ISA 235 Class Prep Quiz Questions
Which of the following value chain activities involves transforming raw materials into goods and services? -Outbound Logistics -Marketing and Sales -Services -Inbound Logistics -Operations
Operations
True or False: The critical path in a Program Evaluation and Review Technique (PERT) is the longest path through the project ensuring all critical tasks are completed from start to finish.
False
True or False: https://www.miami.miamioh.edu/ (Links to an external site.) is an example of a domain name while miami.miamioh.edu is an example of a Universal Resource Locator (URL)
False
I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." The competitor made significant in-roads into this market by offering three varieties of ice creams. I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of "Orange peel ice cream." Which competitive strategy is I-scream-4 Ice Cream implementing?
Focused product differentiation
RFID technology can be used in which of the following situations? -In toll roads to collect payments from passing cars -In cars as antitheft system -To track patient locations to facilitate emergency situations and ensure safety -In large retailers to speed customer checkout process
In all situations listed here
True or False: A satellite communication system uses wireless WAN technology to provide worldwide communication capabilities, including voice, videoconferencing, and Internet access.
True
True or False: Adwords such as "denim shorts" or "coding classes" are keywords that advertisers choose to pay for and appear as sponsored links on the search engine results pages.
True
True or False: Buying a computer from Dell using their online portal is an example of Ecommerce while Dell collaborating with its retailers online is referred as Ebusiness.
True
True or False: Information silo occurs when there is a lack of communication between the business units (functions and departments), making it difficult to work cross-functionally.
True
True or False: It is not necessary for a database table to have a foreign key.
True
True or False: Metadata provides details about data such as date created and data type of each field.
True
True or False: Reading the bar code of each purchased product in a check-out counter is an example of Online Transaction Processing (OLTP).
True
True or False: Secure sockets layer (SSL) ensures that all data transmission remains private by establishing an encrypted link between a web server and a browser.
True
True or False: Service oriented architecture (SOA) promotes a scalable and flexible enterprise architecture that can implement new or reuse existing MIS components, creating connections among disparate applications and systems.
True
True or False: Skype relies on peer-to-peer (P2P) network to make calls without using an expensive centralized infrastructure.
True
True or False: Sustainable, or green, MIS describes the production, management, use, and disposal of technology in a way that minimizes damages to the environment.
True
True or False: The number of daily ATM transactions is an example of efficiency while the number of new customers joined due to the ATM's ease of use can be considered as the effectiveness of the ATM initiative.
True
Name and define the Five Forces from Porter's Five Forces Model:
-Buyer Power: the power of customers to drive down prices -Supplier Power: the power of suppliers to drive up prices of materials -Threat of Substitute Products or Services: the power of customers to purchase alternatives -Threat of New Entrants: the power of competitors to enter a market -Rivalry Among Existing Competitors: the power of competitors
Authentication
A method for confirming users' identities
Information Silo
An information management system that is unable to freely communicate with other information management systems. Communication within an information silo is always vertical, making it difficult or impossible for the system to work with unrelated systems.
A marketing project requires the sales team to be able to forecast the customer demand however, adding this application will overshoot the project budget by 30%. At what phase of the system development life cycle (SDLC) will the project manager realize that this project is infeasible given the current budget and business requirement? -Development -Planning -Design -Implementation -Analysis -Testing -Maintenance
Analysis
Which of the following does NOT correctly represent the disruptive technology in the supply chain? -Drones use electronic tags and labels to identify objects wirelessly and supports material management -RFID finds its use in container tracking and highway toll collection -Robotics focusses on creating artificial intelligence devices that can be used in warehouses for picking, packing, and managing materials. -3D printing has a potential to disrupt manufacturing and procurement processes by bringing production closer to users.
Drones use electronic tags and labels to identify objects wirelessly and supports material management
True or False: A sales representative generated the sales information for each product, for each customer, at each location, for each day while a general manager created a quarterly sales report by each department, across all products. The general manager report consists of a fine granular data while the report created by sales representative is of coarse granular data.
False
True or False: A worm must attach to something such as an executable file, to spread; while a virus do not need to attach to anything to spread from computer to computer.
False
True or False: Authentication is the process of providing a user with permission including access levels and abilities such as file access, file sharing , hours of access etc.
False
True or False: Deleting your sent email from your computer also deletes it from your email provider's server.
False
True or False: Emoticons used by the users in social media are examples of structured data.
False
True or False: Ethernet is a wireless connection with speed ranging from 1 Mbps to 10 Mbps.
False
True or False: In the context of Porter's Five Forces Model, the bargaining power of customers of medicinal drugs is enhanced when pharmaceutical companies patent their products.
False
True or False: Inventory cycle time is the agreed upon time between the purchase of a product and the delivery of the product.
False
True or False: Order fulfillment is a Business-facing process or front-office processes which involves dealing with external customers.
False
True or False: Single-tenancy in the cloud means that a single instance of a system serves multiple customers.
False
True or False: The core ERP components primarily focus on external operations such as business intelligence and Ebusiness.
False
Which of the following is NOT an advantage of a relational database over a text document or a spreadsheet? -Increased information redundancy -Increased flexibility -Increased scalability and performance -Increased information integrity -Increased information security
Increased information redundancy
Which of the following is NOT an issue related to the waterfall methodology? -Any problem in a phase flows onward to the next phase -It is inflexible, any unexpected contingency may sabotage the plan -It assumes that users can specify all business requirements in advance -It does not require all the steps to be performed in sequence. One can skip a step and perform it in later phases.
It does not require all the steps to be performed in sequence. One can skip a step and perform it in later phases.
Which of the following is NOT true about Digital subscriber line (DSL)? -It works over a limited physical distance like homes and small businesses -It can transmit and receive data much faster than dial-up access -It uses standard telephone lines with broadband modem technology -It ties up the telephone line so the user cannot receive and make phone calls while online
It ties up the telephone line so the user cannot receive and make phone calls while online
Which of the following is NOT a benefit of integrated systems? -Limited information for decision making -Smooth flow of information and process -Automated business processes -Collective decision making
Limited information for decision making
Which of the following is NOT true for transmission control protocol/Internet protocol (TCP/IP)? -It provides technical foundation for the public Internet as well as for large numbers of private networks -One of the disadvantage of TCP/IP is that it does not allow diverse or differing networks to connect and communicate with each other -TCP part of TCP/IP verifies the correct delivery of data ensuring the size of the data packet remains same throughout its transmission -IP part of TCP/IP verifies the data are sent to the correct IP address
One of the disadvantage of TCP/IP is that it does not allow diverse or differing networks to connect and communicate with each other
Which of the following is a customer relationship management metric? -Number of items damaged during production -Inventory turnover time -Percentage of service calls resolved per day -Percentage of suppliers who supplies product on time
Percentage of service calls resolved per day
Which of the following is NOT a common type of Hackers? -Cyberterrorist -Hactivist -Black-hat -Pink-hat
Pink-hat
Which of the following is NOT a problem associated by low-quality data? -In one of the records, customer's first name is switched with the last name -10% of the records are populated by mm/dd/yyyy format in the Date field while rest of the records have yyyy-mm-dd formats in the Date field -A default value of (999) 999-9999 is automatically populated for Phone field when the phone number is missing -Primary keys are automatically generated by the system -In one of the records, the Customer_Age field has a value of -300
Primary keys are automatically generated by the system
Which of the following is typically NOT considered as an example of Key Performance Indicators (KPIs)? -Retain customers -Average number of transactions per day -Percentage of manufactured products with defects -Average time spent by a customer in an online queue
Retain customers
Which of the followings does not require a business intelligence solution? -Select the customers who purchased product X from location Y. -Why are sales below target? -Predict claim amount and medical coverage costs related to COVID cases for next quarter. -What is the probability that sales of a product will increate by 10% in next month?
Select the customers who purchased product X from location Y.
Which of the following is not an example of data cleansing? -Sort the revenue column in Sales table -Populate the missing date in the Last_Edit_Date column by system date as per the company rules -Remove duplicate records from Customer table -Fix inconsistencies in the customer name format
Sort the revenue column in Sales table
Online Transaction Processing (OLTP)
The capturing of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information
True or False: Unlike cluster analysis, a classification analysis requires that all groups or classes are defined before the analysis begins. For example, in a loan prediction analysis two customer classes are predefined: one who default on loan, and one who did not default on loan.
True
Adwords such as "denim shorts" or "coding classes" are keywords that advertisers choose to pay for and appear as sponsored links on the search engine results pages. -Weather data collected by probes -Wikipedia articles edited by its readers -Feedback provided by Airbnb guests -YouTube video uploaded by its subscribers
Weather data collected by probes
WAP
Wi-Fi Protected Access: enables devices to connect to a wireless network to communicate with each other
WAN
Wide Area Network: spans a large geographic area such as a state, province, or country.
WLAN
Wireless Local Area Network: a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet
WMAN
Wireless Metropolitan Area Network: a metropolitan area network that uses radio signal to transmit and receive data
WWAN
Wireless Wide Area Network: a wide area network that uses radio signals to transmit and receive data
Program Evaluation and Review Technique (PERT) Chart
a graphical network model that depicts a project's tasks and the relationships between them
Porter's Five Forces Model
a model for analyzing the competitive forces within the environment in which a company operates, to assess the potential for profitability in an industry
Multi-tenancy
a single instance of a system serves multiple customers
Black-hat hacker
criminals who break into computer networks with malicious intent
Which of the following is an example of a consumer-to-business (C2B) commerce? -consumer selling items in eBay -Walmart buying confectionaries from Nestle -Government providing medicare to eligible households -customers providing helpful reviews in Yelp about Chipotle
customers providing helpful reviews in Yelp about Chipotle
Structured Data
data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address
Moore's law refer to the computer chip performance per dollar ___________ every ___________.
doubling; 18 months
Single-tenancy
each customer or tenant must purchase and maintain an individual system
A _____________ site is separate and fully equipped facility where the company can move immediately after a disaster and resume business.
hot
Former CEO of Turing Pharmaceuticals Martin Shkreli increased the price of the drug Daraprim from $13.50 per pill to $750 per pill overnight. Daraprim is used to treat toxoplasmosis, which can affect pregnant women, people with HIV and others with weakened immune systems. Shkreli's decision may be considered as _______________________ business practice. -legal but unethical -illegal but ethical -legal and ethical -illegal and unethical
legal but unethical
Alibaba, a Chinese multinational e-commerce company hired developers from the U.S. to create a website that would appeal to both the audience at home (China) and across the English-speaking world. This is an example of _______________________.
offshore outsourcing
Key Performance Indicators (KPIs)
quantifiable metrics a company uses to evaluate progress towards critical success factors
Granularity
refers to the level of detail in the model or the decision-making process
An activity or task in a Business Process Model and Notation is represented by a/an _________________.
rounded-corner rectangle
Virus
software written with malicious intent to cause annoyance or damage
White-hat hacker
someone who exploits computer systems or networks to identify security flaws and make improvement recommendations
Worm
spreads itself not only from file to file but also from computer to computer
Which of the following is NOT a benefit of Cloud Computing? -users share pooled computing resources which reduces the cost of the service -computing capacity can be increased or decreased immediately, allowing for optimal scalablility -user can increase storage and processing power as needed -users have full control over data location
users have full control over data location