, MIS Chapter 4 Quiz, Chapter 5, Chapter 4, Chapter 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

28.(p. 302-303) According to the Real World case, some of Cisco's employees are full-time telecommuters, living and working in places such as Illinois while telecommuting to the firm's offices in California

TRUE

In a(n) _______________ database structure, all of the relationships among records are one-to-many, because each data element is related to only one element above it. A. hierarchical

a

Large organizations usually place control of enterprise-wide database development in the hands of A. Database administrators (DBAs)

a

The object-oriented database model supports. That is, new objects can be automatically created by replicating some or all of the characteristics of one or more parent objects. A. inheritance

a

The primary challenge of a distributed database is: A. Data accuracy

a

A is an overall logical view of the relationships needed to support specific end-user application programs that will access the databaseB. subschema

b

The database maintenance process is accomplished via: B. Transaction processing systems and other end user applications, with the support of the DBMS

b

The tables in a relational database are flat files which have rows and columns. Each row represents a in the file. B. record

b

When independent of any other files related to it, a single table is referred to as a(n): B. Flat file

b

Software that is installed on intranet Web servers can be accessed by employees within the company or by external business partners who are using Web browsers, if access is allowed by the company.

TRUE

Telecommunications and network management software can reside in communications processors, such as multiplexers and routers.

TRUE

The Internet provides electronic discussion forums and bulletin board systems that are formed and managed by special-interest newsgroups.

TRUE

The Open System Interconnection (OSI) model was officially adapted as an international standard by the International Organization of Standards (ISO).

TRUE

The unique achievement of Napster was the empowerment of the peers, in association with a central index, to quickly and efficiently locate available content.

TRUE

Web browser technology makes customer and supplier access of intranet resources a lot easier and faster than with previous business methods.

TRUE

Wi-Fi is faster and less expensive than Standard Ethernet and other common wire-based LAN technologies.

TRUE

i45.(p. 164) The ease of creating Java applets and distributing them from network servers to client PCs and network computers is one of the major reasons for Java's popularity.

TRUE

As it relates to telecommunications media, the problem of the last mile is:

Tying into older technology

A DBMS query language is designed to: B. Support end users who wish to obtain ad hoc reports

b

A central source of data that have been cleaned, transformed, and cataloged so that they can be used for business analysis, market research, and decision support is called a _______________. B. data warehouse

b

A database with a(n) data structure can easily handle a many-to-many data relationship. B. network

b

According to one database pioneer, the future development of databases and data warehouses will depend on B. columns

b

According to the text, most data warehouses will run in a column format. B. 50 times faster

b

All of the following are major functions of a database management system except: B. Identifying insufficient data processing or storage needs

b

108. (p. 463) E-business architecture planning integrates business strategy development and business _______________ engineering to produce e-business and e-commerce applications using the resources of the IT architecture, component development technologies, and a repository of business models and application components.

process

Communications channels such as microwave, fiber optics, or satellite transmission that provide high-speed transmission rates typically use _______________ channels.

broadband

Telecommunications and network technologies are internetworking and revolutionizing _______________.

business and society

104. (p. 455) A _______________ is a conceptual framework that expresses the underlying economic logic and system that prove how a business can deliver value to customers at an appropriate cost and make money.

business model

119. (p. 471) According to the text case, DHL Express experienced lower costs through centralized IT, but this made it difficult to ensure that IT spending was in synch with _______________.

business strategy

A database with a(n) _______________ data structure can easily handle ad hoc requests for information. A. hierarchical B. network C. relational D. object-oriented

c

121. (p. 472-473) According to the text case, Avnet Marshall transformed itself into a premiere example of an inter-networked, _______________ business.

customer value-focused

According to the textbook case, file processing in Hadoop is not halted by hardware failures because _______________. D. Hadoop keeps three (3) copies of all data

d

Boolean logic deals with three logical operators: D. AND, OR, and NOT

d

98. (p. 453) The acronym SWOT stands for strengths, weaknesses, opportunities, and _______________.

threats

VoIP works by digitizing a voice signal, chopping it into __________, and then sending them over a company's computer network or the Internet, much like data or email.

packets

94. (p. 448) The result of the planning process is called a __________, which formally articulates the actions that are necessary to achieve the desired goals.

plan

103. (p. 401) Online _______________ processing enables managers and analysts to interactively examine and manipulate large amounts of detailed and consolidated data from many perspectives.

analytical

63. (p. 459) Having a _______________ perspective means measuring the company's learning curve, such as the time spent on staff training. A. learning and growth B. customer C. financial D. business process

A

No matter what the project, all of the following elements are necessary except: A. Prototypes B. Process C. Tools D. Techniques

A. Prototypes

Open systems are a recent telecommunications trend. Open systems:

All of the choices are correct.

7.Distribution and manufacturing are considered front office systems; customer service and sales order entry are back office systems

FALSE

8.(p. 133) According to the text, operating systems are a type of general purpose application program.

FALSE

8.(p. 277) The integration of enterprise application clusters has little, if any, impact on customer call center responsiveness

FALSE

16.(p. 138) Some powerful word processing packages have built-in capabilities that end users can use to convert documents to HTML format for publication as web pages.

TRUE

18.(p. 140) Presentation graphics packages help end users design and manage computer-generated slide shows that can contain text, graphics, and multimedia displays.

TRUE

18.(p. 289) Increasingly, sales people are using Web browsers and contact management software to connect to their company's marketing websites

TRUE

20.(p. 141) A personal information manager helps users store, organize, and retrieve information about customers and prospects, and schedule and manage appointments.

TRUE

20.(p. 290) Firms such as transportation companies, wholesalers, retailers, financial institutions, and service companies must use production/operations information systems to plan and control their operations

TRUE

22.(p. 143) A number of large and fast-growing companies are turning to application service providers instead of developing or purchasing the application software they need to run their businesses.

TRUE

22.(p. 291) Computer aided manufacturing systems are those that automate the production process, such as employing humanlike robots to complete the step of painting the product being manufactured

TRUE

A(n) _______________ is a standard set of rules and procedures for the control of communication in a network.

protocols

66.(p. 283) Training in a virtual world is effective, but obstacles include both _______________. A. technology and culture B. hardware and software C. front office and back office D. suppliers and customers

A

69. (p. 418) Who was the British AI pioneer responsible for proposing a test for determining if machines could think? A. Alan Turing B. John McCarthy C. Allen Nevell D. Herbert Simon

A

Programming that serves to "glue together" or mediate between two separate, and usually already existing, programs is known as _______________. A. front-line software B. software handshaking C. middleware D. back-line software

(C.) Middleware

70.(p. 284) A(n) _______________ business system is a type of information system that supports the business functions of accounting, finance, marketing, operations management, and human resource management. A. functional B. inter-enterprise C. collaboration D. enterprise resource

A

Communications channels such as microwave, fiber optics, or satellite transmission that provide high-speed transmission rates typically use _______________ channels. A. broadband B. narrow-band C. wireless D. voice-band

A

Which of the following is a key business use of the Internet?

All of the choices are correct.

Most Linux distributions are released via BitTorrent to help with _______________ needs. A. security B. bandwidth C. user registration D. file compression

B

67. (p. 461) A company that enters the _______________ quadrant of a strategic positioning matrix must capitalize on a high degree of customer and competitor connectivity and use of IT. A. global market penetration B. product and service transformation C. cost and efficiency improvements D. performance improvement in business effectiveness

A

60. (p. 458) The _______________ component of the information technology architecture includes the organizational structure of the IS function within a company and the distribution of IS specialists, designed to meet the changing strategies of a business. A. IT organization B. data resources C. technology platform D. applications architecture

A

60.(p. 281-282) Electronic mail, voice mail, faxing, Web publishing, bulletin board systems, and paging are considered _______________ tools. A. electronic communication B. collaborative work management C. electronic conferencing D. All of the choices are correct

A

68.(p. 133) Which of the following are considered application specific software packages? A. Education and entertainment B. Electronic mail C. System utilities D. Programming languages

A

When IP was first standardized, the specification required that each system attached to the Internet be assigned a unique, _______________ Internet address value.

32-bit

A network with 100 nodes has 9,900 possible connections. A network with 1,000 nodes has _______________ possible connections.

999,000

Which of the following best describes how star, ring, and bus networks differ? A. Performance and reliability B. Performance, reliability, and cost C. Reliability and cost D. Performance and cost

B

The central processing unit (CPU) consists of: A. the Control unit and the RAID unit B.. Arithmetic-logic unit and the RAID unit C. the RAID unit and the Fuzzy Logic unit D. the Control unit and the Arithmetic-logic unit

D

27.Operational accounting systems emphasize legal and historical record-keeping and the production of accurate financial statements

TRUE

110. (p. 418) According to the _______________ test, a computer could demonstrate intelligence if a human interviewer, conversing with an unseen human and an unseen computer, could not tell which was which.

Turing

The _______________ layer in an OSI model provides communications services for end users.

application

118. (p. 424) Expert systems can provide decision support to end users in the form of advice from an _______________ in a specific problem area.

expert or expert consultant

Older, traditional mainframe-based business information systems are called _______________ systems.

legacy

109. (p. 451) In a planning context, a virtual world is a _______________ of the real world.

microcosm

110. (p. 451) When personnel staff create a role-playing exercise to be used in a supervisory training, they are creating a _______________.

microworld

96. (p. 451) When a work team goes white-water rafting or engages in some other outdoor team-building exercise, they are creating a _______________ in which to reflect on and improve the way they work together.

microworld

118. (p. 468) Before beginning development of a new application, don't just ask users what they want; find out what they __________.

need

A change in technology induces social, political, and economic system changes _______________.

only after a critical mass of users is reached.

The Internet, as originally conceived in the late 1960's was a _______________ system.

peer-to-peer

102. (p. 400-401) Many companies are using webcasting to selectively broadcast reports and other information to the networked PCs of managers and specialists over corporate internets. This is an example of _______________ reporting.

push

111. (p. 464) Implementing e-business applications, such as enterprise resource management or customer relationship management, requires a _______________ of core business processes, both internally and with supply chain partners.

reengineering

99. (p. 453) Strategic business/IT planning involves an evaluation of the potential benefits and __________ a company faces when using IT-based strategies and technologies for competitive advantage.

risks

An internetworking unit that connects networks based on different protocols is a _______________.

router

105. (p. 409) Typically, __________ analysis is used when decision makers are uncertain about the assumptions made in estimating the value of certain key variables.

sensitivity

123. (p. 436) Intelligent agents, also called _______________, are special-purpose, knowledge-based information systems that accomplish specific tasks for users.

software robots or bots

111. (p. 423) The development of natural languages and _______________ are major thrusts in the natural interface area of AI applications.

speech recognition

A network configuration that consists of a central computer system with a number of smaller computers tied directly to it, but not to each other, is a _______________ network.

star

106.(p. 159) Fifth generation languages, which are designed to be as much as possible like spoken languages, are referred to as _______________ languages. A. natural B. macro C. generator D. syntax

A

108.(p. 160) _______________ is a major benefit of object-oriented programming. A. Reusability of objects B. Conformity of objects C. A simplified programmer interface D. Faster compilation time

A

When a firm develops ways to differentiate their products and services from their competitors', it is pursuing a _______________ strategy. A. differentiation B. alliance C. innovation D. marketing

A

11.(p. 280) Transaction processing systems update the corporate databases of an organization to reflect changes resulting from day-to-day business transactions

TRUE

Communications satellites can use microwave radio as their telecommunications medium.

TRUE

If access to data is not restricted with passwords and other security mechanisms, the integrity of the data can be easily compromised.

TRUE

In the central server architecture of P2P networking, the P2P software connects your PC to a central server with the directory of all users of the network.

TRUE

Mainframe-based wide area networks frequently use telecommunications monitors or teleprocessing monitors.

TRUE

All of the following statements about a virtual private network are correct except:

Relies on modem, twisted-pair wire, and router technology

Newly developed optical routers will be able to send optical signals up to 2,500 miles without regeneration.

TRUE

Output from analog devices must be converted into digital form in order to input it into a computer.

TRUE

112.(p. 153) Linux, an open source product, is a _______________-like operating system that is rapidly gaining market share as a high-performance operating system for network and Web servers. A. Unix B. BASIC C. COBOL D. Windows

A

66.(p. 133) Which of the following are considered application software packages? A. Word processing programs B. Operating systems C. System utilities D. System development programs

A

1.(p. 130) Software is considered the variable part of the computer, whereas the hardware is considered the invariable part.

TRUE

1.(p. 272) Cross-functional enterprise systems cross the boundaries of traditional business functions in order to reengineer and improve vital business processes all across the enterprise

TRUE

10.(p. 135) Although Microsoft Office has a large share of the software suite market, Lotus, Corel, and Sun all offer competing productivity suites.

TRUE

11.(p. 136) Web browsers are the key software interface used to point and click through the hyperlinked resources of the Internet, as well as corporate intranets and extranets.

TRUE

112. (p. 424) _______________ represents knowledge in the form of past performance, occurrences, and experiences.

Case-based reasoning

A network with 100 nodes has 9,900 possible connections. A network with 1,000 nodes has _______________ possible connections. A. 9,900,000 B. 999,000 C. 99,000 D. over one million

(B.) 999,000

Security is a top concern of network management today, so telecommunications software must provide all of the following except:

Central processing

Which of the following best describes a local area network? A. A network that covers a large geographic area, such as a city or state B. A network that connects computers within a limited physical area, such as inside a single building C. A network that covers no more than a single state D. A private network that uses the Internet as its main backbone

(B.) A network that connects computers within a limited physical area, such as inside a single building

Which of the following statements best defines a network? A. The usefulness or utility that comes from linking computers together B. An interrelated or interconnected chain, group, or system C. Computers linked together via cabling or wireless technology D. A group of individuals linked via hardware and software

(B.) An interrelated or interconnected chain, group, or system

Local and global telecommunications networks are rapidly converting to digital transmission technologies. Digital technology provides all of the following benefits over analog technology except: A. Much lower error rates B. Equivalent transmission speeds C. Movement of larger amounts of information D. Greater economy

(B.) Equivalent transmission speeds

Most companies are building e-business and e-commerce websites to achieve all of the following goals except: A. Generate new revenue from online sales B. Increase foot traffic at brick and mortar locations C. Reduce transaction costs D. Increase the loyalty of existing customers via Web customer service and support

(B.) Increase foot traffic at brick and mortar locations

The five basic categories of components in a telecommunications network include: A. Protocols, telecommunications channels, computers, telecommunications control software, and modems B. Terminals, telecommunications processors, telecommunications channels, computers, and telecommunications control software C. Terminals, telecommunications channels, computers, and modems D. Terminals, telecommunications processors, computers, modems, and protocols

(B.) Terminals, telecommunications processors, telecommunications channels, computers, and telecommunications control software

Most of the institutions and commercial partners on the Internet2 network are connected via _______________, a network backbone that will soon support throughput of 10 Gbps. A. Abilene B. Phoenix C. Enterprise D. Indiana

(A.) Abilene

Based on the information presented in the text, telecommunications terminals are best described as: A. Any input/output device that uses telecommunications networks to transmit or receive data, including telephones B. Devices that support data transmission and reception between terminals and computers C. Channels over which data are transmitted and received D. Programs that control telecommunications activities and manage the functions of telecommunications networks

(A.) Any input/output device that uses telecommunications networks to transmit or receive data, including telephones

Telecommunications and network technologies are internetworking and revolutionizing _______________. A. business and society B. business and globalization C. society and politics D. globalization and politics

(A.) Business and society

The use of an intranet in an organization _______________. A. can significantly improve communications and collaboration within an enterprise. B. can significantly hinder communications and collaboration within an enterprise. C. has no effect communications and collaboration within an enterprise. D. is only possible if the organization is using WiFi.

(A.) Can significantly improve communications and collaboration within an enterprise.

An _______________ is a network link that uses Internet technologies to interconnect the intranet of a business with the intranets of its customers, suppliers, or other business partners. A. extranet B. omninet C. intranet D. none of the above

(A.) Extranet

Which of the following statements regarding Internet Service Providers is correct? A. ISPs provide individuals and organizations with access to the Internet for a fee B. ISPs are independent organizations; they have no connection to one another C. ISPs are no longer necessary for access to the Internet D. ISPs provide a direct connection between a company's networks and the Internet

(A.) ISPs provide individuals and organizations with access to the Internet for a fee

The text lists five basic categories of components in a telecommunications network. One of these categories includes telecommunications processors, which: A. Support data transmission and reception between terminals and computers B. Are channels over which data are transmitted and received C. Consist of programs that control telecommunications activities and manage the functions of telecommunications networks D. Include input/output terminals

(A.) Support data transmission and reception between terminals and computers

Metcalfe's law states that: A. The usefulness or utility of a network equals the square of the number of users B. More network nodes equals more usefulness to network members C. Networks with too many nodes rapidly lose their effectiveness D. The usefulness or utility of a network equals the number of users times the number of nodes

(A.) The usefulness or utility of a network equals the square of the number of users

All of the following statements about the Internet revolution are true except: A. The Internet has become the largest and most important network today, and has evolved into a global information superhighway B. The central computer system of the Internet is the most powerful communications center in the world C. The Internet is constantly expanding, as more and more businesses and other organizations join its global web D. The Internet does not have a headquarters or governing body

(B.) The central computer system of the Internet is the most powerful communications center in the world

ISPs are connected to one another through network _______________. A. touch points B. portals C. access points D. hubs

(C.) Access points

The telecommunications industry has changed _______________. A. from a deregulated market to government-regulated monopolies. B. not at all since 1900. C. from government-regulated monopolies to a deregulated market. D. none of the above.

(C.) From government-regulated monopolies to a deregulated market

Telecommunications-based business applications can help a company overcome all of the following barriers to business success except: A. Time barriers B. Geographic barriers C. Human resource barriers D. Cost barriers

(C.) Human resource barriers

An _______________ is a network inside an organization that uses Internet technologies to provide an Internet-like environment within the enterprise. A. extranet B. omninet C. intranet D. none of the above

(C.) Intranet

A change in technology induces social, political, and economic system changes _______________. A. long before a critical mass of users is reached. B. before the technology is well understood. C. only after a critical mass of users is reached. D. when it is used as a political tool by radical countries.

(C.) Only after a critical mass of users is reached.

Which of the following statements regarding Internet2 is true? A. Internet2, like the first Internet, is open to all users B. Internet2 uses the same infrastructure as the current Internet, so it will be easy to learn C. The purpose of Internet2 is to build a roadmap that can be followed during the next stage of innovation for the current Internet D. Internet2 will someday replace the original Internet

(C.) The purpose of Internet2 is to build a roadmap that can be followed during the next stage of innovation for the current Internet

Applications that use the Internet and Internet-based technologies are typically less expensive to _______________ than traditional systems. A. develop B. operate C. maintain D. All of the choices are correct.

(D.) All of the choices are correct.

Open systems are a recent telecommunications trend. Open systems: A. Use common standards for hardware, software, applications, and networking B. Create a computing environment that is easily accessed by end users and their networked computer systems C. Provide greater connectivity, and a high degree of network interoperability D. All of the choices are correct.

(D.) All of the choices are correct.

Telecommunications networks now play vital and pervasive roles in Web-enabled _______________. A. e-business processes B. electronic commerce C. enterprise collaboration D. All of the choices are correct.

(D.) All of the choices are correct.

The comparative _______________ of publishing and accessing multimedia business information internally via intranet websites has been one of the primary reasons for the explosive growth in the use of intranets in business. A. attractiveness B. lower cost C. ease D. All of the choices are correct.

(D.) All of the choices are correct.

Which of the following is a key business use of the Internet? A. Internet websites for interactive marketing and electronic commerce B. E-mail, file transfer, and discussion forums C. Intranet links with remote employee sites D. All of the choices are correct.

(D.) All of the choices are correct.

Traveling salespeople and those at regional sales offices can use the Internet, extranets, and other networks to transmit customer orders from their laptop or desktop PCs, thus breaking _______________ barriers. A. physical B. competition C. structural D. geographic

(D.) Geographic

To communicate over a network, each PC usually has a circuit board called a _______________. A. printed circuit card B. modem C. router D. network interface card

(D.) Network interface card

All of the following would typically be supported by an organization's intranet information portal except: A. Communication and collaboration B. Business operations and management C. Web publishing D. Recruitment

(D.) Recruitment

A network that covers a large geographic distance, such as a state or a country, is considered a _______________ network. A. client/server B. local area C. small area D. wide area

(D.) Wide area

29.(p. 272) _______________ is defined as the use of the Internet and other networks and information technologies to support electronic commerce, enterprise communication and collaboration, and Web-enabled business processes, both within a networked enterprise and with customers and business partners A. Electronic business B. Enterprise collaboration C. Cross-functional system management D. Supply chain management

A

34.(p. 272) A(n) _______________ architecture illustrates the inter-relationships of the major cross-functional enterprise applications that many companies have, or are installing, today A. enterprise application B. enterprise operation C. cross-functional D. none of the choices are correct

A

36.(p. 275) Which of the following applications focuses on acquiring and retaining profitable customers via marketing, sales, and service processes? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management

A

41. (p. 394) _______________ is an example of an unstructured, operational management decision. A. Cash management B. Program control C. Product planning D. Capital budgeting

A

41.(p. 275) As described in the text, supply chain management focuses on: A. Developing the most efficient and effective sourcing and procurement processes B. Acquiring and retaining profitable customers via delivery of timely products C. Acquiring and retaining partners who can enhance the selling and distribution of a firm's products and services D. Providing a firm's employees with tools that support group collaboration and decision support

A

42. (p. 394) _______________ is an example of a structured, tactical management decision. A. Program control B. Employee performance appraisal C. Credit management D. Company reorganization

A

43. (p. 452) Technology convergence, increasing information content, and e-commerce are _______________ trends that are shaping strategic business/IT planning. A. technology B. competitive imperatives C. deregulation D. customer sophistication/expectations

A

44. (p. 453) All of the following are considered competitive forces except: A. Cost leadership B. Competitors C. Customers D. New entrants

A

46. (p. 453) _______________ are areas of substandard business performance compared to others in the industry or market segments. A. Weaknesses B. Opportunities C. Threats D. Strengths

A

46.(p. 276) Enterprise application integration (EAI) software provides _______________ that performs data conversion and subordination, and application communication and messaging services A. middleware B. a legacy system C. the telecommunication protocol D. a business application

A

48. (p. 400) A weekly sales report is a typical example of a(n) _______________ report. A. periodic scheduled B. exception C. demand D. action

A

51. (p. 456) Which of the following questions best represents the sustainability component of a business model? A. What is it about the firm that makes it difficult for other firms to imitate it? B. What are the firm's capabilities and capabilities gaps that need to be filled? C. Where do the dollars come from? D. To which customers is the firm offering this value?

A

52. (p. 401) With _______________, data about sales offices can be rolled up to the district level, and district-level data can be rolled up to provide a regional-level perspective. A. consolidation B. drill-down C. filtration D. slicing and dicing

A

53. (p. 405) Many companies are using GIS technology along with global positioning system devices to do all of the following except: A. Map customer traffic patterns within each store B. Choose new retail store locations C. Optimize distribution routes D. Analyze the demographics of their target audiences

A

55. (p. 457-458) The _______________ component of the business/IT planning process involves developing strategic plans for managing or outsourcing a company's IT resources. A. resource management B. technology architecture C. strategic development D. All of the choices are correct.

A

55.(p. 130) The two general classifications of software are: A. Systems and application B. Programming and CASE C. Commercial and custom D. Programming languages and development tools

A

57.(p. 133) _______________ software are programs that manage and support the operation of computer systems and networks. A. System B. CASE C. Commercial D. General purpose

A

63. (p. 414) Decision support in business is changing, driven by all of the following except: A. Changing corporate spending patterns B. Rapid developments in end user computing and networking C. Internet and Web technologies D. Web-enabled business applications

A

63.(p. 131) According to the Real World Case, GE spends $150 million each year to purchase all of its desktop and laptop computers from which vendor? A. Dell B. Hewlett-Packard C. Gateway D. None of the above

A

63.(p. 283) Which of the following is considered a collaborative work management tool? A. Calendaring and scheduling B. Instant messaging C. Voice conferencing D. Paging

A

71.(p. 134) According to the text, function-specific application software does which of the following? A. It supports specific applications of end users in business and other fields B. Provides CASE tools for developing new applications C. Allows anyone to contribute to the development of a specific application D. Manages and supports operations of computer systems and networks

A

72.(p. 135) One of the biggest advantages offered by software suites is that: A. All the programs within the suite use a similar graphical user interface (GUI) B. The packages take up a lot of disk space C. There is a custom graphical user interface for each application in the suite D. They cost more than the total cost of buying the individual packages separately

A

72.(p. 287) Which of the following is considered a human resource business function? A. Compensation analysis B. Payroll C. Customer relationship management D. Sales force automation

A

74. (p. 422) All of the following would be considered an AI application in the natural interface group except: A. Visual perception B. Speech recognition C. Multisensory interfaces D. Virtual reality

A

74. (p. 461) The _______________ model uses the Internet to provide a comprehensive suite of services that the customer's employees can use directly. A. self-service innovator B. supply chain innovator C. channel mastery D. market creator

A

75. (p. 424) Which of the following represents knowledge in the form of past performance, occurrences, and experiences? A. Case-based reasoning B. Frame-based knowledge C. Object-based knowledge D. Rule-based knowledge

A

75. (p. 461) The _______________ model uses the Internet to reduce search costs and offers the customer a unified process for collecting information necessary to make a large purchase. A. infomediary B. supply chain innovator C. channel mastery D. market creator

A

78. (p. 463) New business processes are stored in a _______________ of reusable business models and application components. A. repository B. bank C. database D. All of the choices are correct.

A

80. (p. 467) Which of the following is not considered one of the top ten enterprise resource planning challenges? A. Organizing the data B. Getting end user buy-in C. Dealing with multiple/international sites and partners D. Moving to a new platform

A

82. (p. 426) According to the text, all of the following are considered benefits of an expert system except: A. It is cheaper to employ than multiple human experts B. It can outperform a single human expert in many situations C. An expert system is faster and more consistent than human experts D. It does not get tired or distracted

A

86. (p. 427) An employee performance evaluation expert system is an example of an expert system in the application category of: A. Decision management B. Selection/classification C. Process monitoring/control D. Diagnostic/troubleshooting

A

86. (p. 470) Change experts recommend all of the following tactics to reduce the risks and cost and to maximize the benefits of change except: A. Change the company culture before the project is implemented, not after B. Involve as many people as possible in e-business planning and application development C. Keep constant change an expected part of the culture D. Make liberal use of financial incentives and recognition

A

86.(p. 139) According to the text, spreadsheet packages are used by virtually every business for _______________. A. analysis, planning, and modeling B. maintaining accounting records, such as a general ledger C. keeping up-to-the-minute inventory records D. tracking human resources

A

87.(p. 139) When using a spreadsheet package to answer "what if" questions, the user must change: A. Only a selected variable to see the impact of that change B. A number of variables to make a single change to the spreadsheet output C. All the formulas in order to calculate new values D. Nothing - spreadsheets cannot be used to answer "what if" questions

A

88.(p. 292) Machine control is the use of computers to control the actions of machines. This is also known as ____________________. A. numerical control B. computer-aided manufacturing C. process control D. manufacturing execution systems

A

90. (p. 429) All of the following are suitability criteria for expert systems except: A. Viability B. Domain C. Expertise D. Structure

A

90.(p. 141) Groupware aids collaboration by providing users with _______________. A. electronic mail, scheduling, and task management B. electronic mail and spreadsheet software C. electronic mail and word processing software D. All of the choices are correct.

A

90.(p. 295) According to the text, _______________ emphasize legal and historical record-keeping and the production of accurate financial statements. A. operational accounting systems B. management accounting systems C. cross-functional accounting systems D. financial accounting systems

A

91.(p. 141) Groupware is best described as a(n) _______________ program. A. general purpose application B. application specific C. system management D. system development

A

92.(p. 296) Which of the six essential accounting business systems mentioned in the text records purchases from, amounts owed to, and payments to suppliers? A. Accounts payable B. Accounts receivable C. Inventory control D. Order processing

A

93.(p. 145) Cloud computing is not: A. Grid computing B. A style of computing users need not have knowledge, expertise, or control over the technological infrastructure C. A style of computing where resources are provided as a service over the Internet D. A metaphor for the Internet

A

95. (p. 436) An intelligent agent is: A. A software surrogate that accomplishes specific tasks for users B. Database software used to analyze current sales trends C. A marketing software system used to do statistical analysis D. A software package used by robots

A

Compared to coaxial cable, standard twisted-pair telephone lines: A. Support lower data transmission speeds B. Are virtually the same as coaxial cable in speed and service provided C. Have less interference and distortion because of their insulation D. None of the choices are correct.

A

95.(p. 147) System management programs: A. Manage the hardware, software, networking, and data resources of computer systems during the execution of information processing jobs B. Manage e-mail and CASE tools for both end users and developers C. Help users develop information system programs and procedures D. All of the choices are correct.

A

97.(p. 147) The user interface function of an operating system typically: A. Allows end users to communicate with it so they can load programs, access files, and accomplish other tasks B. Manages the hardware resources of a computer system C. Controls the creation, deletion, and access of files of data and programs D. Manages the accomplishment of the computing tasks of end users

A

98.(p. 147) Which of the following is the most popular type of user interface? A. Graphical B. Command-driven C. Menu-driven D. Voice

A

A bit, the smallest element of data, can have values of: A. 0 or 1 B. 0, 1, or 8 C. 0 through 7 D. 0 through 8

A

A communications medium that consists of one or more central wires surrounded by thick insulation is called _______________ cable. A. coaxial B. fiber optic C. twisted-pair D. packet-transmission

A

A touchpad is best described as a: A. Small, rectangular, touch-sensitive surface usually placed below the keyboard B. Stationary device containing a roller ball whose top is exposed outside its case C. Pen-shaped device with a ballpoint at the end D. Device rolled along the desktop in order to move the cursor on the screen

A

A typical dissatisfied customer will tell _______________ about his or her experience. A. 8 to 10 people B. nobody C. everyone he/she knows D. 2-4 people

A

A(n) _______________ strategy is a competitive strategy by which a firm seeks to become a low-cost producer of products and services in the industry. A. low cost leadership B. differentiation C. innovation D. alliance

A

Accessing and retrieving documents that have been stored online is a function of _______________. A. document management B. enterprise intelligence C. information creation, sharing, and management D. All of the choices are correct.

A

According to Moore's Law, _______________ doubles every 18 to 24 months. A. computing power B. computer prices C. computer storage capacity D. the number of functioning computers

A

According to the text, competition is a _______________ characteristic in business that _______________. A. positive, is natural and healthy B. negative, can consume significant resources C. neutral, can help a firm meet strategic enterprise objectives D. none of the choices are correct.

A

According to the text, which of the following is considered by millions of computer users to be the primary function of the desktop PC? A. Allows access to the Internet B. Increases productivity through the use of software applications C. Facilitates creation of local area networks D. All of the choices are correct

A

According to the textbook case, SCM software: A. allows McKesson to monitor CVS's store level consumption and inventory B. allows CVS to monitor McKesson's store level consumption and inventory C. allows McKesson to see what items CVS is ordering from other vendors D. allows CVS to place orders with vendors other than McKesson

A

According to the textbook case, innovation in information systems at Universal Orlando comes from thinking like a: A. Customer B. Competitor C. Employee D. IT specialist

A

All of the following are competitive forces in the marketplace except: A. Alliances B. Competition C. Substitutes D. Bargaining

A

All of the following are examples of the business value of operational CRM except: A. Enables easy collaboration with customers, suppliers, and partners B. Supports customer interaction with greater convenience through a variety of channels, including phone, fax, e-mail, chat, and mobile devices C. Synchronizes customer interactions consistently across all channels D. Makes a company easier to do business with

A

All of the following are support processes, except: A. Customer relationship management B. Procurement of resources C. Technology development D. Employee benefits intranet

A

All the following are competitive strategies except: A. New entries into the market B. Innovation C. Cost leadership D. Alliances

A

An intelligent terminal that can perform data entry and some information processing tasks independently is called a _______________ terminal. A. transaction B. dumb C. Windows D. remote

A

Based on the information presented in the text, telecommunications terminals are best described as: A. Any input/output device that uses telecommunications networks to transmit or receive data, including telephones B. Devices that support data transmission and reception between terminals and computers C. Channels over which data are transmitted and received D. Programs that control telecommunications activities and manage the functions of telecommunications networks

A

Becoming a low-cost producer of products and services in an industry is an example of a(n): A. Cost leadership strategy B. Differentiation strategy C. Innovation strategy D. Growth strategy

A

Business process reengineering (BPR) incorporates all the following strategies, except: A. Lowering prices as a competitive strategy B. Promoting business innovation C. Making major improvements to business operations D. None of the choices are correct.

A

CRM systems help fulfill prospect and customer responses and requests by doing all of the following except: A. Mailing out additional marketing materials B. Providing product information C. Capturing relevant information for the CRM database D. Quickly scheduling sales contacts

A

Companies in stage _____ of a supply chain management implementation concentrate on making improvements to internal supply chain processes and external processes and relationships with suppliers and customers. A. one B. two C. three D. four

A

Computer systems rely on which of the following components? A. Input, processing, output, storage, and control B. Input, processing, output, storage, and the Internet C. The Internet, processing, output, storage, and control D. Input, processing, output, the Internet, and control

A

Data are processed and stored in a computer system through the presence or absence of electronic or magnetic signals to the computer. This is called a "binary" representation of data, because the computer and the media can exhibit only _______________ states or conditions. A. two B. three C. five D. ten

A

Enterprise resource planning is recognized as a necessary ingredient that many companies need in order to: A. Gain the efficiency, agility, and responsiveness required to succeed in today's dynamic business environment B. Maximize their marketing dollars C. Reduce inventory levels D. Hold onto competent employees in a competitive environment

A

Explicit knowledge deals with: A. Data, documents, and things written down or stored on computers. B. "How-to" knowledge, which resides in workers. C. Using data mining techniques to capture external information. D. All of the choices are correct.

A

Fiber optics uses cables consisting of one or more hair-thin filaments of __________ fiber wrapped in a protective jacket. A. glass B. plastic C. ceramic D. nylon

A

If a company takes care of a service problem quickly, _______________ of complaining customers will do business with the company again. A. 70 percent B. 15 percent C. 50 percent D. 85 percent

A

Metcalfe's law states that: A. The usefulness or utility of a network equals the square of the number of users B. More network nodes equals more usefulness to network members C. Networks with too many nodes rapidly lose their effectiveness D. The usefulness or utility of a network equals the number of users times the number of nodes

A

Most of the institutions and commercial partners on the Internet2 network are connected via _______________, a network backbone that will soon support throughput of 10 Gbps. A. Abilene B. Phoenix C. Enterprise D. Indiana

A

Of the typical costs associated with implementing a new ERP system, _______________ is the lowest. A. hardware B. software C. data conversions D. reengineering

A

Optimize network of suppliers, plants, and distribution centers is an outcome of the _______________ SCM function. A. supply chain design B. materials management C. collaborative fulfillment D. supply chain event management

A

Personal digital assistants most commonly use which of these technologies? A. Pen-based computing B. Optical scanning C. Jump drives D. Back-lit keyboards

A

Report key measurements in the supply chain, such as filling rates, order cycle times, and capacity utilization is an outcome of the _______________ SCM function. A. supply chain performance management B. materials management C. collaborative fulfillment D. supply chain event management

A

SCM systems generally provide companies with all of the following benefits except: A. Lower marketing costs B. Quicker times to market C. Reductions in inventory levels D. Lower transaction and materials costs

A

Smart card technology: A. Allows debit cards to store a cash balance on a card and electronically transfer some of it to others to pay for items and services B. Is not yet available in the United States C. Is commonly used by banks to read and process checks D. All of the choices are correct.

A

Speaker dependent voice recognition systems: A. Compare speech patterns to a dictionary B. Allow a computer to understand a few words from a voice it has never heard before C. Require users to pause between each spoken word D. All of the choices are correct.

A

Telecommunications and network technologies are internetworking and revolutionizing _______________. A. business and society B. business and globalization C. society and politics D. globalization and politics

A

The _______________ layer in an OSI model provides communications services for end users. A. application B. data link C. network D. transport

A

The central processing unit (CPU): A. is the main processing component of a computer system B. controls all the peripheral devices of a computer system C. is controlled by the RAID unit D. is also called a Fuzzy Logic unit

A

The goal of SCM is to create a fast, efficient, and low-cost network of business relationships, or a _______________, to get a company's products from concept to market. A. supply chain B. service chain C. product chain D. relationship chain

A

The goal of the _______________ phase of a customer relationship is to help customers perceive the value of a superior product offered by an outstanding company. A. acquire B. enhance C. retain D. all of the choices are correct.

A

The output devices of a computer system include: A. printers and video displays B. the Arithmetic-logic unit C. scanners and RAID units D. the Fuzzy Logic unit

A

The text lists five basic categories of components in a telecommunications network. One of these categories includes telecommunications processors, which: A. Support data transmission and reception between terminals and computers B. Are channels over which data are transmitted and received C. Consist of programs that control telecommunications activities and manage the functions of telecommunications networks D. Include input/output terminals

A

The third generation of computers relied on _______________. A. solid state technology and integrated circuits B. transistors C. vacuum tubes D. punch cards

A

The value chain framework can be used to view a firm as a series, a chain, or a network of basic activities that: A. Add value to its products and services, and thus add a margin of value to the firm. B. Lower costs along the product development chain. C. Create the perception of value and goodwill to employees. D. Create a smooth-flowing chain of events between the supplier and the customer.

A

Which of the following best describes magnetic stripe technology? A. A form of data entry that helps computers read credit cards B. A form of computing where debit and credit cards have an embedded microprocessor chip C. Technology that enables users to download full-motion video into a computer system D. Technology commonly used in banks in order to magnetically read checks and deposit slips

A

Which of the following correctly describes the supply chain life cycle supported by SCM systems? A. Commit, schedule, make, and deliver B. Buy, make, sell C. Buy, sell, schedule, deliver D. None of the choices are correct.

A

Which of the following does not apply to a personal digital assistant (PDA)? A. Supports applications with heavy mathematical computing B. A dumb terminal with limited processing capabilities C. Designed for convenient mobile communications via a touch screen D. Considered an information appliance

A

Which of the following is a execution SCM objective? A. Build and transport B. Monitoring, controlling, and adjusting production C. Changing transportation methods D. Establishing objectives and policies

A

Which of the following is a support process? A. Collaborative workflow intranet B. Targeted marketing C. Customer relationship management D. Just-in-time warehousing

A

Which of the following is a tactical SCM objective? A. Deploying resources to match supply to demand B. Monitoring, controlling, and adjusting production C. Changing transportation methods D. Establishing objectives and policies

A

Which of the following statements about optical disks is true? A. They can be read only, recordable, or rewritable B. They can hold approximately 50 megabytes on a single disk C. They have totally replaced "3.5" diskettes D. They have totally replaced magnetic tape as secondary storage

A

Which of the following statements best describes a workstation computer? A. Supports applications with heavy mathematical computing and graphics display demands, such as computer-aided design (CAD) B. Coordinates telecommunications and resource sharing in small, local area networks (LANS) C. Allows convenient mobile communications and touch-screen computing D. All of the choices are correct.

A

Which of the following statements regarding Internet Service Providers is correct? A. ISPs provide individuals and organizations with access to the Internet for a fee B. ISPs are independent organizations; they have no connection to one another C. ISPs are no longer necessary for access to the Internet D. ISPs provide a direct connection between a company's networks and the Internet

A

Which of the following would occur in stage 1 of a supply chain management implementation? A. Logistics B. Collaborative marketing C. Order management D. Resource allocation

A

_______________ agility is the ability to co-opt customers in the exploitation of innovation opportunites. A. Customer B. Partnering C. Operational D. Technological

A

_______________ are sometimes used as front-end computers in order to assist midrange computers in performing telecommunications processing and network management. A. Midrange computers B. Mainframes C. Supercomputers D. All of the choices are correct.

A

_______________ are the most important category of computer systems for both businesspeople and individual consumers. A. Microcomputers B. Supercomputers C. Network Servers D. Mainframes

A

_______________ is the technological backbone of e-business, an enterprise-wide transaction framework with links into sales order processing, inventory management and control, production and distribution planning, and finance. A. Enterprise resource planning B. Supply chain management C. Electronic data interchange D. Partner relationship management

A

Which of the following is related to human factors feasibility? A. Customer acceptance B. How well the proposed system will fit with the existing organizational structure C. Increased profits D. Hardware capability

A. Customer acceptance

All of the following are done during the systems implementation stage of application development, except: A. Develop logical models of the current system B. Acquire or develop hardware and software C. Convert to the new business system D. Manage the effects of system changes on end users

A. Develop logical models of the current system

All of the following are done during the systems investigation stage of application development, except: A. Develop logical models of the current system B. Conduct a feasibility study C. Determine how to address business opportunities and priorities D. Develop a project management plan and obtain management approval

A. Develop logical models of the current system

Which of the following is done during the systems analysis stage of application development? A. Develop logical models of the current system B. Conduct a feasibility study C. Develop logical models of new system D. Test the system, and train people to operate and use it

A. Develop logical models of the current system

Which of the following activities would normally be performed during the closing project management phase? A. Document the project B. Establish reporting obligations C. Compare actual progress with baseline D. Initiate control interventions, if necessary

A. Document the project

Which of the following are activities performed during the controlling project management phase? A. Establish reporting obligations B. Identify and sequence activities C. Commit resources to specific tasks D. Meet with stakeholders

A. Establish reporting obligations

According to the text, corrective maintenance includes: A. Fixing software bugs and logic errors not detected during the implementation testing period B. Modifying existing functions or adding new functionality to accommodate changes in the business or operating environments C. Reducing the chances of system failure or extending the capacity of a current system's useful life D. Making changes to an existing system that are intended to improve the performance of a function or interface

A. Fixing software bugs and logic errors not detected during the implementation testing period

According to the text, what is probably the most important contribution of the modern project management approach? A. Identifying the project as a series of steps B. Recognizing the importance of user input to the project C. Eliminating the input of information system specialists D. None of the selections are considered the most important

A. Identifying the project as a series of steps

Systems thinking means that an individual sees: A. Inter-relationships among systems and processes B. Discrete snapshots of change, whenever it occurs C. Linear cause-and-effects when events occur D. All of the choices are correct.

A. Inter-relationships among systems and processes

Which of the following are activities performed during the closing project management phase? A. Meet with stakeholders B. Identify and sequence activities C. Commit resources to specific tasks D. Establish reporting obligations

A. Meet with stakeholders

All of the following are activities performed during the planning project management phase except: A. Stating the problems/goals B. Identify the "critical path" C. Writing a detailed project plan D. Estimate time and resources needed for completion

A. Stating the problems/goals

Evaluating and acquiring necessary hardware and software resources and information system services is a(n) _______________ activity. A. acquisition B. software development C. documentation D. conversion

A. acquisition

Determining whether expected cost savings, increased profits, and other benefits exceed the cost of developing and operating a system is related to _______________ feasibility. A. economic B. functional C. operational D. system

A. economic

During the physical design stage, users and analysts focus on determining __________ the system will accomplish its objectives. A. how B. when C. where D. All of the choices are correct.

A. how

The most important objective to achieve during the _______________ phase is the clear and succinct statement of the problem that the project is to solve, or the goals that it is to achieve. A. initiating/defining B. planning C. executing D. controlling

A. initiating/defining

According to the text, certain changes in _______________ may dictate the need for change, regardless of the assessed feasibility of such change. A. the business environment B. product specifications C. management structure D. technical system requirements

A. the business environment

Automatic entry of product data and easy-to-use data entry screens for Web customers are examples of a _______________ requirement. A. user interface B. processing C. control D. storage

A. user interface

Applications that use the Internet and Internet-based technologies are typically less expensive to _______________ than traditional systems.

All of the choices are correct.

The comparative _______________ of publishing and accessing multimedia business information internally via intranet websites has been one of the primary reasons for the explosive growth in the use of intranets in business.

All of the choices are correct.

In telecommunications networks, multiplexers:

Allow a single communications channel to carry multiple simultaneous data transmissions

Which of the following statements best defines a network?

An interrelated or interconnected chain, group, or system

103. (p. 157-159) The text outlines four levels of languages that allow a programmer to develop the sets of instructions that constitute a computer program. Which of the following is not one of those languages? A. Machine languages B. Graphical languages C. Assembler languages D. High-level languages

B

33.(p. 272) Instead of focusing on the information processing requirements of business functions, enterprise software focuses on supporting integrated clusters of _______________ involved in the operations of a business. A. application software B. business processes C. customer relationships D. all of the choices are correct

B

34. (p. 390) The type of information required by decision makers in a company is directly related to the level of management decision making and the amount of _______________ in the decision situations they face. A. financial risk B. structure C. variable information D. urgency

B

35. (p. 448) _______________ planning is done on a short-term basis to implement and control day-to-day operations. A. Strategic B. Operational C. Tactical D. Scenario

B

35.(p. 275) Which of the following applications focuses on the efficiency of a firm's internal production, distribution, and financial processes? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management

B

36. (p. 393) Decisions made at the tactical management level tend to be more: A. Structured B. Semi-structured C. Unstructured D. Self-structured

B

36. (p. 451) All of the following are examples of questions that would be asked when establishing an "understanding the customer" strategic vision except: A. Who are our customers? B. How can we add value for the customer with e-business services? C. How are our customers' priorities shifting? D. Who should be our target customers?

B

37. (p. 451) Which of the following is an example of questions that would be asked when establishing a "customer value" strategic vision? A. Who are our customers? B. How can we add value for the customer with e-business services? C. How are our customers' priorities shifting? D. Who should be our target customers?

B

38. (p. 451) All of the following are examples of questions that would be asked when establishing a "competition" strategic vision except: A. Who are our real competitors? B. How are our competitor's priorities shifting? C. What is our toughest competitor's business model? D. Are our competitors potential partners, supplies, or customers in an e-business venture?

B

39. (p. 393) Which of the following statements is a characteristic of the content dimension of information? A. Information is provided when it is needed. B. Information is related to the information needs of a specific recipient for a specific situation. C. Information is provided in an easy-to-understand form. D. Information is presented in a narrative, numeric, or graphic form.

B

57.(p. 280) Transaction processing systems process data in two basic ways: _______________ and _______________. A. Online processing, offline processing B. Online/real-time processing, batch processing C. Distributed processing, centralized processing D. Replicated processing, distributed processing

B

40. (p. 393) Which of the following statements is a characteristic of the form dimension of information? A. Information is based on past, present, or future time periods. B. Information is arranged in a predetermined sequence. C. All the information needed is provided. D. The information can have a broad or narrow scope, or an internal or external focus.

B

42. (p. 452) Outsourcing, growth, and customer orientation are _______________ trends that are shaping strategic business/IT planning. A. technology B. competitive imperatives C. deregulation D. customer sophistication/expectations

B

42.(p. 275) According to the text, customer relationship management focuses on: A. Developing the most efficient and effective sourcing and procurement processes B. Acquiring and retaining profitable customers via marketing and delivery of timely products and services C. Acquiring and retaining partners who can enhance the selling and distribution of a firm's products and services D. Providing a firm's employees with tools that support group collaboration and decision support

B

47. (p. 453) _______________ are the potential for new business markets or innovative breakthroughs that might expand present markets. A. Weaknesses B. Opportunities C. Threats D. Strengths

B

49. (p. 400) A major freight company has several thousand drivers. A report containing information about only those company drivers who have not taken a mandatory defensive driving course is an example of a(n) _______________ report. A. periodic scheduled B. exception C. demand D. action

B

50.(p. 278) _______________ are events that occur as part of doing business, such as sales, purchases, deposits, withdrawals, refunds, and payments A. Items B. Transactions C. Occurrences D. Processes

B

51. (p. 401-402) Online analytical processes involve all of the following analytical operations except: A. Consolidation B. Filtration C. Drill-down D. Slicing and dicing

B

51.(p. 278) A transaction is _______________ A. any exchange of goods B. any business event that must be captured and recorded C. an event requiring an exchange of money D. any business process where an exchange of resources occurs

B

52. (p. 456) The question "How many new activities must be performed as a result of the Internet?" best represents the _______________ component of e-business models. A. scope B. connected activities C. implementation D. sustainability

B

54. (p. 407) Using a decision support system involves all of the following types of analytical modeling activities except _______________ analysis. A. sensitivity B. exception C. what-if D. goal-seeking

B

54. (p. 457-458) The _______________ component of the business/IT planning process involves making strategic IT choices that reflect an information technology architecture designed to support a company's e-business and other business/IT initiatives. A. resource management B. technology architecture C. strategic development D. All of the choices are correct.

B

58. (p. 458) The _______________ component of the information technology architecture includes the many operational and specialized databases that store and provide data and information for business process and decision support. A. IT organization B. data resources C. technology platform D. applications architecture

B

59. (p. 411) Which of the following is one of the most common and useful types of data mining for marketing? A. Goal seeking analysis B. Market basket analysis C. Optimization analysis D. Sensitivity analysis

B

59.(p. 133) According to the text, operating systems are a type of _______________ program. A. CASE B. System management C. Application-specific D. General purpose

B

61.(p. 130) COTS software stands for: A. Custom off-the-shelf software B. Commercial off-the-shelf software C. Combined off-the-shelf software D. Contaminated on-the-surface software

B

62.(p. 131) According to the Real World Case, GE spends $150 million each year to purchase all of its desktop and laptop computers from how many vendors? A. Two B. One C. Ten D. Nobody is certain

B

62.(p. 281-282) Workflow systems, document sharing, and knowledge management are considered _______________ tools. A. electronic communication B. collaborative work management C. electronic conferencing D. All of the choices are correct

B

64. (p. 414) A(n) _______________ is a Web-based interface and integration of MIS, DSS, EIS, and other technologies that gives all intranet users and selected extranet users access to a variety of internal and external business applications and services. A. enterprise Resource System B. enterprise Information Portal C. executive Information System D. collaborative Information System

B

64. (p. 459) A company that measures the time it takes to process a phone call, tabulates the results of customer surveys, and tracks the number of user complains has a _______________ perspective. A. learning and growth B. customer C. financial D. business process

B

64. (p. 283) Which of the following is considered an electronic communications tool? A. Calendaring and scheduling B. Instant messaging C. Voice conferencing D. Chat systems

B

66. (p. 416) According to the text, an enterprise knowledge portal has all of the following except: A. Personalized views of news and data B. Desktop publishing tools C. Collaboration tools D. Community work areas

B

67.(p. 133) Which of the following are considered general purpose application software packages? A. Education and entertainment B. Electronic mail C. System utilities D. Programming languages

B

69. (p. 461) A company that enters the _______________ quadrant of a strategic positioning matrix is extensively networked with its customers, suppliers, and competition through Web sites, intranets, and extranets. A. global market penetration B. product and service transformation C. cost and efficiency improvements D. performance improvement in business effectiveness

B

69.(p. 133) Which of the following is not considered a system management software packages? A. Database management B. CASE tools C. System utilities D. Application servers

B

70. (p. 461) The _______________ model supplements, rather than replaces, physical distribution and marketing channels. Examples are Cisco and Dell. A. market creator B. channel reconfiguration C. channel mastery D. All of the choices are correct.

B

71. (p. 421) All of the following are attributes of intelligent behavior that AI attempts to duplicate except: A. Reasoning and learning B. Emotion C. Problem solving D. Responding quickly and successfully to new situations

B

73. (p. 422) All of the following would be considered an AI application in the robotics group except: A. Visual perception B. Neural networks C. Locomotion D. Navigation

B

73. (p. 461) The _______________ model uses the Internet to streamline the interactions among all parties in the supply chain to improve operating efficiency. A. self-service innovator B. supply chain innovator C. channel mastery D. market creator

B

73.(p. 287) Which of the following is considered a production/operations business function? A. Personnel requirements forecasting B. Process control C. Investment management D. Sales force automation

B

76. (p. 424) Which of the following represents knowledge in the form of a hierarchy or network of collections consisting of a complex package of data values describing its attributes? A. Case-based reasoning B. Frame-based knowledge C. Object-based knowledge D. Rule-based knowledge

B

76.(p. 287) Providing website visitors with chat rooms, Web forms and questionnaires, and e-mail correspondence opportunities enables companies to use _______________ to encourage customers to become involved in product development, delivery, and service issues. A. order processing B. interactive marketing C. sales force automation D. None of the choices are correct

B

77. (p. 462) A business application planning process includes consideration of IT proposals for all of the following except: A. Addressing strategic business priorities B. Building business cases C. Planning for application development D. Planning for application implementation

B

79. (p. 422) Which of the following artificial intelligence applications can learn by processing sample problems and their solutions? A. Knowledge-based systems B. Neutral networks C. Expert systems D. Fuzzy logic systems

B

79.(p. 289) Many companies view sales force automation as a way to gain _______________ in sales productivity and marketing responsiveness. A. customer loyalty B. strategic advantage C. higher profits D. demographic/psychographic customer statistics

B

80. (p. 422) Which of the following is an example of a robotics application of AI? A. Intelligent work environment that helps capture the why and the what of engineered design and decision making B. Machine-vision inspection systems for gauging, guiding, identifying, and inspecting products and providing competitive advantage in manufacturing C. Automated animation interfaces that allow users to interact with virtual objects via touch D. Situation assessment and resource allocation software for uses that range from airlines and airports to logistics centers

B

81.(p. 137) According to the text, experts predict the Web browser will be the model for: A. Internet development tools for the future B. How most people use networked computers in the future C. New graphical user interfaces in the future D. Cloud computing

B

82. (p. 456-457) According to the text case, the original Iridium organization failed because: A. the company couldn't afford to keep the system updated. B. Iridium focused on the wrong business. C. the system was not operational before the company went through a merger. D. satellite phones do not work indoors.

B

83. (p. 426) According to the text, all of the following are major limitations of an expert system except: A. It has a limited focus B. Users of the system have a high learning curve C. It is unable to learn D. It is costly to develop

B

83.(p. 137) All of these statements regarding web logs or blogs are false except: A. Blogs are websites of personal origin, not commercial. B. Each blog is a developing commentary on a particular theme that uses a dated log format. C. Blogs are declining in popularity because they are difficult to update. D. The information on a blog can only be written by the site owner.

B

84.(p. 291) Computer-integrated manufacturing systems support all of the following concepts except: A. Flexible manufacturing systems B. Inquiry processing C. Agile manufacturing D. Total quality management

B

85.(p. 292) When a manufacturer automates production of a product by installing computer systems to monitor processes and robots to do some of the assembly tasks, it is an example of ____________________. A. computer integrated manufacturing B. computer-aided manufacturing C. process control D. task control

B

88. (p. 427) A communications network expert system is an example of an expert system in the application category of: A. Decision management B. Design/configuration C. Process monitoring/control D. Diagnostic/troubleshooting

B

88. (p. 472) Which of the following is an action that would normally be taken while trying to build commitment to an impending change? A. Develop leadership capability B. Transfer knowledge and skills C. Create a compelling change story D. Implement culture change

B

89. (p. 427) All of the following would be controlled by the process monitoring/control category of expert systems except: A. Chemical testing B. Material selection C. Inventory control D. Production monitoring

B

90. (p. 472) All of the following are actions that would be taken while attempting to develop a change in vision except: A. Understand the strategic vision B. Assess the organization's readiness for change C. Create a compelling change story D. Make the vision operational and comprehensive

B

91. (p. 431) Which of the following would be considered a fuzzy logic term? A. Above ten B. Very low C. Over ten D. Between one and five

B

91. (p. 495) According to the text case, senior managers finally realized that IT personnel _______________ functional or divisional heads who are largely concerned with their own areas. A. often have a similar view of the organization to B. often have a more comprehensive view of the organization than many C. often have a less comprehensive view of the organization than many D. none of the above

B

93.(p. 296) Computer-based _______________ systems support business managers and professionals in decisions concerning the financing of a business, and the allocation and control of financial resources within a business. A. accounting information B. financial management C. marketing information D. management information

B

94. (p. 434) _______________ is commonly used by pharmaceutical and biotechnology firms to develop and observe the behavior of computerized models of new drugs and materials. A. Fuzzy logic B. Virtual reality C. A neural network D. An expert system

B

94.(p. 145-146) When a company purchases software, it has: A. Purchased the rights of ownership B. Purchased a license to use the software under the terms of the agreement C. A difficult time obtaining a license because of legality issues D. None of the choices are correct.

B

A network with 100 nodes has 9,900 possible connections. A network with 1,000 nodes has _______________ possible connections. A. 9,900,000 B. 999,000 C. 99,000 D. over one million

B

A(n) _______________ strategy is a competitive strategy by which a firm significantly expands its capacity to produce goods and services, expanding and diversifying in the market. A. alliance B. growth C. differentiation D. innovation

B

According to the text, common wisdom holds which of the following as a reason for CRM failure? A. senior management opposition B. elongated projects that take on too much, too fast. C. lack of support from software vendors D. all of the choices are correct.

B

According to the text, the Internet: A. Has limited competition world-wide B. Has created many ways to enter the market quickly, with relatively low cost C. Has created new entry barriers to competition D. Has decreased prices world-wide

B

According to the textbook case, Visa's _______________ management infrastructure was fragmented, complex, and costly to maintain. A. human resources B. financial C. marketing D. communications

B

All of the following statements about the Internet revolution are true except: A. The Internet has become the largest and most important network today, and has evolved into a global information superhighway B. The central computer system of the Internet is the most powerful communications center in the world C. The Internet is constantly expanding, as more and more businesses and other organizations join its global web D. The Internet does not have a headquarters or governing body

B

An agile company supports all the following except: A. Short-lived products and services B. Standardized products and services C. Information-rich products and services D. Niche market products and services

B

An internetworking unit that connects networks with somewhat dissimilar communications aspects is a _______________. A. bridge B. router C. gateway D. hub

B

As it relates to telecommunications media, the problem of the last mile is: A. A low voltage drop at the end of the line B. Tying into older technology C. Finding the money to complete the project D. None of the choices are correct.

B

Banks use _______________ technologies for check processing. A. voice response B. magnetic ink character recognition C. laser printer D. optical scanner

B

Business process reengineering (BPR) is often referred to as: A. Streamlining B. Reengineering C. Quickening D. None of the choices are correct.

B

Business process reengineering is best defined as: A. A key technology to reduce customer late payments B. A radical redesign of business processes to achieve improvements in cost, quality, speed, or service C. A key way to ensure successful improvement in processing D. All of the choices are correct.

B

Companies in stage _____ of a supply chain management implementation concentrate on expanding the business network of Web-enabled SCM-capable trading partners in their supply chain to increase operational efficiency and effectiveness in meeting strategic business objectives. A. one B. two C. three D. four

B

Companies like Wal-Mart extend their networks to their customers and suppliers in order to build innovative continuous inventory replenishment systems that would lock in their business. This creates a(n) _______________ information system. A. leveraged B. inter-enterprise C. intra-enterprise D. locked-in

B

Computer systems rely on all the following components except _______________. A. input B. internet C. processing D. storage

B

Develop an accurate forecast of customer demand by sharing demand and supply forecasts instantaneously across multiple tiers is an outcome of the _______________ SCM function. A. supply chain design B. collaborative demand and supply planning C. collaborative fulfillment D. supply chain event management

B

Developing a relationship with a customer such that the customer cannot afford to switch suppliers is an example of: A. Monopolistic enterprise B. Locking in the customer C. Growth strategies D. None of the above is correct

B

ERP systems can provide vital cross-functional information on business performance to managers in a very timely manner. This describes the key business benefit of: A. Enterprise agility B. Decision support C. Decreased costs D. Quality and efficiency

B

Enterprise resource planning software for a manufacturing company will typically process data from _______________. A. sales orders and inventory B. sales, inventory, shipping, and invoicing, as well as from forecasts for raw material and human resources C. accounts receivable and payable D. none of the choices are correct

B

Fiber optics are regarded as the communications media of the future, primarily due to its _______________. A. availability B. greater speed and capacity C. lower installation costs D. greater compatibility with existing communications media

B

Fundamentally, _______________ helps a company get the right products to the right place at the right time, in the proper quantity, and at an acceptable cost. A. customer relationship management B. supply chain management C. electronic data interchange D. partner relationship management

B

IPv4, the current Internet addressing protocol, can accommodate about _______________ addresses. A. 4 trillion B. 4 billion C. 4 million D. None of the above

B

In a telecommunications network, a gateway is a communications processor that: A. Is used for port switching B. Connects different communications architectures C. Connects two LANS based on the same network standards or protocols D. Connects LANs to Wi-Fi networks

B

In telecommunications networks, multiplexers: A. Convert digital signals to analog and vice versa B. Allow a single communications channel to carry multiple simultaneous data transmissions C. Include bridges, routers, hubs, and gateways, which interconnect a local area network with other local and wide area networks D. Make connections between communications circuits in a network

B

In the _______________ phase of a customer relationship, CRM account management and customer service and support tools help keep customers happy by supporting superior service from a responsive networked team of sales and service specialists and business partners. A. acquire B. enhance C. retain D. all of the choices are correct.

B

Local and global telecommunications networks are rapidly converting to digital transmission technologies. Digital technology provides all of the following benefits over analog technology except: A. Much lower error rates B. Equivalent transmission speeds C. Movement of larger amounts of information D. Greater economy

B

Most companies are building e-business and e-commerce websites to achieve all of the following goals except: A. Generate new revenue from online sales B. Increase foot traffic at brick and mortar locations C. Reduce transaction costs D. Increase the loyalty of existing customers via Web customer service and support

B

Nike's failed SCM implementation resulted in all the following except: A. $100 million in lost sales B. 50% of the Nike factories were closed C. Depressed stock prices D. Class action lawsuits

B

Offline devices: A. are directly attached to the CPU B. are not controlled by the CPU C. are controlled by the CPU D. can replace the CPU

B

Performance support, building expert networks, and leveraging organizational know-how are a function of _______________. A. document management B. enterprise intelligence C. information creation, sharing, and management D. All of the choices are correct.

B

Sharing of accurate inventory and procurement information is an outcome of the _______________ SCM function. A. supply chain design B. materials management C. collaborative fulfillment D. supply chain event management

B

Siebel Systems, Oracle, PeopleSoft, SAP AG, and Epiphany are some of the leading vendors of __________ software. A. ERP B. CRM C. PRM D. All of the choices are correct.

B

Speaker independent voice recognition systems: A. Compare speech patterns to a dictionary B. Allow a computer to understand a few words from a voice it has never heard before C. Require users to pause between each spoken word D. All of the choices are correct.

B

Tacit knowledge deals with: A. Data, documents, and things written down or stored on computers. B. "How-to" knowledge, which resides in workers. C. Using data mining techniques to capture external information. D. None of the choices are correct.

B

The first electronic digital computer was completed in the _______________. A. 1870s B. 1940s C. 1950s D. 1960s

B

The five basic categories of components in a telecommunications network include: A. Protocols, telecommunications channels, computers, telecommunications control software, and modems B. Terminals, telecommunications processors, telecommunications channels, computers, and telecommunications control software C. Terminals, telecommunications channels, computers, and modems D. Terminals, telecommunications processors, computers, modems, and protocols

B

The mechanical loom was invented by _______________. A. Blaise Pascal B. Joseph Jacquard C. Herman Hollerith D. Keith Glennan

B

The most popular pointing device used today is the _______________. A. pointing stick B. light pen C. trackball D. electronic mouse

B

The odds of selling a product to a new customer are _______________, whereas the odds of selling a product to an existing customer are _______________. A. 10 percent, 75 percent B. 15 percent, 50 percent C. 5 percent, 20 percent D. 5 percent, 85 percent

B

The second generation of computers relied on _______________. A. miniaturized circuits B. transistors C. vacuum tubes D. punch cards

B

Using an information system to make customers and/or suppliers reluctant to change to another competitor is called: A. Growth strategy B. Building switching costs C. Creating alliances D. Raising barriers to entry

B

VoIP works by digitizing a voice signal, chopping it into __________, and then sending them over a company's computer network or the Internet, much like data or email. A. bits B. packets C. characters D. waves

B

What sets the RIM BlackBerry apart from other wireless PDA solutions? A. Lower price B. It is always on and connected C. Smaller size and weight D. Longer battery life

B

Which of the following best describes a local area network? A. A network that covers a large geographic area, such as a city or state B. A network that connects computers within a limited physical area, such as inside a single building C. A network that covers no more than a single state D. A private network that uses the Internet as its main backbone

B

Which of the following is a competitive force in the marketplace? A. Cost leadership B. Competition C. Differentiation D. Alliances

B

Which of the following is a competitive strategy? A. New entries into the market B. Innovation C. Bargaining power D. Substitutes

B

Which of the following is a primary business process? A. Collaborative workflow intranet B. Targeted marketing C. Technology development D. Procurement of resources

B

Which of the following is an example of the business value of collaborative CRM? A. Provides all users with the tools and information that fit their individual roles and preferences B. Improves efficiency and integration throughout the supply chain C. Empowers all employees to respond to customer demands more quickly D. Synchronizes customer interaction with greater convenience through a variety of channels, including phone, fax, e-mail, chat, and mobile devices

B

Which of the following statements best defines a network? A. The usefulness or utility that comes from linking computers together B. An interrelated or interconnected chain, group, or system C. Computers linked together via cabling or wireless technology D. A group of individuals linked via hardware and software

B

Which of the following technologies transmits data at the fastest rate? A. Modem B. Cable modem C. ISDN D. Home satellite

B

Which of the following would occur in stage 3 of a supply chain management implementation? A. Order fulfillment B. Collaborative marketing C. Order management D. Resource allocation

B

Which of the following would perform the required mathematical and logic operations of a central processing unit (CPU)? A. Control unit B. Arithmetic-logic unit C. RAID unit D. Fuzzy logic unit

B

_______________ agility is the ability to leverage assets, knowledge, and competencies in the exploration and exploitation of innovation opportunities. A. Customer B. Partnering C. Operational D. Technological

B

_______________ are popular for process monitoring and instrumentation because these are narrow in scope and do not require demanding processing versatility. A. Workstations B. Minicomputers C. Supercomputers D. Mainframes

B

All of the following would be a focus of a human factors feasibility study except: A. Acceptance by employees B. How well a proposed system fits the company plans C. Customer and supplier acceptance D. All of the choices are factors in human factors feasibility.

B. How well a proposed system fits the company plans

Which of the following is a function of the systems analysis stage? A. Conducting a feasibility study B. Developing the functional requirements of the system C. Writing program code D. Data conversion

B. Developing the functional requirements of the system

User interface design refers to the development of: A. Programs and procedures to be used by end-users B. Display screens, forms and reports, and interactive computer user dialogs C. User training manuals D. The structure of databases and files accessible by end users

B. Display screens, forms and reports, and interactive computer user dialogs

Which of the following statements about documentation is true? A. Documentation is no longer important because commercial software has online help systems, backed up with Internet-based help systems B. Documentation serves as a method of communication among the people who develop, implement, and maintain a system C. Only program modifications and/or customizations need to be documented D. Documentation is the most expensive part of any system implementation

B. Documentation serves as a method of communication among the people who develop, implement, and maintain a system

When a company needs to evaluate competing proposals for hardware or software acquisition: A. Each evaluation factor is assigned an equal weight B. Each evaluation factor is assigned a different number of points, depending on its importance to the company C. The lowest bid is always the ultimate selection factor D. Only three things matter: cost, performance, and support

B. Each evaluation factor is assigned a different number of points, depending on its importance to the company

Which of the following are activities performed during the planning project management phase? A. Establish reporting obligations B. Identify and sequence activities C. Commit resources to specific tasks D. Meet with stakeholders

B. Identify and sequence activities

All of the following would be a focus of a legal/political feasibility study except: A. Copyright or patent infringements B. Links to grassroots political parties C. Identifying the key stakeholders and the degree to which the proposed system may affect the distribution of power D. Existing contractual obligations

B. Links to grassroots political parties

Which of the following is an example of an intangible cost? A. Employee salaries B. Loss of customer goodwill C. Reduced inventory-carrying costs D. Improved customer service

B. Loss of customer goodwill

According to the text, adaptive maintenance includes: A. Fixing software bugs and logic errors not detected during the implementation testing period B. Modifying existing functions or adding new functionality to accommodate changes in the business or operating environments C. Reducing the chances of system failure or extending the capacity of a current system's useful life D. Making changes to an existing system that are intended to improve the performance of a function or interface

B. Modifying existing functions or adding new functionality to accommodate changes in the business or operating environments

Which of the following is done during the systems maintenance stage of application development? A. Develop logical models of the current system B. Monitor, evaluate, and modify the business system as needed C. Develop logical models of new system D. Convert to the new business system

B. Monitor, evaluate, and modify the business system as needed

38.(p. 275) Which of the following applications focuses on tools that support group collaboration and decision support? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management

C

Which of the following statements most accurately applies to the concept of prototyping? A. Prototyping is not practical for large-scale projects B. Prototyping produces an actual working model of the information system needed by users C. Prototyping emphasizes getting the design right the first time D. Prototyping reduces the need for user involvement in systems development

B. Prototyping produces an actual working model of the information system needed by users

The acronym RFP stands for: A. Request for pricing B. Request for proposal C. Request for flat pricing D. Request for fixed pricing

B. Request for proposal

Which of the following are activities performed during the initiating/defining project management phase? A. Establish reporting obligations B. Securing resources C. Commit resources to specific tasks D. Meet with stakeholders

B. Securing resources

Why are business end users frequently added to system development teams? A. They have the greatest stake in a successful product B. They know a lot about the business activities that affect the company's business processes C. They are usually experienced in IS development D. They are the most likely to eliminate unnecessary documentation and steps

B. They know a lot about the business activities that affect the company's business processes

39.(p. 275) Which of the following applications aims to acquire and retain partners who can enhance the sale and distribution of a firm's products and services? A. Customer relationship management B. Enterprise resource planning C. Partner Relationship Management D. Supply chain management

C

A logical model of a current system is a blueprint of: A. How the current system does what it does B. What the current system does, without regard to how it does it C. What the system does and how it does it D. Documentation of what the new system will look like and how it will work

B. What the current system does, without regard to how it does it

Economic feasibility is concerned with: A. How well a proposed information system supports the objectives of the organization and its strategic plan for information systems B. Whether expected cost savings, increased revenue, increased profits, reductions in required investment, and other types of benefits will exceed the cost of developing and operating a proposed system C. Determining if reliable hardware and software capable of meeting the needs of a proposed system can be acquired or developed by the business in the required time D. The willingness and ability of management, employees, customers, suppliers, and others to operate, use, and support a proposed system

B. Whether expected cost savings, increased revenue, increased profits, reductions in required investment, and other types of benefits will exceed the cost of developing and operating a proposed system

The question of compatibility with hardware and software being provided by competing suppliers is a _______________ evaluation factor. A. performance B. compatibility C. technology D. connectivity

B. compatibility

A large retail company with many locations may choose to use a conversion strategy in which the new system is put in place at only one location. This method of conversion is called _______________ conversion. A. parallel B. pilot C. phased D. direct

B. pilot

Fast, automatic calculation of sales totals and shipping costs is an example of a _______________ requirement. A. user interface B. processing C. control D. storage

B. processing

Changing data in company databases to new data formats and subsets required by newly installed software is a(n) _______________ activity. A. acquisition B. software development C. documentation D. conversion

B. software development

Developing software that will not be acquired externally and making necessary modifications to software packages that are acquired is a(n) _______________ activity. A. acquisition B. software development C. documentation D. conversion

B. software development

78.(p. 136) According to the text, Web browsers are sometimes called the _______________. A. HTML client B. communication tool of the future C. universal client D. online collaboration client

C

97. (p. 452) According to the textbook case, there are four IT risk categories, which are: _______________ .

Business Operations Risks, Program Risks, Business Interruption Risks, Market Risks

104.(p. 158) Which of the following characteristics does a high-level language possess? A. They are also known as machine or assembler languages B. They are designed to be utilized by specific types of computers C. High-level instructions resemble mathematical expressions D. They are more efficient than assembler language programs

C

107.(p. 160) Object-oriented programming languages: A. Are a type of assembler language B. Separate data elements from the procedures that will be performed on them C. Use programming statements that tell objects to perform actions on themselves D. Are useful for numerical processing, but not for graphics-oriented applications

C

110.(p. 161) The acronym HTML stands for: A. High Transfer Machine Language B. High Transmission Markup Language C. Hypertext Markup Language D. Hypermedia Markup Language

C

113.(p. 173) Program editors, debuggers, and code analyzers are types of _______________. A. Unix tools B. Programming languages C. CASE tools D. Operating Systems

C

114. (p. 173) Those CASE tools that support activities early in the life cycle of a software project (e.g., requirements, design support tools) are sometimes called _______________. A. Pre-CASE tools B. Post-CASE tools C. Front-end or Upper CASE tools D. Back-end or Lower CASE tools

C

30.(p. 272) _______________ systems cross the boundaries of traditional business functions in order to reengineer and improve vital business processes all across the enterprise. A. Electronic business B. Enterprise collaboration C. Cross-functional enterprise D. Supply chain management

C

31.(p. 272) Networked enterprises view _______________ systems as a strategic way to use IT to share information resources and improve the efficiency and effectiveness of business processes A. electronic business B. enterprise collaboration C. cross-functional enterprise D. supply chain management

C

34. (p. 448) _______________ planning involves the setting of objectives and the development of procedures, rules, schedules, and budgets. A. Strategic B. Operational C. Tactical D. All of the choices are correct.

C

35. (p. 390) Which of the following statements most accurately describes the operational level of management? A. Composed of a board of directors and an executive committee of the CEO and top executives who develop overall organizational goals, strategies, policies, and objectives as part of a strategic planning process B. Composed of self-directed teams and middle managers, who develop short-and medium-range plans, schedules, and budgets C. Composed of self-directed teams or supervisory managers who develop short-range plans, according to procedures and within the budgets and schedules established for the teams and other workgroups of the organization D. None of the choices are correct.

C

37. (p. 393) Decisions made at the strategic management level tend to be more: A. Structured B. Semi-structured C. Unstructured D. All the choices are correct.

C

38. (p. 394) Deciding what product lines to develop over the next five years is an example of a(n) _______________ decision. A. structured B. semi-structured C. unstructured D. open-ended

C

40.(p. 275) As described in the text, partner relationship management focuses on: A. Developing the most efficient and effective sourcing and procurement processes B. Acquiring and retaining profitable customers via delivery of timely products C. Acquiring and retaining partners who can enhance the selling and distribution of a firm's products and services D. Providing a firm's employees with tools that support group collaboration and decision support

C

41. (p. 452) A situation where previously regulated markets are opening is a _______________ trend that is shaping strategic business/IT planning. A. technology B. competitive imperatives C. deregulation D. customer sophistication/expectations

C

43. (p. 396) Business intelligence applications are based on all of the following except: A. Personalized and Web-enabled information analysis B. Knowledge management C. Rapid information input processes D. Decision support technologies

C

43.(p. 275) According to the text, enterprise resource planning focuses on: A. Developing the most efficient and effective sourcing and procurement processes B. Acquiring and retaining profitable customers via delivery of timely products C. The efficiency of a firm's internal production, distribution, and financial processes D. Providing a firm's employees with tools that support group collaboration and decision support

C

45. (p. 453) All of the following are considered competitive strategies except: A. Differentiation B. Innovation C. New entrants D. Alliances

C

46. (p. 399) Harrah's, Capital One, and Barclays are a few of the companies using _______________ DSS models to identify customers who produce the greatest profit. A. loyalty and service B. product and service quality C. customer selection D. financial performance

C

47.(p. 277) Distribution and manufacturing are _______________ A. middleware B. legacy systems C. back office systems D. front office systems

C

48. (p. 453) _______________ are the potential for business and market losses posed by competitors, competitive forces, government, or disruptive technologies. A. Weaknesses B. Opportunities C. Threats D. Strengths

C

48.(p. 277) _______________ software can integrate the front-office and back office systems applications of a business so they work together in a seamless, integrated way A. Customer relationship management (CRM) B. Knowledge management (KM) C. Enterprise application integration (EAI) D. Supply chain management (SCM)

C

52.(p. 278-279) Transaction processing systems play a vital role in supporting the _______________ of an e-business enterprise. A. customer service B. product distribution C. operations D. systems architecture

C

54.(p. 130) Software is considered the _______________ part of the computer, whereas the hardware is considered the _______________ part. A. expensive, inexpensive B. inexpensive, expensive C. variable, invariable D. invariable, variable

C

56. (p. 408-409) What type of analysis should be used to respond to the statement, "Let's cut advertising by $1000 repeatedly so we can see its relationship to sales"? A. Goal-seeking B. Optimization C. Sensitivity D. What-if

C

56. (p. 457-458) The _______________ component of the business/IT planning process involves developing business strategies that support a company's business vision, using IT to create innovative e-business systems focusing on customer and business value. A. resource management B. technology architecture C. strategic development D. All of the choices are correct.

C

57. (p. 409) __________ analysis involves making repeated changes to selected variables until a chosen variable reaches a target value. A. What-if B. Sensitivity C. Goal-seeking D. Optimization

C

57. (p. 458) The _______________ component of the information technology architecture includes the networks, computer systems, system software, and integrated enterprise application software that provide the computing and communications platform supporting the strategic use of information technology. A. IT organization B. data resources C. technology platform D. applications architecture

C

58.(p. 133) An accounting program is an example of _______________ software. A. System B. CASE C. Application-specific D. General purpose

C

58.(p. 281) _______________ systems are cross-functional information systems that enhance communication and coordination among the members of business teams and workgroups. A. Enterprise coordination B. Enterprise integration C. Enterprise collaboration D. Transaction processing

C

61 (p. 281-282) Video-conferencing, chat systems, and discussion forums are considered _______________ tools. A. electronic communication B. collaborative work management C. electronic conferencing D. All of the choices are correct

C

61. (p. 459) Having a _______________ perspective means measuring financial performance, such as number of debtors, cash flow, or return on investment. A. learning and growth B. customer C. financial D. business process

C

62. (p. 412) According to the textbook case, Warner Home Video is using _______________ to forecast the number of video disks going to retail stores. A. online order entry statistics B. mail order catalog data C. business intelligence applications D. none of the choices are correct.

C

65. (p. 414) Internal enterprise information portal applications typically include access to all of the following except: A. E-mail and project websites B. Human resources Web self-services C. Internet news services D. Corporate databases

C

65.(p. 131-132) According to the Real World Case, which of the following is a problem with SaaS? A. SaaS is open-source software. B. GE owns the software and is responsible for making it work daily. C. GE does not own the software, it's on lease. If the vendor goes bankrupt, everything shuts down. D. SaaS refuses to license its software to GE.

C

65.(p. 283) Which of the following is considered an electronic conferencing tool? A. Calendaring and scheduling B. Instant messaging C. Data conferencing D. Paging

C

66. (p. 460) E-mail, chat systems, discussion groups, and a company website are typical examples of the _______________ quadrant of a strategic positioning matrix. A. global market penetration B. product and service transformation C. cost and efficiency improvements D. performance improvement in business effectiveness

C

68.(p. 283) _______________ tools help people accomplish or manage group work activities. A. Calendaring and scheduling B. Task and project management C. Collaborative work management D. Knowledge management

C

69.(p. 282-283) Collaborative work management tools include all of the following except: A. Calendaring and scheduling tools B. Task and project management C. Faxing, paging, and bulletin board systems D. Knowledge management

C

72. (p. 422) All of the following would be considered an AI application in the cognitive science group except: A. Expert systems B. Neural networks C. Speech recognition D. Learning systems

C

72. (p. 461) The _______________ model supplants, rather than replaces, existing physical business offices and call centers by using the Internet as a sales and service channel. A. self-service innovator B. supply chain innovator C. channel mastery D. market creator

C

73.(p. 135) Which of the following statements is not a characteristic of software suites? A. They contain software tools that can help increase productivity, collaborate with colleagues, and access intranets, extranets, and the Internet B. All components of the software use a similar graphical user interface C. There is a custom graphical user interface for each application in the suite D. They cost less than the total cost of buying the individual packages separately

C

75.(p. 287) All of the following are supported by the accounting business function except: A. General ledger B. Inventory control C. Capital budgeting D. Payroll

C

76. (p. 461) The _______________ model uses the Internet to process purchases, including the process of searching, comparing, selecting, and paying online. A. infomediary B. supply chain innovator C. channel mastery D. transaction intermediary

C

76.(p. 135) Which of the following, according to the text, are the basic components found in a comprehensive software suite? A. Word processing, spreadsheet, and accounting B. Word processing, spreadsheet, and email C. Word processing, spreadsheet, database manager, and presentation graphics D. Word processing, database manager, presentation graphics, and email

C

77. (p. 424) Which of the following represents knowledge in the form of a network of data elements including both the data and the methods/processes that act on those data? A. Case-based reasoning B. Frame-based knowledge C. Object-based knowledge D. Rule-based knowledge

C

77.(p. 136) According to the text, the most important software component for many computer users today is the once simple and limited, but now powerful and feature rich, _______________. A. word processing application B. presentation graphics package C. web browser D. database management system

C

77.(p. 288) Targeted marketing includes all of the following components except: A. Online behavior B. Content C. Credit D. Demographics/psychographics

C

78.(p. 288) Advertising and promotion efforts can be tailored to each visit to a site by an individual. This strategy is based on a variety of tracking techniques, such as Web "__________" files recorded on the visitor's disk drive from previous visits. A. Virus B. Donut C. Cookie D. Compressed

C

79.(p. 136) According to the text, which of the following is true of integrated packages? A. They have more features than software suites B. They are more powerful than software suites C. They are cheaper than software suites D. They require more disk space than software suites

C

80.(p. 136) According to the text, which of the following is not true of integrated packages? A. They require less disk space than software suites B. They have fewer features than software suites C. They are more powerful than software suites D. They are cheaper than software suites

C

81. (p. 425) Within an expert system, the _______________ contains facts about a specific subject area and rules that express the reasoning procedures of an expert on the subject. A. inference engine B. knowledge engineer C. knowledge base D. None of the choices are correct.

C

81. (p. 468) Which of the following is the biggest obstacle to knowledge management systems? A. Cost B. Immature technology C. User resistance to sharing knowledge D. Immaturity of knowledge management industry

C

82.(p. 291) Computer-integrated manufacturing systems do all the following for activities that are needed to produce products, except: A. simplify B. automate C. segregate D. integrate

C

83.(p. 291) The overall goal of computer-integrated manufacturing is to create flexible, agile, manufacturing processes that do what? A. Support the knowledge management processes of the organization. B. Create products leading specifically to high customer satisfaction. C. Efficiently produce products of the highest quality. D. Integrate well into Supply Chain information systems

C

84. (p. 470) Which of the following is part of the technology dimension of change management? A. Ownership B. Recruitment C. Enterprise architecture D. Change control

C

84.(p. 138-139) All of the following are considered characteristics of a word processing package except: A. Spell checker and thesaurus B. Grammar and punctuation correction C. Instant messaging D. Web page design capability

C

85. (p. 427) An inventory control expert system is an example of an expert system in the application category of: A. Decision management B. Selection/classification C. Process monitoring/control D. Diagnostic/troubleshooting

C

85.(p. 139) All of the following are considered characteristics of a desktop publishing package except: A. Used to print newsletters and brochures B. Imports text and graphic files from other programs C. Used for business analysis and modeling D. Used to print books and manuals

C

87.(p. 292) When a manufacturer uses computers to control ongoing physical processes, it is an example of ____________________. A. computer integrated manufacturing B. computer-aided manufacturing C. process control D. manufacturing execution systems

C

91.(p. 296) Which of the six essential accounting business systems mentioned in the text reflects changes in inventory and provides shipping and reorder information? A. Accounts payable B. Accounts receivable C. Inventory control D. Order processing

C

92. (p. 473) According to the textbook case, what was the final stage of organizational transformation for Reuters as it sought to implement global shared service centers for its financial services function? A. Organizational redesign B. Technology enablement C. Sourcing redesign D. Business process redesign

C

92.(p. 145) Cloud computing is best described as: A. Grid computing B. A style of computing where applications are provided by unknown sources "hidden in the clouds" C. A style of computing where resources are provided as a service over the Internet D. A style of computing where a network is not connected to the Internet

C

93. (p. 434) Multisensory input/output devices, such as data gloves or jumpsuits, are commonly used with _______________ systems. A. knowledge-based B. neural network C. virtual reality D. fuzzy logic

C

96. (p. 437) The use of intelligent agents is growing rapidly as a way to do all of the following except: A. Simplify software use B. Search websites on the Internet and on corporate intranets C. Make matches on Internet dating sites D. Facilitate comparison shopping among the many e-commerce sites on the Web

C

99.(p. 153) Which statement best describes open source software? A. The primary enhancements are made by teenagers B. It is a very insecure operating system because of its huge security holes C. It is more reliable than traditional software because it is subject to more rigorous code review D. It is more costly than propriety software

C

A CRM system includes all the following phases, except: A. Acquire B. Enhance C. Balance D. Retain

C

A CRM system should support the organization in which phase of the relationship between a business and its customers? A. Acquire and enhance B. Enhance and retain C. Acquire, enhance, and retain D. Acquire and retain

C

A gigabyte (GB) is used to express which of the following approximate measures? A. 1,000 byes of storage B. 1,000,000 bytes of storage C. 1,000,000,000 bytes of storage D. 1,000,000,000,000 bytes of storage

C

A sales company such as eBay would be most likely to use information technology to promote _______________. A. online stock trading B. point-of-sale inventory tracking C. online auctions D. virtual manufacturing alliances

C

A transaction database allows all of the following activities except: A. Linking employees and distribution partners to customers B. Letting customers check order history C. Giving employees a complete view of each customer D. None of these activities are supported by a transaction database.

C

A typical box of breakfast cereal takes _______________ to get from factory to supermarket, struggling its way through wholesalers, distributors, brokers, and consolidators, each of which has a warehouse. A. seven days B. 30 days C. over 100 days D. six months

C

A(n) _______________ is a standard set of rules and procedures for the control of communication in a network. A. amplification B. algorithm C. protocols D. transponders

C

A(n) _______________ strategy is a competitive strategy by which a firm develops ways to differentiate its products and services from those of its competitors. A. low cost leadership B. innovation C. differentiation D. growth

C

ATM (asynchronous transfer mode) is an emerging high-capacity __________ switching technology. A. node B. packet C. cell D. network

C

According to the text, in the world of the Internet, a firm's biggest competitor: A. Usually exists and is close in the physical world B. Usually does not exist but will emerge close in the physical world C. May not yet exist but could emerge almost overnight D. Probably exists in an overseas location

C

According to the text, which of the following is not a current use of RFID chips? A. Tagging pets and personal property B. Tagging magazines and books in public locations C. Tagging spacecraft to follow their location as they orbit the earth D. Tagging human beings

C

According to the textbook case, Telefonica realized that many smaller businesses could not afford standard EDI services, so they offered InfoEDI which allows transmission to be entered and processed _______________. A. on data exchanges B. on intranets C. on the Internet D. on extranets

C

All of the following are primary business processes, except: A. Customer relationship management B. Targeted marketing C. Technology development D. Just-in-time warehousing

C

All of the following relate to Peripherals except: A. input devices B. output devices C. CPU devices D. secondary storage devices

C

All of the following statements about a virtual private network are correct except: A. Uses the Internet as its main backbone network B. Connects the intranets of a company's different locations, or establishes extranet links between a company and its customers, suppliers, and business partners C. Relies on modem, twisted-pair wire, and router technology D. Relies on network firewalls, encryption, and other security features to provide a secure network

C

All of the following statements regarding Internet telephony are correct except: A. It is often referred to as voice over IP or VOIP B. It involves using an Internet connection to pass voice data using IP instead of a standard public telephone network C. It incurs standard long-distance telephone call charges D. It demands a very well-configured network to run smoothly

C

Although the benefits of ERP are many, the costs and risks can be considerable. Which of the following make up the bulk of the cost of implementing a new ERP system? A. Hardware B. Software C. Reengineering (developing new business processes) D. Converting data from legacy systems

C

Companies in stage _____ of a supply chain management implementation strive to optimize the development and management of their supply chains in order to meet strategic customer value and business value goals. A. one B. two C. three D. four

C

Data are processed and stored in a computer system through the presence or absence of electronic or magnetic signals to the computer. This is called a _______________ representation of data, because the computer and the media can exhibit only two states or conditions. A. Ternary B. Trinary C. Binary D. Bipolar

C

Expanding a company's product offering into global markets is an example of a(n) _______________ strategy. A. cost leadership B. differentiation C. growth D. alliance

C

ISPs are connected to one another through network _______________. A. touch points B. portals C. access points D. hubs

C

In a telecommunications network, a hub is a communications processor that: A. Connects two LANS based on the same network standards or protocols B. Connects different communications architectures C. Facilitates port switching D. None of the choices are correct.

C

In addition to the five basic competitive strategies, the text describes several key strategies implemented with information technology. Which of the following is not one of those strategies? A. Locking in customers B. Building switching costs C. Creating alliances D. Raising barriers to entry

C

In an OSI model, the _______________ layer does the routing and forwarding. A. physical B. data link C. network D. application

C

In telecommunications networks, twisted-pair wire: A. Is the least commonly used medium B. Facilitates mobile data communication C. Is used for both voice and data transmission D. Is commonly laid on the floors of lakes and oceans

C

In the 1950s, _______________ were invented and quickly replaced the thousands of vacuum tubes used in electronic computers. A. microchips B. resistors C. transistors D. miniaturized circuits

C

In the _______________ phase of a customer relationship, a business relies on CRM software tools and databases to proactively identify and reward its most loyal and profitable customers via targeted marketing programs. A. acquire B. enhance C. retain D. all of the choices are correct.

C

Increasingly, businesses are moving to _______________ CRM systems, to involve business partners as well as customers in collaborative customer services. A. operational B. analytical C. collaborative D. portal-based

C

It costs _______________ to sell to a new customer than it does to sell to an existing one. A. twice as much B. the same amount C. six times more D. half as much

C

Managing the full range of the customer relationship involves two related objectives: (1) providing the organization and all customer-facing employees with a single, complete view of every customer at every touch and across all channels, and (2) providing _________________________. A. suppliers with a single, complete view of the internal workings of the company B. distributors with a single, complete view of the company and its extended channels C. customers with a single, complete view of the company and its extended channels D. customers, suppliers, and investors with a complete view of the internal workings of the company

C

Older, traditional mainframe-based business information systems are called _______________ systems. A. historical B. standard C. legacy D. application

C

Programming that serves to "glue together" or mediate between two separate, and usually already existing, programs is known as _______________. A. front-line software B. software handshaking C. middleware D. back-line software

C

Real-time information management, communication, and collaboration are a function of _______________. A. document management B. enterprise intelligence C. information creation, sharing, and management D. All of the choices are correct.

C

Research shows that the major reason for CRM failure is: A. senior management opposition B. lack of support from software vendors C. lack of understanding and preparation D. none of the choices are correct.

C

Support the entire logistics process, including picking, packing, shipping, and delivery in foreign countries is an outcome of the _______________ SCM function. A. supply chain design B. materials management C. collaborative fulfillment D. supply chain event management

C

Telecommunications-based business applications can help a company overcome all of the following barriers to business success except: A. Time barriers B. Geographic barriers C. Human resource barriers D. Cost barriers

C

The _______________ generation of computers was characterized by further miniaturization of circuits, increased multiprogramming, and virtual storage memory. A. second B. third C. fourth D. fifth

C

The dark, magnetic stripe on the back of credit cards can hold about _______________ of information. A. 200 gigabytes B. 200 kilobytes C. 200 bytes D. Immaterial, as this technology is not yet available in the United States

C

The first generation of computers relied on _______________. A. miniaturized circuits B. transistors C. vacuum tubes D. punch cards

C

The function of an input device is: A. to interpret computer program instructions B. to transmit directions to other components of the computer system C. to convert data into electronic form for entry into a computer system D. none of the above

C

The function of an output device is to: A. Convert data into an electronic machine-readable form for direct entry into a computer system B. Perform the arithmetic and logic functions required in computer processing C. Convert electronic information produced by the computer system into human-intelligible form for presentation to end-users D. Store the data and program instructions needed for processing

C

The primary storage (main memory) of a computer is also called: A. ROM B. RAID C. RAM D. None of the choices are correct.

C

When a firm strives to find ways to help its suppliers and customers reduce their costs or to increase the costs of their competitors, it is pursuing a strategy of _______________. A. innovation B. alliance C. cost leadership D. growth

C

When customers become dependent on mutually beneficial inter-enterprise information systems, they become reluctant to switch to a company's competitors because they would incur all following costs except: A. Time B. Money C. Innovation D. Effort

C

Which of the following applies best to CD-RW optical disk technology? A. Users are unable to record their own data on the disks B. Users can record their own data, but only once C. Users are able to record and then erase the disks D. None of the choices are correct.

C

Which of the following is a secondary storage device? A. Primary memory B. Random access memory C. Magnetic disk D. The CPU

C

Which of the following statements regarding Internet2 is true? A. Internet2, like the first Internet, is open to all users B. Internet2 uses the same infrastructure as the current Internet, so it will be easy to learn C. The purpose of Internet2 is to build a roadmap that can be followed during the next stage of innovation for the current Internet D. Internet2 will someday replace the original Internet

C

Which of the following would not be considered a characteristic of supercomputer systems? A. Uses parallel, interconnected microprocessors B. Can process at speeds of billions of operations per second C. Runs the same software found on most home computers, but at faster speeds D. Designed specifically for high-speed numeric computation

C

__________ are some of the more powerful microcomputers; they are used to coordinate telecommunications and resource sharing in small LANs and in Internet and intranet websites. A. Mainframes B. Supercomputers C. Network Servers D. None of the choices are correct.

C

_______________ agility is the ability to accomplish speed, accuracy, and cost economy in the exploitation of innovation opportunities. A. Customer B. Partnering C. Operational D. Technological

C

_______________ bytes of storage are needed to represent the name "Sarah." A. Two B. Three C. Five D. Ten

C

_______________ involves the electronic exchange of business transaction documents over the Internet and other networks between supply chain trading partners (organizations and their customers and suppliers). A. Data exchange B. Intranets C. Electronic data interchange D. Data interchange

C

_______________ systems store customer account data in common databases and then make it available throughout a company via Internet, intranet, or other network links. A. Enterprise Resource Planning (ERP) B. Supply Chain Management (SCM) C. Customer Relationship Management (CRM) D. Knowledge Management (KM)

C

Prototyping involves: A. A standard systems development cycle using CASE tools B. The rapid generation of a system by IS professionals, without the need for end user input C. An interative, interactive development process with extensive end user involvement D. A fail-safe development process designed to ensure that an information system meets all user requirements, without revision

C. An interative, interactive development process with extensive end user involvement

Which of the following are activities performed during the executing project management phase? A. Establish reporting obligations B. Identify and sequence activities C. Commit resources to specific tasks D. Meet with stakeholders

C. Commit resources to specific tasks

Which of the following is done during the systems design stage of application development? A. Develop logical models of the current system B. Conduct a feasibility study C. Develop logical models of new system D. Convert to the new business system

C. Develop logical models of new system

Which of the following correctly reflects the stages of the system development life cycle? A. Investigation, analysis, implementation, and maintenance B. Analysis, design, and implementation C. Investigation, analysis, design, implementation, and maintenance D. Investigation, prototyping, design, conversion, and change management

C. Investigation, analysis, design, implementation, and maintenance

According to the text, preventative maintenance includes: A. Fixing software bugs and logic errors not detected during the implementation testing period B. Modifying existing functions or adding new functionality to accommodate changes in the business or operating environments C. Reducing the chances of system failure or extending the capacity of a current system's useful life D. Making changes to an existing system that are intended to improve the performance of a function or interface

C. Reducing the chances of system failure or extending the capacity of a current system's useful life

Systems thinking means all the following, except: A. Seeing inter-relationships among systems and processes B. Seeing processes of change among systems, rather than discrete snapshots of change C. Seeing linear cause-and-effects when events occur D. Seeing the forest and the trees in any situation

C. Seeing linear cause-and-effects when events occur

Which category of feasibility study focuses on determining if reliable hardware and software, capable of meeting the needs of a proposed system, can be acquired or developed in the required time? A. Economic B. Operational C. Technical D. Legal/political

C. Technical

A feasibility study will answer all of the following questions except: A. Does the technology exist that is necessary to implement the proposed system? B. Is the proposed system technologically, economically, and operationally feasible? C. Which brand and model of computer will be used by the proposed system? D. What impact will the proposed system have on current employees?

C. Which brand and model of computer will be used by the proposed system?

All of the following are activities performed during the executing project management phase except: A. Commit resources to specific tasks B. Add additional resources/personnel if necessary C. Writing a detailed project plan D. Initiate project work

C. Writing a detailed project plan

All of the following are activities performed during the initiating/defining project management phase except: A. Stating the problems/goals B. Securing resources C. Writing a detailed project plan D. Exploring costs/benefits with a feasibility study

C. Writing a detailed project plan

The overall process by which information systems are designed and implemented within organizations is referred to as systems _______________. A. design B. analysis C. analysis and design D. implementation

C. analysis and design

Signals for data entry errors and quick e-mail confirmation for customers are examples of a _______________ requirement. A. user interface B. processing C. control D. storage

C. control

Recording and communicating detailed system specifications, including procedures for end users and IS personnel and examples of input screens, output displays, and reports, is a(n) _______________ activity. A. acquisition B. software development C. documentation D. conversion

C. documentation

Assessing and making necessary corrections to the programs, procedures, and hardware used by a new system is a(n) _______________ activity. A. acquisition B. software development C. testing D. conversion

C. testing

113. (p. 464) A _______________ application implements a business strategy of using IT to support a total customer care focus for all areas of a company. CRM or customer relationship management

CRM or customer relationship management

Which of the following technologies transmits data at the fastest rate?

Cable modem

In a telecommunications network, a gateway is a communications processor that:

Connects different communications architectures

100.(p. 154) Open-source licensing is defined by all of the following except: A. The license must not discriminate against any person or group of persons B. The license must not contaminate other software by placing restrictions on any software distributed along with the licensed software C. The license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software D. The license must be specific to a product

D

101.(p. 153) According to the text, Linux' popularity is due to all the following except: A. Performance and price B. Flexibility and reliability C. It is Open Source software D. All of the choices are correct.

D

102.(p. 157) Machine languages are _______________. A. first-generation programming languages B. written using binary codes C. difficult languages in which to program compared to more recent languages D. All of the choices are correct.

D

105.(p. 158) Which of the following is not considered a high-level language? A. BASIC B. COBOL C. FORTRAN D. Ruby on Rails

D

109.(p. 161) All of the following are popular programming languages for developing multimedia web pages, websites, and web-based applications except: A. XML B. HTML C. Java D. COBOL

D

111.(p. 164) Which of the following statements is applicable to the Java programming language? A. It is a page description language that creates hypertext or hypermedia documents B. It inserts control codes within a document that create links to other parts of the document or to other documents anywhere on the World Wide Web C. It embeds control codes in the ASCII text of a document, which designates titles, headings, graphics, and multimedia components, as well as hyperlinks within the document D. It consists of small application programs called applets that can be executed by any computer and any operating system anywhere in a network

D

115.(p. 173) Those CASE tools that are used later in the life cycle (e.g., compilers, test support tools) are sometimes called _______________. A. Pre-CASE tools B. Post-CASE tools C. Front-end or Upper CASE tools D. Back-end or Lower CASE tools

D

32.(p. 272) Moving from mainframe-based legacy systems to integrated, cross-functional client/server applications typically involves installing _______________ software. A. enterprise resource planning B. supply chain management C. customer relationship management D. all of the choices are correct

D

37.(p. 275) Which of the following applications focuses on developing the most efficient and effective sourcing and procurement processes? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management

D

39. (p. 451) Which of the following is a question that would be asked when establishing a "value chain" strategic vision? A. Who are our customers? B. How can we add value for the customer with e-business services? C. Are our competitors potential partners, supplies, or customers in an e-business venture? D. Who would be our supply chain partners?

D

40. (p. 452) A demand for better and more convenient solutions is a _______________ trend that is shaping strategic business/IT planning. A. technology B. competitive imperatives C. deregulation D. customer sophistication/expectations

D

44. (p. 397) Decision support systems use _______________ to support the making of semi-structured business decisions. A. analytical models B. specialized databases C. a decision maker's own insights and judgments D. All of the choices are correct.

D

44.(p. 275)As described in the text, knowledge management focuses on: A. Developing the most efficient and effective sourcing and procurement processes B. Acquiring and retaining profitable customers via delivery of timely products C. Acquiring and retaining partners who can enhance the selling and distribution of a firm's products and services D. Providing a firm's employees with tools that support group collaboration and decision support

D

45. (p. 399) Dell, Wal-Mart, and Amazon are a few of the companies using _______________ DSS models to stimulate and optimize supply chain flow and reduce inventory levels. A. pricing B. product and service quality C. financial performance D. supply chain

D

45.(p. 276) Enterprise application integration (EAI) software enables users to model the business processes and interactions that should occur between: A. International divisions B. Suppliers and customers C. End users D. Business applications

D

47. (p. 400-401) The information products from an MIS take all the following forms except: A. scheduled reports. B. exception reports. C. push reports. D. pull reports.

D

49. (p. 453) _______________ are core competencies and resources where a firm is a market or industry leader. A. Weaknesses B. Opportunities C. Threats D. Strengths

D

49.(p. 277) Customer service and sales order entry are _______________ A. middleware B. legacy systems C. back office systems D. front office systems

D

50. (p. 400) With _______________, information is available whenever a manager demands it. A. push reporting B. exception reports C. periodic scheduled reports D. demand reports and responses

D

50. (p. 456) Offering customers something distinctive or at a lower cost than competitors is a component of the _______________ business model. A. revenue source B. pricing C. sustainability D. customer value

D

53. (p. 452) According to the text case, which of the following is not an IT risk? A. Program Risk B. Market Risk C. Business Operations Risk D. Technology Risk

D

53.(p. 130) Which of the following is true of off-the-shelf software? A. It is developed with the intent to sell multiple copies B. The company buying the software has no control over the specifications, schedule, or evolution of the software C. The company that develops the software is not the intended audience D. All of the choices are correct.

D

53.(p. 278) Transaction processing systems are _______________ information systems that process data resulting from the occurrence of business transactions. A. customer relationship management (CRM) B. knowledge management (KM) C. operational accounting D. cross-functional

D

54.(p. 279) Online transaction processing is considered a _______________ system because it captures and processes transactions immediately. A. customer service B. post-event C. batch processing D. real time

D

55. (p. 407-708) Which one of the following should be used to answer the question, "What would happen to sales if we cut advertising by 25 percent?" A. Goal-seeking B. Optimization C. Sensitivity D. What-if

D

55.(p. 280) The first step of the transaction processing cycle is ______________ A. inquiry processing B. document generation C. transaction processing D. data entry

D

56.(p. 130) _______________ application programs perform common information processing jobs for end users. A. Systems B. CASE C. Commercial D. General purpose

D

56.(p. 280) _______________ update the corporate databases of an organization to reflect changes resulting from day-to-day business transactions. A. Online transaction processing (OLTP) systems B. Enterprise application integration systems C. Accounting processing systems D. Transaction processing systems

D

58. (p. 409) __________ analysis is a more complex form of goal-seeking where the goal is to find the best value for a target variable given certain constraints. A. What-if B. Sensitivity C. Market basket D. Optimization

D

59. (p. 458) The _______________ component of the information technology architecture includes business applications designed as an integrated architecture of enterprise systems that support strategic business initiatives. A. IT organization B. data resources C. technology platform D. applications architecture

D

59.(p. 281) The capabilities and potential of _______________ are driving the demand for better enterprise collaboration tools in business. A. the Internet B. intranets C. extranets D. All of the choices are correct

D

Which of the following is a common application for a midrange computer? A. Industrial process-control B. Computer-aided design (CAD) C. "Front end" telecommunications D. All of the choices are correct.

D

60. (p. 411) The purpose of _______________ is to determine what products customers purchase together with other products. A. a regression decision tree B. neural networks C. cluster detection D. market basket analysis

D

60.(p. 130) Application software can be subdivided into two categories: A. COTS and POTS B. First generation and second generation C. Custom and commercial D. General purpose and function specific

D

61. (p. 411) By targeting customers who are already known to be likely buyers, the effectiveness of a given marketing effort is significantly increased—if the marketing takes the form of _______________. A. in-store displays B. catalogs C. a direct offer D. The form of the marketing does not matter.

D

62. (p. 459) Having a _______________ perspective means reflecting on the performance of key business processes. A. learning and growth B. customer C. financial D. business process

D

64.(p. 131) According to the Real World Case, GE's Global Supplier Library lacked which of the following? A. A central repository B. Multi-language capabilities C. Self-management of data D. All the above

D

65. (p. 459) The most valuable Internet applications allow companies to transcend communication barriers and establish connections that will do all of the following except: A. Enhance productivity B. Stimulate innovative development C. Improve customer relations D. Increase the quality of job applicants

D

67. (p. 416) Which of the following is an example of an unstructured data source? A. ERP database B. CRM database C. Other databases D. E-mail

D

67.(p. 283) Training in a virtual world can both _______________. A. increase costs and increase efficiency B. lower costs and lower efficiency C. increase costs and lower efficiency D. lower costs and increase efficiency

D

68. (p. 418) Artificial intelligence is a science and technology based on: A. Computer science B. Biology and psychology C. Linguistics and mathematics D. All of the choices are correct.

D

68. (p. 461) A company that enters the _______________ quadrant of a strategic positioning matrix has a high degree of internal connectivity and pressures to improve its business processes. A. global market penetration B. product and service transformation C. cost and efficiency improvements D. performance improvement in business effectiveness

D

70. (p. 421-423) AI applications can be grouped under all of the following areas except: A. Cognitive science B. Robotics C. Natural interfaces D. Linguistics

D

70.(p. 133) According to the text, which of the following describes system software? A. Used for developing new systems as required for business purposes B. Performs information processing tasks for end users C. Allows anyone to contribute to the development of a specific application D. Manages and supports operations of computer systems and networks

D

71. (p. 461) The _______________ model requires you to be among the first to market and to remain ahead of competition by continuously innovating. Examples are Amazon.com and E*TRADE. A. self-service innovator B. supply chain innovator C. channel mastery D. market creator

D

71.(p. 284) Marketing information systems can help marketing managers with: A. Customer relationship management B. Product planning and pricing C. Targeted marketing strategies D. All of the choices are correct

D

74.(p. 135) Which of the following software suites is an open-source product? A. Microsoft Office B. Lotus Smartsuite C. WordPerfect Office D. OpenOffice

D

74.(p. 287) Which of the following is supported by the marketing business function? A. Compensation analysis B. Process control C. Credit management D. Sales force automation

D

75.(p. 135) One disadvantage of software suites is that: A. Users may be paying for features that they never use B. The packages take up a lot of disk space C. Upgrade costs are often expensive D. All of the choices are correct.

D

78. (p. 424) Which of the following represents knowledge in the form of statements of fact, typically in the form of premise and conclusion? A. Case-based reasoning B. Frame-based knowledge C. Object-based knowledge D. Rule-based knowledge

D

79. (p. 464) Implementing new business/IT strategies requires managing the effects of major changes in _______________. A. business processes B. managerial roles C. employee work assignments D. All of the choices are correct.

D

80.(p. 290) _______________ information systems support the production/operations function that includes all activities concerned with the planning and control of the processes producing goods and services. A. Finance B. Management C. Marketing D. Manufacturing

D

81.(p. 291) Computer integrated manufacturing is an overall concept that stresses using computer-based systems in manufacturing to do all the following, except: A. Simplify production processes B. Automate production processes C. Integrate all production and support processes D. Integrate collaboration and communication throughout the organization

D

82.(p. 137) According to the text, e-mail: A. Is a fad that will soon disappear B. Will be replaced by instant messaging C. Works best in cloud computing D. Has changed the way people work and communicate

D

83. (p. 456-457) According to the textbook case, all of the following were causes for the failure of the Iridium project except: A. the service was too expensive. B. the phone only worked outdoors. C. the original phone was too bulky. D. the phones were never properly tested.

D

84. (p. 427) An equipment calibration expert system is an example of an expert system in the application category of: A. Decision management B. Selection/classification C. Process monitoring/control D. Diagnostic/troubleshooting

D

85. (p. 470) Implementing a new e-business application, such as customer relationship management might involve: A. Developing a change action plan B. Assigning selected managers as change sponsors C. Developing employee change teams D. All of the choices are correct.

D

86.(p. 292) When a manufacturer installs performance-monitoring information systems for factory floor operations, it is an example of ____________________. A. computer integrated manufacturing B. computer-aided manufacturing C. process control D. manufacturing execution systems

D

87. (p. 427) A suspect identification expert system is an example of an expert system in the application category of: A. Decision management B. Diagnostic/troubleshooting C. Design/configuration D. Selection/classification

D

87. (p. 472) All of the following are examples of the actions that would normally be taken while defining a change strategy except: A. Assess readiness for change B. Select the best change configuration C. Establish change governance D. Promote leadership resolve

D

88.(p. 140) Which one of the following would typically not be accomplished with presentation graphics software? A. Converting numerical data into graphics and displays B. Incorporating multimedia files into presentations C. Preparing a computerized slideshow to accompany an oral presentation D. Preparing a text report for management

D

89. (p. 472) All of the following are actions that would be taken while attempting to develop a culture of change except: A. Understand the current culture B. Design the target organization C. Implement cultural change D. Merging new employees (fresh blood) into the existing culture.

D

89.(p. 140) Presentation graphics have become more powerful in recent years and can now: A. Calculate formulas for business planning B. Enable collaboration within teams C. Organize appointments and calendars D. Prepare graphics and presentations for transfer to Web sites in HTML format

D

89.(p. 295) Accounting systems are among the ____________________, yet _______________ information systems in business. A. newest, least used B. newest, most widely used C. oldest, least used D. oldest, most widely used

D

92. (p. 432) Genetic algorithms were first used to simulate millions of years in _______________ evolution in just a few minutes on a computer. A. biological B. geological C. ecosystem D. All of the choices are correct.

D

93. (p. 473) Which of the following is the initial stage of an organizational transformation? A. Organizational redesign B. Technology enablement C. Sourcing redesign D. Business process redesign

D

96.(p. 147) Which of the following is a basic function that an operating system performs in the operation of a computer system? A. User interface and support services B. Resource and task management C. File management and utilities D. It performs all of the functions above

D

A BlackBerry ____________________. A. performs common PDA functions B. doesn't have a visible antenna C. uses the same network as most mobile phones D. All of the choices are correct.

D

A CRM system provides sales reps with the software tools and company data sources they need to _______________. A. support and manage their sales activities B. optimize cross-selling C. optimize up-selling D. All of the choices are correct.

D

A company can boost its profits _______________ by increasing its annual customer retention by only _______________. A. 8 percent, 10 percent B. 100 percent, 2 percent C. 5 percent, 58 percent D. 85 percent, 5 percent

D

A company that places a strategic focus on customer value recognizes that __________, rather than __________, has become a primary determinant in a customer's perception of value. A. service, price B. price, quality C. quality, service D. quality, price.

D

A customer-focused business can build customer value and loyalty by: A. Making a loyal customer feel special with website personalization B. Letting customers place orders directly, or through distribution partners C. Letting customers check order history and delivery status D. All of the choices are correct.

D

A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape the structure of competition in its industry. A. technological innovations B. competitive business processes C. competitive forces D. competitive strategie

D

A lack of adequate collaboration between suppliers, distributors, and ________________ departments within a company will sabotage any SCM system. A. marketing B. production C. inventory management D. All of the choices are correct.

D

A network configuration that consists of a central computer system with a number of smaller computers tied directly to it, but not to each other, is a _______________ network. A. bus B. ring C. central processing D. star

D

A network that covers a large geographic distance, such as a state or a country, is considered a _______________ network. A. client/server B. local area C. small area D. wide area

D

A serious problem of competitive advantage is that: A. It normally doesn't last very long and it isn't sustainable over the long term B. Competitors figure out how it was done and do the same thing C. A competitive advantage can become a competitive necessity D. All of the choices are correct.

D

A strategic information system can be any kind of information system that uses information technology to help an organization _______________. A. gain a competitive advantage B. reduce a competitive disadvantage C. meet strategic enterprise objectives D. all of the choices are correct

D

A(n) _______________ CRM provides all users with the tools and information they need to fit their individual roles and preferences. A. operational B. analytical C. collaborative D. portal-based

D

A(n) _______________ strategy is a competitive strategy by which a firm develops unique products or services from those of its competitors, or makes radical business changes that may alter the fundamental nature of the industry. A. alliance B. growth C. differentiation D. innovation

D

A(n) _______________ strategy is a competitive strategy by which a firm establishes new business linkages with customers, suppliers, competitors, and other companies. A. growth B. low cost leadership C. differentiation D. alliance

D

According to the text, common wisdom holds all of the following as reasons for CRM failure, except: A. Lack of senior management sponsorship. B. elongated projects that take on too much, too fast. C. Lack of end-user incentives leading to poor user adoption rates. D. All of the choices are correct.

D

According to the text, using web-enabled PDAs allows workers to realize all the following benefits except: A. Send and receive email B. Access the Web C. Exchange information with desktop PCs or Web servers D. Helps retain younger and more technologically savvy employees

D

According to the text, which of the following is not true of Mainframes? A. Mainframes usage is growing. B. Mainframes are large, fast, and powerful. C. Mainframes can be used as superservers for networks. D. All of the choices are correct.

D

According to the textbook case, it took Colgate U.S. anywhere from one to five days to acquire an order and another one to two days to process the order. After ERP, order acquisition and processing combined takes _______________. A. five days B. three days C. 24 hours D. four hours

D

All of the following are basic competitive forces discussed in the text except: A. Rivalry of competitors B. Threat of substitutes C. Bargaining power of suppliers D. Bargaining power of competitors

D

All of the following are basic competitive strategies discussed in the text except: A. Cost leadership B. Innovation C. Product differentiation D. Strategic dominance

D

All of the following are operation SCM objectives and outcomes except: A. Schedule and monitor production B. Control and adjust production C. Order/inventory tracking D. Material movement

D

All of the following are strategic SCM objectives and outcomes except: A. Establishing policies B. Designing a network C. Establishing objectives D. Scheduling production

D

All of the following can be used to counter competitive forces in the marketplace except: A. Alliances B. Growth C. Innovation D. Bargaining

D

All of the following would typically be supported by an organization's intranet information portal except: A. Communication and collaboration B. Business operations and management C. Web publishing D. Recruitment

D

All the following describe a VPN except: A. A VPN uses the Internet as its main backbone network. B. A VPN relies on network firewalls, encryption, and other Internet and intranet security features. C. A VPN uses the Internet to establish secure intranets between its distant offices and locations. D. A VPN is available for use by anyone with access to the Internet.

D

Applications that use the Internet and Internet-based technologies are typically less expensive to _______________ than traditional systems. A. develop B. operate C. maintain D. All of the choices are correct.

D

Because each supply chain process should add value to the products or services a company produces, a supply chain is frequently called a __________ chain. A. process B. service C. product D. value

D

Business process engineering includes: A. Bottom-up participation B. Short time requirements C. Improved new versions of current processes D. Radical levels of change

D

Business process redesign includes all the following, except: A. Top-down participation B. Long time requirements C. Brand new business processes D. Incremental levels of change

D

CRM software uses information technology to create an enterprisewide system that integrates and automates many of the _______________ processes with which customers interact. A. sales B. customer-serving C. marketing D. All of the choices are correct

D

CRM systems help a company identify, reward, and market to their most loyal and profitable customers through: A. Analytical marketing software B. Databases that include a customer data warehouse and CRM data mart C. Data mining tools D. All of the choices are correct.

D

CRM systems help marketing professionals do all of the following except: A. Qualify leads for targeted marketing B. Schedule direct marketing mailings C. Track direct marketing mailings D. Build up-to-date marketing brochures

D

CRM systems store customer account data in common databases and then make it available throughout a company via all the following, except: Internet, intranet, or other network links. A. Internet B. Intranet C. Network links D. Catalogs

D

Companies employing supply chain management systems can still face problems. Which of the following is not identified as a cause of SCM problems in the text? A. A lack of demand planning knowledge B. Inaccurate production or inventory data provided by a company's other information systems C. Inaccurate or overly-optimistic demand forecasts D. Too many solutions from which to choose

D

Companies that consistently offer the best value from the customer's perspective do all the following, except: A. Keep track of their customers' individual preferences B. Keep up with market trends C. Supply products, services, and information anytime, anywhere D. Offer lowest prices and fastest delivery

D

Continuous speech recognition systems: A. Compare speech patterns to a dictionary B. Allow a computer to understand a few words from a voice it has never heard before C. Require users to pause between each spoken word D. Recognize conversationally paced speech

D

EDI is still a popular data-transmission format among major trading partners, primarily to automate repetitive transactions, though it is slowly being replaced by _____-based Web services. A. HTML B. Intranet C. Web-2 D. XML

D

ERP creates a framework for integrating and improving a company's internal business processes that results in significant improvements in the quality and efficiency of: A. Customer service B. Production C. Distribution D. All of the choices are correct.

D

Which of the following is a key business use of the Internet? A. Internet websites for interactive marketing and electronic commerce B. E-mail, file transfer, and discussion forums C. Intranet links with remote employee sites D. All of the choices are correct.

D

High speed storage media _______________ than lower-speed storage media. A. cost less per byte and provide higher capacities B. cost less per byte and provide lower capacities C. cost more per byte and provide higher capacities D. cost more per byte and provide lower capacities

D

Investments in information technology that build valuable new relationships allow a firm to: A. Lock in the supplier B. Lock in the customer C. Lock out competition D. All the above

D

Monitor every stage of the supply chain process, from price quotation to the moment the customer receives the product is an outcome of the _______________ SCM function. A. supply chain design B. materials management C. collaborative fulfillment D. supply chain event management

D

Most semiconductor memory must receive a continuous supply of electricity because most semiconductor memory is volatile. This means: A. It provides virtually unlimited online storage B. Semiconductor memory is permanent C. It provides fault-tolerant storage capacity D. If the power to the memory is interrupted the contents of the memory will be lost

D

Network management package functions include all of the following except: A. Managing network resources and traffic to avoid congestion B. Providing security C. Informing network administrators of potential problems before they occur D. All of the choices are functions of network management packages.

D

One device used as an input device in a computer system is a pointing stick, which is best described as: A. A small gearshift lever set in a box B. A stationary device containing a roller ball whose top is exposed outside its case C. A pen-shaped device with a ballpoint at the end D. A small, button-like device, sometimes likened to the eraser head of a pencil

D

Open systems are a recent telecommunications trend. Open systems: A. Use common standards for hardware, software, applications, and networking B. Create a computing environment that is easily accessed by end users and their networked computer systems C. Provide greater connectivity, and a high degree of network interoperability D. All of the choices are correct.

D

Optimize plans and schedules while considering resource, material, and dependency constraints is an outcome of the _______________ SCM function. A. supply chain design B. materials management C. collaborative fulfillment D. collaborative manufacturing

D

Organizations are changing from a competitive environment in which mass-market products and services were standardized, long-lived, information-poor, and exchanged in one-time transactions to an environment in which companies compete globally with niche-market products and services that are _______________. A. individualized B. short-lived C. exchanged on an ongoing basis with customers D. All the choices are correct.

D

Security is a top concern of network management today, so telecommunications software must provide all of the following except: A. Authentication B. Encryption C. Firewalls D. Central processing

D

Telecommunications networks now play vital and pervasive roles in Web-enabled _______________. A. e-business processes B. electronic commerce C. enterprise collaboration D. All of the choices are correct.

D

The comparative _______________ of publishing and accessing multimedia business information internally via intranet websites has been one of the primary reasons for the explosive growth in the use of intranets in business. A. attractiveness B. lower cost C. ease D. All of the choices are correct.

D

The demands of today's competitive business environment are pushing manufacturers to use which of the following technologies to help them re-engineer their relationships with suppliers, distributors, and retailers? A. Intranets B. Extranets C. E-commerce Web portals D. All of the choices are correct.

D

The goal of knowledge management systems (KMS) is to help knowledge workers _______________ important business knowledge. A. create B. organize C. distribute D. All of the choices are correct.

D

The most common output trend is _______________. A. printed reports and documents B. audio responses C. voice responses D. video displays

D

The practice of becoming the largest purchaser of products from a given supplier is an example of: A. Cost leadership B. Growth strategies C. Differentiation D. Locking in the supplier

D

To communicate over a network, each PC usually has a circuit board called a _______________. A. printed circuit card B. modem C. router D. network interface card

D

Traditional business improvement includes all the following, except: A. Bottom-up participation B. Short time requirements C. Improved new versions of current processes D. Radical levels of change

D

Traditional business improvement includes: A. Top-down participation B. Long time requirements C. Brand new business processes D. Incremental levels of change

D

Traveling salespeople and those at regional sales offices can use the Internet, extranets, and other networks to transmit customer orders from their laptop or desktop PCs, thus breaking _______________ barriers. A. physical B. competition C. structural D. geographic

D

When IP was first standardized, the specification required that each system attached to the Internet be assigned a unique, _______________ Internet address value. A. 4-bit B. 8-bit C. 16-bit D. 32-bit

D

Which of the following best describes optical scanning devices? A. Hand-held wands used to read data on merchandise tags B. Photoelectric devices that scan data C. Converts reflected light patterns into electronic impulses, which are accepted as input into the computer system D. All of the choices are correct.

D

Which of the following has been a major cause of failure in ERP projects? A. Business managers and IT professionals underestimating the complexity of the planning, development, and training needed B. Trying to do too much too fast C. Insufficient training in the new work tasks required by the ERP system D. All of the choices are correct.

D

Which of the following is an advantage of RAID? A. It provides virtually unlimited online storage B. It provides high access speeds C. It provides fault-tolerant storage capacity D. All of the choices are advantages.

D

Which of the following is not a strategy of a virtual company? A. Share infrastructure and risk with alliance partners B. Link complementary core competencies C. Migrate from selling products to selling solutions D. Increase concept-to-case time

D

Which of the following is not a valid storage medium? A. Paper documents B. Optical disks C. Magnetic tape D. All of the choices are valid storage media.

D

Which of the following would not fit the typical classification of a computer peripheral? A. Monitors and printers B. Scanners and hard disk drives C. CD-ROM drives and backup systems D. Central processing unit

D

Which one of the following statements regarding a telecommunications network is false? A. A protocol is a standard set of rules and procedures for the control of communications in a network B. The communications control information needed for "handshaking" between terminals and computers is a protocol C. A protocol deals with the control of data transmission/reception in a network D. Protocols are not applicable to hardware, such as cables and modems

D

A feasibility study is a preliminary study to investigate the information needs of prospective users and is used to determine the proposed system's _______________. A. resource requirements B. costs and benefits C. feasibility D. All of the choices are correct.

D. All of the choices are correct.

Control measures for end user applications vary greatly depending upon the: A. Number and nature of the users of the application B. Scope and duration of the application C. Nature of the data involved D. All of the choices are correct.

D. All of the choices are correct.

Software packages that are _______________ aren't a good choice at any price. A. slow B. hard to use C. poorly documented D. All of the choices are correct.

D. All of the choices are correct.

The systems implementation stage of application development involves: A. Hardware and software acquisition B. Conversion of data resources C. Testing of programs and procedures D. All of the choices are correct.

D. All of the choices are correct.

Which of the following is recognized as an idea to spur end user Web development? A. Spur creativity B. Make users comfortable C. Set limits D. All of the choices are correct.

D. All of the choices are correct.

Which of the following statements applies to end user development? A. IS professionals play a consulting role, while end users do their own application development B. Focus should be on the fundamental activities of any information system: input, processing, output, storage, and control C. Users develop new or improved ways to perform your jobs without the direct involvement of IS specialists D. All of the choices are correct.

D. All of the choices are correct.

According to the text, perfective maintenance includes: A. Fixing software bugs and logic errors not detected during the implementation testing period B. Modifying existing functions or adding new functionality to accommodate changes in the business or operating environments C. Reducing the chances of system failure or extending the capacity of a current system's useful life D. Making changes to an existing system that are intended to improve the performance of a function or interface

D. Making changes to an existing system that are intended to improve the performance of a function or interface

Which of the following factors is related to technical feasibility? A. Customer acceptance B. Governmental restrictions C. Cost savings D. Network reliability

D. Network reliability

All of the following are activities performed during the closing project management phase except: A. Install all deliverables B. Release project resources C. Document the project D. Writing a detailed project plan

D. Writing a detailed project plan

All of the following are activities performed during the controlling project management phase except: A. Create reporting tools B. Compare actual progress with baseline C. Establish reporting obligations D. Writing a detailed project plan

D. Writing a detailed project plan

Switching from the use of a present system to the operation of a new or improved system is a(n) _______________ activity. A. acquisition B. software development C. documentation D. conversion

D. conversion

Dealing with patents, copyrights, and licensing for a proposed system is related to _______________ feasibility. A. economic B. technical C. operational D. legal/political

D. legal/political

The _______________ feasibility assessment focuses on the degree to which the proposed development project fits with the existing business environment and objectives, with regard to development schedule, delivery date, corporate culture, and existing business processes. A. technical B. legal/political C. economic D. operational

D. operational

In analyzing a potential application, you should focus first on the _______________ to be produced by the application. A. input B. processing C. storage D. output

D. output

When analyzing a potential application, the proper order of actions should be: A. input, output, processing B. processing, output, input C. input, processing, output D. output, input, processing

D. output, input, processing

Fast retrieval and update of data from product, pricing, and customer databases is an example of a _______________ requirement. A. user interface B. processing C. control D. storage

D. storage

Educating management, end users, customers, and other business stakeholders to develop user competencies is a(n) _______________ activity. A. acquisition B. testing C. documentation D. training

D. training

17.(p. 139-140) When a spreadsheet is used to answer "what if" questions, the user must reenter the values and formulas into the cells in order to see the impact of the changes.

FALSE

10.(p. 279)Online transaction processing (OLTP) is generally considered a post-event system because transactions are entered nightly

FALSE

13.(p. 137) Instant messaging is quite popular in today's society, outside of the workplace. It is not yet being used in the business environment.

FALSE

14.(p. 137) A weblog is a website on which a company advertises its products in a very brief, yet commercial way.

FALSE

15.(p. 137-138) Blogs are online diaries from a particular point of view. They are personal in origin, not commercial.

FALSE

16.(p. 283) Collaborative work management tools help people accomplish or manage individual work activities

FALSE

17.(p. 284) The term interactive marketing has been coined to describe a supplychainmanagement process that is based on using the Internet, intranets, and extranets to establish a two-way transactions between a business and its customers

FALSE

19.(p. 140) Presentation graphics packages have gotten more powerful in recent years, but not even the top-end packages enable end users to publish to the World Wide Web.

FALSE

19.(p. 289) Many companies view sales force tracking as a way to gain a strategic advantage in sales productivity and marketing responsiveness

FALSE

2.(p. 130) Unlike hardware, which has several categories, software has only one category—computer applications.

FALSE

2.Networked enterprises view cross-functional enterprise systems as a strategic way to use IT to centralize information resources

FALSE

21.(p. 143) Web sites built with collaborative development tools can integrate a wide variety of individual applications in order to increase team productivity. However, they do little to improve individual productivity.

FALSE

21.(p. 291) The overall goal of computer-integrated manufacturing is to segregate the production and support processes

FALSE

25.(p. 143) One key disadvantage of an application service provider is that a "pay as you go" structure is often more expensive than what a company would pay if it had purchased the software outright.

FALSE

26.(p. 295)Accounting information systems are among the newest, yet are the most widely used information systems in business

FALSE

28.(p. 146) Contrary to what many believe, when an individual or a company buys a software application, they have actually purchased the rights of ownership.

FALSE

3. Partner relationship management concentrates on the efficiency of a firm's internal production, distribution, and financial processes

FALSE

30.(p. 147) Purchasing an operating system is an unnecessary expense because off-the-shelf application software packages contain a built-in operating system.

FALSE

34.(p. 157) Performance monitor programs are designed to monitor the performance and usage of computer systems in order to achieve system and data security.

FALSE

35(p. 157) Performance monitor programs are designed to monitor and control the use of computer systems, provide warning messages, and record evidence of unauthorized use of computer resources.

FALSE

36.(p. 157-158) Machine languages are high-level languages whose instructions closely resemble human language or the standard notation of mathematics.

FALSE

37.(p. 158) When high-level programming languages are used, programmers must learn a different language for each type of computer that uses the program.

FALSE

39.(p. 160) A key characteristic of object-oriented programming languages is that they separate the data elements from the procedures or actions that will be performed upon that data.

FALSE

4.(p. 130) COTS software is custom, off-the-shelf software that is purchased and then modified to meet the needs of the customer.

FALSE

4.(p. 275)Knowledge management applications focus on providing a firm's employees with tools that support groupcollaboration, decisionmaking, and human resources management

FALSE

41.(p. 161) Of the different programming languages, third-generation COBOL is the most widely used today.

FALSE

42.(p. 161) HTML, XML, and COBOL are all popular programming languages for building multimedia web pages, websites, and web-based applications.

FALSE

44.(p. 162) XML-enabled search software can easily find the exact product you specify if the product data at a website is labeled with identifying HTML tags.

FALSE

46.(p. 164) Microsoft's .NET is a relatively new collection of programming support for what are known as Web services, the ability to use the Web without limit.

FALSE

48.(p. 167) A language compiler translates computer programs written in another programming language into the computer's own machine language instruction codes.

FALSE

51.(p. 153) Open source software is typically not encumbered by licensing restrictions.

FALSE

6.(p. 276) Enterprise application integration (EAI) software provides legacysystems that perform data conversion and coordination, and application communication and messaging services

FALSE

In frequency division multiplexing (FDM), a multiplexer effectively divides one high-speed channel into multiple high-speed channels.

FALSE A multiplexer divides a high-speed channel into multiple slow-speed channels.

An extranet is a network inside a company that uses Internet technologies to provide a private Internet-like network environment to the firm.

FALSE An intranet does this.

Booking a reservation over the Internet costs an airline about 50 percent less than booking the same reservation over the telephone.

FALSE Booking a reservation over the Internet costs an airline about 90 percent less than booking the same reservation over the telephone.

In the pure peer-to-peer architecture of P2P networking, the P2P software connects your PC to a central server with the directory of all users of the network.

FALSE In the central server architecture of P2P networking, the P2P software connects your PC to a central server with the directory of all users of the network.

Intranets seldom have much impact on communications and collaboration within an enterprise.

FALSE Intranets can significantly improve communications and collaboration within an enterprise.

Middleware is an essential component of any IT infrastructure because it allows disparate systems to be isolated.

FALSE Middleware is an essential component of any IT infrastructure because it allows disparate systems to be joined together in a common framework.

Multiplexers work to increase the number of transmissions possible, while also increasing the number of physical data channels.

FALSE Multiplexers work to increase the number of transmissions possible without increasing the number of physical data channels.

Today, ordinary telephone wire is the least used medium for telecommunications.

FALSE Ordinary telephone wire is still the most widely used medium for telecommunication.

PCS phone systems cost substantially more to operate and use than cellular systems, but have lower power consumption requirements.

FALSE PCS phone systems cost substantially less to operate and use than cellular system, and they have lower power consumption requirements.

The Internet has a central computer system that is the most powerful in the world.

FALSE The Internet has no central computer system or telecommunications center.

The Internet, as originally conceived in the late 1960s, was a pure peer-to-peer system.

FALSE The Internet was conceived as a peer-to-peer system.

The network-centric concept views the PC as the central computing resource of any computing environment.

FALSE The network-centric concept views networks as the central computing resource of any computing environment.

The telecommunications industry has changed from a deregulated market to government-regulated monopolies.

FALSE The opposite is true; the telecommunications industry has gone from government-regulated monopolies to a deregulated market.

A change in technology often induces social, political, and economic system changes long before a critical mass of users is reached.

FALSE Until a critical mass of users is reached, a change in technology only affects the technology.

113. (p. 424) _______________ represents knowledge in the form of a hierarchy or network of collections consisting of a complex package of data values describing its attributes.

Frame-based knowledge

106. (p. 409) __________ analysis reverses the direction of the analysis done in what-if and sensitivity analyses.

Goal-seeking

112. (p. 464) _______________ is a process that carries out the plans for changes in business/IT strategies and applications that were developed during the planning process.

Implementation

In telecommunications networks, twisted-pair wire:

Is used for both voice and data transmission

All of the following statements regarding Internet telephony are correct except:

It incurs standard long-distance telephone call charges

114. (p. 424) _______________ represents knowledge in the form of a network of data elements including both the data and the methods/processes that act on those data.

Object-based knowledge

102. (p. 453) _______________ are the potential for new business markets or innovative breakthroughs that might expand present markets.

Opportunities

All of the following would typically be supported by an organization's intranet information portal except:

Recruitment

115. (p. 424) _______________ represents knowledge in the form of statements of fact, typically in the form of premise and conclusion.

Rule-based knowledge

95. (p. 448) _______________ planning deals with the development of an organization's mission, goals, strategies, and policies. Corporations may begin the process by developing a shared vision.

Strategic

101. (p. 453) _______________ are core competencies and resources where a firm is a market or industry leader.

Strengths

The text lists five basic categories of components in a telecommunications network. One of these categories includes telecommunications processors, which:

Support data transmission and reception between terminals and computers

Compared to coaxial cable, standard twisted-pair telephone lines:

Support lower data transmission speeds

12.(p. 136) Web browsers are becoming the universal software platform from which end users launch into information searches, multimedia file transfer, discussion groups, and many other Internet, intranet, and extranet applications.

TRUE

12.(p. 280)Transaction reports can take the form of a transaction listing, such as a payroll register

TRUE

13.(p. 281) Enterprise collaboration systems are cross-functional e-business systems that enhance communication, coordination, and collaboration among the members of business teams and workgroups

TRUE

14.(p. 283)Training in a virtual world is effective, but obstacles include both technology and culture

TRUE

15.(p. 283) Training in a virtual world can both lower costs and increase efficiency

TRUE

23.(p. 143) Application service providers rely on the Internet to provide their services to customers.

TRUE

23.(p. 292) A processcontrol computer system uses special sensing devices that measure physical phenomena, such as temperature or pressure changes

TRUE

24.(p. 143) A company without enterprise resource planning expertise can call upon an application service provider to deliver, support, and maintain an ERP for a fixed monthly fee.

TRUE

24.(p. 292) Human resource information systems are designed to support most common human resource functions, such as recruitment, selection, hiring, job placement, performance appraisals, and training over corporate intranets

TRUE

25.(p. 292-294) Human resource management applications offered over corporate intranets can enable managers and other employees to perform HRM tasks with little intervention by the HRM department

TRUE

26.(p. 145) Regardless of whether a software application is purchased off the shelf or is accessed via an ASP, it must be licensed for use.

TRUE

27.(p. 145-146) Software licensing is a complex topic that involves considerations of the special characteristics of software in the context of the underlying intellectual property, including copyright, trademark, and trade secrets.

TRUE

29.(p. 146) As a software purchaser, the license you agree to typically prohibits reverse engineering or modifying the software.

TRUE

3.(p. 130) General purpose application programs perform common information processing jobs for end users.

TRUE

32.(p. 153) An advantage of open source software is that programmers can read and modify the source code, so they can improve it, adapt it, and fix bugs.

TRUE

33.(p. 156) Utility programs are used to perform miscellaneous housekeeping and file conversion functions, including data backup, data recovery, virus protection, data compression, and file defragmentation.

TRUE

38.(p. 159) Most fourth-generation programming languages encourage programmers and users to specify the results they want, while the computer determines the sequence of instructions that will accomplish those results.

TRUE

40.(p. 160) When programming in an object-oriented language, an example of an object would be a set of data about a customer's account and the operations that are performed on the data.

TRUE

43.(p. 162) Extensible Markup Language (XML) classifies data in such a way that it makes website information easier to search, sort, and analyze.

TRUE

47.(p. 165) Web services can link key business functions for the exchange of data in real time within the Web-based applications a business might share with its customers, suppliers, and other business partners.

TRUE

49. (p. 167) In programming packages, a compiler is used to translate high-level language statements into machine language instructions.

TRUE

5.(p. 132-133) The specifications and functionality of custom software are controlled or retained by the developing organization.

TRUE

5.(p. 266) Enterprise application integration (EAI) software enables users to model the business processes and interactions that should occur between business applications

TRUE

50.(p. 168) Software developers can use CASE tools at different stages of the software development processes.

TRUE

52.(p. 154) Whatever a person builds using open-source software, he or she must provide the same capabilities to anyone else under the same open-source license terms.

TRUE

6.(p. 133) System software are programs that manage and support the operation of computer systems and networks.

TRUE

7.(p. 133) An accounting program is an example of application-specific software.

TRUE

9.(p. 135) One of the biggest advantages offered by software suites is that all the programs within the suite use a similar graphical user interface (GUI). This gives them the same look and feel, and makes them easier to learn and use.

TRUE

9.(p. 278-279) Transaction processing systems play a vital role in supporting the operations of an e-business enterprise

TRUE

A Bluetooth chip is designed to replace cables; it takes the information normally carried by a cable and transmits it to a receiver Bluetooth chip.

TRUE

A client/server network of several interconnected local area networks can replace a large mainframe-based network with many end user terminals.

TRUE

An intranet is a network inside an organization that uses Internet technologies to provide an Internet-like environment within the enterprise.

TRUE

Business-to-business electronic commerce websites can be used by businesses to establish strategic relationships with their customers and suppliers.

TRUE

The five basic categories of components in a telecommunications network include:

Terminals, telecommunications processors, telecommunications channels, computers, and telecommunications control software

Which of the following statements regarding Internet2 is true?

The purpose of Internet2 is to build a roadmap that can be followed during the next stage of innovation for the current Internet

Metcalfe's law states that:

The usefulness or utility of a network equals the square of the number of users

103. (p. 453) _______________ are the potential for business and market losses posed by competitors, competitive forces, government, or disruptive technologies.

Threats

100. (p. 394) _______________ decisions involve situations where it is not possible to specify in advance most of the decision procedures to follow.

Unstructured

122. (p. 468) _______________ is the biggest obstacle to knowledge management systems.

User resistance to sharing knowledge

117. (p. 434) _______________ involves using multisensory human-computer interfaces that enable human users to experience computer-simulated objects, spaces, activities, and "worlds" as if they actually exist.

Virtual reality

100. (p. 453) _______________ are areas of substandard business performance compared to others in the industry or market segments.

Weaknesses

A data warehouse contains data that have been processed in all the following ways except: A. Separated

a

A is an overall logical view of the relationships among the data elements in a database. A. schema

a

According to the textbook case, on cars: A. Cars are a goldmine of consumer information

a

Database development involves defining and organizing the of the data needed to build a database. A. structure

a

Databases contain data elements that describe both entities and the among entities. A. relationships

a

From a logical point of view, a(n)is the smallest data element that can be observed and manipulated. A. character

a

The tables in a relational database are flat files which have rows and columns. Each column represents a in the file. A. field

a

Using a relational database, a user can temporarily combine two or more tables so that he/she can see relevant data in a form that looks like it is in one big table. This is the operation. A. join

a

Variable-length records contain: A. both a variable number of fields and variable field lengths.

a

Which of the following is true of data in a data warehouse? A. Data in operational databases is ever

a

115. (p. 464) CRM is designed to implement a business strategy of using IT to support _______________ for all areas of a company.

a total customer care focus

Database management packages based on the model can link data elements from various tables to provide information to users. B. relational

b

Which database model allows many-to-many relationships among records so that a data element can be accessed by following one of several paths? B. Network

b

Which of the following is true of data marts? B. They are a subset of a data warehouse.

b

_______________ is the most commonly used database application for the PC.B. Microsoft Access

b

105. (p. 458-48-59) BSC is a method for measuring a company's activities in terms of its vision and strategies. BSC is an acronym for _______________.

balanced scorecard

A(n) _______________ is an integrated collection of logically related data elements. C. database

c

According to the textbook case, the innovation of the open-source product Hadoop is C. that it has no proprietary predecessor

c

All of the following contribute to problems when using a file management approach except: C. Data independence

c

Early mainframe DBMS packages used the _______________ structure, in which all records are dependent and arranged in multilevel structures, consisting of one root record and any number of subordinate levels. C. hierarchical

c

Many end users have trouble correctly phrasing database language search queries, so most end-user DBMS packages now offer methods. C. GUI

c

The _______________ database structure is considered one of the key technologies of a new generation of Web-based applications. C. object-oriented

c

The basic form of a SQL query is: C. SELECT ¼ FROM ¼ WHERE ¼

c

The model is the most widely used database structure today. C. relational

c

The operation is used to create a subset of the columns contained in the temporary tables created by the select and join operations. C. project

c

The physical design stage of database development: C. Determines the data storage structures and access methods

c

What type of databases are employees using when they access online data banks, whether those data banks are free or paid for through subscriptions? C. External databases

c

Which database structure works effectively with complex data types, such as video clips, audio segments, and other subsets of Web pages, and is considered one of the key technologies of Web-based applications? C. Object-oriented

c

Which of the following statements concerning the replication and duplication process for updating distributed databases is correct? C. Replication is the more complicated process because it must find changes in each distributed database and make appropriate changes to make each database identical

c

114. (p. 464) Up to 75 percent of CRM projects fail to meet their objectives, often as a result of sales force automation problems and "unaddressed _______________ issues" related to the sales staff.

cultural

The use of an intranet in an organization _______________.

can significantly improve communications and collaboration within an enterprise.

ATM (asynchronous transfer mode) is an emerging high-capacity __________ switching technology.

cell

120. (p. 471) The change management model presented in the text suggests that the business vision created in the strategic planning phase should be communicated in a compelling _______________ to the people in the organization.

change story

107. (p. 462) The process of _______________ means both the CEO and the CIO manage the development of complementary business and IT strategies to meet customer value and business value vision.

coadaptation

106. (p. 461) Widespread internal use of Internet-based technologies, such as intranets and extranets, can substantially improve information sharing and _______________ within the business and with its trading partners.

collaboration

116. (p. 468) A basic requirement of managing business change is getting the involvement and _______________ of top management and all stakeholders affected by the planning processes.

commitment

Database administrators and database design analysts work with end users and systems analysts to do all of the following except: D. Enter live data into the system until it has proven to be reliable

d

Database management involves the use of database management software to control how databases are _______________. D. All of the choices are correct.

d

Fixed-length records contain: D. both a fixed number of fields and fixed field lengths.

d

In the relational database model, all data elements within the database are viewed as being stored in the form of simple two-dimensional tables, sometimes referred to as D. relations

d

Object technology allows designers to do all of the following except: D. Substantially reduce the file size of designs

d

Operational databases store the detailed data needed to support the business processes and operations of a company. They are also called D. All of the choices are correct.

d

The _______________ stage of database development translates the conceptual models into the data model of a DBMS. D. logical design

d

Which of the following is a legitimate use for data mining? D. All of the choices are correct.

d

_______________ are used to model the relationships among the many entities involved in business processes. D. Subschema diagrams

d

_______________ databases have become the most popular structure for analytical databases that support online analytical process (OLAP) applications, in which fast answers to complex queries are expected. D. Multidimensional

d

n mainframe and server computer systems, the database management system controls the of the databases of computer-using organizations. D. All of the choices are correct.

d

97. (p. 390) As companies migrate toward responsive e-business models, they are investing in new __________-driven decision support application frameworks that help them respond rapidly to changing market conditions and customer needs.

data

108. (p. 413) The ability to _______________ in an EIS allows executives to quickly retrieve displays of related information at lower levels of detail.

drill-down

109. (p. 416) For many companies, enterprise information portals are the entry to corporate intranets that serve as their knowledge management systems. That's why such portals are called _______________ portals by their vendors.

enterprise knowledge

An _______________ is a network link that uses Internet technologies to interconnect the intranet of a business with the intranets of its customers, suppliers, or other business partners.

extranet

119. (p. 428) Hundreds of rules may be required to capture the assumptions, __________, and reasoning that are involved in even simple problem situations.

facts

99. (p. 390) Information has three dimensions: time, content, and _______________.

form

116. (p. 431) Data that are incomplete or ambiguous are often referred to as __________ data.

fuzzy

Traveling salespeople and those at regional sales offices can use the Internet, extranets, and other networks to transmit customer orders from their laptop or desktop PCs, thus breaking _______________ barriers.

geographic

Fiber optics are regarded as the communications media of the future, primarily due to its _______________.

greater speed and capacity

117. (p. 469) Systems _______________ are consulting firms or other outside contractors who assume the responsibility for developing and implementing a new e-business application, including designing and leading its change management activities.

integrators

101. (p. 398) Unlike management information systems, decision support systems rely on __________ bases, as well as databases as vital system resources.

model

In an OSI model, the _______________ layer does the routing and forwarding.

network

To communicate over a network, each PC usually has a circuit board called a _______________.

network interface card

121. (p. 430) Neural networks are computing systems modeled after the brain's meshlike network of interconnected processing elements, called _______________.

neurons

107. (p. 412) The first goal of executive information systems was to provide top executives with immediate and easy access to information about a firm's critical success factors (CSFs), that is, key factors that are critical to accomplishing an organization's _______________ objectives.

strategic

98. (p. 390) Typically, a board of directors and an executive committee of the CEO and top executives develop overall organizational goals, strategies, policies, and objectives as part of a _______________ planning process.

strategic

120. (p. 428) The easiest way to develop an expert system is to use an expert _______________ as a developmental tool

system shell

122. (p. 434) Virtual reality becomes _______________ when users, who can be anywhere in the world, use VR systems to work alone or together at a remote site.

telepresence

104. (p. 407) In _______________ analysis, a user makes changes to variables, or relationships among variables, and observes the resulting changes in the values of other variables.

what-if

A network that covers a large geographic distance, such as a state or a country, is considered a _______________ network.

wide area


Set pelajaran terkait

Mc Graw Hill Smartbook 17 - Accouting II

View Set

Chapter 1 Introduction to Corporate Finance

View Set

Med Sure Chapter 62: Managements of Patients With Burn Injury second

View Set

Physics - Chapter 8: Rotational Motion

View Set

PHARM - Neuro practice questions

View Set

Psych Chapter 7 Online Quiz and Learning Curve

View Set

Integrated Chinese Lesson 6 Dialoague 2

View Set