MIS 513 - Midterm (Quizzes), MIS Midterm Chapter 1, Quiz 1, TRUE MIS 3302 UHD Exam 2 (Ch.5-8) Review, UHD M.I.S. 3302 Final (ALL CHAPTERS), MIS FINAL EXAM, IS Chapter 3, IS Chapter 4, MIS 304 4
Which of the following is a basic concept associated with Web 2.0?
-Airbnb -Uber -YouTube
example of business-to-business electronic commerce
-Allyspareparts.com selling glass for windshields and rearview mirrors to automobile manufacturers. -Blueberrypie4u.com selling pastries, candies, and chocolate bars to supermarkets
Examples of Asynchronous Communication:
-Discussion boards -Texting -Emailing
Which of the following is a core activity on according to the value chain model?
-Inbound Logistics -Operations and Manufacturing -Outbound Logistics -Marketing and Sales -Customer Service
In the procure-to-pay process, the negotiation of price and terms is followed by __________.
-Issuing of the purchase order -Receiving the goods -Receiving and paying the invoice.
Which of the following characterized the fourth generation of computing, which began in the 1990s?
-It was the beginning of the interpersonal computing era. -The end of the personal computer era
click-and-mortar business strategy example
-JCPenney has an online store as well as physical stores. -Walmart has an online store as well as physical stores. -Best Buy has an online store as well as physical stores.
Which of the following types of communication is asynchronous?
-Messages posted on Facebook -Email -Microblog -Webcast -A slideshare presentation posted on the Web These are not coordinated in time.
example of government-to-business electronic commerce
-The U.S. government buying office supplies using an online procurement Web site. -Juanita signing up for city water and sewer services and paying her bill for the services online
Cloud computing
-dependent on a vendor -does not give complete control over data -provides little visibility into true security and disaster preparedness capabilities
The managerial (or tactical) level of decision making
-functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization. - focus on specific business functions. -is referred to as semistructured decision making because solutions and problems are not clear-cut and often require judgment and expertise.
Big Data
-is a method of gaining business intelligence and making better business decisions. -a megatrend of the Information Age.
examples of synchronous communication
-virtual meeting -chatting online -A phone call
A USB port, short for universal serial bus port, can connect up to 127 different peripheral devices together with a single connector.
...
A computer keeps data, instructions and information on a register media.
...
A light-sensing input device that coverts printing text and images into a form the computer can process is which of the following?
...
A storage device records (writes) and/or retrieves (reads) items to and from storage media.
...
A website is a collection of related webpages and associated items, such as documents and pictures, stored on a web server.
...
An IP address is a sequence of number and letters that uniquely identifies each computer or device connected to the Internet.
...
Any hardware component that conveys information from a computer or mobile device to one or more people is known as a(n) ____________________.
...
E-mail is a utility program.
...
FTP is an acronym that stands for "First Transfer Protocol".
...
In which gesture do you move two fingers apart?
...
In which gesture do you move two fingers together?
...
In which gesture do you press and hold one finger on an object and then move the finger to the new location?
...
It certifications can do which of the following for the certified employee?
...
Memory consists of electronic components that store instructions waiting to be executed and the data needed by those instructions
...
Software that enables users with an Internet connection to access and view webpages on a computer or mobile device is known as which of the following?
...
Software, also called a(n) ____________________, tells the computer what tasks to perform and how to perform them.
...
The DNS in "DNS server" stands for which of the following?
...
The Internet has its roots in a network that became functional in 1969, linking scientific and academic researchers across the United States. What was the name of that network?
...
The applied science devoted to incorporating comfort, efficiency and safety into he design of items in the workplace is known as which of the following?
...
What is a program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the collected information to some outside source while the user is online known as?
...
What is a security tool that detects and protects a computer and its data from unauthorized intrusions?
...
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks
...
What translates domain names, the text-based name that corresponds to an IP address, to its associated IP address?
...
Which kind of device is hardware capable of transferring items from computers and devices to transmission media and vice versa?
...
Which of the following allows users to create and manipulate documents?
...
Which of the following conveys meaning and is useful to users?
...
Which of the following enables users to speak to other users over the Internet?
...
Which of the following facilitates the transfer of files from one computer to another over the Internet?
...
Which of the following is NOT an example of malware?
...
Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media?
...
Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video?
...
Which of the following is a computer dedicated to providing one or more services to other computers or devices on a network?
...
Which of the following is a popular Cisco certification?
...
Which of the following is a program that extends the capability of a web browser?
...
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?
...
Which of the following is a set of programs that coordinates all the activities among a computer or mobile device's hardware?
...
Which of the following is a special purpose computer that functions as a component in a larger product?
...
Which of the following is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals?
...
Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?
...
Which of the following is an electronic version of a printed book, readable on computers and other digital devices?
...
Which of the following is an example of an operating system?
...
Which of the following is equal to approximately one million characters?
...
Which of the following represents the amount of data that travels over a network?
...
Which of the following software allows users to organize data in rows and columns and performs calculations?
...
Which software allows users to create, access and manage data?
...
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?
...
You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as?
...
3 types of Globalization
1. Economic Changes 2. Cultural Changes 3. Technological Changes
An IP address is a _______
32-bit number
How many bits in a byte?
8
A recent trend in display advertising has been ________ advertising, where the ads placed on a page are in some way related to the content of that page. A) contextual B) buzz C) viral D) affiliate E) stealth
A
Ben buys a camera from Xenthix which starts malfunctioning, as the camera fell down from his hand and broke its lens. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage is of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce? A) Ben sells the camera to Balvinder Singh on Iora.com. B) Ben files an online suit against Xenthix. C) Ben files a complaint on Xenthix's Web site asking for a refund. D) Ben buys another camera from Xenthix's online store. E) Ben sells the camera to the world's largest used camera dealer Koenister.com.
A
Doug, a frequent visitor of online auction sites, uses two different accounts-one to place a low bid and the other to place a very high bid on the desired item. This leads to other bidders dropping out of the auction. He then retracts the high bid and wins the item at the low bid. This form of e-auction fraud is known as ________. A) shill bidding B) bid luring C) rafter bidding D) mystery bidding E) bid skimming
A
E-filing is an example of a ________ tool. A) government-to-citizen B) consumer-to-consumer C) government-to-government D) consumer-to-business E) business-to-business
A
Hatso, a famous hat retailer chain, opens a new store in Kentucky and chooses to operate solely in the traditional physical markets. It approaches business activities in a traditional manner by operating physical locations such as retail stores and not offering their products or services online. Which of the following business strategies does Hatso follow? A) brick-and-mortar B) click-only C) organizational D) low-cost leadership E) differentiation
A
How do comparison shopping sites generate revenue? A) by charging a commission on transactions B) by selling their products in physical stores as well C) by charging a virtual shelf space fee to manufacturers D) by increasing the click count on their sites E) by charging distribution fees to consumers
A
How is structural firmness of a Web site achieved? A) by providing understandable messages if anything goes wrong B) by redirecting Web pages to different sites if any link fails C) by using technical jargons to define a problem D) by developing a mirror site E) by implementing a complicated source code
A
Identify a characteristic of the Web that influences a Web site's security and performance. A) structural firmness B) functional convenience C) cost compliance D) representational delight E) disintermediation capacity
A
Identify a key driver for m-commerce. A) location-based services B) economic conditions C) Web-based applications D) crowdsourcing E) offshoring
A
Identify a true statement about reintermediation with reference to e-tailing. A) It refers to the design of business models that reintroduce middlemen. B) It refers to the design of business models that eliminate middlemen. C) It provides ways for clients and firms to conduct business online without human assistance. D) It provides ways for clients and firms to conduct business activities in a traditional manner by operating physical locations. E) It enables access to Web sites linked to corporate databases in order to provide real-time access to personalized information.
A
Identify a true statement about the Internet of things. A) It enables companies to offer various innovative products and services that go beyond the initial purchase. B) It defines a set of reachable and exploitable vulnerabilities present in a business model. C) It contains rules and guidelines that describe how security is to be enforced during system operation. D) It identifies the tasks that are critical within a business model and builds a network that depicts their interdependencies. E) It is defined as the percentage of visitors who leave the Web site after viewing that page.
A
Identify a true statement about the function of Google's Ad Words. A) It ensures high-quality leads when a search is conducted online. B) It presents a view of short-term technology integration. C) It presents a view of long-term technology integration. D) It redirects Web pages to different sites if the link fails. E) It provides immediate communication to and receives feedback from customers.
A
If a company's Web site is in the sponsored list of a search engine, the search engine receives revenue on a ________ basis. A) pay-per-click B) pay-per-sale C) click-through D) pay-per-conversion E) click-per-visit
A
In the context of GPS-enabled location-based services, the ability to determine the basic geographic position of a cell phone is an example of ________ service. A) location B) mapping C) navigation D) tracking E) reintegration
A
When shoppers come into a store to evaluate the look and feel of a product, just to then purchase it online or at a competitor's store is known as ________. A) showrooming B) a rafter bid C) freecycling D) a forward auction E) crowdsourcing
A
Which of the following occurs in a reverse pricing model? A) Customers specify the product they are looking for and how much they are willing to pay for it. B) Companies set the prices that customers pay for products. C) Companies conduct an online auction for all products available for sale. D) Customers specify the product they are looking for and the company provides the product with a price. E) Companies negotiate special volume discounts with local businesses and offer them to their customers.
A
Which of the following statements explain mass customization? A) Firms tailor their products and services to meet a customer's particular needs on a large scale. B) Firms immediately provide communication to and receive feedback from customers. C) Firms provide ways for clients to conduct business online without human assistance. D) Firms market their products and services over vast distances. E) Firms link Web sites to corporate databases to provide real-time access to personalized information.
A
Which of the following statements is true about electronic commerce? A) Business-to-business electronic commerce is by far the largest form of electronic commerce in terms of revenues. B) Electronic commerce is limited to transactions between businesses and consumers. C) Electronic commerce between businesses and their employees is impossible. D) All forms of electronic commerce involve business firms. E) Consumer-to-consumer electronic commerce is a complete reversal of the traditional business-to-consumer electronic commerce.
A
Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. The introduction of middlemen in business models is an example of ________. A) reintermediation B) remutualization C) gentrification D) disintermediation E) defalcation
A
________ is the largest e-auction site. A) eBay B) Asos C) Zappos D) ePier E) Fitiquette
A
payment service
A __________ allows customers to purchase goods without providing private information.
value proposition
A __________ is what a business provides to a customer and what the customer is willing to pay for that product or service.
Microsoft SharePoint is an example of what type of technology?
A content management system
Porsche, Nordstrom, and IBM are examples of companies that pursue which type of strategy?
A differentiation strategy. These companies try to provide better products or services than their competitors.
social bookmarking
A group of employees is tasked with collecting information related to eSports to identify the potential for a venture. The employees are entirely dependent on information they find on the Internet and tag content using defined keywords to aid collaboration. Which of the following terms is most closely linked to the task the employees are performing?
collaboration
A group of people working together to achieve a common goal
intranet
A private network that is used exclusively within an organization is sometimes called a(n)
Which of the following is a difference between a server and a workstation?
A workstation is typically used by one user at a time
protocol
A(n) __________ is a set of rules that programs on two communicating devices follow.
34) Which of the following occurs if only one computer needs to use the network in a packet-switching system?
A) Data is sent continuously.
70) Which of the following differentiates grid computing from cloud computing?
A) Grid computing uses a large number of computers.
40) Web servers process user requests for pages using the ________.
A) Hypertext Transfer Protocol
3) ________ deliver information to you in a usable format.
A) Output technologies
31) ________ is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the Internet concurrently.
A) Packet switching
61) Which of the following statements is true about the software as a service model?
A) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
63) Which of the following statements is true about the infrastructure as a service model?
A) The customer has to manage the licenses for the operating systems being used.
22) Which of the following statements is true about servers?
A) They are used to provide services to users within large organizations or to Web users.
35) Internet protocol or the protocol used by the Internet is called the ________.
A) Transmission Control Protocol (TCP)
15) The customer relationship management system and personal productivity software are examples of ________.
A) application software
56) Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.
A) collocation facilities
69) ImmuneEarth, a research and development company, has a motto to "eradicate all diseases." It has numerous departments that research the cure of various diseases. One of its largest departments include the AIDS department where more than 500 scientists are researching the cure for AIDS. ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose. Recently, one of its computers was updated because it had low performance which had slowed the entire system. Which of the following is ImmuneEarth using to research the cure for AIDS?,
A) grid computing
49) Which of the following is the host name in the URL "labs.google.co.in/jack carver?"
A) labs
28) In ________ networks, servers and clients have defined roles.
A) server-centric
17) A ________ is the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems.
A) supercomputer
11) The operating system of a computer is an example of a(n) ________ software.
A) systems
46) Which of the following is likely to have the suffix ".org" after the domain name in its URL?
A) the Red Cross Society
7) The primary storage is also known as ________.
A) volatile memory
Which of the following is an example of software theft?
ALL OF THEM b. Intentionally erasing programs c. Illegally register and/or activate a program d. Illegally copying a program
Which of the following is the main objective of information systems that focuses on improving supply chains?
Accelerate product development and innovation and to reduce costs. (Supply chain management systems - SCM)
The amount of time it takes the processor to read from memory, and which is measured in nanoseconds is known as which of the following?
Access Time
Which of the following is an example of an HTML editor?
Adobe Dreamweaver
Which of the following is a signal that is continuous and varies in strength and quality and has an infinite number of values?
Analog
Organizations that effectively utilize __________ can more easily customize marketing campaigns from the segment level to even the individual customer.
Analytical CRM
Which of the following explains Web analytics?
Analyzing Web surfers' behavior in order to improve Web site performance
Which of the following statements is true about peer production?
Anyone can help in producing or improving the final outcome.
Managerial
At the __________ level of decision making, functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization.
________ use(s) information systems to enhance a person's perception of reality by providing relevant information about the user's surroundings with the use of special glasses or other devices.
Augmented Reality
Click-through rate reflects ________. A) the ratio of surfers who visit a Web site divided by the number of surfers who clicked on an ad B) the ratio of surfers who click on an ad divided by the number of times it was displayed C) the percentage of visitors who actually perform the marketer's desired action D) the ratio of surfers who click on an ad divided by the number of people who make a purchase E) the ratio of surfers who visit a Web site divided by the number of people who make a purchase
B
Companies use ________ in an attempt to move up their Web sites in the organic search engine results. A) search engine image protection B) search engine optimization C) search engine keyword insertion D) search-oriented architecture E) domain stacking
B
Companies using a ________ business strategy are also called virtual companies. A) click-and-flip B) click-only C) brick-and-mortar D) bricks-and-clicks E) click-and-mortar
B
EZBiz, the brainchild of three college friends, is a startup venture that plans to produce and market sports gear. The venture is still stuck in the planning phase as they have not been able to decide the suitable business strategy to opt for. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy? A) The company has limited access to funds and is looking to keep its costs low. B) The public is wary of sharing confidential information after a recent spate of credit card scandals. C) A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain. D) Several companies who have switched from a brick-and-mortar strategy to a click-only strategy are experiencing severe channel conflicts. E) Some click-only companies have been unable to achieve economies of scale and are subsequently unable to offer lower prices.
B
In the context of GPS-enabled location-based services, capturing specific locations to be viewed on the phone is an example of ________ service. A) location B) mapping C) navigation D) tracking E) disintegration
B
The auction site eBay.com is an example of ________ electronic commerce. A) business-to-business B) consumer-to-consumer C) business-to-consumer D) consumer-to-business E) government-to-business
B
Timothy was reading tournament results of the football World Cup matches on Infogoalistic.com. As he was going through the results, an advertisement of new football studs popped up. This is an example of ________ advertising. A) covert B) contextual C) surrogate D) niche E) user-generated
B
When a Web site ensures privacy and security of the consumer's data, ________ can be achieved. A) reintermediation B) structural firmness C) disintermediation D) functional convenience E) representational delight
B
Which of the following is a disadvantage of e-tailing? A) It is limited by physical store and shelf space restrictions. B) It requires additional time for products to be delivered. C) It complicates the process of comparison shopping. D) It restricts companies from effectively competing on prices. E) It reduces a company's inventory turnover time.
B
Which of the following statements is true about firms pursuing a brick-and-mortar business strategy? A) These firms avoid indulgence in physical store locations. B) These firms avoid indulgence in electronic commerce. C) These firms are only involved in export business activities. D) These firms indulge in rafter bidding activities. E) These firms operate in both physical and virtual arenas.
B
Which of the following statements is true about firms pursuing a click-and-mortar business strategy? A) These firms are only involved in export business activities. B) These firms operate in both physical and virtual arenas. C) These firms are involved in rafter bidding activities. D) These firms conduct business only electronically in cyberspace. E) These firms avoid indulgence in physical store locations.
B
With respect to the online consumer's hierarchy of needs, identify the most critical characteristic of a Web site. A) functional convenience B) structural firmness C) representational delight D) descriptive link text E) cross-platform compatibility
B
________ are two-dimensional barcodes with a high storage capacity that are typically used to point the consumer to a particular Web page when he or she scans the barcode with a mobile device's camera. A) Viral codes B) QR codes C) MSI barcodes D) MaxiCodes E) CPC Binary Barcodes
B
________ is a three-digit code located on the back of a credit or debit card that is used for authorization by the card-issuing bank to combat fraud in online purchases. A) Competitive Fraud Detector B) Card Verification Value C) Online Purchase Processor D) Card Detection Value E) Purchase Processing Value
B
________ is defined as the percentage of visitors who leave the Web site after viewing that page. A) Bounce rate B) Exit rates C) Link rate D) Web analytics E) Domain analytics
B
32) Which of the following is mandatory for packet switching to work?
B) Each packet being sent across a network must be labeled with a header.
68) ________ is used to transmit voice and video communication over the Internet.
B) IP convergence
64) Which of the following statements is true about a public cloud?
B) It can be used by any interested party on a pay-per-use basis.
43) Which of the following statements is true about a uniform resource locator?
B) It is used to identify and locate a particular Web page.
8) Which of the following statements is true about secondary storage?
B) It retains the data when the power to the computer is shut off.
65) EasyQuery is a knowledge management company that is contemplating a partnership with Kasko, a cloud service provider. The management of EasyQuery is particularly concerned about Kasko's viability and will start a partnership only when it is sure that Kasko meets this criteria. Assume that viability is the only criteria that a cloud service provider needs to meet. If EasyQuery enters into a partnership with Kasko, it means that ________.
B) Kasko has long-term sustainability
54) Which of the following occurred in the 1990s-2000 generation of computing?
B) The personal computer era ended and interpersonal computing began.
5) The ________ is responsible for performing all the operations of the computer.
B) central processing unit
26) A ________ is any computer on the network, or any software application that uses only the services provided by the server.
B) client
48) In a URL, the ________ is the particular Web server or group of Web servers (if it is a larger Web site) that will respond to the Web request.
B) host name
38) Prior to the invention of the Web, content posted on the Internet could be accessed through the Internet tool Gopher. The Web took Gopher one step further by introducing ________.
B) hypertext
21) A ________ is used for personal computing and small business computing.
B) microcomputer
19) A ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network.
B) server
14) Which of the following tasks is performed by the application software?
B) writing a business letter
Entering a large number of separate forms or documents into a computer system and manipulating these data at a single time is referred to as ________.
Batch processing
Which of the following is a megatrend of the Information Age?
Big data
example of consumer-to-consumer electronic commerce.
BooksForAll.com allowing consumers to sell their books to other consumers for a fixed price
How is business process management similar to quality improvement approaches such as total quality management?
Both intended to be cross-functional approaches to improve an organization.
________ are a set of activities an organization performs in order to reach their business goals.
Business processes
Which of the following statements is true about electronic commerce?
Business-to-business electronic commerce is by far the largest form of electronic commerce in terms of revenues.
How do key performance indicators help functional managers to enhance business processes?
By assessing the organization's progress toward a certain goal
How can green computing be implemented in an organization?
By using virtualization to replace hundreds of individual servers with just a few powerful mainframe computers
Bookseller Barnes & Noble is an example of a ________ company. A) flip-only B) click-only C) click-and-mortar D) click-and-flip E) brick-and-mortar
C
In ________ pricing, companies set the prices that consumers pay for products. A) viral B) top-up C) menu-driven D) reverse E) rafter bid
C
In the context of GPS-enabled location-based services, the ability to give route directions from one point to another is an example of ________ service. A) mapping B) disintegration C) navigation D) reintegration E) tracking
C
In the context of pay-per-click models, inflating the revenue to a host or increasing costs for the advertiser by repeatedly clicking on a link is called ________ fraud. A) link B) affiliate C) click D) conversion E) disintermediation
C
The form of electronic commerce that is used by organizations to conduct business with business partners without involving the end consumer is known as ________ electronic commerce. A) business-to-consumer B) peer-to-peer C) business-to-business D) business-to-intermediary E) business-to-supplier
C
The online sales of goods and services are known as ________. A) e-information B) e-integration C) e-tailing D) e-collaboration E) e-filing
C
Under the ________ pricing model, the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement. A) pay-per-refresh B) pay-per-sale C) pay-per-click D) pay-per-conversion E) click-per-visit
C
Walmart.com is an example of a ________ retailer. A) brick-and-mortar B) click-only C) bricks-and-clicks D) click-and-flip E) brick-and-flip
C
Which of the following characteristics of the Web deals with stimulating a consumer's senses? A) functional convenience B) cost compliance C) representational delight D) structural firmness E) disintermediation capacity
C
Which of the following is an example of reintermediation? A) The diamond card of the Futilery Centriono, is issued by invitation only to customers who spend more than $250,000 a year on their shopping card. B) Nanny Duke, a baby products manufacturing company, acquires a list of parents-to-be and showers them with samples of diapers and other baby products to capture a share of their future purchases. C) Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations. D) Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers. E) Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute meals in order to provide competition to the other food chains in the area.
C
Which of the following statements is true about companies pursuing a click-only business strategy? A) These companies approach business activities by operating in physical locations. B) These companies operate in both physical and virtual arenas. C) These companies conduct business electronically in cyberspace. D) These companies are only involved in export business activities. E) These companies choose to operate their business activities solely in the traditional manner.
C
24) ________ is the transmission capacity of a computer or communications channel.
C) Bandwidth
67) ________ is used to increase Web application performance.
C) Edge computing
72) ________ has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs.
C) IP convergence
1) ________ are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse.
C) Input technologies
42) Which of the following is true about the graphical Web browser Mosaic?
C) It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox.
41) Which of the following statements is true about the Information Infrastructure Act?
C) It opened the Web for commercial purposes.
45) Which of the following is likely to have the suffix ".com" after the domain name in its URL?
C) Microsoft
52) The first CPU had 2,200 transistors, whereas the newest models have broken the 2-billion-transistor mark. Take for example, the Intel Core i7 Extreme CPU which can complete hundreds of millions of operations every second. Which of the following is the most similar to this scenario?
C) New generation digital cameras have a higher number and size of pixels than older digital camera models.
23) ________ define the procedures that different computers follow when they transmit and receive data.
C) Protocols
10) ________ is the collection of programs that control the basic operations of computer hardware.
C) Systems software
62) Which of the following statements is true about the platform as a service model?
C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.
53) Which of the following occurred in the 1964-1990s generation of computing?
C) The mainframe era ended and the personal computer era began.
12) Operating systems are often written in ________, a very low level computer programming language that allows the computer to operate quickly and efficiently.
C) assembly language
30) The Internet relies on ________ technology to deliver data and information across networks.
C) packet-switching
27) A ________ is any computer that requests and provides services.
C) peer
36) A ________ is a device used to connect two or more individual networks.
C) router
55) Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________.
C) the product is designed to last only for a certain life span
20) Designed for medical, engineering, or animation and graphics design uses, ________ are optimized for visualization and rendering of three-dimensional models.
C) workstations
eBay is an example of which type of e-commerce site?
C2C
________ is a three-digit code located on the back of a credit or debit card that is used for authorization by the card-issuing bank to combat fraud in online purchases
Card Verification Value
Which of the following is an example of green computing?
Changing the power-saving setting on all of an organization's computers. It prevents energy from being wasted while computers are idling or left on overnight.
Which of the following is NOT a typical revenue model in the digital world?
Channel marketing
Which of the following is a valid way to protect yourself when shopping on a Web site?
Check the site's privacy policy
What does the first wave of change consist of?
Civilization based on Agriculture and handwork; Relatively Primitive Stage; Luddites opposed technology
Which of the following is a recording of a user's path through a website?
Clickstream Data
Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users access through the Internet?
Cloud
The various services offered by Google, such as Gmail (e-mail), Google Drive (word processing), or Google Calendar, all of which are accessed via a Web browser, freeing users from the task of installing or updating traditional desktop applications or worrying about storing or backing up data, are good examples of ________.
Cloud Computing
Dropbox is an example of a __________ collaboration tool.
Cloud based
Which type of information systems enables people to communicate, team up, and coordinate with each other?
Collaborative System
The ".com" suffix in a Uniform Resource Locator is reserved for ________.
Commercial organizations
Which of the following is a challenge for organizations when it comes to sustaining a competitive advantage?
Competitors can copy strategic systems. Smart rivals are quick to duplicate or improve on a successful system.
The ability to independently learn new technologies as they emerge and assess their impact on your work and life is called ________.
Computer Fluency
Which of the following occurs during wiki wars?
Contributors continuously edit or delete each other's posts
The component of the processor that direct and coordinates most of the operation in the computer is known as which of the following?
Control Unit
Knowledge workers are professionals who
Create, modify, and/or synthesize knowledge as a fundamental part of their jobs
________ is the securing of business financing from individuals in the marketplace.
Crowdfunding
________ is used in consumer-to-business e-commerce to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people.
Crowdsourcing
A ________ is a form of e-auction which allows businesses to buy seized and surplus government equipment. A) reverse auction B) mystery auction C) top-up D) forward auction E) rafter bid
D
A click-and-mortar business strategy is also referred to as a ________ business strategy. A) click-and-flip B) brick-and-mortar C) click-only D) bricks-and-clicks E) brick-and-flip
D
A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of ________ electronic commerce. A) business-to-consumer B) government-to-citizen C) government-to-business D) government-to-government E) business-to-business
D
A way to ensure that a company's site is on the first page users see when looking for a specific term is using ________ advertising. A) stealth B) viral C) buzz D) search E) affiliate
D
Bid shielding is sometimes called ________. A) bid skimming B) bid luring C) reverse bidding D) shill bidding E) rafter bidding
D
Identify a true statement about a nanotube-based computer. A) It operates with just two bytes of information, and can only count to 16. B) It operates with just one bit of information, and can only count to 64. C) It operates with just one bit of information, and can only count to 8. D) It operates with just one bit of information, and can only count to 32. E) It operates with just two bytes of information, and can only count to 32.
D
In electronic commerce, ________ is defined as the percentage of single-page visits. A) exit rate B) showrooming C) freecycling D) bounce rate E) value chain analysis
D
Online retailer Amazon.com is an example of a ________ company. A) click-and-mortar B) click-and-flip C) bricks-and-clicks D) click-only E) brick-and-mortar
D
Which of the following explains Web analytics? A) conducting online marketing research to improve product quality B) analyzing Web sites in order to find the best one in a category C) tracking all online purchasers to try and increase their frequency of visit to a particular Web site D) analyzing Web surfers' behavior in order to improve Web site performance E) analyzing Web sites in order to find the best online business practices
D
Which of the following is an example of business-to-consumer electronic commerce? A) Brenda files her income tax online. B) Canchi, a shoe manufacturer, conducts business over the Web with its retailers. C) Juan buys Kevin's guitar on Monsung.com. D) Reuben buys a pair of shoes on Mysticshoes.com. E) Neal places a bid for a mobile phone on the online auction site Feliciate.com.
D
Which of the following is an example of disintermediation? A) Anister, a car-manufacturing company, markets most of its four-wheel drives in high altitude regions where vehicles require more power. B) Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute meals in order to provide competition to the other food chains in the area. C) Aubrey Thirst Quencher is a market leader in sports drinks. It expands its market by providing its drinks to working women in urban areas. D) Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers. E) A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment.
D
________ is used in consumer-to-business e-commerce in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people. A) Nearshoring B) Insourcing C) Offshoring D) Crowdsourcing E) Homesourcing
D
66) ________ is used to solve large-scale computing problems.
D) Grid computing
47) Which of the following is likely to have the suffix ".edu" after the domain name in its URL?
D) Harvard Business School
37) Datagram routing and delivery are possible because every computer and router connected to the Internet is assigned an ________.
D) IP address
50) Which of the following statements is true about an IP address?
D) It can be used to navigate to particular Web addresses.
29) ________ networks enable any computer or device on the network to provide and request services. All members of the network have equivalent capabilities and responsibilities.
D) Peer-to-peer
33) Which of the following statements is true about packet-switching systems?
D) These systems adapt instantly to changes in network traffic.
2) Which of the following statements is true about processing technologies?
D) They transform inputs into outputs.
25) Bandwidth is measured in ________.
D) bits per second
71) In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A ________ can help overcome these problems.
D) dedicated grid
18) A ________ is used primarily as the main, central computing system for major corporations.
D) mainframe
13) Which of the following tasks is performed by the systems software?
D) printing documents
59) The ability to adapt to increases or decreases in demand for processing or data storage is known as ________.
D) scalability
6) Any input your computer receives is digitized and then is processed by the CPU. Which of the following explains the meaning of the word "digitized" in the preceding sentence?
D) translated into binary code
57) Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.
D) utility computing
Which of the following allows for storage and management of a company's documents, such as word processing documents, presentations and spreadsheets?
DMS (Document management system)
Which of the following identifies the quality of data in a database?
Data Integrity
A collection of data organized in a manner that allows access, retrieval and use of that data is known as which of the following?
Database
Which of the following allows users to add, modify and delete data?
Database management system
Which of the following allow organizations to easily store, retrieve, and analyze data?
Database management systems
With respect to the types of information systems used in organizations, a product demand forecasting system is an example of a(n) ________ system.
Decision Support
With respect to the types of information systems used in organizations, a product demand forecasting system is an example of a(n) ________ system.
Decision support
Which of the following is an implication for firms that have a threat of new entrants into their market?
Decreased market share
Information about one's identity and place of living is an example of
Demographic Data
Which of the following statements is true about Collaboration?
Describes a group of people working together to achieve a common goal.
Employees at Z-Gadgets, a global organization, often participate in online meetings with their colleagues who are located in different countries. To participate in such meetings, the employees use their own computers and headsets with microphones to interact with one another. Identify the collaboration technology used by the employees of Z-Gadgets.
Desktop Video conferencing
What is a cultural challenge of operating in the digital world?
Differences in Power distance and uncertainty avoidance
Which of the following is a geoeconomic challenge of operating in the digital world?
Differences in network infrastructures
An event or action that could cause a loss of or damage to a computer or mobile device hardware, software,data, information or processing capability is known as which of the following?
Digital Security Risk
________ are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market.
Disruptive innovations
________ computing is a computing model in which multiple types of computers are networked together to share data and services.
Distributed
Disintermediation
Diva is a fashion apparel manufacturer in Texas. Diva recently closed all its physical retail stores and moved all its operations online. The store also let go of all of its distributors and started dealing directly with its consumers. With respect to the given scenario, Diva has carried out the process of __________.
example of business-to-consumer electronic commerce
DivaLikeYou.com selling women's clothing, shoes, and fashion jewelry to individual customers
Companies following a ________ business strategy choose to operate solely in the traditional physical markets approaching business activities in a traditional manner. A) click-only B) high-cost leadership C) low-cost leadership D) click-and-flip E) brick-and-mortar
E
How can the effectiveness of e-mail advertising campaigns be measured directly? A) by reflecting the percentage of visitors who actually perform the marketer's desired action B) by reflecting the number of surfers who click on an ad divided by the number of times it was displayed C) by creating use cases and business models to determine the ratio of the opened mails to the sent mails D) by conducting online polls, starting online forums, and collecting user feedbacks E) by including special links in the e-mail that allow tracking which e-mails the customers have opened or reacted to
E
In e-business terminology, ________ companies are sometimes called "pure play companies." A) bricks-and-clicks B) click-and-mortar C) brick-and-mortar D) click-and-flip E) click-only
E
In the context of GPS-enabled location-based services, the ability to see another person's location is an example of ________ service. A) reintegration B) navigation C) mapping D) disintegration E) tracking
E
Some search engines offer to elevate a page's position in the organic results after paying a fee. This is known as ________. A) paid analysis B) e-reintermediation C) e-subscription D) e-information E) paid inclusion
E
The concept of the Long Tail refers to a focus on ________. A) brand evangelism B) broad markets C) generic brands D) brand dilution E) niche markets
E
The performance of a pay-per-click advertising model can be assessed by ________, which reflects the percentage of visitors who actually perform the marketer's desired action such as making a purchase. A) click fraud rate B) contextual search rate C) pop-up rate D) click-through rate E) conversion rate
E
The phenomenon of cutting out the "middleman" and reaching customers more directly and efficiently is known as ________. A) gentrification B) demutualization C) defalcation D) dissemination E) disintermediation
E
The technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution is known as ________ management. A) digital analytics B) digital signature C) digital marketing D) digital radiography E) digital rights
E
Which of the following characteristics of the Web deals with making the interaction with a Web site easier or more convenient? A) representational delight B) cost compliance C) structural firmness D) disintermediation capacity E) functional convenience
E
Which of the following is a mechanism for consumer-to-consumer transactions? A) e-tailing B) e-integration C) e-filing D) e-tendering E) e-auctions
E
Which of the following is an example of consumer-to-consumer electronic commerce? A) Niobi makes an online deposit of $5,000 into her friend's account. B) Heath buys a gift for Vanessa on Aniocride.com. C) Blanco, a manufacturer, conducts business over the Web with its retailers. D) Ashley buys a new pair of shoes on Fequette.com. E) Marty buys Lobsang's mountaineering equipment on Chieoke.com.
E
With respect to e-tailing, ________ can initiate certain actions, such as making a phone call to a sales representative, or sending a text message to a pre-specified number. A) MaxiCodes B) CPC Binary Barcodes C) viral codes D) MSI barcodes E) QR codes
E
39) The standard method of specifying the format of Web pages is called ________.
E) Hypertext Markup Language (HTML)
51) The prediction that the number of transistors on a chip would double about every two years is known as ________.
E) Moore's law
16) Which of the following statements is true about open source software?
E) These programs' source code is freely available for use and/or modification.
4) A(n) ________ is also referred to as the computer's brain.
E) microprocessor or CPU
44) The suffix ".org" is reserved for ________.
E) nonprofit organizations
58) Utility computing offers tremendous benefits in terms of ________ for companies operating in the digital world.
E) scalability
9) The CPU interacts with ________ for permanently storing data.
E) secondary storage
60) Using ________, multiple machines located at different locations and each with its own applications can be configured to run on one single computer, enabling the IT service providers to better utilize their resources.
E) virtualization
Which of the following types of information systems enables customers to buy goods and services from a firm's Web site? a. Electronic Commerce System b. Geographic Information System c. Customer Relationship Management System d. Supply Chain Management System e. Collaborative System
Electronic Commerce System
The ________ Act of 1986 made it much more difficult for anyone, including the government, to eavesdrop on phone conversations.
Electronic Communications Privacy
An electronic __________ is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting.
Electronic meeting system
The purpose of an intelligent system is to ________.
Emulate or enhance human capabilities
In ________, data and behavior of a class are hidden from other classes and are thus protected from unexpected changes.
Encapsulation
Which of the following conditions is essential for successful Enterprise 2.0 implementation?
Enterprise 2.0 should be driven by a specific usage context
Identify a key factor of globalization.
Evolution of technology
At the ________ level of an organization, managers focus on long-term strategic questions facing the organization, such as which products to produce, which countries to compete in, and what organizational strategy to follow.
Executive
To assist ________ decision making, information systems are used to obtain aggregate summaries of trends and projections of the future.
Executive-level
________ decisions are referred to as unstructured decisions because the problems are relatively complex and non-routine.
Executive-level
________ decisions deal with complex problems with broad and long-term ramifications for an organization.
Executive-level
A data mart contains data about each file in a database and each field within a file
FALSE
In a Microsoft Access database a column is equal to a record and a row is equal to a field within that record.
FALSE
Non-volatile memory loses its contents when the power is interrupted.
FALSE
Unauthorized access is the use of a computer or its data for unapproved or possibly illegal activities.
FALSE
A public cloud is internal to an organization and can help the organization to balance demand and supply of computing resources within the organization.
False
A work flow automation system is an example of a synchronous groupware tool.
False
Amazon.com is an example of a brick-and-mortar company.
False
Cache is non-volatile memory source
False
Companies pursuing a click-and-mortar business strategy have no physical store locations, allowing them to focus purely on electronic commerce.
False
Companies pursuing a click-only business strategy approach business activities in a traditional manner by operating physical locations.
False
Countries such as India remain popular for offshore outsourcing because of rising salaries.
False
E-mail is an example of synchronous communication
False
Electronic commerce is limited to transactions between businesses and consumers, which is known as business-to-consumer (B2C) EC.
False
Email is an example of synchronous communication.
False
Google Talk is an enterprise-level collaboration tool that allows users to create group Web sites and share team information.
False
Government-to-business (G2B) EC does not involve businesses' relationships with all levels of government.
False
IS personnel with service mentality put up roadblocks to customers' new systems ideas and give reasons that the new ideas cannot, or will not, work.
False
Little or no documentation, training, or support for system complexities or problems is a risk for information technology.
False
One of the challenges for brick-and-mortars involve increasing IS complexity.
False
Risk tolerance for people within the organization should be low for the deployment of innovative information systems.
False
Shill bidding is also known as freecycling.
False
Structured Data is typically captured in a data model.
False
THe only drawback of Extensible Markup Language (XML) is that it is not customizable.
False
The Electronic Communications Privacy Act (ECPA) offered far stronger support for e-mail communications than it did for voice mail.
False
The development of low-cost computing platforms and communication technologies is an economic change brought about by globalization enabled by information technology.
False
The development of low-cost computing platforms and communication technologies is an economic change brought about by the globalization enabled by information technology.
False
The greatest impact of the Web-based EC revolution has occurred in companies adopting the brick-and-mortar approach.
False
The menu-driven pricing scheme transcends the reverse pricing system.
False
The name "Internet" is derived from the concept of wireless networking.
False
The network effect refers to the notion that the value of a network is based on the number of networks being used.
False
The purpose of a knowledge management system is to create, store, analyze, and manage spatial data.
False
The structural firmness for the login page of an online banking site need not be emphasized to the user.
False
The technical area of competency of an IS professional is the easiest to maintain in the digital world because of the huge popularity of individual technologies.
False
Transaction processing systems are used by a narrow range of organizations only to process customer transactions more efficiently.
False
Unstructured decisions can be programmed directly into operational information systems so that they can be made with little or no human intervention.
False
VoIP is an acronym that stands for Voice over Infrastructure Procedures
False
With respect to the organizational decision making levels, top-level managers typically focus on problems within a specific business function, such as marketing or finance.
False
According to the network effect, if some users of a network lack knowledge, the network has little or no value.
False.
Data Mining Agents are also known as Shopping Bots.
False. Buyer Agents are aka Shopping Bots.
Business Analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes.
False. Advanced Analytics do.
One major problem affecting supply chains are ripple effects referred to as the multiplier effect.
False. Bullwhip Effect.
A combination of one or more related characters in a database is known as which of the following?
Field
________ refers to technologies that support activities in the financial sector.
Fintech
Which of the following statements explain mass customization?
Firms tailor their products and services to meet a customer's particular needs on a large scale.
The term given to a company that is first to enter a market thus creating a competitive advantage is ________.
First-mover advantage
Social bookmarking allows users to share internet bookmarks and to create categorization systems. These categorization systems are referred to as __________
Folksonomies / Folksonomy
Different types of data can travel on Ethernets by being enclosed in another set of headers to form packets called Ethernet ________.
Frames
The Game, Inc. company is offering a new game that can expand exponentially to new users. The company is offering the very basic game for free allowing the user to upgrade to several levels of a paid subscription model. Choose the selection below that best exemplifies this revenue model.
Freemium
Which of the following is a typical revenue model in the digital world?
Freemium, Affiliate marketing, Licensing, Subscriptions
__________ allows using approximations or subjective values to handle situations where information about a problem is incomplete.
Fuzzy Logic
________ is an example of an online office suite comprised of a spreadsheet application, a word processor, and a presentation application.
Google Docs
Reducing the electricity and environmental waste while using computers, mobile devices and related technologies is known as which of the following?
Green Computing
What involves reducing the electricity consumed and environmental waste generated when using a computer?
Green Computing
________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard.
Hardware
key performance indicators
Help functional managers assess the organization's progress toward a certain goal. These metrics are deemed most critical for business processes, for which functional managers are responsible.
Wide Area Network (WAN)
Henry works for Orion Inc., an IT company in Texas. His supervisor is visiting China for business. Henry has to send his supervisor a few important documents for an upcoming event. Which of the following networks will allow Henry to connect to his supervisor in China?
"Backward looking" budgets are typically based on __________.
Historical Data rather than being based on a clear understanding of current conditions and forecasts of future trends.
Web servers process user requests for pages using the ________.
Hypertext Transfer Protocol
________ is used to transmit voice and video communication over the Internet.
IP convergence
Which of the following statements is true about information systems (IS) and information technology (IT)?
IT programs are more technical than IS programs
knowledge
In order to use information you need. Knowledge is the ability to understand information, form opinions, and make decisions or predictions based on the information.
The convergence of information technology and operations technology, offering the potential for tremendous improvements in efficiency, product quality, agility, and flexibility, allowing companies to mass-produce customized products and better monitor supply chains, refers to which term below?
Industrial Internet of Things
What does the second wave of change consist of?
Industrial Revolution
Processed data that is organized in a meaningful and useful way is known as which of the following?
Information
What does the third wave of change consist of?
Information Age; Information becomes the currency
________ is concerned with what information an individual should have to reveal to others in the workplace or through other transactions, such as online shopping. a. Information Accuracy b. Information Asymmetry c. Information Privacy d. information Piracy e. Information accessibility
Information Privacy
Which of the following occurred when Alvin Toffler's "third wave" gained speed? a. Occupations changed to accommodate the mechanized society. b. Society moved from a predominantly agrarian culture to the urbanized machine age. c. The ability to perform repetitive tasks became a quality to be instilled and valued. d. Individuals shifted from handicrafting items for sale to working in factories. e. Information became the currency of the realm.
Information became the currency of the realm
Which of the following portrays the improved integration benefit of a customer relationship management (CRM) system?
Information from the CRM can be integrated with other systems to streamline business processes and gain business intelligence as well as make other cross-functional systems more efficient and effective.
Both Sony's PlayStation Network and FedEx's systems were developed and are continuously updated to help the companies ________. Choose the option that best fits.
Information privacy
TZA Solutions Corp. is considering opening a new call center in Mumbai, India. Which of the following infrastructure plans should it consider implementing?
Installing its own generators because of frequent power outages
Which of the following speech recognition-based technologies is used for telephone surveys, and to guide customers through the various menu options when calling a company's customer service line?
Interactive voice response
Which of the following entities is responsible for managing global and country code top-level domains, as well as global Internet Protocol (IP) number space assignments?
Internet assigned numbers authority
Connecting host computers and their networks together to form even larger networks is called ________.
Internetworking
Disintermediation
Involves cutting out the middleman and reaching customers more directly and efficiently
Which of the following statements is true about an IP address?
It can be used to navigate to particular Web addresses
Which of the following is true of metadata?
It describes data in terms of who, where, when, and why
Which of the following is an advantage of cloud-based hosting over in-house hosting?
It doesn't require much capital and can be easily developed.
Identify a true statement about the Internet of things.
It enables companies to offer various innovative products and services that go beyond the initial purchase.
Identify a true statement about the function of Google's Ad Words.
It ensures high-quality leads when a search is conducted online.
TCP/IP stands for Transmission Control Protocol/Internet Protocol
It facilitates the transmission of Web pages and other information.
_______, the use of the Internet protocol (IP) for transporting voice, video, fax, and data traffic, has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs.
It has no meaning in and of itself
Which of the following best describes mass customization?
It helps firms tailor their products and services to meet a customer's particular needs on a large scale. For example, Dell Computer Corporation allows customers to customize their computers based on their specific performance needs.
Which of the following statements is true about information?
It is a representation of reality
Which of the following statements is true about information?
It is a representation of reality.
Which of the following is true about association discovery?
It is a technique used to find associations or correlations among sets of items. (Data mining)
Which of the following statements is true about knowledge? a. It is raw material—recorded, unformatted words and numbers. b. It has little value in comparison with raw data. c. It has no meaning in and of itself. d. It is the ability to understand information. e. It assists in converting information into raw data.
It is the ability to understand information
Best description of computer ethics
It is used to describe moral issues and standards of conduct as they pertain to the use of information systems.
Which of the following best describes social cataloging?
It occurs when contributors organize online information regarding specific topics such as academic citations, wireless networks, books, and music.
Which of the following actions of a firm suggests that it uses the freemium approach for applying freeconomics?
It offers basic services for free, but charges a premium for special features.
Which of the following best describes the network effect?
It refers to the notion that the value of a network increases with the number of users
Which of the following best describes the network effect?
It refers to the notion that the value of a network increases with the number of users.
Which of the following is a disadvantage of e-tailing?
It requires additional time for products to be delivered.
Which of the following is an example of reintermediation?
Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations.
Identify a key driver for m-commerce
Location-based services
In the __________ process, goods are produced based on forecasts and are stocked in a warehouse (i.e., a push-based approach); customers' orders are then fulfilled from inventory.
Make-to-stock
Which of the following is the role of a client computer in client-server computing?
Making requests for services
Which of the following is an example of consumer-to-consumer electronic commerce?
Marty buys Lobsang's mountaineering equipment on Chieoke.com
In online analytic processing systems, __________ are the values or numbers the user wants to analyze.
Measures (or sometimes called facts)
________ is a cooperative social media application making use of the network effect.
Media sharing
Electronic components that store instructions waiting to be executed by the processor, data needed by those instructions and the results of processing the data are known as which of the following?
Memory
________ is an example of an electronic communication tool.
Microsoft Outlook
Which of the following can be cited as an example of outsourcing?
Microsoft hands over its customer service function to Convergys, located in India.
________ transmission uses high-frequency radio signals that are sent through the air using either terrestrial (earth-based) or satellite systems.
Microwave
Mike is at Jim's house and admires his digital music collection. He then downloads the entire collection for his own personal use.
Mike commits an ethical intellectual property violation
According to ________, the number of transistors that could be squeezed onto a silicon chip would double every 18 months.
Moore's Law
Worldwide banking group HSBC moving its back-office operations to China and India is an example of ________.
Offshoring
________ refers to the process of integrating external stakeholders into the innovation process.
Open innovation
At the ________ level of a firm, the routine, day-to-day business processes and interactions with customers occur.
Operational
Information systems at the ________ level of an organization often help in automating repetitive activities.
Operational
Inventory management is an application that is part of the ________ functional area.
Operations
________ is used by text recognition software to convert typed, printed, or handwritten text into the computer-based characters that form the original letters and words.
Optical character recognition
__________ software are applications written by third-party vendors that are used by many different users and organizations.
Packaged
managerial level
People at the ________ make semistructured decisions.
operational
People at the __________ level make structured decisions.
tactical or managerial level
People at the __________ make semistructured decisions.
executive or strategic level
People at the __________ make unstructured decisions.
Business analytics augments business intelligence by using __________ to help identify trends or predict business outcomes.
Predictive Analysis (Predictive Models)
Which of the following best describes dynamic pricing?
Priceline uses dynamic pricing with its Name Your Own Price strategy
The several processes associated with the acquiring of goods from external vendors are collectively referred to as the __________ process.
Procure-to-Pay
efficiency
Purchasing a new system to help reduce costs by automating repetitive tasks is called operational ______
What is the term for a square-shaped coded graphic that corresponds to a web address or other information?
QR Code
With respect to e-tailing, ________ can initiate certain actions, such as making a phone call to a sales representative or sending a text message to a pre-specified number.
QR Codes
Which of the following database models represent entities as two-dimensional tables, with records as rows, and attributes as columns?
Relational database model
________ reflect(s) the organization's specific assets that are utilized to achieve cost or product differentiation from its competitors.
Resources
Which of the following is an example of business-to-consumer electronic commerce?
Reuben buys a pair of shoes on Mysticshoes.com
Which of the following is an example of business-to-consumer electronic commerce?
Reuben buys a pair of shoes on Mysticshoes.com.
What should you be sure to do if you shop online?
Review your monthly credit card and bank statements.
example of government-to-citizen electronic commerce.
Richard filing his income tax using an online tax payment Web site
Which of the following is an example of disintermediation?
Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experience a dip in sales due to channel conflicts between retailers.
Which of the following is a popular query language that allows users to manage, update and retrieve data?
SQL
Which of the following is true SSDs (solid state disks) compared to traditional hard disks?
SSDs have faster transfer rates
The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles that will allow computers to be able to better index Web sites, topics, and subjects.
Semantic
With respect to organizational decision-making levels, for ________ decisions, some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made.
Semistructured
The Internet of Things and the massive amounts of data generated enabled the creation of service-oriented business models. Identify this model.
Servitization
Rapid Technology Inc. is planning on expanding into Nairobi, Kenya. Which of the following infrastructure plans should the firm consider implementing?
Setting up its own satellite links to be independent from the local, unreliable communications networks
Which of the following is NOT an example of a digital security risk?
Slacker
________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.
Social Networking
________ attempts to increase the relevance of search results by including content from blogs and microblogging services.
Social Search
__________ attempts to increase the relevance of search results by including content from blogs and microblogging services.
Social Search
Which of the following types of information systems facilitates collaboration and knowledge sharing? a. Visualization System b. Electronic Commerce System c. Word Processor d. Social Software e. Intelligent System
Social Software
________ refer(s) to a program or set of programs that tell the computer to perform certain tasks.
Software
Which of the following is a collection of individual programs sold as a unit?
Software Suite
global
Sony has a central office in Japan, with many subsidiaries located worldwide. The central office makes most of the strategic decisions. This type of business strategy is known as a __________ business strategy.
The emergence of a highly successfully business that is technology based with potential for growth and scalability is often referred to as a(an) ________.
Startup
When senior managers at the executive level of the organization conduct ________, they form a vision of where the organization needs to head.
Strategic planning
Which type of innovation is best described as using the company's talent and assets in innovative ways?
Structure innovation
Which of the following types of information systems supports the coordination of suppliers, product or service production, and distribution? a. collaborative system b. electronic commerce system c. supply chain management system d. geographic information system e. intelligent system
Supply Chain Management System
The process of connecting separate information systems and data to improve business processes and decision making is known as ________.
Systems integration
A videoconference is a meeting between two or more geographically separated people and can save companies time and money
TRUE
Cache is a temporary memory source.
TRUE
Digital signals are in one of two states: on or off.
TRUE
In a Microsoft Access database a row is equal to a record and a column is equal to a field within that record.
TRUE
Malware, short for malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices.
TRUE
Non-volatile memory does not lose its contents when the power source is interrupted
TRUE
The arithmetic logic unit(ALU), part of a computer processor, performs arithmetic, comparison, and other operations.
TRUE
Volatile memory loses its programming when the power is interrupted
TRUE
The binary system uses how many unique digits, and what are those digits?
TWO (0 and 1)
Which of the following is not an example of a pointing devices?
Tablet
________ can be used to visualize user-generated content on a site.
Tag clouds
Which area of competency is considered the most difficult for the IS professional to maintain?
Technical because of the rapid pace of technological innovation in the digital world.
Which of the following core competencies is part of an IS personnel's business knowledge and skills?
Technological communication and presentation
Internet Tax Freedom
The ________________ Act requires Internet sales to be treated in the same way as mail-order sales (e.g., collect sales tax from customers residing in same state as business).
Which of the following is true of the advantage of using information technology?
The competitive advantage of using new technologies generally has a fleeting effect. Competitors eventually do the same thing, eliminating the advantage.
Which of the following occurred in the 1964-1990 generation of computing?
The mainframe era ended and the personal computer era began.
Which of the following occurred in the 1958-1964 generation of computing?
The mainframe era expanded.
What does a Web site's conversion rate reflect?
The percentage of visitors who actually perform the marketer's desired action, such as making a purchase
Which of the following is an issue associated with managing IS infrastructure?
The planned obsolescence of computer hardware carries a high price tag for the environment in terms of resources needed.
EZBiz, the brainchild of three college friends, is a startup venture that plans to produce and market sports gear. The venture is still stuck in the planning phase as they have not been able to decide the suitable business strategy to opt for. They are currently trying to decide between a bricks-and-clicks strategy or a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?
The public is wary of sharing confidential information after a recent spate of credit card scandals.
Which of the following statements is true about the e-business innovation cycle?
The vertical dimension of the cycle shows the extent to which an organization derives value from a particular information technology and the horizontal dimension shows time.
Which of the following statements is true about companies pursing a click-only business strategy?
These companies conduct business electronically in cyberspace.
Which of the following statements is true about companies pursuing a click-only business strategy?
These companies conduct business electronically in cyberspace.
Which of the following statements is true about firms pursuing a brick-and-mortar business strategy?
These firms avoid indulgence in electronic commerce.
Which of the following statement is true about firms pursuing a click-and-mortar business strategy?
These firms operate in both physical and virtual arenas.
Which of the following statements is true of operational-level decisions?
They are highly structured and recurring. Planning typically has a time frame of a few hours or a few days.
Over time, which of the following is true of thermal printers?
They are inexpensive, but the print quality is low and images tend to fade
Under which conditions do online retailers have to legally collect sales taxes from their customers?
They are legally required to collect sales taxes only from customers residing in a state where the business has a substantial presence.
Which of the following is NOT one of Porter's five primary forces?
Threat of flooding the industry with excellent products
Why are information systems typically used at the operational level?
To increase efficiency
The protocol used by the Internet is called the ________.
Transmission Control Protocol (TCP)
A click-and-mortar business strategy approach is also referred to as the bricks-and-clicks business strategy.
True
A record is a group of related field in a database.
True
Advances in cloud computing (think Gmail, Evernote, or DropBox) allow for accessing e-mails, files, notes, and the like from different devices, enhancing portability and mobility in computing
True
Advances in cloud computing (think Gmail, Evernote, or DropBox) allow for accessing e-mails, files, notes, and the like from different devices, enhancing portability and mobility in computing.
True
An intelligent agent is also referred to as a bot.
True
An organization's IS infrastructure has a broad and flexible set of capabilities that can be utilized in a variety of ways.
True
CRM allows organizations to focus on driving revenue as well as on reducing costs as opposed to emphasizing only cost cutting.
True
Click-only companies can often compete more effectively on price since they do not need to support the physical aspects of the click-and-mortar approach.
True
E-tailers can focus on the Long Tails.
True
Electronic commerce can involve the events leading up to the purchase of a product as well as customer service after the sale.
True
For Web sites to be successful, structural firmness is a must.
True
For unstructured organizational decisions, few or no procedures to follow for a given situation can be specified in advance.
True
Hashtags are used to add metadata to messages posted on social media applications, allowing users to search for content related to a certain topic.
True
IS personnel with service mentality believe that the customers own the technology and the information and that the technology and information are there for the customers, not for the systems personnel.
True
Knowledge is the ability to understand information, form opinions, and make decisions or predictions based on the information.
True
Knowledge portals can be customized to meet the unique needs of their intended users.
True
M-commerce is defined as any electronic transaction or information interaction conducted using a wireless mobile device and mobile networks that leads to the transfer of real or perceived value in exchange for information, services, or goods.
True
M-commerce is defined as any electronic transaction or information interaction conducted using a wireless, mobile device and mobile networks that leads to the transfer of real or perceived value in exchange for information, services, or goods.
True
Most organizations have three general decision-making levels: operational, managerial, and executive.
True
One drawback of pay-per-click models is the possibility of abuse by repeatedly clicking on a link to inflate revenue to the host or increase the costs for the advertiser.
True
Sir John Maddox, a physicist, was quoted in Scientific American in 1999 saying, "The most important discoveries of the next 50 years are likely to be ones of which we cannot now even conceive."
True
Social Media is a classification of Web 2.0 applications.
True
Social software can enhance communication within organizations as well as between an organization and its stakeholders.
True
Someone with an automating perspective thinks of technology as a way to help complete a task.
True
The easiest way to understand computer networking is through the human communication model.
True
The use of information systems has become one of the primary ways that organizations improve their value chains.
True
Transmission media refers to the physical pathway used to carry network information.
True
Using a utility computing model, cloud computing helps to transform IT infrastructure costs from a capital expenditure to an operational expenditure.
True
Web sites can offer a virtually unlimited number and variety of products because e-tailing is not limited by physical store and shelf space restrictions.
True
Web technologies allow for integration of information via Web sites that can be linked to corporate databases to provide real-time access to personalized information.
True
When Web pages are designed using semantic principles, computers will be able to read the pages, and search engines will be able to give richer and more accurate answers.
True
When organizations undergo disintermediation, they have to take on those activities previously performed by the middleman.
True
Structured Query Language is the most common language used to interface with relational database management systems (RDBMSs).
True.
Which of the following differentiates a blog from a wiki?
Unlike a wiki, a blog does not allow visitors to edit the original posted material.
________ is the process of analyzing an organization's activities to determine where value is added to products and/or services and what costs are incurred for doing so.
Value chain analysis
IP convergence has led to which of the following?
Video Conferencing over IP
__________ are comprised of members from different geographic areas and assembled as needed to collaborate on a certain project.
Virtual Teams
Which of the following steps should be taken by a person to ensure his or her privacy online?
Visit Web sites anonymously.
__________ refers to the display of complex data relationships using a variety of graphical methods.
Visualization
Which of the following is an example of IP convergence?
Voice over IP
Dynamic Web applications are often referred to as ________ applications.
Web 2.0
Which of the following versions of the Web allows people to collaborate and share information online?
Web 2.0
Some people see ________ as the "contextual Web," where the immense amounts of content available to users will be filtered by contextual factors such as time, location, social activities, and so on.
Web 3.0
__________ is used by organizations to determine patterns in customers' usage data.
Web Usage Mining
__________ refers to extracting textual information from online documents.
Web content mining
Which of the following is a reason for the development of the semantic Web?
Web pages were designed to be understood by people, but not by comptuers
________ is the distribution of digital media, such as audio or video files, via syndication feeds for on-demand playback on digital media players.
Webcasting
WorldTravel (www.worldtravel.com) is a travel Web site that provides detailed information about the different places that tourists can visit across the globe. Additionally, it also helps visitors to book tickets and hotels in these destinations. Which of the following, if true, would most assure the customers of their online privacy?
When collecting personal information, WorldTravel explicitly states the purpose of the information and that it will not be used for anything else.
M-commerce
Which type of commerce involves consumers using a wireless mobile device and mobile networks?
a differentiation strategy
Which type of strategy would a company pursue if it wanted to try to provide better products or services than its competitors?
organizational strategy
a firm's plans of how to accomplish its mission and goals and gain or sustain an advantage over its rivals.
An extranet
a private network that allows two or more firms to use the Internet to do business together
value chain
a set of activities that adds value throughout the organization. Employees look to add more value to a process by acquiring cheaper resources, improving products, or selling more products.
business model
a summary of a business's strategic direction, outlining how the objectives will be achieved; a business model specifies how a company will create, deliver, and capture value.
Cloud-based collaboration tools ________.
allow for easy transferability of documents from one person to another
Microblogs like twitter
allow for short messages and replies, but do not allow visitors to change content
blogs
allow visitors to add comments to the original content, but they do not allow visitors to change the original posted material.
local area network
allows people within a building to share data and other resources.
content management system
allows users to publish, edit, version track, and retrieve digital content.
Which of the following explains Web analytics?
analyzing Web surfers' behavior in order to improve Website performance.
Which of the following storage methods is used for storing long-term copies of organizational data?
archival
wikis
are collaborative Web sites where visitors can add, delete, or modify content on the site, including the work of previous authors
Information Systems
are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data.
business processes
are the activities that organizations perform in order to reach their business goals.
Operating systems are often written in ________, a very low-level computer programming language that allows the computer to operate quickly and efficiently.
assembly language
At the operational level of decision making of a firm, information systems are designed to
automate repetitive activities. It is the routine, day-to-day business processes and interactions with customers that occur here.
________ is the transmission capacity of a computer or communications channel, which represents how much binary data can be reliably transmitted over the medium in one second.
bandwidth
The base 2 numerical system is known as which of the following?
binary
Companies following a ________ business strategy choose to operate solely in the traditional physical markets approaching business activities in a traditional manner.
brick-and-mortar
With respect to the types of information systems used in organizations, an Online Analytical Processing (OLAP) system is an example of a(n) ________ system.
business intelligence
wide area network
can allow people in buildings, cities, and the world to share data and other resources.
public clouds
can be used by anyone on a pay-per-use basis. They are useful when a company has insufficient capital or other resources to build or expand an IT infrastructure. Also offer rapid scalability.
Which of the following is the highest-ranking IS personnel responsible for strategic planning and IS use throughout a firm?
chief information officer
Shawna is concerned about how much of her private information is available on the Internet. What is one step Shawna can take to maintain her privacy online?
choose Web sites that are monitored by independent organizations. Several independent organizations, such as TRUSTee, monitor the privacy and business practices of Web sites
In the context of pay-per-click models, inflating the revenue to a host or increasing costs for the advertiser by repeatedly clicking on a link is called ________ fraud.
click
Bookseller Barnes & Noble is an example of a ________ company.
click-and-mortar
Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system.
collaborative system
Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.
collocation facilities
Which of the following entails having the knowledge and understanding of computers, mobile devices, the Internet, and related technologies?
computer literacy
grid computing
consists of remote computers connected in a single network to create a virtual supercomputer.
A(n) ________ system allows users to publish, edit, version track, and retrieve digital content, such as documents, images, audio files, videos, or anything else that can be digitized.
content management
A recent trend in display advertising has been ________ advertising, where the ads placed on a page are in some way related to the content of that page.
contextual
Ultimately, companies want to improve their __________ rates, which reflect the percentage of visitors who actually perform the marketer's desired action, such as making a purchase.
conversion
Intellectual property is best defined as
creations of the mind that have commercial value
_________ is used in computer-to-business e-commerce to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people.
crowdsourcing
Which of the following scenarios exemplifies an electronic commerce activity?
crystal Maze, an online jewelry store selling jewelry through the store's official Web site
For a firm, reduced prices, need for increased quality, and demand for more services would result due to ________.
customer's bargaining power
reverse pricing model
customers specify the product they want and how much they are willing to pay, and the Web site matches the customers' bids with offers from companies.
Processed Data
data that has been converted to information.
transnational business strategy
decides which aspects of the organization should be under central control and which should be decentralized.
The base 10 numerical system is known as which of the following?
decimal
Digital world
demonstrates the importance of information and related technologies. previous.
An attach that disrupts computer access to internet services and often results in entire networks being knocked offline is known as which of the following?
denial of service (DoS)
Identify the focus of managers at the tactical level of an organization.
deploying organizational resources to achieve the strategic objectives of the organization
The discovery, collection and analysis of evidence found on computers and networks is known as which of the following?
digital forensics
The technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution is known as ________ management.
digital rights
Which of the following models does Priceline use with its Name Your Own Price strategy?
dynamic pricing
Which online business uses a click-only business strategy?
e-Bay
The online sales of goods and services are known as ________.
e-tailing
The extent to which goals are accomplished faster, at lower cost, or with relatively little time and effort is called ________.
efficiency
The purpose of an intelligent system is to ________.
emulate or enhance human capabilities
Human Resource Activities __________.
encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management.
The process of converting data that is readable by humans into encoded characters to prevent unauthorized access is known as which of the following?
encryption
the third generation of computing
end of the mainframe era
With respect to the types of information systems used in organizations, financial, operations, and human resource management is an example of a(n) ________ system.
enterprise resource planning
The engineering principles that incorporate comfort, efficiency and safety into the design of the workplace thus reducing employee injury is known as which of the following?
ergonomics
Identify a key factor of globalization.
evolution of technology
REVIEW QUESTION REVIEWING 26 OF 33 Roshanda, who works for a major retailer located in Seattle, wants to check the availability of some merchandise with one of her company's suppliers in New York. Roshanda also wants to verify the total amount of inventory she has ordered this month from the supplier. Which network will Roshanda most likely use to access this information using the Internet infrastructure?
extranet
Amazon.com is an example of a brick-and-mortar company.
false
Volatile memory does not lose its contents when power is removed
false
A company's ________ secures proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users.
firewall
Hardware and/or software that protects a network's resources from intrustion is known as which of the following?
firewall
A ________ is a form of e-auction which allows businesses to buy seized and surplus government equipment.
forward auction
E-filing is an example of a ________ tool.
government-to-citizen
A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of __________ electronic commerce.
government-to-government
Unformatted Data
has no meaning and has little value until it is processed. In information systems, raw symbols such as words and numbers are simply referred to as data.
The ___ is the particular web server or group of servers that will respond to the Web request.
host name
Which of the following features of the Web contains not only information, but also references or links to other documents?
hypertext
Which of the following goods are produced using the make-to-order approach?
i.e. Amazon's Kindle E-Book Reader Raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until an order is received (a pull-based approach); in extreme cases, even design and engineering start only when an order is received.
Which of the following is a governmental challenge of operating in the digital world?
import and export regulations
Any data and instructions entered into the memory of a computer or mobile device is known as what?
input
utility computing
involves renting resources such as processing, data storage, or networking from an external provider on an as-needed basis.
social networking
involves social online communities where individuals with a broad and diverse set of interests meet and collaborate.
System competency
involves understanding how to build and integrate systems and how to solve problems. Those strong in systems competency will ultimately manage large, complex systems.
Business competency
involves understanding not only the technical aspects of the job but also the nature of the business.
client
is a computer that uses the services provided by a server.
HTML
is a page description language for specifying how text, graphics, video, and sound are placed on a Web page. It stands for Hypertext Markup Language. -It regulates how servers process user requests for Web pages.
geotagging
is adding geospatial metadata (such as latitude, longitude, or altitude) to media
server
is any computer on a network that makes services available to users of the network.
Which of the following is true of information?
is data that has been formatted and processed. Information is best described as formatted and processed data. Information is useful whereas data is of little value until processed.
exit rate
is defined as the percentage of visitors who leave a Web site after viewing a particular page; in other words, it is the last page that users view before moving on to a different site, or closing their browser windows.
Supply chain execution __________.
is the execution of supply chain planning. (Puts planning into motion and reflects the processes involved in improving the collaboration of all members of the supply chain)
Information technology
is the hardware, software, and network components of an information system.
click through rate
is the number of surfers who click on an ad divided by the number of times it was displayed.
bounce rate
is the percentage of users for whom a particular page is the only page visited on the Web site during a session.
E-information
is the stage of business in which an organization provides electronic brochures and other types of information for customers.
Social enterprise
is the use of social media within a company's boundaries or between a company and its customers or stakeholders.
URL stands for Uniform Resource Locator
is used to identify and locate a particular Web page
A metric deemed most critical to accessing progress toward a certain goal is referred to as a(an) ________.
key performance indicator
computer literacy
knowing how to properly use a computer
The business intelligence information that executives need to make strategic decisions is __________.
less structured than the other levels of decision making
In the context of GPS-enabled location-based services, the ability to determine the basic geographic position of a cell phone is an example of ________ service.
location
Identify a key driver for m-commerce.
location-based services
Catering to niche markets in addition to (or instead of) purely selling mainstream products is known as the __________ model.
long tail
With respect to the five general classes of computers, ________ are typically used for mission critical applications, such as transaction processing.
mainframes
Web 1.0
maintained a relatively strict distinction between content creators and content consumers.
Computer viruses,worm, Trojan horses, and rootkits are classified as which of the following, or programs that act without a user's knowledge and deliberately alter the computer's operations?
malware
The executive (or strategic) level of decision making
managers focus on long-term strategic questions facing the organization, such as which products to produce, in which countries to compete, and what organizational strategy to follow.
Social Network Analysis is a technique that attempts to __________.
map people's contacts to discover connections or missing links (sometimes called structural holes) within the organization.
According to basic economics within a competitive marketplace, the price of a product is set by its ________.
marginal cost
In an e-business innovation cycle, after an organization scans the environment for new emerging and enabling technologies, the next step is to ________.
match the most promising new technologies with current economic opportunities
Which of the following is the domain name for www.mayo.edu/research?
mayo.edu
In ________ pricing, companies set the prices that consumers pay for products.
menu-driven
The main circuit board of the computer is known as which of the following?
motherboard
When an organization offers the customer both a retail store and Internet shopping experience, it is referred to as ________.
multi-channel retailing
When an organization offers the customer both a retail store and Internet shopping experience, it is referred to as ________.
multichannel retailing
In the context of GPS-enabled location-based services, the ability to give route directions from one point to another is an example of ________ service.
navigation
What is the term that represents the principle that all Internet data should be treated the same?
net neutrality
The concept of the Long Tail refers to a focus on _____________.
niche markets
At the executive level of decision making, information systems are used to __________.
obtain aggregate summaries of trends and projections of the future
value creation
occurs when an organization can provide products at a lower cost or with superior benefits to the customer.
E-tailing
occurs when businesses sell products to consumers online.
With respect to the types of information systems used in organizations, a word processor is an example of a(n) ________ system.
office automation
Potential pitfalls of social media and the enterprise include
online product reviews, microblogging, and bad vibes going viral
Which of the following best explains the process of moving business processes or tasks to another company?
outsourcing
In addition to being used for communication and collaboration, organizational intranets are widely used for enabling employee self-service for administering benefits, managing retirement plans, or other human resources-based applications through employee ________.
portal
menu driven pricing
pricing is the traditional model in which companies set the prices that consumers pay for products.
A field that uniquely identifies each record in a database is known as which of the following?
primary key
Peter Drucker stated that a knowledge society would emerge in the future that meant ________.
processing knowledge would be as important as processing land, labor, or capital.
The central processing unit(CPU), which interprets and carries out the basic instructions that operate a computer is part of which computer component below?
processor
Which of the following can be cited as an example of a supply chain management system?
procurement planning
Which of the following ethical issues has become a greater concern because of the rise of the Internet?
protection of personal privacy
Information systems at the operational level
provide data about actual customer transactions.
Value creation occurs when an organization can ________.
provide products at a lower cost or with superior benefits to the customer
cloud computing
provides convenient, on-demand network access to a shared pool of computing resources
Infrastructure as a Service (IaaS)
provides only the basic capabilities of processing, storage, and networking.
In information systems management, a systems consultant is responsible for ________.
providing information systems knowledge to external clients
The purpose of a Data Warehouse is to __________.
put key business information into the hands of more decision makers, and an organization that successfully deploys a data warehouse has committed to pulling together, integrating, and sharing critical corporate data throughout the firm.
The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________.
rapid elasticity
Inbound logistics involves business activities associated with __________.
receiving of supplies as well as handling reservations, and operations would include the day-to-day activities of checking guests in or out, cleaning rooms, preparing breakfast, and so on.
Reintermediation
refers to the design of business models that reintroduce middlemen in order to reduce the chaos brought on by disintermediation.
E-commerce
refers to the exchange of goods, services, and money among firms, between firms and their customers, and between customers, supported by communication technologies and, in particular, the Internet.
value creation
refers to the situation where organizations can sell products to customers at lower costs or with superior benefits.
web hosting
refers to the space provided for maintaining Web sites through Web servers.
Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. The introduction of middlemen in business models is an example of ________.
reintermediation
A light=sensing input device that reads printed text and graphics and then translates the results into a form the computer can process is known as which of the following?
scanner
A way to ensure that a company's site is on the first page users see when looking for a specific term is using ________ advertising.
search
Companies use ________ to move up their Web sites in the organic search engine results.
search engine optimization
Companies use ______ to move their Websites in the organic search engine results.
search engine optimization.
With respect to the general classes of computers, a ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network.
server
The Internet of Things and the massive amounts of data generated enabled the creation of service-oriented business models. Identify this model.
servitization
semi structured managerial-level decisions
some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made.
Identify a characteristic of the Web that influences a Web site's security and performance.
structural firmness
When a Web site ensures privacy and security of the consumer's data, ________ can be achieved
structural firmness
With respect to the general classes of computers, a ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network.
supercomputer
The managerial level of an organization is also known as the ________ level.
tactical
Which of the following core competencies is part of an IS personnel's business knowledge and skills?
technological communication and presentation
Computer fluency
the ability to independently learn new technologies and assess their impact on your work and life.
To which of the following is Moore's Law related?
the number of transistors on a computer chip. It states that the number of transistors on a chip will double roughly every 2 years
-The end of the interpersonal era of computing -The beginning of the internetworking era of computing
the present, fifth generation of computing.
value chain analysis
the process of analyzing an organization's activities to determine where value is added to products and/or services and what costs are incurred for doing so.
Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________.
the product is designed to last only for a certain life span
Click-through rate reflects ________.
the ratio of surfers who click on an ad divided by the number of times it was displayed
Hypertext Markup Language
the standard method for specifying the format of Web pages.
Hypertext Transfer Protocol is
the standard that servers use to process user requests for Web pages
Identify the purpose of a transaction processing system used in organizations.
to handle day-to-day business event data at the operational level of the organization
Identify the purpose of an office automation system.
to support a wide range of predefined day-to-day activities of individuals and small groups
________ refers to anything that occurs as part of a daily business of which a record must be kept.
transaction
With respect to the types of information systems used in organizations, a grocery store checkout cash register with a connection to a network is an example of a(n) ________.
transaction processing system
low-cost leadership strategy
tries to offer the lowest prices in the industry for goods and services. Walmart is an example.
best-cost provider strategy
tries to provide good services at a reasonable cost. An example is Dell.
multidomestic business strategy
uses a loose federation of business units, each of which is rather independent in its strategic decisions.
Cloud computing
uses the Internet as the platform for applications and data and also allows users to access their data and programs from any Internet-connected computer.
Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.
utility computing
With respect to the components of a business model, ____ is the utility that the product/service must offer to customers
value proposition
With respect to the components of a business model, ________ is the utility that the product/service must offer to customers.
value proposition
The term ________ was coined by Harvard business professor Jeffrey Rayport to describe how good business techniques can be driven by word-of-mouth or person-to-person communication.
viral marketing
Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home.
virtual private
While using digital dashboards, pull reporting is conducted to __________.
visually present key performance indicators and other summary information used by managers and executives to make decisions.
YouTube is a unique _____________ application because it is largely based on user-generated content.
web 2.0