MIS Final
Robert Johnson works for the Chambers County Library as an events coordinator. He is responsible for coordinating the annual book drive with several other agencies in the area as well as various book clubs. Which of the following would enable Robert to establish a meeting schedule for everyone involved in the planning process? (1)IM (2)iCalendar (3)hCard (4)Email (5)Wiki
iCalendar
In comparison with primary storage, hard drives are ________. .(1)more volatile (2)more expensive (3)smaller in storage capacity (4)slower in processing digital information (5)faster than random access memory
slower in processing digital information
An ethical system that judges whether an act is right or wrong by considering the consequences of the action, weighing its positive effects against its harmful ones. EX: When doctors in crisis situations form a triage that assigns degrees of urgency to wounds or illnesses to decide the order of treatment of a large number of patients or casualties, they are using the ________ framework. (1)medical diagnosis (2)medical decision-making (3)utilitarianism (4)natural laws and rights (5)rule of law
utilitarianism
Netflix uses customer surveys to identify delivery delays caused by the U.S. Postal Service. The surveys give Netflix valuable information and improve the company's ________. (1)customer feedback rate (2)ability to charge for premium shipping (3)selection of movies (4)profits (5)visibility in the supply chain
visibility in the supply chain
Mead Corporation has recently approved the purchase of a new ERP system for its paper processing plant in Valley, Alabama. To ensure that all stakeholder's requirements are collected and documented, form a(n) ________ approach during the planning and analysis phase of the process. (1)cross-functional team (2)unified procurement (3)SaaS (4)custom system development (5)best of breed procurement
cross-functional team
The processes by which electronic data that might be used as legal evidence are requested, secured, and searched. EX: The Montana Mining Company was required to produce emails and other electronic documents as part of a civil lawsuit over a dispute with landowners. The process by which these documents can be requested and used as legal evidence is called ________.
e-discovery
Hanover Pretzels recently implemented a new wireless network with coverage for all its plant operations and administrative offices. The fixed cost of the project was $180,000. What is the savings of the project if it returns the investment in three years? (1)$15,000 in six months (2)$40,000 per year (3)$10,000 per quarter (4)$5,000 per month (5)dash$10,000
$5,000
A company strategy that involves offering a similar product at a lower price compared to competitors EX:Walmart has followed this theory by focusing its strategy on dominating a broad market.
Low cost Leadership
Joe Roberts, a senior at Georgia State College, is the group leader for an important class project. Group members have difficult schedules to coordinate, so Joe decides to conduct most meetings in a virtual environment. Joe knows that to compensate for the weak norms common in virtual teams, he must make group expectations very clear. Which of the following would best help Joe clarify expectations? (1)A team charter (2)A wiki (3)A shared workspace (4)A blog (4)A legal contract
A Team Charter
Web software frequently used to build knowledge bases that allows users to add and edit interlinked web pages. EX: Best Buy is expanding its retail outlets to include smaller kiosk-type stores that will be located inside malls. They are recruiting a number of young, tech-savvy employees to work at the kiosks. The company wants to create knowledge storehouses that employees can edit as needed, adding contributions from their own personal experiences with products or updating existing information. Which of the following can the company use to help it organize how-to guides and create a substantial base of knowledge for its new employees? (1)Virtual world (2)GDSS (3)Microblogging (4)A wiki (5)Twitter
A Wiki
Michael Rainer is a systems integrator who works for Allied Technologies. This means that Michael offers what type of expertise to companies that have purchased software from several different vendors? (1)A project manager who oversees the purchase of new software (2)A manager who, through leadership, prepares the organization for change to become dynamic (3)A manager who inspires employees to work together and provide resources the project team needs (4)A consultant who ensures that employees are making the best use of information systems (5)A consultant who ensures that hardware and software components of an IS work together
A consultant who ensures that hardware and software components of an IS work together
The Zip Right In convenience store recently upgraded its stores with new paint and lighting. The customer checkout system, however, was still slow and inefficient. What is the most likely consequence of this situation?
A negative impact on the customer relationship
Government funding for technology-based innovation is often the only source of funding available for high-risk projects that private investors may avoid. For which of the following projects is government funding most critical? (1)A project to develop a more disease-resistant orange tree (2)A scheme to improve the financial status of a company. (3)A project to launch a new, low-cost and fuel-efficient car (4)An infrastructure project that should be completed in one year (5)A research project on hybrid oil
A research project on hybrid oil
Knowledge management is a broad term used by organizations, academic institutions, and governments to describe which of the following? (1)Organizational strategies developed to increase market share (2)Processes that experts use to categorize public assets (3)Strategies that organizations use to understand the responsibility they have toward society (4)A set of strategies and practices organizations use to become more systematic about managing intellectual capital (5)Practices that customers use to understand products prior to purchasing
A set of strategies and practices organizations use to become more systematic about managing intellectual capital
Dow Chemical launched a social "alumni" network to tap the knowledge and skills of its retirees, employees on maternity leave, and others no longer working at the company by using an internal social network. Which of the following is one of the driving forces behind the increasing use of social networks by organizations? (1)A shortage of chemical engineers (2)A decrease in the number of baby boomers retiring (3)A shortage of skills and organizational knowledge as baby boomers retire (4)A lower level of education among new employees (5)A lack of pension plans for new employees
A shortage of skills and organizational knowledge as baby boomers retire
EDP Corporation requires that employees sign a(n) ________, which encompasses services each employee will be provided, whether and how much they can utilize company resources for personal use, the kinds of surveillance that are in place, and it reinforces legal requirements, such as prohibitions against unauthorized copying. (1)acceptable-use policy (2)intellectual property disclaimer (3)Fair Information Practices policy (4)ethical conduct policy (5)Internet usage policy
Acceptable Use Policy
Which of the following is an example of an executing process in project management? (1)Fixing project schedules (2)Selecting the project team (3)Defining milestones and goals (4)Turning over system documentation to the IT department (5)Allocating work assignments
Allocating Work Assignments
Which of the following best describes change management? (1)An approach to the transition employees make as they switch from existing work processes to new ones (2)An approach to streamlining work processes to maintain universal codes (3)An approach to project management that ensures that project stakeholders do not deviate from the defined project objectives (4)An approach that brings new employees in an organization up to date with work processes (5)An approach to get rid of employees no longer needed as a result of the project
An approach to the transition employees make as they switch from existing work processes to new ones
A roadmap created by an organization to describe its current situation and where it should head to achieve its mission, focusing on business strategy and the technology infrastructure required to achieve it. EX:GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its annual strategic planning process, GenXTech is analyzing its current situation and where it should head to achieve its mission. Its focus is on business strategy and the technology infrastructure required to achieve it.. They are creating this...
An enterprise architecture
In a recent meeting with the top executives in the company, the CEO, Dan Klippinger, was given a ballpark figure to implement a new customer relationship management system that was predicted to save the company $5 million dollars over the next few years. Although the requirements for the system had not been determined and the numbers were just estimates, the CEO used the amount he initially heard in all his future discussions about the system. The tendency for the CEO to rely too heavily on this single piece of information is called ________. (1)confirmation bias (2) anchoring (3) availability bias (4) overconfidence (5) a planning fallacy
Anchoring
The type of software that controls basic computer operations such as file management, disk storage, hardware interfaces, and integration with the application software. EX: Christy works as an executive assistant to the president of Wykoff Industries. She spends the majority of her time answering emails, composing letters, and preparing estimates. What type of software is Christy using to complete the tasks in her job?
Application Software
In the music industry, why were innovations like Apple's iTunes considered to be disruptive innovations -A new product or service, often springing from technological advances, that has the potential to reshape an industry.? (1)Because these innovations were illegal (2)Because Apple had the support of music company executives (3)Because these innovations had higher operational costs (4)Because these innovations reduced Apple's supplier power in the music industry (5)Because these innovations had a negative effect on existing competitors in the music industry
Because these innovations had a negative effect on existing competitors in the music industry
A reference point used as a baseline measurement. An activity would you perform to measure and compare your business processes to similar processes of other companies within your industry
Benchmarking
An approach used by organizations in which they procure the best systems for each application, regardless of the vendor, and then build interfaces among them. EX: Capital One has different vendor software for each of its main enterprise systems including an ERP system, an SCM system, and its customer relationship management system. The company uses only the best system for each of its primary functions and then builds interfaces among them to unify the system architecture. Capital One is using a(n) ________ approach to software procurement. (1)custom system development (2)best of breed (3)unified (4)Software as a Service (5)request for information
Best of Breed
The "Internet of Things" is often considered a major contributor to ________, which also includes information collected from wikis, blogs, social networking sites, and discussion forums. (1)a data warehouse (2)business intelligence (3)Web 2.0 (4)big data (5)bots
Big data
iTicket, an online event-ticketing site, recently discovered that most of its good seats for a widely anticipated concert were preemptively booked in bulk by brokers. This action resulted in a shortage of tickets that the public could have bought themselves. Which of the following most likely enabled the brokers to book tickets in such large numbers? (1)Neural networks (2)Mashups (3)Big data (4)Dashboards (5)Bots
Bots
Kyle Albright is a database administrator at Regions Bank in Atlanta. He is currently working on problems of information overload on the bank's operational systems. Which of the following actions would BEST help Kyle to speed up the systems and prevent information overload? (1)Storing critical data on email or locally on workstations (2)Building a data warehouse optimized for complex queries (3)Housing all transactional data on a common server (4)Creating a process of running system queries simultaneously (5)Transferring all the company data to the cloud
Building a data warehouse optimized for complex queries
The accounting department is conducting a series of data back-ups in preparation for year-end reports and audits. This activity is considered a ________ that involves information technology resources. (1)financial transaction (2)deliverable (3)project (4)audit (5)business process
Business Process
How can human resources professionals use information systems to increase efficiency and effectiveness? (1)By formulating an e-commerce strategy for the organization (2)By developing products to better meet customer needs (3)By developing a website to answer routine customer questions (4)By creating online training manuals and e-learning modules for employees (5)By using information collected from customer surveys to determine how to spend advertising dollars
By creating online training manuals and e-learning modules for employees
When Stan Copelan, a staff accountant at a large brokerage firm, decided he had had enough of seeing customers lose their life savings from corruption in his company, he posted information on a blog about the company's unethical business practices. The company fired Stan, which resulted in the blogging community reposting information about the corruption and damaging the company's reputation. In what way did ICT play a role in this situation? ICT is Info and Com Technology - The term encompasses the broad collection of information processing and communications technologies, emphasizing that telecommunication technology is a significant feature of information systems (1)By providing a way for the company to defend its reputation (2)By helping legal officials build a case against the company (3)By providing a viral reach that amplified the effects of the corruption (4)By limiting the amount of corruption at the company (5)By providing a cover for Stan
By providing a viral reach that amplified the effects of the corruption
An important feature of unified communications is the ________, which lets senders know whether the individual is available to communicate at the moment and which mode he or she prefers. (1)hashtag (2)context indicator (3)IM (4)tag cloud (5)GDSS
Context Indicator
When established companies fail to respond to disruptive innovations that capitalize on new technologies, they can become victims of ________.
Creative Destruction
(Commercially available computer software that is ready to buy, install, and use.) Software products such as Microsoft Office, Quicken, Adobe Premiere, and Eudora Pro are also called ________. (1)legacy software (2)utility software (3)COTS (4)software as a service (5)open source software
COTS (Commercial Off the Shelf)
NOAA.org is a website that allows visitors to search an extensive knowledge database for information about hurricanes and other extreme weather events. It contains frequently asked questions and is continually updated as new information becomes available. Which step of the knowledge management process has NOAA successfully accomplished by developing its massive searchable database? (1)Locating sources (2)Capturing knowledge (3)Identifying the goal (4)Distributing reports E. Verifying information
Capturing Knowledge
Which of the following is responsible for overseeing an organization's information systems and ensuring that information systems support the organizational strategy? (1)Chief Information Officer (CIO) (2)Chief Executive Officer (CEO)(3)Chief Information Security Officer (CISCO) (4)Chief Operations Officer (COO) (5)Chief Privacy Officer (CPO)
Chief Information Officer (CIO)
Which of the following real-life functions does an intelligent agent perform? (1)Monitoring the Internet to screen out malicious software and viruses (2)Collecting and sorting a company's sales data (3)Classifying and indexing web pages for search engines (4)Tracking Internet usage patterns of a company's employees (5)Loading data into data warehouses
Classifying and indexing web pages for search engines
Business intelligence data that includes every click by every visitor on a website, along with associated data such as time spent on the page and the visitor's IP address EX: Travels by Donna, a travel agency in Georgia, recently created a website to attract travel clientele for the company. It is vital that the company be able to track the time that visitors spend on each page to understand the destinations and offers that interest potential customers. Which of the following will BEST help the company understand customer behavior patterns as well as the URL the visitor just left? (1)Clickstream data (2)Pop-up ads (3)Real-time data (4)Keystroke logging (5)IP addres
Clickstream Data
Joe Roberts is finalizing the project management plan for the Wild River Social Media project, which will describe the components needed to ensure the success of the project and serve as a high-level road map for the project team. Which of the following project management planning documents is NOT a key part of the plan? (1)Closing documents (2)Risk-management plan (3)Quality management plan (4)Project charter (5)Project schedule
Closing Documents
Which of the following enables users to access software applications and information systems remotely over the Internet, rather than locally on an individual PC or from servers in the organization's data center?
Cloud Computing
Which of the following statements about e-learning methods is FALSE? (1)Corporate e-learning modules are often self-paced, and educational e-learning is based on the university calendar with defined start and end dates. (2)Corporate e-learning modules are professionally developed using excellent production tools or commercial software. (3)College-based e-learning systems lack wikis, blogs, and other collaborative tools due to their lack of validity. (4)Corporate e-learning consists of modules employees can take on their own time to improve their skills or achieve certification. (5)College-based e-learning systems are developed in-house by instructors who focus on the content of the course more than the visual elements.
College-based e-learning systems lack wikis, blogs, and other collaborative tools due to their lack of validity
The CIO at Bank of America recently decided that all bank operations should be moved to the cloud in order to save money and ensure that the bank uses the most current technology available. To make the decision, the CIO used only data that supported his plans and failed to consider studies that pointed to the risks and vulnerabilities in cloud-based computing. In this example, the CIO was exhibiting ________ in his decision-making process. (1)hindsight bias (2) a planning fallacy (3) overconfidence (4)confirmation bias (5)availability bias
Confirmation Bias
Companies with disparate databases that are not shared among employees or departments within the organization often experience ________. (1)more ownership challenges (2)faster response time (3)fewer reporting formats (4)conflicting information (5)higher reliability in the data
Conflicting Information
When aggregate or summarized information is in agreement with detailed information, it has which characteristic of high-quality information? (1)Consistency (2)Timeliness (3)Bias (4)Uniqueness (5)Completeness
Consistency
The project dashboard for the Wild River Social Media Project indicates that the project is behind schedule in several key activities that require Joe Roberts, the project manager, to reallocate resources to stay on schedule. In this example, Joe is performing which project management process? (1)Planning (2)Initiating (3)Controlling (4)Executing (5)Closing
Controlling
James Key is a corporate trainer at Regions Bank in Atlanta. The bank is developing a new business intelligence department and will using web-based analytics to track customer use of online banking services and other functions available on the company website. James is designing a course for employees to teach them about web-based analytics. Which of the following strategies should James use to engage employees and help them understand and apply the concepts of web-based analytics? (1) Create a company blog to highlight how course topics apply to current events in the company (2)Have employees write a research paper on web-based analytics (3)Form a focus group to discuss the course concepts (4)Provide PowerPoint slides and chapter readings for each class (4)Give multiple-choice quizzes to test employees' knowledge of the course concepts
Create a company blog to highlight how course topics apply to current events in the company
AFLAC, Inc. is implementing a new sales program to encourage customer service representatives to offer additional insurance products to customers who call for service. This is an example of a CRM (Customer Relationship Management) strategy to earn more revenue from existing customers by ________. (1)cross-selling (2)promoting permission marketing (3)implementing sales force automation (4)using a foot-in-the-door technique (5)using predictive analytics
Cross-Selling
The collection and analysis of vast amounts of customer data that enable companies to target market their products to specific customers has created concerns about the use and misuse of customer information. Which of the following is NOT a reason for the increase in the use of "Big Data" by companies? (1)Data storage costs have decreased significantly. (2)Customers have complete knowledge about the data that is collected about them. (3)Your answer is correct.C. Federal regulations fail to prevent companies from mining transaction data collected from customers. (4)Data mining techniques have become very sophisticated. (5)Targeted marketing reduces advertising costs.
Customers have complete knowledge about the data that is collected about them.
Individual facts or pieces of information. EX: Jackson walks into the ACE After-Hours Care clinic complaining of a fever. The nurse takes his temperature and enters the number into the patient information system. John's temperature reading represents a piece of ________.
DATA
Which of the following is a type of intelligence gathering that uses statistical techniques to explore records in a data warehouse, hunting for hidden patterns and relationships that are undetectable in routine reports? (1)Data mining (2)Normalizing (3)Transforming (4)Forecasting (5)Data extracting
Data Mining
A model used for planning the organization's database that identifies what kind of information is needed, what entities will be created, and how they are related to one another. EX:Devon Degosta is planning the organization's database. The model Devon is developing to identify what kind of information is needed, what entities will be created, and how they are related to one another is called a(n) ________. (1)archiving model (2)hierarchical model (3)process model (4)data model (5)functional model
Data Model
The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. (1)data independence (2)data redundancy (3)data modeling (4)online processing (5)batch processing
Data Redundancy
Craigslist.com is an example of a ________, whereby the company owns the actual database but the records are created and managed by customers. (1)shadow system (2)data warehouse (3)database without boundaries (4)database management system (5)data mart
Database Without Boundaries
A central data repository containing information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning. EX: Realtree Outdoors, Inc. maintains a centralized repository of information from internal sources, competitor information, census reports, metadata from documents and multimedia, and other information. This repository is known as a ________. (1)data dictionary (2)data mart (3)data warehouse (4)shadow system (5)operational database
Data Warehouse
Why do data ownership issues often arise in the workplace? (1)The quality of data varies across departments. (2)Data security and compliance controls are well enforced. (3)Data is often taken from external sources. (4)Data is shared by all the stakeholders in the organization. (5)Data is stored in databases on external servers.
Data is shared by all the stakeholders in the organization.
An integrated collection of information that is logically related and stored in such a way as to minimize duplication and facilitate rapid retrieval Example: Professor Jones is accessing information about students currently enrolled in her Management Information Systems course. She wants to print out a class listing so she can take attendance each day. The information about the students in her class is stored in a ________. (1)student enrollment system (2)record (3)data dictionary (4)data mart (5)database
Database.
A wireless provider is currently offering customers who buy a new iPhone with a two-year contract a special package that includes a leather case, extra car charger, and earphones. In terms of Porter's Five Forces, what is this company trying to do with this special promotion? (1)Increase buyer power (2)Increase the threat of new entrants (3)Increase the threat of substitutes (4)Decrease buyer power (5)Decrease the power of suppliers
Decrease buyer power
The Internet is a disruptive innovation that has affected Porter's Five Forces in all of the following ways EXCEPT ________. (1)eliminating switching costs B. lowering barriers to entry C. increasing rivalry among competitors D. increasing the power of buyers E. decreasing the threat of substitutes
Decreasing the threat of new substitutes
The marketing department has defined several key ________ related to the Wild River Social Media Project including the creation of a new user interface that lets customers purchase photos taken on the ride and a feedback function where riders can post information about what they learned on the ride. (1)milestones (2)resources (3)constraints (4)benchmarks (5)deliverables
Deliverables
Dan Womack is an internal auditor who specializes in risk management audits for an organization's data assets. He has been hired by Wachovia Bank to perform a formal risk assessment for the company. Which of the following steps should Dan undertake first in order to assess the firm's readiness to face any potential security breaches? (1)Assessing threats from inside or outside the organization (2)Predicting future risks and devising strategies to prevent them (3)Recovering existing systems from damage (4)Evaluating controls and filling in security gaps (5)Determining which information assets need protection
Determining which information assets need protection
The International Accounting Standards Board (IASB) plays an important role in global trade and investment by doing which of the following? (1)Developing and promoting a single worldwide set of financial reporting standards (2)Representing accountants employed in the public and private sectors in the United States (3)Providing professional accountants worldwide with access to a wide range of resources (4)Establishing international tax laws and codes (5)Establishing international standards on ethics in auditing and public sector accounting
Developing and promoting a single worldwide set of financial reporting standards
Technologies that software developers, publishers, media companies, and other intellectual property owners use to control access to their digital content EX: Technologies that software developers, publishers, media companies, and other intellectual property owners use to control access to their digital contentune Bug Books, an e-publisher of rare and out-of-print books, uses an information system that administers the way its customers access online publications of digitized books. The system assigns each customer with a unique ID, maintains records of the books purchased by customers, encrypts electronic documents for transmission, and includes options to order hard copies of electronic documents. Which of the following terms describes the technology used in this case? (1)Customer relationship management system (2)Digital rights management (3)Inventory management (4)Internet resource management (5)Online identity management
Digital rights management
At a recent mock drill held at the headquarters of Pratt & Whitney, department managers used the company's ________ to guide their actions following the simulated disaster that destroyed their network access and technology resources. (1)due diligence plan (2)emergency evacuation plan (3)business continuity plan (4)business automation plan (5)disaster recovery plan
Disaster Recovery Plan
Brad Wallace conducts several online sales meetings a year as the district manager for Provident Insurance Company. During the meetings, Brad often comes across to his sales team as arrogant, blunt, and aggressive. This has had a negative impact on morale and increased turnover in his sales force. Brad is exhibiting a characteristic common in online environments know as ________. (1)telepresence (2)presence awareness (3)collaboration (4)media richness (5)disinhibition
Disinhibition
An economic community that includes the related industries making complementary products and services, the competitors themselves, the suppliers, and also the consumers.
Ecosystem
A powerful technique that protects sensitive data is ____________. (1)phishing (2)encryption (3)surfing (4)hacking (5spamming
Encryption
Amy Neff wishes to enroll for Hotmail's free email service. Which of the following would BEST help Hotmail establish that Amy is not a software bot? (1)Entering a sequence of letters and numbers from an image (2)Using biometric identification (3)Providing an alternative email address (4)Providing her contact details and Social Security number (5)Uploading her photo and providing visible identification marks
Entering a sequence of letters and numbers from an image
The tendency to continue investing in a project, despite mounting evidence that it is not succeeding, often comes about because people mistakenly let sunk costs affect decision making rather than weighing the value of further investment is known as ________. (1)post-purchase rationalization (2)progress trap (3)escalation of commitment (4)buyer's remorse (5)zero-profit condition
Escalation Commitment
When Apple took steps to identify and correct questionable employment practices on the part of some of its suppliers, it demonstrated ____________ practices across its supply chain. (1)ethical (2)predatory (3)temporary (4)mandatory (5)revisionary
Ethical
The office manager for Freeman and Associates is concerned that subcontractors are billing the company twice for work that is performed. Which of the following reports would help the manager identify fraudulent transactions? (1)Routine report (2)Exception report (3)Compliance report (4)Non-compliance report (5)General ledger report
Exception Report
Audrey Tillman is head of HR for a large Chicago-based real estate and property management firm with offices located throughout the northeast. She is trying to identify a potential candidate in the company to manage a complex new property the company was recently hired to manage. The position requires extensive expertise in the field and experience working with executives. Which of the following tools would help Audrey identify the best candidate for the position? (1)Neural network (2)Expert locator tool (3)Content management system (4)Social network analysis (5)Knowledge management system
Expert Locator Tool
Knowledge that can be documented and codified, which is often stored in information systems, on websites, in spreadsheets, or in handbooks and manuals. EX: Consumer Reports is a magazine that tests consumer products in its labs and disseminates information on the results so consumers can compare brands. The information that is analyzed and published by Consumer Reports can be accessed by consumers from the publisher's website, and it is also sent to subscribers in the form of a printed magazine. The product information is an example of ________. (1)explicit knowledge (2)tacit knowledge (3)financial capital (4)structural capital (5)intellectual capital
Explicit Knowledge
Which part of the SDLC planning process examines whether an initiative is viable from technical, financial, and legal standpoints? SDLC (Systems Development Life Cycle) - The process that describes the seven steps in the life of an information system: planning, analysis, design, development, testing, implementation, and maintenance. (1)Brand assessment (2)Feasibility study (3)Business process reengineering (4)Market share analysis (5)Procurement analysi
Feasibility study
One of Porter's three basic strategies. A company strategy that involves differentiating a product or service for a particular market niche. EX: In the highly competitive cell phone market, BlackBerry has positioned its smartphone by focusing its product on the needs of government and corporate business users.
Focused Niche Strategy
A statistical decision support tool used to analyze historical trends and other business intelligence to estimate some variable of interest, such as customer demand. EX: The business analysts at Blue Bell, a brand of ice cream, recently were asked to assess revenue generated over the past five years to observe seasonal and historical trends. After extensive analysis, they arrive at the conclusion that the sales were highest during the months of July and August, the summer months in the country, and an all-time low during January, the peak of winter. Which of the following tools would have BEST helped them arrive at this conclusion? (1)Goal-seek analysis (2)Forecasting (3)What-if analysis (4)Optimization analysis (5)Market basket analysis
Forecasting
Primary keys that appear as an attribute in a different table are a foreign key in that table. They can be used to link the records in two tables together. EX:In Valdosta State University's database, student records in the student table are linked to the university's academic majors table through a common field, which is the major code. In the student table, the major code is a ________ (1)primary key (2)foreign key (3)record (4)functional key (5)complex key
Foreign Key
Virtual teams are increasingly common in organizations as new collaborative technologies allow companies to draw on employees' expertise regardless of physical location and also reduce the number of physical meetings that require travel. A key drawback to virtual teams, however, is the lack of nonverbal communication to convey group norms. This can often lead to problems such as ________. (1)impression management (2)groupthink (3)missed deadlines (4)bias (5)free riding
Free Riding
Which of the following is a web-based e-mail service that was built from the ground up to work within the browser rather than with client software installed on a computer? (1)Lotus Notes (2)Gmail (3)Scribd (4)IM (5)Groupwise
Gmail
Columbus Flight Services, Inc. offers charter flights serving small to medium cities. They are evaluating the possibility of expanding into the corporate jet leasing industry. As part of the planning process, they are using Porter's Five Competitive Forces model to evaluate the ________. (1)product (2)industry (3)investment (4)market (5)competition
Industry
The success of the 419 scam is based on the human frailty of __________. (1)poor memory (2)laziness (3)helpfulness (4)greed (5)fear of authority
Greed
EX: Robert works for CHS Computer Specialists, which focuses on helping small business owners fix their company computers. Robert works primarily on PC components such as hard drives, DVDs, and monitors. Which of the following does Robert focus on repairing? (1)Hardware. (2)Disaster recovery (3)Software (4)Backup systems (5)Data
Hardware
At a conference of music professors, users were instructed to use the #musicedu symbol to preface their comments about the conference topics on Twitter so other attendees could easily locate information. This is an example of using a(n) ________. (1)tag cloud (2)hashtag (3)wiki (4)mashup (5)microblog
Hashtag
ETX Enterprises offers Software as a Service (SaaS) to companies that lack in-house IT departments. Which of the following describes SaaS? .(1)Managing applications, networks, storage, and security and providing website performance monitoring to subscribers over the Internet (2)Installing commercial, off-the-shelf software (3)Hosting and managing access to software applications delivered over the Internet on a subscription basis. (4)Supplying online access over networks to storage devices and storage area network technology (5)Developing proprietary software
Hosting and managing access to software applications delivered over the Internet on a subscription basis
Professor Dunlap is developing a new online course called "The History of Religion." Which of the following factors should he take into account as he develops his online course?
How students interact in a virtual classroom environment
The competencies and knowledge possessed by the organization's employees. EX:Chick-fil-A is opening a new store in Sacramento, California, that will be run by a new franchise owner. The company has asked Josh Carter, a manager with more than ten years with the company, to help open the store and teach the new owner how to run the business. What type of intellectual capital is Chick-fil-A leveraging by sending Josh to help open the new store? (1)Social capital (2)Structural capital (3)Human capital (4)Equity capital (5)Financial capital
Human Capital
Progressive Insurance recently deployed Salesforce.com for its sales agents; it provides real-time web-accessible metrics showing the number of new accounts for each rep, and it automatically sends e-mails to the whole organization to recognize and congratulate the top performers. This approach is based on which of the following? (1)Human motivation (2)Team dynamics (3)Pay-for-performance (4)Social comparison (5)Self-determination theory
Human Motivation
John Finley teaches an international business course by using a combination of traditional lectures in class twice a week and an online discussion and quiz that his students must complete for each chapter. He also posts all his course materials, such as PowerPoint slides, on his course website so students can access them at any time. John's approach is known as a(n) ________ model of e-learning. (1)self-paced learning (2)instructor-led (3)learning management system (4)hybrid (5)Internet-based
Hybrid
Which of the following statements about Internet Mail Access Protocol (IMAP) is TRUE? (1)IMAP deletes indicators regarding the status of emails, such when a user has replied or read an email. (2)IMAP requires the installation of client software and cannot work on web browsers. (3)IMAP is an outdated protocol for organizing outgoing mail. (4)IMAP allows access to email only from a single device, ensuring privacy. (5)IMAP maintains emails on a server instead of on a single machine.
IMAP maintains emails on a server instead of on a single machine.
Which of the following is NOT one of the criteria commonly used to determine the value of an IT project? (1)Return on investment (2)Contribution to competitive strategy (3)Improvement in customer satisfaction level (4)Payback period (5)Compliance and risk reduction
Improvement in customer satisfaction level
Jamal uses Endnote software to create and format the bibliography for his research paper. Jamal is using information systems to do which of the following?
Increase his personal productivity
Iron Bank Coffee has three retail stores, each operating independently with their own database of customers and products. The owner, Richard Smith, has decided to consolidate the databases of the three stores into a single database. Which of the following is NOT a benefit Mr. Smith will realize by consolidating the databases? (1)Makes performing information updates easier (2)Increases the number of customers for the coffee shops Your answer is correct.C. Improves information quality (3)Uses less hard disk space (4)Reduces data redundancy
Increases the number of customers for the coffee shops
Which one of the following statements is NOT an amplification effect of information systems? An Amplification effect is When small events within an information system have far-reaching effects (1)An individual sends emails to more people than intended.. (2)Data from an email or photo can be forwarded or uploaded for millions to view. (3) Information stored in the cloud can be easily hacked and stolen by anyone. (4)Information posted on a person's social networking site can be easily distributed to a wider audience than the person's own network. (5)A negative video about a company is spread virally through YouTube
Information stored in the cloud can be easily hacked and stolen by anyone.
Which phase of the project management process involves identifying the project sponsor, the project manager, and team members? (1)Initiating phase (2)Monitoring phase (3)Controlling phase (4)Planning phase (5)Executing phase
Initiating Process
AFLAC, Inc. recently implemented a company policy that all new IT projects must be coordinated and approved by the project management office. Which of the following endeavors would this new policy apply to? (1)Updating software programs (2)Performing information system maintenance (3)Backing up organizational data (4)Installing a wireless network in a branch office (5)Setting up new employees with systems access
Installing a wireless network in a branch office
Which of the following is the primary function of unified communications? (1)Integrating multiple applications and communications channels into a single interface (2)Collecting and storing data from multiple users and building a database (3)Allowing a company to communicate with all its customers at the same time (4)Providing a virtual environment for employees to collaborate (5)Maintaining a record of individual changes made on shared documents through version control
Integrating multiple applications and communications channels into a single interface
Freeman and Associates is a medium-sized construction company specializing in high-end custom homes. The bookkeeper handles all orders, approvals, invoices, and payments manually. Which of the following will help the company implement a more streamlined and faster approval system for its financial activities? (1)Monitoring cash management and budget planning (2)Analyzing customer information (3)Integrating the modules in the financial system (4)Increasing financial analytics and financial reporting (5)Implementing a supply chain management system
Integrating the modules in the financial system
Innovative Solutions, a patent law firm, provides client services such as drafting patents, filing patent applications, and managing intellectual property rights. The company is planning to build an electronic database of the patent applications it has filed for its clients over the years. However, most of its clients are not tech-savvy and often rely on handwritten notes for their reference. Which of the following software tools would enable the company to convert the large number of paper-based notes from its clients into electronic records that can be easily searched and referenced? (1)Image recognition (2)Knowledge management program (3)Intelligent character recognition (4)semantic mapping (5)Optical mark recognition
Intelligence Character Recognition
HR Solutions, Inc. provides human resource technology solutions to companies that are seeking ways to reduce costs and improve efficiencies in their operations. Which one of the following functions is NOT a human resource function that would benefit from a technology-based solution? (1)Interviewing potential job candidates (2)Processing timesheets electronically (3)Developing a website to answer routine HR questions (4)Implementing direct deposit for all payroll processing (5)Implementing an online application process
Interviewing Potential Job Candidates
An organization's private web space. It relies on TCP/IP and web browsers, but it is password-protected and accessible only to authorized individuals through the organization's portal. EX: Total Service Group, LLC is an information technology firm that uses its own private web space to organize and distribute employee forms and announcements. It has recently begun using the same web space to manage its knowledge-related initiatives as well. The company's employees are able to access information about HR, procedure manuals, and frequently asked questions. The private web space is an example of a(n) ________. (1)content management system (2)wiki (3)local area network (4)knowledge management system (5)intranet
Intranet
Which of the following functions does a firewall perform? (1)It ensures that routine back-ups of sensitive data are completed. (2)It encodes sensitive data to ensure safe transmission across unsecured networks. (3)It attracts malicious attacks to study their properties and origins. (4)It ensures security by using multiple authentication strategies for employees. (5)t defines which IP addresses or domains should be blocked.
It defines which IP addresses or domains should be blocked.
The waterfall or traditional software methodology is considered by many to have exceeded its useful life and inappropriate for modern development projects. Surveys, however, show that the method is still widely used in many organizations. Which of the following reasons explains why it is still considered a viable methodology in today's fast-paced development environment? (1)It adapts quickly to inevitable changes in a project. (2)It has a logical and familiar structure, which is comfortable to use. (3)It is more iterative and allows developers to rapidly build workable components. (4)Organizations need time to adjust to its team-oriented approach. (5)It has a strong track record of delivering quality software on time
It has a logical and familiar structure, which is comfortable to use.
Which of the following is a drawback of the waterfall method - Method in which the systems development life cycle tasks occur sequentially, with one activity starting only after the previous one has been completed? (1)Its SDLC tasks occur in a non-sequential manner. (2)It estimates deliveries based on the time and requirements available. (3)It does not address testing very well. (4)It is unable to adapt to changes of the business landscape. (5)Its activities occur at the same time, which makes it hard to monitor them.
It is unable to adapt to changes of the business landscape.
The executive team at AFLAC, Inc. wants to encourage more productive brainstorming in its product development meetings. Several employees have complained that their opinions are not captured in the minutes of the meetings and that certain individuals dominate the discussions. It has decided to begin using a new group decision support system to facilitate the process. What is one of the key advantages AFLAC will realize using group decision support systems? (1)It will give high-status individuals within the group additional influence on decisions. (2)It will allow users to express independent viewpoints that may differ from those of others in the group. (3)It will not support anonymity and require users to use their real names, to increase accountability. (4)It will promote "groupthink." (5)It will allow users to collaborate with each other asynchronously, saving time and effort in coordination.
It will allow users to express independent viewpoints that may differ from those of others in the group.
Delta Airlines recently updated its ________ to include new measures related to airline safety and customer satisfaction with its online reservation system. These updated and quantifiable metrics will be used by Delta to evaluate its organization against industry standards. (1)key performance indicators (2)social media (3)strategic goals (4)dashboard (5)portal
Key Performance Indicators
The Blue Door is a new high-end clothing store catering to college students in a small southern city. It recently launched a new line of accessories with the college logo imprinted. The company has set up a Google Ad account to deliver the link to its website as the top search result to Internet users when they search for words such as "scarves" and "collegiate accessories." Which of the following does this situation illustrate? (1)Direct marketing (2)Product placement (3)Conversion rate (4)Keyword advertising (5)E-commerce
Keyword Advertising
A network that connects devices such as computers, printers, and scanners in a single building or home EX: Abercrombie Financial Consultants is planning to install a network in its office so employees can work together on client files and documents, manage tax records, access the Internet, and share the company's new printer/copier. The company wants to have control over which employees have access to files, so it will need to have a central server. Which type of network would be most appropriate for Abercrombie?
LAN (Local Area Network)
The Acme Company's payroll office maintains its employee pay records within its own computer files, each containing information that is required for processing monthly payroll checks. A separate area of the company handles employee benefits with its own computer system and employee records. Acme Company is limited to comparing and analyzing employee information in these files for which of the following reasons? (1)Data independence (2)Data integrity (3)Lack of data integration (4)Consistent data definitions (5)Complicated tables and fields
Lack of Data Integration
Which of the following businesses is an example of where rivalry among existing competitors is strong and buyers have power? (1)Dude ranch vacation (2)Lawn care business (3)English antiques store (4)Commercial-grade kitchen appliances (5)Customized motorcycles
Lawn Care Business
A self-contained digital resource embedded in an e-learning course that can be edited and reused for other purposes. EX: The Chicago Culinary School uses an e-learning system for students to watch videos, learn terminology, and master the fundamentals of cooking. When developing the course for the culinary school, the course designers decided to create ________ with all digital resources about each topic organized in one place. This approach lets students access and complete just the learning modules they need to complete each class and also allows the course designers to easily update and reuse the learning material. (1)learning objects (2)a semantic web (3)a knowledge repository (4)chapters (5)cookies
Learning Obects
Cambridge Landscape Architects is evaluating a new CAD system to assist with landscape design projects in its new urban garden design center. As a general rule, the company should consider buying the CAD software versus developing a custom system in-house under what circumstances? (1)Licensed software meets 75 to 80 percent of its requirements (2)The cost to develop the software is very reasonable. (3)Organizations need to retain the same business processes. (4)Customer demands emphasize customization of a product. (5)Software needs to fit the enterprise architecture perfectly
Licensed software meets 75 to 80 percent of its requirements
The head of information security for TIC Credit Union recently suggested that the company increase the level of online surveillance of employees to reduce the risks of employee theft and violations of customer privacy laws. Which of the following negative impacts should the bank president be concerned about regarding the recommendation? (1)Compromised company security (2)Increased pressure on corporate e-mail systems (3)Increased instances of plagiarism (4)Lowered productivity of employees (5)Increased levels of cyberslacking
Lowered productivity of employees
Malicious software designed to attack computer systems. EX: Lynn Brown is a contract underwriter who does freelance work for a local insurance company. Her desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits and her e-mail communications. Data gathered from the monitoring activity is sent to a remotely placed hacker. Which of the following threats most likely has infected Lynn's computer? (1)A web crawler (2)A Trojan horse (3)A worm (4)A firewall 5)Malware
Malware
Which of the following disciplines studies how people, technology, processes, and data work together, and is also used to describe a type of information system that supports decision making by supervisors? (1)Collaborative information systems (2)Operations management systems (3)Management information systems (4)Executive information systems (5)Business intelligence systems
Management information systems
Paula Watkins was surprised when a job position that she interviewed for and felt sure she had never materialized. She later heard that the company had conducted a search of her social networking profile that made them reconsider hiring her for the position. What should Paula have considered prior to applying for a new job? (1)Securing good references (2)Creating a new resume (3)Making sure she had a good interview suit (4)Communicating her work experience (5)Managing her online impression
Managing her online impression
James Coburn is a business analyst at Dillard's, a high-end retail store. James is preparing a report to assess customer data to understand the buying patterns of customers when they purchase multiple items. Which of the following will BEST help James analyze the purchasing habits of customers who bought rain boots along with umbrellas, ties along with shirts, and hair clips along with headbands among other related products? (1)Online analytical processing (2)Forecasting (3)What-if analysis (4)Goal-seek analysis (5)Market basket analysis
Market Based Analysis
Tom Tebeau is a web designer at a publishing firm in Atlanta where he is currently using a process to aggregate a wide array of information like book reviews, customer feedback, awards won, and company details on its public website. Which of the following is he using to bring together all this information from multiple internal and external sources onto the company's customizable web pages? (1)Dashboard (2)Middleware (3)Virtualization software (4)Mashup (5)Portal
Mashup
Data about data that clarifies the nature of the information EX: The search function of major photo-sharing websites such Flickr.com depend on information that is tagged with each photo including the photographer's name, contact information, release and copyright status, as well as caption and location data. This information is collectively known as ________.
Metadata
Brasfield and Gorie, Inc., a large advertising company with offices across the country, began an employee discussion forum on its website to allow employees to develop a sense of identity and solidarity. There were no restrictions on employee postings to allow employees to interact freely. However, a few months later, a few employees began criticizing the company on the forum and undermining morale. The company does not want to limit employee interaction, but at the same time, it would like to limit what employees can write. Which of the following features of a discussion forum will help them achieve this goal? (1)telepresence (2)Moderators (3)Version control (4)Anonymity (5)Forum leaders
Moderators
In the ________ phase, project managers pay close attention to reports and dashboards that might show early warning signs that some tasks have fallen behind. (1)planning (2)executing (3)initiating (4)closing (5)monitoring
Monitoring
A principle named for computer executive Gordon Moore, which states that advances in computer technology, such as processing speed or storage capabilities, doubles about every 2 years.provides an understanding of why computing resources today are more available than in previous decades?
Moore's Law
Which of the following statements is NOT a key reason that information technology (IT) is essential to managing nonprofit organizations? (1)Some nonprofit organizations engage in sales and marketing activities. (2)Operational requirements for nonprofits are similar to for-profit businesses. (3)Nonprofits often require extensive human resources to operate effectively. (4)Nonprofits need to communicate and collaborate extensively with other organizations. (5)Most nonprofit organizations have a concealed profit motive
Most nonprofit organizations have a concealed profit motive
Which ethical framework judges the morality of actions based on how well the actions adhere to broadly accepted rules regardless of actual consequences? (1)Social engineering (2)The rule of law (3)Utilitarianism (4)Intellectual property (5)Natural laws and rights
Natural Laws & Rights
Which type of network treats all processors equally and allows sharing of printers and files without the use of a central server?
Peer-to-Peer
A process that refines entities and their relationships to help minimize duplication of information in tables. EX:Devon Degosta is finalizing the database for DD-Designs. The last process involves minimizing the redundant information in the database and eliminating any awkward many-to-many relationships. Which process is Devon performing? (1)Data modeling (2)Data recovery (3)Data scrubbing (4)Normalization (5)Data mining
Normalization
Realtree, Inc. is in the process of launching a knowledge management system and needs to capture tacit knowledge from experienced employees that has been never documented. Which of the following approaches should Realtree use to get employees to share acquired information? (1)Offering inconsequential rewards for sharing information (2)Setting up an anonymous information sharing website to collect information (3)Offering monetary awards and public recognition (4)Threatening to fire any employees who do not participate (5)Promoting employees who share information
Offering monetary awards and public recognition
The employee database of Synovus Financial Company needs to store the birth date of each employee. In the context of database architecture, this is an example of ________. (1)one-to-one (2)one-to-many (3)data integrity (4)many-to-many (5)a hierarchical database
One-to-One
Rodney Perkins, who works in the marketing department of the Fairfield Inn, has been given the responsibility of identifying patterns in the preferences of guests who have repeatedly visited the hotel in the past ten years. Which of the following would BEST help him categorize the massive amounts of data to reveal preferences of guests, such as room type and room service? (1)What-if analysis (2)Forecasting analysis (3)Online analytical processing (4)Optimization analysis
Online analytical processing
A type of software whose licensing terms comply with criteria such as free distribution, so other people can access the source code to improve it, build upon it, or use it in new programs. EX: The city government of Los Angeles recently upgraded its information technology infrastructure and, for the first time, implemented software in the human resources department that is freely distributed along with the code underlying the program. The type of software the city has implemented in HR is called ________.
Open Source Software
Emily Robertson is an employee at Regions Insurance Company, the largest insurance company in Texas. What type of decisions will she undertake if her responsibilities include receiving customer queries, setting appointments for sales representatives, updating customer records, and tracking potential clients through call records? (1)Strategic decisions (2)Unstructured decisions (3)Tactical decisions (4)Directional decisions (5)Operational decisions
Operational Decisions
Business intelligence is said to be used at the ________ if companies use it to bring meaningful, performance-related information to all employees. (1)strategic level (2)tactical level (3)directional level (4)executive level (5)operational level
Operational Level
The area of management concerned with the design, operation, and improvement of the systems and processes the organization uses to deliver its goods and services.
Operations Management. Kia Motor Company is performing a key function of operations management when it [purchases new parts and supplies] for its new line of automobile
Electronic devices that capture text or images and convert them to digital format EX:When Kayla goes through the checkout line at the local grocery store, a(n) ________ captures the barcodes of her groceries and converts them to a digital format to generate the total amount of her groceries
Optical Scanner
Web 2.0 and user-generated content (UGC) characterize the ________ component of an information system. Web 3.0 and the "Internet of Things" rely on the ________ component of an information system.
People / Technology
Chancellor's is a high-end men's clothing store that frequently resorts to discount blowouts to get rid of excess merchandise. Which of the following best explains the reason for these sales? (1)A decrease in inventory costs (2)An increase in the price of raw materials (3)Ineffective tracking of the inventory (4)Increased competition in the local market (5)Overestimating demand
Overestimating Demand
Which of the following is typically NOT included in a full-featured financial management system? (1)Procurement (2)Payroll (3)Cash management (4)Budgeting (5)General ledger
Payroll
An attempt to steal passwords or other sensitive information by persuading the victim, often in an email, to enter the information into a fraudulent website that masquerades as the authentic version. EX: Janie Mount received an e-mail that contained a link to a website that appeared to be the website of her bank. The e-mail directed her to open the link and update her personal information including her credit card number, her Social Security number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. This is an example of Janie being a victim of ________. (1)keylogging (2)a phishing attack (3)pharming (4)spam (5)a worm
Phishing Attack
William Hart, a freelance writer and expert in rose gardening, recently updated his gardening website with an instructional manual for cultivating a new type of rose. One website visitor copied William's manual and posted it on her own blog and passed it off as her original work. This is an example of ________. (1)attribution (2)plagiarism (3)cybersquatting (4)bootlegging (5)online identity theft
Plagiarism
Michael Holliday is a business systems analyst who is working on a feasibility study for a new e-911 system for the city of Memphis. Which of the following phases is he working on as he determines if the system will provide a good return on investment for the city? (1)Design (2)Testing (3)Requirements analysis (4)Development (5)Planning
Planning
Brian Abeyta is responsible for the office that oversees all the projects going on throughout the organization. His office provides project management training, software, and support. What type of office does Brian manage? (1)Records management office (2)Business process management office (3)Procurement office (4)Product development office (5)Program management office
Program Management Office
A gateway that provides access to a variety of relevant information from many different sources on one screen; for an enterprise, the portal provides a secure gateway to resources needed by employees, customers, and suppliers. EX: Macon State University recently implemented a ________ designed to provide a central location for students and faculty to access university information needed for registration, grades, and financial aid, and to provide access to courses, email, and other secure resources. (1)mashup (2)dashboard (3)database (4)website (5)portal
Portal
Which of the following terms refers to a gateway that provides access to a variety of relevant information from many different sources on one screen? (1)Decision support system (2)Portal (3)Dashboard (4)Data warehouse (5)Mashup
Portal
The advantage sellers have when there is a lack of competition and they can charge more for their products and services. This is one of Porter's five competitive forces. EX: Pharma, Inc. recently started selling a new, patented drug for high cholesterol called Terazatin. Sales of Terazatin are so successful that Pharma has decided to raise the price from $12 a pill to $20 a pill. Which of the following forces is Pharma using to increase the price of Terazatin?
Power of Suppliers (Supplier Power)
Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of ________. (1)interest (2)knowledge (3)executives (4)practice (5)experts
Practice
Sally Weathers is a student at Valdosta State University. Her student ID number is the main number she uses for her school-related activities such as enrollment and meal charges. Sally's student ID number in a table of student records would be referred to as a ________. (1)foreign key (2)unique ID (3)normal key (4)primary key (5)secondary key
Primary Key
A company requires that all technology purchases be approved by IT and must conform to company standards. This is an example of a(n) __________ that ensures a consistent enterprise architecture. (1)intellectual property disclaimer (2)Internet usage policy (3)ethical conduct policy (4)procurement policy (5)acceptable-use policy
Procurement Policy
Haliburton Manufacturing Corporation makes industrial air conditioning units for large organizations. Last year the company spent more than $5 million on new technology designed to make its employees more productive and streamline its business processes. The expected return on investment, however, was much lower than the company expected, and production of new air conditioners was not improving. What economic theory helps explain the reason Haliburton is not getting an immediate return on its IT investment? (1)Productivity paradox (2)This is the correct answer.B. (3)Business performance theory (4)Productivity theory (5)Agency theory (6)Rational choice theory
Productivity Paradox
Blackhawk Security Systems, Inc. is a government contractor that handles highly sensitive information for overseas military operations. Which of the following security controls is the company most likely to implement to ensure the safety of its high-level sensitive data? (1)Restricting employee access to official mails (2)Prohibiting entry of employees in shared workspaces (3)Requiring employees to update their passwords every few months (4)Prohibiting public access to the company's website (5)Prohibiting the downloading of data to USB drives
Prohibiting the downloading of data to USB drives
In order to begin work on the Wild River Social Media Project, the director of marketing must first obtain a ________, which authorizes the project and includes a clear statement of objectives, estimated start and end dates, the names of the relevant people and their roles, a tentative budget, criteria for success, and other pertinent information. (1)Gantt chart (2)project charter (3)project management plan (4)work breakdown structure (5)business case
Project Charter
Which of the following represents procurement as part of the support value activities in a value chain analysis? (1)Providing technical support for the manufacturing processes (2)Creating a new advertising campaign for the company's products (3)Purchasing inputs such as raw materials, resources, equipment and supplies (4)Hiring new employees (5)Distributing goods and services to customers
Purchasing inputs such as raw materials, resources, equipment and supplies
Which of the following BEST describes a key performance indicator? (1)Quantifiable metrics most important to the individual's role and the organization's success (2)Abstract qualitative metrics to measure an individual's role and the organization's success (3)Strategic goals of the organization (4)Qualitative metrics to measure growth indicators of a country (5)Abstract qualitative metrics to measure and compare the success of industries
Quantifiable metrics most important to the individual's role and the organization's success
Direct TV captures customer transactions and streams the data instantly to its data warehouse where it can be used to develop targeted promotions to new customers or ones who may be considering canceling their service. This process represents a growing need for ________ to make faster business decisions. (1)internal company information (2)knowledge management systems (3)real-time business intelligence (4)big data (5)web-based information
Real-time business intelligence
The technology project steering committee at Wolf Camera approved the expenditure of $50,000 for the development of a new photo-refinishing program for customers to use on its website. The project manager has estimated that the system according to the requirements will cost $100,000 to develop. In this case what should the project manager suggest to the committee to keep the project within their budget? (1)Reduce the scope of the project (2)Use consultants for the project (3)Buy an off-the-shelf system (4)Outsource the project (5)Increase the amount of time to develop the system
Reduce the Scope of the Project
Projects focused on explicit knowledge and structural capital, much of which is in electronic form and scattered across different formats and media types, are hampered by the ease of copying and editing electronic files so that different versions contain inconsistent information. This problem is referred to as ________. (1)exclusivity (2)scalability (3)reliability (4)redundancy (5)accessibility
Redundancy
A database model that organizes information into tables of records that are connected to one another by linking a field in one table to a field in another table with matching data is called a(n) ________ database. (1)network (2)hierarchical (3)web-enabled (4)object-oriented (5)relational
Relational
Raymond James Investment Services recently completed its requirements definition document and provided the information to several software vendors so they can describe the software products they have that may fit. The document Raymond James has sent out is called a(n) ________. (1)request for application (2)request for quotation (3)request for information (4)request for proposal (5)unified procurement document
Request for Information
Kennesaw State University's technology steering committee has decided to pursue the purchase of data-analytics software based on their research and information from vendors. They invited software companies to provide a detailed description of their products, services, and costs to implement the new system. The responses from the ________ will help the committee select the best vendor that meets their software requirements. (1)procurement document (2)request for information (3)request for application (4)request for proposal (5)request for quotation
Request for Proposal
EX: Amy Palmer is a systems analyst who is working on the analysis phase of a project to implement a new web-based analytics dashboard for all department heads and managers in her company. She is helping the managers prioritize the functions of the dashboards into categories according to whether they are mandatory, preferred, or nonessential. Amy is working on a(n) ________ analysis. (1)competitive (2)probabilistic (3)requirement (4)market share (5)amortized
Requirement Analysis
Which of the following is part of the XML family of standards that is used to describe online resources and their properties for the semantic web? (1)Resource description framework (2)Optical character recognition (3)SMTP (4)Extensible Markup Language (5)ICR
Resource Description Framework
Greystone Properties has learned that one of its property managers is collecting and downloading confidential data about apartment residents. According to the company's incidence response plan, which of the following actions should Greystone follow to best contain any damage caused by the information security threat? (1)Preserve evidence of damage done (2)Recover the data (3)Investigate system logs for evidence (4)Restrict systems access (5)Reevaluate the risk matrix
Restrict systems access
All of the following are examples of human capital management metrics that can provide a company with valuable information about how well the organization is managing its human capital EXCEPT ________. (1)human capital return on investment (2)turnover costs (3)retention rates (4)turnover rates (5)employee satisfaction levels
Retention Rates
Which of the following situations is representative of the "last mile" issue in telecommunications? (1)Smartphone owners working in remote countries are unable to use features such as 4G and Wi-Fi because those countries do not yet have the relevant infrastructure. (2)An e-commerce site is available in only two language versions, and customers speaking neither language cannot browse through the site while shopping. (3)Rural subscribers of an Internet Service Provider (ISP) complain of poor Internet speeds compared to those enjoyed by downtown users. (4)Students find that the farther they are from their university building, the harder it is to connect to the Internet with their laptops. (5)Emergency medical personnel are unable to receive calls during emergencies due to high cell phone usage
Rural subscribers of an Internet Service Provider (ISP) complain of poor Internet speeds compared to those enjoyed by downtown users.
Mail server using the simple mail transfer protocol; handles outgoing email. EX: Chandler Wright is a student at Georgia Tech University. She is setting up her email for outgoing email using her university email address, which is hosted by Georgia Tech. To set it up, she would enter the name of the ________ server so when she sends an outgoing email, it will first be transmitted to a port on the university's server. (1)TCP/IP (2)IMAP (3)POP (4)IM (5)SMTP
SMTP server Mail server using the simple mail transfer protocol; handles outgoing email.
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions are referred to as ________.
Software Packages
Blue Hen Organic Foods has decided to use a cloud-computing service to manage the company's computer processing and data storage needs. Blue Hen's risk-management team has identified several concerns with implementing a cloud-based computing architecture. Which of the following is NOT a risk associated with cloud computing? (1)Data security (2)Scalability of the system to meet customer demand. (3)Reliability of the company's Internet connection (4)Capability to use virtualization software (5)Loss of control over mission-critical systems and data
Scalability of the system to meet customer demand
Al Johnson develops condominium communities in central Florida for the senior living market. In a recent development project, Al found he continually added square footage and features to the units, causing considerable delays and added expense. Al's rationale is consistent with the idea of ________. (1)scope creep (2)buyer's remorse (3)post-purchase rationalization (4)escalation of commitment (5)progress trap
Scope Creep
Julie Van Horn is a human resource manager at the Intuit Software Development Center in San Jose, California. She monitors the flow of people coming in and going out of the organization and coordinates the level of access for each employee. Which of the following requirements is she focusing on while tracking the authentication of employees to ensure the privacy and safety of data? (1)Usability requirement (2)Security requirement (3)Functional requirement (4)Interface requirement (5)Language requirement
Security Requirement
Mead Industries recently implemented a new enterprise resource planning (ERP) system in its Alabama production plant. It must quickly train its managers and floor supervisors on how to use the new system and each of the components. Because the managers work in shifts, Mead is evaluating various ways to administer the training to ensure all employees have the required knowledge. Which type of training approach would be most suitable for Mead? (1)Hybrid learning (2)Wiki-based training (3)Self-paced learning (4)Learning management system (5)Instructor-led training
Self Paced Learning
Smaller databases developed by individuals outside of the IT department that focus on their creator's specific information requirements. Ex: To support an innovative idea for an important business project, a manager creates a separate database system that is not integrated into the enterprise database. This is an example of a(n) (1)shadow system (2)data mart (3)data warehouse (4)excessive documentation method (5)foreign database
Shadow System
Bainbridge Property Management Company employees must access several different software systems to coordinate vendors, manage customer rental agreements, and schedule maintenance updates to their apartment communities. The company implemented a ________ for their employees so they can access the systems they use most often with a specific user ID and password. (1)single sign-on (2)shadow password (3)token ID (4)pre-shared key (5)canonical account
Single Sign On
The number and quality of all the relationships an organization's employees maintain, not just with one another, but with clients, customers, suppliers, and prospective employees. EX:Lynn Brown is widely known as the one of the best customer relationship managers in her company. Over the years she has developed and maintained strong relationships with the company's customers and suppliers that have enabled the company to gain market share and profits in a competitive market. The type of intellectual capital that Lynn contributes to her company is known as ________. (1)human capital (2)structural capital (3)social capital (4)equity capital (5)financial capital
Social Capital
Zara, a clothing company based in Spain, wants to increase its online presence through online interconnections with a community of its customers. The company would like to create groups of customers who interact with each other as well as the company and generate information that can be used in future products. Which of the following will BEST help them reach out to people who may be interested in their products and tailor ads to reach precise target groups based on their members' profiles? (1)Wiki (2)Instant messaging system (3)Social networking system (4)Video conferencing system (4)Electronic mail system
Social networking system
________ is a type of agile method that offers a framework for software development that relies on tightly knit, cohesive teams that do sprints of two to four weeks each. (1)Rapid application development (2)Spiral model (3)Extreme programming (4)Scrum (5)Waterfall
Srum
As organizations move more of their mission-critical applications to the cloud, they find that security concerns __________. (1)are unchanged (2)are eliminated (3)are reduced (4)are borne entirely by the cloud provider (5)still persist
Still Persistent
The knowledge stored as documentation, often electronically, about business processes, procedures, policies, contracts, transactions, patents, research, trade secrets, and other aspects of the organization's operations. EX: Morgan and Morgan, a law firm, documents client-related data each day in an electronic database. The data includes the type of legal advice sought, revenue generated by each client, and progress on each case, among others. What type of intellectual capital does this data represent to the firm? (1)Structural capital (2)Human capital (3)Social capital (4)Venture capital (5)Financial capital
Structural Capital
Facts and data that are reasonably ordered, or that can be broken down into component parts and organized into hierarchies EX:Amazon.com stores all transaction data about its customers with clearly defined fields for customer name, items purchased, order history, amount spent, etc. This is an example of ________.
Structure Information
A standard query language, widely used to manipulate information in relational databases EX: Taxpayers who move and do not leave a forwarding address may never receive their tax refunds because the check is returned as undeliverable. To address this problem, the IRS has implemented a process where taxpayers can go online and key in their name, state, and tax year to see if they have a refund that was undeliverable. This is an example of using a ________ to retrieve information from the IRS database (1)relational database (2)SQL query (3)table (4)web search tool (5)Primary key
Structured Query Language (SQL)
In an ERP suite that includes modules specialized for higher education, which of the following would be used by students to register for classes, check for prerequisites, and obtain course information? (1)Student resources (2)Student academic records (3)Financial aid (4)Institutional advancement E(5)E-learning
Student Academic Records
The person on an e-learning development team who knows what content should be included in the course and possesses the content expertise. EX: Brice Bishop is the senior environmental engineer for Energy Savers, LLC. The company is developing an e-learning system that will include modules for new engineers to complete as part of the company training on environmental engineering processes specific to the company. Brice has been asked to decide what needs to be included in the modules because he has the most knowledge in the company on engineering topics. Brice's role in developing the e-learning system is called a(n) ________. (1)knowledge engineer (2)e-learning instructor (3)subject matter expert (4)e-learning specialist (5)instructional designer
Subject Matter Expert
Cingular Cell, Inc. charges its customers a high contract termination fee if they cancel their cell phone contract before the expiration date. The termination fee is an example of a ________ (1)switching cost (2) customer retention fee (3) loyalty cost (4)customer service fee (5)customer service penalty
Switching Costs
Which type of software controls basic operations such as file management, disk storage, hardware interfaces, and security
System Software
Eversen Energy Partners works in remote areas of Alaska trying to identify renewable sources of energy and educating locals on conservation and alternative sources of fuel. The employees of Eversen have been with the company since its inception and have spent many years learning the local culture and how to communicate well with the village residents. Which of the following do Eversen employees use when working in this environment? (1)Meta knowledge (2)Documented knowledge (3)Explicit knowledge (4)Tacit knowledge (5)Intellectual capital
Tactic Knowledge
Emily Harris, a marketing manager at a major advertising firm, undertakes decisions on promotional campaigns, Internet marketing, and brand awareness. At which level of decision making is Emily involved? (1)Tactical (2)Strategic (3)Administrative (4)Executive (5)Operational
Tactical
The general manager for Freeman and Associates is reviewing monthly project management reports to determine the best course of action for the next phase of the building project he manages. The types of decisions he is making are ________ decisions. (1)unstructured (2)structured (3)strategic (4)tactical (5)operational
Tactical
Organizations are increasingly using e-learning approaches to train employees and help build intellectual capital. Which of the following statements about e-learning is FALSE? (1)E-learning systems are generally web based and can operate on any platform. (2)Technological glitches are reduced because employees use their own computers. (3)E-learning systems can accommodate courses in several languages. (4)Companies can reduce the cost of holding physical classes for employees. (5)E-learning can occur without the constraints of time or space.
Technological glitches are reduced because employees use their own computers
John Finley is an account executive for Wellington Industries, which has subsidiaries around the world. He is planning his annual sales meeting, which is held online via the Internet. Which of the following technologies will enhance his meeting with media richness and interactivity among the participants? (1)Telepresence technologies (2)Virtual reality (3)Instant messaging (4)Mashups (5)Microblogging
Telepresence technologies
Jonathan Hudson is responsible for analyzing web metrics for Blockbuster Video's online movie rental business. Which of the following metrics would he analyze to determine the depth of each visit to the website? (1)The number of page views per visit (2)The comparison between page visits made in the past and current year (3)The conversion rate (4)The forecasted number of page visits estimated around peak hours (5)The number of page views at a competitor's website
The Conversion Rate
Xerox, a company that sells business services and document technology products, sustains its investment in technological innovation, particularly in areas such as color science, digital imaging, and nanotechnology. These strategic investments, made only in specific areas, keep the company ahead of the competition. Which of the following messages does this example convey? (1)Large IT investments are essential for the success of a company in today's business environment. (2)IT investments must be made on the most modern technology available in the market. (3)IT investments should not be focused on certain aspects and should have a broad outlook. (4)Xerox will not be able to compete effectively without IT investments in all areas of the company. (5)The ability to extract the value of technology requires human imagination and innovation
The ability to extract the value of technology requires human imagination and innovation
Which of the following is NOT a reason that organizations choose an operating system? (1)The market share of the operating system (2)The availability of technical support for the system (3)The selection of business-oriented applications available to run on it (4)The amount of storage capacity it has (5)The compatibility of the system
The amount of storage capacity it has
When a customer uploads a video on YouTube about their negative experience with a company's product or service, which of the following is responsible for addressing the online threat to the company's reputation?
The crisis management team
Microformats introduce meaning to information by attaching semantics to it. Which of the following describes the function of microformats like the hCard in the business world? (1)The maintenance of a database of a user's web history (2)The electronic exchange of business card information (3)The storage and retrieval of incoming e-mails (4)The creation of a database of company products (5)The creation of multimedia files for wikis
The electronic exchange of business card information
Which of the following is NOT a reason that fiber optic cables are ideal for long-distance transmission? (1)They carry many more channels simultaneously. (2)Fiber optic cable is secure. (3)Light signals do not attenuate as much as electrical signals. (4)They are cheap and easy to install. (5)They are very durable
They are cheap and easy to install
A small start-up business offering system development services and website hosting has decided to adopt an agile software development method in its development projects. Which of the following statements about agile software development methods is true? These are Development strategies involving cohesive teams that include end users and in which many activities occur simultaneously rather than sequentially to accelerate delivery of usable software. (1)They involve agile members being individually responsible for delivery. (2)They involve developers who are less disciplined. (3)They stress on agile teams undertaking sequenced tasks. (4)They involve developers who are resistant to changes in requirements. (5) They involve characteristics of cohesiveness and trust.
They involve characteristics of cohesiveness and trust.
Which of the following statements about modern web-based point-of-sale (POS) technology is TRUE?
They often mimic the brick-and-mortar versions
Which of the following is NOT a reason that IT and group collaboration is a key research topic? (1)The "people" component of information systems is becoming less important in today's business environment (2)Virtual teams are becoming increasingly more common in the workplace. (3)Group collaboration tools and processes are becoming more advanced and used in the workplace more often. (4)Students increasingly engage in virtual teamwork, especially those who take some or all of their courses online (5)The psychology of group dynamics often changes when team members use online tools.
The "people" component of information systems is becoming less important in today's business environment.
The______ into an industry pose to existing businesses; high when start-up costs are very low and newcomers can enter easily. This is one of Porter's five competitive forces. EX: high when it is easy for competitors to enter a market and low when there are high capital investment costs to compete in the market?
Threat of New Entrants
Which of the following is a key advantage of using twisted-pair wires to transmit data? (1)They are resistant to interference. (2)They are sturdy and durable. (3)They are resistant to wiretapping. (4)They offer the highest rates of data transmission. (5)They are thin and highly flexible.
Thy are thin and highly flexible
Rail Europe is a company that promotes and sells European train travel tickets in the North American market. The company was not achieving good results from its website, and visitors rarely stayed on the website long or purchased a ticket. To increase the ________ of its website, the company added more travel-related advice, interactive maps, and other content to its website. (1)time spent on site (2)clickthrough rate (3)cost per clickthrough (4)cost per impression (5)bounce rate
Time Spent on Site
EX: Customers at Morgan Financial Services pay a monthly fee to access real-time stock prices for their brokerage accounts. This is an example of which of the following characteristics that makes information valuable? Suitability, Reliability, Safety, Scalability, orTimeliness
Timeliness
John Monfort has been hired by Daniel Appliance Company to collect data from customers who returned appliances over the past ten years. The survey asked for the customer's opinion about the kind of service they received. John's survey results are likely to be of little use to the company because the information lacks which of the following characteristics of high-quality information? (1)Timeliness (2)Logical (3)Duplication (4)Completeness (5)Bias
Timeliness
To compete against larger athletic stores and Internet retailers selling running shoes and equipment, the Big Dog Running Company recently created a Facebook page. Which of the following objectives is Big Dog trying to achieve with the use of a social networking site? (1)To document complaints (2)To buy products at a cheaper rate (3)To connect with customers and announce new products (4)To integrate clients in strategizing long-term visions (5)To formulate marketing and organizational plans
To connect with customers and announce new products
Blue Cross Insurance Company recently implemented software to track online communications of its customer service employees who have unlimited access to the Internet. Why do employers like Blue Cross adopt such tools? (1)To enable efficient data mining (2)To protect employee privacy (3) To increase employee productivity (4)To facilitate faster communication (5)To prevent data redundancy
To increase employee productivity
For what reason would the Payless Shoe Store, which follows a low-cost leadership strategy, post an "All Sales Final" sign on its products? (1)To increase the sale of its products (2)To reduce the costs incurred in the supply chain (3)To streamline financial workflows (4)to increase supplier power (5)To make it easy for managers to track inventories
To reduce the costs incurred in the supply chain
Companies are most likely to use internal social networking sites for which of the following reasons?
To share organizational information and collaborate on projects
"The value chain does not end when the buyer pays for the product or service." Which of the following statements contradicts this judgment? (1)Total value transfer of tangible goods happens at the point of sale. (2)Customer orientation is the key to success in modern business. (3)Customer reviews of products and services can help companies identify areas of improvement. (4)Marketing success should be measured in terms of customer satisfaction. (5)The value chain includes all components that add value to a product or service.
Total value transfer of tangible goods happens at the point of sale
radio frequency identification (RFID) A technology placed on tags with small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery that stores information on the tagged object's history. What are RFID tags typically used for? (1)Processing checks in banks (2)Storing smartphone data (3)Tracking shipments of physical goods (4)Monitoring ATM machines (5)Capturing data on weather systems
Tracking shipments of physical goods
Alyssa Meade is the database administrator for Realtree Outdoors, Inc. She is updating the data warehouse by using zip codes to add demographic data from the U.S. Census Bureau to the company's customer records before loading them into the data warehouse. What is this process called? (1)Data-mining process (2)Normalization process (3)Assimilation process (4)Transformation process (5)Extraction process
Transformation Process
Which of the following is not an example of a sustaining technology?Technologies that offer improvements to streamline existing processes and give companies marginal advantages. (1)Digital cameras with larger LCD screens (2)portable DVD players with longer battery (3)Uber (4)Smart phones with larger displays (5)Newly designed side airbags in the latest model Ford Taurus
Uber
unified procurement An approach used by organizations in which they prefer systems from a single vendor, especially to avoid the need to build interfaces. EX: Automated Business Machines recently implemented a new enterprise resource planning system from SAP. They are evaluating additional modules from the same vendor for their supply chain management and customer relationship management systems. They are concerned that going with a different vendor will result in integration problems. This approach to purchasing software is called a(n) ________. (1)request for information (2)RFP (3)best of breed procurement (4)green public procurement (5)unified procurement
Unified Procrement
Pam Flowers is a production assistant for a company that makes documentary films for nonprofit organizations. Pam uses a ________ on her desktop and smart phone to provide quick access to her emails, IM, RSS feeds, conference calls, and video calls, which allows her to be in constant touch with her colleagues. (1)portal (2)shared workspace (3)universal dashboard (4)context indicator (5)virtual world
Universal Dashboard
Information that has no inherent structure or order and the parts can't be easily linked together. EX: Martin & Martin, LLC is a nonprofit organization offering pro-bono legal services using a network of lawyers. The basement of their office is filled with boxes containing the files of hundreds of cases completed over the past ten years. The legal documents stored in the file boxes are an example of ________.
Unstructured Information
Megabank, a large investment bank, experienced a security breach involving sensitive personal information about customers. The crime was committed by a bank employee's friend who accessed a bank computer in the lobby of a branch office by simply downloading information on a USB drive. Which of the following authentication strategies, if used by Megabank, most likely facilitated the security breach? (1)Iris configuration (2)User knowledge (3)Voice pattern recognition (4)RFID chip (5)Fingerprint recognition
User Knowledge
The content contributed to a system by its users. EX: TripAdvisor.com specializes in providing unbiased customer reviews of travel destinations and encourages customers to post their vacation photos. Which of the following does this situation illustrate?
User-generated content
The Blue Door is an online apparel retailer that has a low rate of customer retention. Which of the following can help increase its customer retention? (1)Streamlining the Blue Door supply chain (2)Building seamless financial workflows at Blue Door with ERP (3)Promoting the Blue Door website in magazines to gain visibility (4)Using CRM to track customer behavior on the Blue Do5)r site (4Using uninvited pop-ups to chat with Blue Door customers
Using CRM to track customer behavior on the Blue Door site customer relationship management (CRM) - Encompasses the strategies, processes, and information systems an organization uses to build and maintain relationships with its current and prospective customers.
An objective vendor selection process that evaluates each vendor on how well its proposal meets the stated requirements is termed_______. (1)Custom system development approach (2)Unified procurement approach (3)Using a weighted scoring model (4)The least expensive vendor approach (5)Best of breed approach
Using a weighed scoring model
Andy heads the IT department of a small company based in Chicago that sells customized T-shirts and corporate incentive items over the Internet. The company has seen a surge in popularity and is planning to expand its operational base to four more cities. However, Andy is directed to come up with a strategy to cut down on the costs incurred in maintaining multiple servers in different cities to host the marketing and e-commerce sites. Which of the following measures will help Andy achieve his objective? (1)Using virtualization software to run multiple OSs on a single server system (2)Procuring server hardware from multiple vendors, instead of just one (3)Outsourcing all computer processing to another company in each location (4)Leasing private lines to transmit information between the corporate sites (5)Isolating each of the cities' servers and running dedicated operating systems on them
Using virtualization software to run multiple OSs on a single server system
Ford Motor Company recently introduced a new app that lets potential customers test drive new models in a graphic 3-D environment using their personal computers. The new application uses ________ to let customers experience many of the car's features in a simulated environment. (1)virtual reality (2)hashtags (3)a mashup (4)a tag cloud (5)a wiki
Virtual Reality
Which of the following enables computers to run multiple operating systems and multiple software applications at the same time and creates what seems to be multiple independent machines all on a single computing device? (1)Software as a Service (2)Private branch exchange (3)Availability (4)Cloud computing (5)Virtualization
Virtualization
Which of the following refers to the technologies that make voice communications across networks using packets feasible, including over the Internet?
VoIP
Inexpensive podcast using video. EX: Non-profits organizations such as UNICEF use web-based information systems to create inexpensive video messages that relay the plight of children in troubled parts of the world
Vodcasts
At the headquarters of CitiBank in New York City, the strategic planning department has implemented a new process of co-locating all the team members working on its strategic projects so they are better able to collaborate and work together using white boards and other technologies that facilitate meetings and communication. This is known as a(n) ________. (1)project team (2)community room (3)war room (4)orientation room (5)hub
War Room
A tiny, invisible image, typically a single pixel with a unique identifier, used on websites to track visitors. EX: TracSoft is a website development company that creates websites for small companies that focus on e-mail marketing. The company uses e-marketing information systems that provide extensive tracking capabilities for their clients by embedding in the HTML e-mail a ________, which is a tiny, invisible image, typically a single pixel with a unique identifier. (1)web analytic (2)pop-up ad (3)web beacon (4)web Trojan (5)tracking device
Web Beacon
Wells Fargo Bank is considering a new software tool that will help bank executives collaborate synchronously and facilitate online meetings with their branch office via the Internet. Which of the following would meet the company's needs? (1)GDSS (2)Microblogging (3)Instant messaging (4)Emailing (5)Web conferencing
Web Conferencing
Sloan Academy is preparing a presentation about quality in online course design and wants to make the information available online to a large number of participants with asynchronous interaction. Which of the following would be most appropriate for Sloan Academy? (1)Virtual classrooms (2)Laptops at every desk (3)Webcasting (4)Audio conferencing (5)Collaborative groupware
Webcasting
The adult education director at St. Francis Hospital uses ________ to evaluate the interactions of variables that contribute to the profitability of various potential seminars. (1)what-if analysis (2)forecasting (3)optimization analysis (4)predictive analysis (5)scheduling
What-if Analysis
Information privacy is most difficult to achieve under which of the following circumstances? (1)When information is stored on highly interconnected systems (2)When information is maintained on isolated systems (3)When information is converted to code form using mathematical equations (4)When information is mainly on paper (5)When information is housed in secure corporate databases
When information is stored on highly interconnected systems
________ is a publicly accessible website that allows users to add and edit interlinked web pages and make contributions from their own personal experience to update existing articles with current information. (1)Monster.com (2)Amazon.com (3)Wikipedia (4)Match.com (5)Ebay
Wikipedia
Acme Pest Control is considering implementing cloud computing to link its three locations to the main office where there is currently just a single PC. The company owner, Mr. Greenleaf, has little technical knowledge and does not have the capital to invest a large amount in technology. Which statement will be true if Mr. Greenleaf implements cloud computing for his company? (1)With cloud computing you pay only for what you use, so a small business will save money. (2)With cloud computing there is a need for a big investment of capital to access computers in the company's other locations. (3)With cloud computing a company needs to have dedicated experts to manage the technology. (4)With cloud computing increased customer demands can easily be met by internal enterprise architecture. (5)With cloud computing it is harder to store, process, and analyze information from any location because it is so far away.
With cloud computing, you pay only for what you use, so a small business will save money
As part of the HCM system, ______ helps track time and attendance, sick leave, vacation leave, and project assignments. EX:Delta Airlines uses an Operational Flight Attendant Scheduler to manage its workforce of flight attendants and to ensure all flights are adequately staffed. Which of the following terms describes this tool? (1)Customer service system (2)Talent management system (3)Human resources management system (4)Workforce management module (5)Customer relationship management system
Workforce management module
Part of the XML family of standardized languages specialized for accounting and business reports; tags identify data elements to make them transparent and also computer-readable. EX:The Securities and Exchange Commission (SEC) implemented electronic reporting based on ________ to develop a common language for financial reporting, improve transparency, and help eliminate manual processes. (1)IASB (2)XBLR (3)HTML (4)Java (5)XML
XBLR
Tom's Food Company recently experienced a complete crash of its website that prevented customers from accessing the website and employees from using the system to process new orders. The information security officer traced the problem to an attack by a botnet triggered outside the company. The disruption to the company's website is called ________. (1)a computer virus (2)a cyber attack (3)a phishing attack (4)a distributed denial of service (5)malware
a distributed denial of service
Columbus Financial Consultants (CFC) is evaluating various options for its enterprise resource planning system. The company has systems running on different platforms and would like to connect the systems and improve consistency. The integration approach that best meets CFC's needs is ________. (1)a vendor-branded suite (2)an engineered suite (3)an unlinked suite (4)a suite with synchronized modules (5)a best of breed suite
a suite with synchronized modules
When Verizon software developers created web-based "services" for each of its business processes using interfaces, they were using a service-based architecture. This means that systems: (1)are created with overlapping components that are used in slow moving companies. (2)are assembled from relatively independent software components. (3)were purchased from an external vendor. (4)are created with mutually dependent software components. (5)are created from interconnected subsets of its software components.
are assembled from relatively independent software components.
Joe Roberts, the project manager for the Wild River Social Media project, is creating the work breakdown structure for the project so he can develop a time frame for the project. All of the following are features included in project management software that will help Joe manage the project EXCEPT ________. (1)a work breakdown structure (2)resource allocation (3)a requirement's definition document (4)a digital dashboard (5)a project baseline schedule
a requirement's definition document
The information managers use to make decisions, drawn from the company's own information systems or external sources. EX: Robert owns and operates a franchise of restaurants that specializes in high-quality organic food. The demand for organic food is growing, and he plans to add a new store. The information he is using to decide where his new store will be located includes customer records combined with external demographic information such as income levels and age. Robert is using ________.
business intelligence
A set of activities designed to achieve a task; organizations implement information systems to support, streamline, and sometimes eliminate business processes. EX: When students use an enrollment system to select and register for classes, they are completing a ________
business process
The ________ refers to a process that organizations put into place coordinate and prioritize software bug fixes and feature enhancements. (1)feasibility study (2)BPR (3)code review process (4)change control process (5)requirement analysis process
change control process
A key concern in IT departments is that recent trends in ________ will affect how decisions about systems development and procurement are made and who makes them. (1)website development (2)project management (3)green computing (4)smart phones (5)cloud computing and SaaS
cloud computing and SaaS
To increase the probability that the Wild River Media Project will be successful and managed efficiently, Joe Roberts should ensure that he: (1)communicates the time, cost, and scope constraints clearly as the project unfolds. (2)allows users to make unlimited changes in the project deliverables. (3)allows end users to learn from their mistakes instead of hand-holding after launch. (4)avoids making unpopular decisions that might dismay the sponsor or clients. (5)commits to delivering features that stakeholders are expecting even if timelines are narrow.
communicates the time, cost, and scope constraints clearly as the project unfolds.
Anything that gives a firm a lead over its rivals; it can be gained through the development and application of innovative information systems. EX: Apple iPhone's intelligent personal assistant, Siri, helped Apple get a jump on market share over other smartphone competitors. This is an example of Apple gaining ________
competitive advantage
An information system used to build customer relationships, enhance loyalty, and manage interactions with customers. EX: Amazon.com offers customers customized recommendations based on previous purchases.
customer relationship management (CRM)
Amy Thornton, an instructional designer at Troy State University, works with professors who teach online courses or are developing online programs for their departments. Amy's primary role as an instructional designer is to _______. (1)provide technical support for Internet connection problems (2)develop a new pay structure for faculty who teach online (3)manage and track budgets for the e-learning process (4)develop the best strategies for the e-learning course or program (5)decide on the content of the course or program
develop the best strategies for the e-learning course or program
Recent research suggests that college students increasingly consider cheating on tests, copying intellectual property, or plagiarizing information for term papers to be more acceptable when they use a computer or the Internet to do it. These findings suggest that students become more ________ when they interact online and the physiological distance is greater, thereby minimizing the harm. (1)socially irresponsible (2)utilitarian (3)ethical (4)guarded (5)disinhibited
disinhibited
An electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data is known as a(n) ________. (1)financial network (2)Internet-based e-market (3)electronic market (4)dot-com market (5)electronic data interchange
electronic data interchange
To implement the organization's five-year strategic plan, Dick's Sporting Goods has decided to invest in a system that will support its core functional departments including financial and asset management and human resources functions. The type of system Dick's is planning to invest in is called a(n) ________ (1)customer relationship management system (2)data warehouse (3)decision support system (4)supply chain management system (5)enterprise resource management system
enterprise resource management system
Integrated application suite to support the whole enterprise that includes modules to manage financials, human resources, supply chain, customer relationships, and other business processes. EX: Wells Fargo Bank recently implemented an integrated application suite to support the whole organization that includes modules to manage financials, human resources, supply chains, customer relationships, and other business processes, creating a "suite of suites" called ________. (1)supply chain management (2)customer relationship management (3)enterprise resource planning (4)business process reengineering (5)total quality management
enterprise resource planning
A team-based agile method that features frequent releases of workable software, short time boxes, programmers who work in pairs, and a focus on testing. EX: Cary Brown works in the IT department at Zappos, an online retailer of clothes and shoes. The department is constantly developing new functionality on its website to personalize a shopper's experience. Because the developers work under pressure to produce quality software quickly, they have adopted a development method of working in pairs, reviewing one another's work, providing each other with feedback, and testing the code as it is written. This method is an example of ________. (1)rapid application development (2)scrum (3)the agile method (4)the waterfall method (5)extreme programming
extreme programming (XP)
The expertise a systems integration consulting firm brings to an organization is: (1)giving the company access to experts who know the software well and how to implement it most effectively. (2)managing the employees working on a software project. (3)ensuring the best prices for purchasing software. (4)understanding privacy laws for different states. (5)knowing how to program the new software.
giving the company access to experts who know the software well and how to implement it most effectively.
When Pepsi's Chinese operations decided to grow its own potatoes to ensure a reliable supply of potatoes for its Lay's potato chips, which in turn helped sales of its sodas, the company was extending its operations by ________. (1)contracting with external potato growers (2)importing potatoes from the United States (3)going downstream in the supply chain (4)implementing a new technology (5)going upstream in the supply chain
going upstream in the supply chain
Which of the following governmental actions will increase the threat of new entrants in a market?The threat new entrants into an industry pose to existing businesses; the threat is high when start-up costs are very low and newcomers can enter easily. This is one of Porter's five competitive forces. (1)There is a decrease in enforcement of anti-trust laws that prevents monopolies. (2)The government squeezes money from the market through open-market operations. (3)The Department of Commerce offers a patent to an existing player. (4)The Federal Reserve increases the cash reserve ratio to tackle inflation. (5)The Federal Reserve reduces the interest rates on credit for small businesses.
he Federal Reserve reduces the interest rates on credit for small businesses.
Delta Airlines suffered a lengthy and embarrassing service disruption of flights when a fire forced it to rely on backup power systems and it discovered that some of its essential servers were not connected to backup power supplies. This situation more likely resulted from a failure to test its ______________. (1) firewalls (2) phishing plan (3) encryption scheme (4)surveillance techniques (5)incident response plan
incident response plan
Data or facts that are assembled and analyzed to add meaning and usefulness. EX: When the number of gallons of milk sold each day by a grocery store is combined with other data, such as the type of milk or quantity of milk sold, and then processed and analyzed, it becomes ________.
information
Joe Roberts is the project manager for the Wild River Social Media Project. As part of the ________, he is establishing the groundwork for the project by clarifying the value it will bring to the organization, setting its objectives, and estimating the project's length, scope, and cost. (1).testing process (2)controlling process (3)initiating process (4)planning process (5)executing process
initiating process
In an organization where the culture welcomes and encourages ideas from all employees, ________. (1)it is harder to implement new information systems (2)innovative new information systems can come from all levels (3)information systems are not widely used (4)cross-functional teamwork is not highly valued (5)user-generated content is less accepted
innovative new information systems can come from all levels
Movies, books, research studies, music, and software are examples of ________, which are intangible assets. (1)intellectual property (2)freehold property (3)public property (4)immovable property (5)tangible property
intellectual property
Information technology (IT) is a strategic enabler when ________. Strategic Enabler is The role information systems play as tools to grow or transform the business, or facilitate a whole new business model.
it focuses on the growth of an organization
Strategies that compress the time horizon for software development, partly to reduce the impact of changing business needs and the resulting rework. They focus on the time available until the next release, or iteration, and the development team determines how many of the requirements it can deliver in that timeframe. EX: Farid Nia is the Application Development manager for Nexus Corporation. He is working on a project to design and build a new web-based time management system where employees can use their smartphones to log the number of hours they work. The time horizon for the deliverables depends on when the next release is due and what the development team determines they can deliver in that time frame. This is an example of a(n) ________ approach to software development. (1)scrum (2)extreme (3)iterative (4)waterfall (5)agile
iterative
The unique characteristics of a project that distinguish it from routine business processes included all the following EXCEPT ________. (1)it is temporary (2)it doesn't require resources from different areas (3)it has metrics for success (4)it has a primary customer or project sponsor (5)it may have an element of uncertainty
it doesn't require resources from different areas
A pharmaceutical company that invests heavily in research and development (R&D) and has several new, patented products ready for market would be operating in an industry with ________. (1)high buyer power (2)high threat of new entrants (3)low threat of new entrants (4)low supplier power (5)high threat of substitute products
low threat of new entrants
Hibbett Sports offers a reward card that gives customers coupons and incentives for store purchases that they can redeem for additional merchandise. This is an example of a ________. (1)marketing program (2)digital coupon (3)loyalty program (4)customer service system (5)bonus program
loyalty program
An online course usually offered by a college or university through a third party for free or very low cost, with open enrollment and often very large volume. EX: MIT Open Courseware is a new type of college level e-learning that is offered free to a large number of participants around the world. The courses allow anyone to enroll and generally offer certificates, but not college credit. These courses rely on computer-based testing and feedback as opposed to feedback directly from an instructor largely due to the sheer number of the participants. This emerging model of e-learning is known as a(n) ________. A. massive open online course Your answer is correct.B. Khan Academy program C. social learning platform D. learning information system E. hybrid course
massive open online course
Sun Microsystems uses the ________ feature introduced by instant messaging to show whether technology experts in each of the various divisions of the company are logged in and available to answer a question, pick up the phone, or stop by for a brief meeting. (1)war room (2)presence awareness (3)telepresence (4)telecommuting (5)media richness
presence awareness
Big Dog Running Company uses ________ to analyze data collected from each of its three stores by product line and date, which allows the company to better design its marketing and promotion campaigns. (1)OLAP (2)goal seeking (3)what-if analysis (4)market basket analysis (5)forecastin
online analytical processing (OLAP) Software that allows users to "slice and dice" or drill down into massive amounts of data stored in data warehouses to reveal significant patterns and trends.
Devon Degosta is updating the employee database with information on a new employee. She enters the employee information into the employee table and then tries to add a department ID for a department that does not exist in the Departments table. The system does not allow her to add the employee record until she creates a Department ID first in the Department table so the employee can then be assigned to it. This is an example of the system enforcing a ________. (1)business rule (2)referential integrity constraint (3)scalability constraint (4)data model (5)database constraint
referential integrity constraint
The Project Management Office (PMO) at Regions Bank in Atlanta recently received approval to begin a project to develop a new benefits administration system for the human resources department. The next step will be to analyze and document what the system should do from a business perspective. To begin this stage of the process, the PMO needs to understand the business process and identify any opportunities to optimize or streamline existing processes. This stage of the SDLC is known as ________. (1)design (2)testing (3)requirement analysis (4)business process reengineering (5)development
requirement analysis
One of the most significant adjustments needed by information systems professionals when changing from traditional development methods to agile is...Agile Strategies are Development strategies involving cohesive teams that include end users and in which many activities occur simultaneously rather than sequentially to accelerate delivery of usable software. (1)requiring employees to record time on the project. (2)changing from a we to a me mindset. (3)resistance to requirements changes. (4)expanding the team size. (5)prohibiting users access to progress reports.
resistance to requirements changes.
A web with meaning, in which online resources and their relationships can be read and understood by computers as well as human beings. EX: Tulane Medical School recently implemented a new web-based resource that was designed to integrate multiple sources of information about health and medical issues for its medical students and teaching faculty. The system encompasses a collection of online medical resources that can be read and understood by computers as well as the medical students and staff. The new system is an example of a(n) ________. (1)wiki (2)knowledge management system (3)enterprise information system (4)digital dashboard (5)semantic web
semantic web
A Shadow System is Smaller databases developed by individuals outside of the IT department that focus on their creator's specific information requirements. When employees create a shadow system, organizations are often faced with many issues, including: .(1)higher levels of productivity from employees. (2)not having to use IT staff to manage the shadow systems. (3)better response time to customers. (4)several versions of the "truth." (5)faster and more efficient work being completed
several versions of the "truth."
TracSoft is a web design and hosting company that caters to small- and medium-sized businesses with a variety of different e-commerce solutions. One the most popular solutions for its clients with limited IT budgets is the use of ________, in which the company pays a subscription fee to access a vendor's software remotely via the Internet. (1)virtualization (2)middleware (3)ERP (4)CRM (5)software-as-a-service
software-as-a-service
Visualization and charting tools provide managers with an effective way to envision future talent needs, termed __________________. (1)employee projections (2)scheduling applications (3)human capital adjustment (4)succession planning (5)FTE planning
succession planning
Photo-tagging is an increasingly common practice that has raised concerns about privacy for all of the following reasons EXCEPT: (1)old and unflattering photos may be found by an employer or potential employer. (2)uploaded photos often contain metadata that can "geotag" a photo with GPS data. (3)people can be tagged without their knowledge or consent. (4)facial-recognition software is becoming increasingly advanced. (5)tags in photos of old friends can help a person remember names better.
tags in photos of old friends can help a person remember names better.
EX: Amy Smith is a recruiter at Total Service Corporation, which handles customer service functions for a credit card processing company. The company recently implemented a system that allows Amy to track each employee's training, performance evaluations, and career development progress. She is also able to help managers with succession planning and training needs. The system Amy is using is known as a(n) ________. (1)employee relationship management system (2)human resources management system (3)workforce management system (4)employee loyalty system (5)talent management system
talent management system
Although societies and governments have developed a multitude of copyright laws, patents, and other legal statutes to protect intellectual property rights, they have found that enforcing intellectual property laws becomes difficult when: (1)the protection of intellectual property involves personal property. (2)the intellectual property is used for commercial purposes. (3)the intellectual property consists of tangible assets. (4)the intellectual property is digitized. (5)the protection of intellectual property involves immovable assets.
the intellectual property is digitized.
One of the critical factors that contribute to the failure of projects is ________. (1)excessive communication from the project manager (2)the lack of executive support for the project (3)too much stakeholder involvement in the project (4)the limited scope of the project (5)the low requirement for customization
the lack of executive support for the project