Super final exam ism

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

________ is the application of social media to facilitate the cooperative work of people inside organizations. A) Enterprise 2.0 B) Enterprise resource planning C) Enterprise application integration D) Enterprise architecture

a

In the context of system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced. A) pilot B) phased C) parallel D) plunge

d

Which of the following is a fundamental category of business intelligence (BI) analysis?

data mining

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

data mining

Supply chain management is an example of aNo ________.

inter-enterprise information system

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow

c

A ________ is content structure that has emerged from the processing of many user tags in social media. A) mashup B) taxonomy C) folksonomy D) viral hook

c

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves. A) data link layer B) data mine C) data warehouse D) data model

c

A stored procedure is a ________. A) program stored in a database that keeps the database consistent when certain conditions arise B) history of actions executed by a database management system C) computer program stored in a database that is used to enforce business rules D) data structure that improves the speed of data-retrieval operations in a database

c

A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise. A) stored procedure B) index C) trigger D) transaction

c

A(n) ________ is a formal description of a system's response to use and misuse scenarios. A) activity log B) work breakdown structure C) test plan D) defect report

c

According to Brooks' Law, adding more people to a late project will ________. A) guarantee efficiencies B) speed up the project C) create diseconomies of scale D) reduce the need for coordination

c

According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________. A) monetary benefit B) popularity C) influence D) security

c

An OLAP report has measures and dimensions. Which of the following is an example of a dimension? A) total sales B) average sales C) sales region D) average cost

c

The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies. A) technical writer B) chief financial officer C) system analyst D) chief technology officer

d

The term ________ means the more people use a site, the more value it has, and the more people will visit. A) par value B) vendor's value C) enterprise use value D) use increases value

d

The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the systems development life cycle (SDLC) project's resources. A) swim-lane layout B) trade-off C) transmission control protocol D) configuration control

d

The viewer of an OLAP report can change its format. Which term implies this capability? A) processing B) analytical C) dimension D) online

d

In the information system (IS) department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.

development

Problematic operational data is termed as ________.

dirty data

________ are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities.

dynamic processes

The two dimensions of process quality are ________.

efficiency and effectiveness

Sina looks over annual performance evaluations for all employees in the sales department. Based on their performance, she determines who is eligible for merit-based salary increases. Sina belongs to the ________ workgroup

human resources

When an area code changes the phone number for a given customer before the change will not match the customer's number afterward. This is an example of ________.

inconsistent data

The primary purpose of an ERP system is ________.

integration

In the information system (IS) department, the ________ group exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services.

outsourcing relations

Ads for Fiona's wedding photography business are displayed on several local Web sites for free. But if users click on them, she's charged $0.25 per click. Which of the following revenue models is Fiona utilizing?

pay per click model

Matt works at a take-out restaurant. His job is to take orders over the phone and then pass it on to the kitchen staff. As a result of being short-staffed, the restaurant management decided to automate Matt's job and assign him kitchen duties instead. In this case, information systems are ________.

performing an activity

Email spoofing is a synonym for ________.

phishing

Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp auction site asking him to reset his username and password. He clicks on the link and it takes him to a site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He emails the customer service desk at the auction site and discovers they never sent the email. This scenario is an example of attempted ________.

phishing

In the context of system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced.

plunge

A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of

pretexting

________ is a measure of the ratio of process outputs to inputs.

process efficiency

Adding process resources increases process effectiveness but adds costs.

true

Cluster analysis is used to identify groups of entities that have similar characteristics.

true

Data warehouses may include data that is purchased from outside sources.

true

Facebook, Twitter, LinkedIn, and Google are all social media providers

true

In an unsupervised data mining technique, analysts do not create a model or hypothesis before running the analysis.

true

In the information systems (IS) industry, a business analyst works with business leaders to develop systems that implement business strategy and goals.

true

Information systems can improve process quality by augmenting the actions of a human who is performing that activity.

true

Natural disasters present the largest risk for infrastructure loss.

true

One of the major functions of the information systems (IS) department is to develop, operate, and maintain applications.

true

One of the major sources of user-generated content (UGC) problems is inappropriate content.

true

Operational data is structured for fast and reliable transaction processing.

true

Push publishing can deliver results according to a schedule or as a result of an event or particular data condition.

true

Regression analysis measures the effect of a set of variables on another variable.

true

Social media has been widely used in businesses-to-consumer (B2C) relationships to market product to end users.

true

The business process management cycle begins by creating a model of the existing business processes.

true

The purpose of the data administration group is to protect data and information assets by establishing data standards and data management practices and policies.

true

Transitioning to a new enterprise system requires careful planning and substantial training.

true

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

unauthorized data disclosure

Metrics that don't improve one's decision-making skills are commonly referred to as ________ metrics.

vanity

The systems development life cycle (SDLC) process follows a linear sequence from requirements to design to implementation. Therefore, the systems development life cycle (SDLC) process is also known as the ________.

waterfall method

When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is to ________. A) develop committees and steering groups B) reinforce employees' sense of self-efficacy C) establish clear and absolute contractual guidelines D) communicate the need for change to the employees

a

The ________ revenue model successfully emerged on PC devices where there is plenty of space for lots of ads. A) ad click B) data C) click-free D) ad pay

a

The finance department of Global Couriers decides that half of the previous year's profits should be reinvested into the business. The marketing department, however, plans to extend the company's services to five more cities, which would require additional investment. The department heads hold a meeting at the end of the quarter to discuss the company's strategies; the meeting is, however, adjourned when they realize that their opinions clash. Information silo, in this case, has led to ________. A) organizational inefficiency B) loss of business C) data duplication D) increased expense

a

The first phase of the systems development life cycle (SDLC) is ________. A) defining the system B) implementing the system C) determining the requirements D) maintaining the system

a

The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data mining D) data communication

a

The responsibilities of a tech support engineer include ________. A) helping users solve problems and providing training B) managing and protecting databases C) writing program documentation D) advising the chief information officer on emerging technologies

a

The situation that occurs when the addition of resources creates inefficiencies is known as ________. A) diseconomies of scale B) marginal utility C) marginal returns D) break-even

a

The systems development life cycle (SDLC) process follows a linear sequence from requirements to design to implementation. Therefore, the systems development life cycle (SDLC) process is also known as the ________. A) waterfall method B) swim-lane method C) scrum process D) agile development method

a

The two dimensions of process quality are ________. A) efficiency and effectiveness B) performance and reliability C) conformance and durability D) perception and serviceability

a

What are the major ERP products of Microsoft Dynamics? A) AX, Nav, GP, and Solomon B) PeopleSoft and Siebel C) Baan, Zoho, and NetSuite D) FoxPro, DB2, IDOL, CMDB, and Omi

a

Which ERP vendor acquired PeopleSoft and Siebel? A) Oracle B) Infor C) Microsoft Dynamics D) SAP

a

Which of the following accurately defines a dimension in an OLAP report? A) It is a characteristic of a measure. B) It is an item that is processed in the OLAP report. C) It is a data item of interest. D) It is referred to a decision tree.

a

Which of the following best represents the value of social capital? A) Number of Relationships × Relationship Strength × Entity Resources B) Entity Resources - (Number of Relationships + Relationship Strength) C) Number of Relationships - Relationship Strength - Entity Resources D) (Number of Relationships × Relationship Strength) / Entity Resources

a

Which of the following is a characteristic of an inter-enterprise information system? A) Its problem solutions affect multiple organizations. B) It is flexible and easily adaptable to organizational changes. C) It increases data duplication among departments. D) It does not require users to have any formal training.

a

Which of the following is a characteristic of dynamic processes? A) They support strategic and less structured managerial decisions. B) They are usually formally defined and documented. C) They support operational and managerial decisions and activities. D) They are standardized processes.

a

Which of the following is a dynamic, social media-based CRM process? A) social CRM B) human resource CRM C) media CRM D) traditional CRM

a

Which of the following is a limitation of aligning information systems (IS) with organizational strategy? A) Adapting the IS to new versions of business processes is complex and time-consuming. B) Aligning the IS direction with the organizational strategy occurs only when organizations merge. C) Aligning the IS direction with the organizational strategy occurs only when the divisions are sold. D) The steering committee provides a forum for the IS department to voice its complaints about the users.

a

Which of the following is a responsibility of a chief information officer (CIO)? A) serving as the principal manager of the IS department B) heading the technology group C) evaluating new technologies that are relevant to the organization D) developing processes and information systems (IS) that implement business strategy

a

Which of the following is an example of an analytical tool? A) Facebook Page Insights B) WinRunner C) FileMaker Pro D) Pidgin

a

Which of the following is considered a threat caused by human error? A) an employee inadvertently installing an old database on top of the current one B) an employee intentionally destroying data and system components C) a virus and worm writer infecting computer systems D) a hacker breaking into a system to steal for financial gain

a

Which of the following statements is true about the relationship between business processes and information systems? A) A business process need not relate to any information system, but an information system relates to at least one business process. B) Information systems incorporate all business process activities and hence, should be developed before business processes. C) The relationship between business processes and information systems is one-to-one. D) Developing information systems before business processes ensures that all activities are considered in the development process.

a

Which of the following statements is true about unsupervised data mining? A) Analysts do not create a model or hypothesis before running the analysis. B) Neural networks are a popular unsupervised data mining application. C) Unsupervised data mining requires tools such as regression analysis. D) Data miners develop a model prior to the analysis and apply statistical techniques to data.

a

Which of the following terms refers to the investment of resources for future profit? A) capital B) interest C) loan D) cash flow

a

Which of the following workgroup processes is related to sales and marketing? A) lead tracking B) order management C) customer support D) accounts receivable

a

Which phase of the customer life cycle categorizes customers according to value and attempt to win back high-value customers? A) loss/churn B) customer acquisition C) relationship management D) marketing

a

With ________, the sender and receiver transmit a message using different keys. A) asymmetric encryption B) a block cipher C) symmetric encryption D) a stream cipher

a

Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax is most likely to have an RFM score of ________. A) 155 B) 511 C) 555 D) 151

b

A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media. A) network motif B) viral hook C) folksonomy D) internet site

b

A(n)________ system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. A) business process reengineering B) customer relationship management C) enterprise resource planning D) customer lifecycle management

b

According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related. A) strength of a viral hook B) value of social capital C) strength of dimensionality D) value of human capital

b

According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________. A) scrums B) points C) grades D) tallies

b

After years of hard work and rigorous research, Carol completed her PhD in microbiology. She posted the news of her achievement on Facebook, and a number of her friends left congratulatory messages on her Facebook wall. Carol's post and her friends' comments are an example of ________. A) secondary data B) content data C) connection data D) continuous data

b

An Enterprise Resource Planning (ERP) solution does not include ________. A) a database design B) the company's operational data C) initial configuration data D) stored procedures

b

An ________ and an OLAP report are the same thing. A) OLAP measure B) OLAP cube C) OLAP dimension D) OLAP array

b

When an organization has inconsistent duplicated data, it is said to have aNo ________.

data integrity problem

In the context of malware protection, the program code that causes the unwanted actions is called the ________. A) payload B) kernel C) bot herder D) key escrow

A

Judy is analyzing weekly sales transactions at a supermarket. She finds that the support value for bed sheets and pillow covers is 0.9. Given this information, which of the following statements is TRUE?

Customers who buy bedsheets usually also buy pillow covers.

Which of the following statements is TRUE of information systems?

Every information system has at least one application.

Which of the following is TRUE of implementing new enterprise systems?

It is expensive and can be well over the budget.

Which of the following best represents the value of social capital?

Number of Relationships × Relationship Strength × Entity Resources

A ________ examines each part of a message and determines whether to let that part pass. A) packet-filtering firewall B) private key C) mail server D) wardriver

a

Which of the following statements is TRUE of the information systems (IS) department?

The operations group monitors user experience and responds to user problems.

) ________ is a broad category of software that includes viruses, spyware, and adware. A) Malware B) Cookie C) Firewall D) Spam

a

A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies. A) business analyst B) business application programmer C) business administrator D) business supervisor

a

A ________ is a string of bits used to encrypt data. A) key B) honeypot C) cookie D) cache

a

A ________ is a type of virus that self-propagates using the Internet or other computer network. A) worm B) sniffer C) Trojan horse D) phisher

a

A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans. A) system analyst B) business analyst C) user support representative D) network administrator

a

A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. A) mart B) mine C) cube D) model

a

A social media policy used by an organization is a statement that ________. A) delineates employees' rights and responsibilities B) lists a firm's products and services that are advertised on social media C) lists the social and environmental effects of a company's economic actions D) defines the type of medium and channel an organization uses on a social media site

a

A student invests money and time in a business administration course. In this example, the student invests in ________. A) human capital B) social capital C) structural capital D) process capital

a

A toy manufacturing company installed a new enterprise system. The installation and adaptation gave rise to a number of issues among different departments. These issues complicated the process as the company had not appointed anyone to resolve them. This situation is an example of ________ while implementing enterprise information systems. A) a lack of collaborative management B) the occurrence of requirement gaps C) transition problems D) employee resistance

a

A(n) ________ is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities and decide among major IS projects and alternatives. A) steering committee B) discussion forum C) IS department D) directors committee

a

A(n) ________ is a software platform that uses social media to facilitate cooperative work of people within an organization. A) enterprise social network (ESN) B) organization net-application (ONAP) C) Webapp D) virtual private network (VPN)

a

ACES is a quality auditing firm. It has dedicated a team of managers, business analysts, and system analysts to develop an information system that receives data and produces quarterly reports that grade companies on their quality rating. The team is using the five-phase systems development life cycle (SDLC) to develop this information system. During which of the following phases will the team identify what kind of reports need to be produced and how frequently? A) requirements analysis B) system implementation C) component design D) system definition

a

According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0. A) signals B) search C) links D) authoring

a

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement? A) social capital B) human capital C) structural capital D) process capital

a

Being linked to a network of highly regarded contacts is a form of ________. A) social credential B) viral marketing C) crowdsourcing D) human capital

a

Carla, a budding restaurateur, meets a veteran chef and restaurateur, Giovanni. Carla wishes to analyze the purchasing pattern of her customer base. Which of the following is most likely to be a piece of sound advice that Giovanni would offer to Carla? A) Carla should use her restaurant's distributed systems to know more about her customers' purchasing patterns. B) Carla should avoid using the restaurant's integrated system to analyze her customers' purchasing patterns. C) Carla should support strategic and less structured managerial decisions to ensure that standardization occurs. D) Carla should support less specific and fluid managerial decisions to ensure that standardization occurs.

a

ERP vendors sometimes train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________. A) train the trainer B) top-down training C) on-the-job training D) employ the employer

a

Enterprise application integration is a ________. A) suite of software applications that consolidates existing systems by providing layers of software that connect applications together B) strategy that uses business process management to radically enhance customer service experience from any customer base C) suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform D) suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service

a

Every information systems (IS) user has the right to a secure computing environment. This means that the ________. A) organization should protect his/her computer and its files B) user should solely be in charge of protecting the organization's computers and files C) user should inform the IS about software upgrades D) user will never face a network problem

a

In 2025, emergence in the context of management would most likely mean a(n) ________. A) loss of control over employees B) loss of loyal customers C) increase in the use of social media for managing employees D) increase in the control over culturally diverse customers

a

In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs. A) activities B) databases C) resources D) presentations

a

In a business process, resources are ________. A) people or computer applications that are assigned to roles B) collections of procedures and activities C) the total number of points of work that can be accomplished in each scrum period D) collections of related tasks that receive inputs and produce outputs

a

In an information systems (IS) department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media. A) operations B) technology C) development D) maintenance

a

In business process management (BPM), an as-is model ________. A) documents the existing business process B) contrasts the former and current states of a business process C) represents the desired state of a business process D) represents the ideal state of a business process

a

In market-basket terminology, ________ describes the probability that two items will be purchased together. A) support B) confidence C) lift D) dimension

a

In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y" or "If they're buying Y, sell them X." A) cross-selling B) value added selling C) break-even D) double-sales

a

In the context of CRM, which of the following statements is true about the foreseen changes and developments by the year 2026? A) Vendors might lose control of customer relationship. B) Organizations might lose control over employees. C) The use of social media for managing employees will be static. D) The control over culturally-diverse customers would be lost.

a

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. A) unauthorized data disclosure B) incorrect data modification C) faulty services D) loss of infrastructure

a

In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works. A) phased B) pilot C) parallel D) plunge

a

Joseph wishes to increase the operational efficiency of his new startup. In order to achieve this, what should Joseph do? A) Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities. B) Joseph should avoid analyzing his firm's distribution systems as they do not play a role in the firm's daily activities. C) If Joseph plans to support formally defined and documented activities in his firm, he should use a dynamic planning system over a structured planning system. D) If Joseph plans to include less specific and fluid activities in his firm, he should use a structured planning system over a dynamic planning system.

a

Marco recently bought a smartphone from Bluetex, a leading electronics company. He was very disappointed with the low battery backup of the phone and posted his reviews on Facebook. Steve, one of Marco's friends, had had a similar experience with Bluetex, and he added to Marco's negative comments about the product. The primary risk Bluetex faces in this situation is the ________. A) loss of control B) loss of credibility C) lack of privacy D) lack of investment

a

Melissa is in charge of creating a Business Process Modeling Notation (BPMN) diagram for the procurement department. The diagram will represent the separate paths to be followed for an old supplier and a new supplier. Which of the following shapes should Melissa use to represent the question "old supplier?" which can be answered with a yes or no as applicable? A) diamonds B) circles C) rectangles D) squares

a

Most social media companies rely on ________ for revenue. A) advertising B) software license fees C) venture capital D) controlled, fixed interfaces

a

OLAP stands for ________. A) online analytical processing B) object-based lead analysis procedure C) object-oriented analytical protocol D) organizational lead analysis process

a

Packet-filtering firewalls ________. A) can filter both inbound and outbound traffic B) examine the destination address but not the source address C) are the most complex type of firewall D) seldom examine the data or the addresses of the message

a

Push publishing delivers business intelligence ________. A) according to a schedule or as a result of an event or particular data condition B) through reporting, data mining, and knowledge management C) by obtaining, cleaning, organizing, relating, and cataloging source data D) in response to requests from users

a

RFM analysis is used to analyze and rank customers according to their ________. A) purchasing patterns B) propensity to respond to marketing stimulus C) socio-economic status D) motivation and needs

a

SFA Inc. has a team of ten information systems (IS) personnel. The personnel are kept busy throughout the day as they help employees solve even the most trivial issues. In which of the following ways can the employees assist the IS personnel in this scenario? A) by learning basic computer skills B) by sharing their passwords with others to use their help in solving those trivial issues C) by installing security programs by themselves D) by making hardware modifications

a

Social ________ provide platforms that enable the creation of social networks, or social relationships among people with common interests. A) media providers B) media sponsors C) welfare organizers D) application providers

a

Social media (SM) providers host the SM presence using ________ in the cloud. A) elastic servers B) proxy servers C) vanity metrics D) viral hooks

a

Stanley Courier Services faced major criticism on Twitter for misplacing important customer documents on multiple occasions, especially when a single customer's negative feedback snowballed into a wave of condemnation within days. Which of the following actions should the courier service take in this scenario? A) leave it B) edit it C) delete it D) report it

a

Success metrics are also known as ________. A) key performance indicators (KPI) B) performance scale identifiers (PSI) C) vanity metrics D) conversion rates

a

The Jackson College of Arts displays its ads for free on a number of Web sites popular among students. However, every time a student clicks on the ads, it pays $0.30 to the site. Which of the following revenue models is Jackson College utilizing? A) pay-per-click model B) freemium model C) data model D) click-free model

a

The ________ revenue model offers users a basic service for free, and then charges a premium for upgrades or advanced features. A) freemium B) pay-per-click C) licensing D) premium

a

Worn-In Shoes is planning to launch its new range of trekking shoes. It has invited customers and trekking enthusiasts on its Facebook page to give suggestions about the features of the new product. The suggested features would then be used to manufacture customized trekking shoes. In this scenario, Worn-In Shoes is practicing ________. A) crowdsourcing B) outsourcing C) homesourcing D) showrooming

a

________ activities are supported by structured process. A) Operations and manufacturing B) Sales and marketing C) Media and human resource D) Media and customer service

a

________ are predesigned procedures for using software products. A) Inherent processes B) Triggers C) Modules D) Service descriptions

a

________ are small files that enables a browser to access Web sites without having to sign in every time. A) Cookies B) Botnets C) Payloads D) Public keys

a

________ is a standard set of terms and graphical notations for documenting business processes. A) Business Process Modeling Notation (BPMN) B) Business Process Execution Language (BPEL) C) Component Object Model (COM) D) International Organization for Standardization (ISO) 9000

a

________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. A) Enterprise resource planning B) Customer relationship management C) Enterprise application integration D) Business process reengineering

a

________ is a term that refers to the level of detail represented by the data. A) Granularity B) Intricacy C) Interoperability D) Complexity

a

________ is the investment in social relations with the expectation of returns in the marketplace. A) Social capital B) Social stock C) Market stock D) Media capital

a

________ is the use of information technology to support the sharing of content among networks of users. A) Social media B) Content publishing C) Multimedia D) Programming

a

________ metrics keep track of goals achieved by an organization. A) Success B) Vanity C) Performance D) Scalar

a

________ processes span an organization and support activities in multiple departments. A) Enterprise B) Inter-enterprise C) Strategic D) Reactive

a

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. A) Data administration B) Authentication C) Usurpation D) Data encryption

a

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships. A) User-generated content B) Folksonomy C) Secondary data D) Continuous data

a

In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.

activities

Most social media companies rely on ________ for revenue.

advertising

Which of the following is considered a threat caused by human error?

an employee inadvertently installing an old database on top of the current one

(n) ________ is a complicated set of possibly nonlinear equations. A) data warehouse B) neural network C) expert system D) online analytical processing (OLAP) cube

b

) A ________ involves balancing three critical factors: requirements, cost, and time. A) work breakdown structure (WBS) B) trade-off C) test plan D) critical path

b

A ________ is an information system that supports the sharing of content among networks of users. A) human resource information system (HRIS) B) social media information system (SMIS) C) database management system (DBMS) D) transaction processing system (TPS)

b

A ________ shows the tasks, dates, and dependencies for the tasks of a project. A) fusion chart B) Gantt chart C) Pareto chart D) control chart

b

A sales report that is current at the time the user accessed it on a Web server is an example of a(n) ________. A) static report B) dynamic report C) expert system D) hybrid market report

b

A(n) ________ has a microchip in it to hold data. A) ATM card B) smart card C) cookie D) key escrow

b

Atlanta Technologies outsourced its information technology (IT) support department to a vendor in China. The vendor company, however, faced repeated instances of software failure and now needs to make some changes to the information systems. Who among the following has control over prioritizing issues related to such changes? A) the chief technology officer at Atlanta (CTO) B) the vendor C) a third party technician D) the chief information officer at Atlanta (CIO)

b

BI servers use ________ to determine what results to send to which users and on which schedule. A) expert systems B) metadata C) RSS feeds D) neural networks

b

Deleting problematic content on social networking sites is best reserved for content that is ________. A) grammatically incorrect B) obscene and inappropriate C) legitimate but negative D) contributed by a layperson

b

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. A) human resources B) information systems C) marketing D) manufacturing

b

During the system implementation phase of the systems development life cycle (SDLC), once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity? A) system configuration B) system conversion C) system development D) system control

b

ERP training falls into two broad categories. One of the categories is training on how to use the ERP application software. What does the training include? A) steps for obtaining top-level management support B) steps for using the applications to accomplish the activities in various processes C) procedures to deal with employee resistance to the new system D) procedures to prepare for organizational changes while implementing ERP solutions

b

Email spoofing is a synonym for ________. A) hacking B) phishing C) usurping D) sniffing

b

Identify the top two ERP vendors. A) Infor and SAP B) SAP and Oracle C) Microsoft Dynamics and Infor D) Microsoft Dynamics and SAP

b

If a defined project is determined to be feasible in the systems development life cycle (SDLC), the next step is to ________. A) create and test components B) form the project team C) maintain the system D) assess process results

b

In ________, statistical techniques can identify groups of entities that have similar characteristics. A) regression analysis B) cluster analysis C) supervised data mining D) neural networks

b

In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process. A) resources B) messages and data C) tasks and activities D) control

b

In information security, which of the following is true about managing risk? A) All organizations except financial institutions should invest heavily in security safeguards. B) Organizations should implement safeguards that balance the trade-off between risk and cost. C) Passwords are classified as technical safeguards. D) Physical security is classified as human safeguards.

b

In the context of knowledge management systems, ________ are rule-based systems that encode human knowledge in the form of If/Then rules. A) expert networks B) expert systems C) intelligent systems D) decision-making systems

b

Jobcon Electronics Inc.'s market strategy for the coming year is to capture a larger market share by upgrading the technology used in its products. The company's R&D department works on technologically enhancing the products. The new products are an instant hit in the market and considerably increase Jobcon's market share. This is an example of the R&D department's ________. A) conformity B) effectiveness C) reliability D) efficiency

b

Judy is analyzing weekly sales transactions at a supermarket. She finds that the support value for bed sheets and pillow covers is 0.9. Given this information, which of the following statements is true? A) The sale of bedsheets and pillow covers is lower than other items. B) Customers who buy bedsheets usually also buy pillow covers. C) The supermarket carries a large stock of bedsheets and pillow covers. D) Customers who buy bedsheets rarely also buy pillow covers.

b

Kenneth is working on a confidential government project. Daniel, a coworker, and he are the only two members who are authorized to access the project's information system. Kenneth, while away on a business trip, receives an email from Daniel asking for his login credentials as Daniel was unable to access the system. Kenneth finds the request unusual, and calls Daniel to confirm if the email was sent by him. Kenneth deletes the email when he learns that Daniel had not sent it. This scenario is an example of attempted ________. A) hacking B) phishing C) sniffing D) wardriving

b

Key escrow is a(n) ________. A) protocol used to secure communication over the internet B) safety procedure that allows a trusted party to have a copy of the encryption key C) device that prevents unauthorized network access D) encryption algorithm that uses both public and private keys

b

Linela Insurance needs to hire twenty accountants immediately to support its accounts receivable process. The hiring and training of the accountants requires a significant investment of funds and time, which the company cannot afford. Linela decides to hire another accounting firm to manage its accounts receivable process and thereby save time and money. This process is known as ________. A) merging B) outsourcing C) headhunting D) diversifying

b

Matt, a sales analyst, predicts the sale of luxury cars by formulating an equation that uses variables such as the customer's age and monthly salary. Which of the following methods does Matt use in this case? A) BigData analysis B) regression analysis C) market-basket analysis D) cluster analysis

b

Once the project's goals and scope have been defined, the next step in the system definition phase of the systems development life cycle (SDLC) is to ________. A) plan the project B) assess feasibility C) determine system requirements D) form a project team

b

Which of the following is used for biometric authentication? A) smart cards B) facial features C) passwords D) personal identification numbers

b

Opezim Plastics has been supplying raw materials to JM Toys for five years. JM Toys has an RFM score of 545. With reference to the score, how should the sales team at Opezim respond to JM Toys? A) The sales team should contact JM Toys immediately. B) The sales team should let go of JM Toys, for the loss will be minimal. C) The sales team should attempt to up-sell more expensive goods to JM Toys. D) The sales team should spend more time with JM Toys.

b

Pablo's Burgers is a new fast food brand that has opened restaurants in twenty cities. Its current goal is to measure brand awareness among its customers based on the input received from social media. Which of the following will help Pablo's measure its brand awareness? A) units B) metrics C) attributes D) assets

b

Ryan is creating a Business Process Modeling Notation (BPMN) diagram for the manufacturing process of his organization. Which of the following should he use to represent the check inventory activity? A) a dotted arrow B) a rectangle C) a diamond D) a solid arrow

b

Samuel, a researcher, deduces that single women between the ages of 25 and 30, who usually live in the suburbs and make thrifty purchases, prefer a particular brand of washing machines. In this case, Samuel uses ________ to understand customer behavior. A) supervised data mining B) cluster analysis C) neural networks D) market-basket analysis

b

Sarah was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she found that her search engine had been changed, and she received pop-up advertisements of the shopping site she had visited the previous day. The program on Sarah's system is ________. A) a cookie B) adware C) a payload D) a Trojan horse

b

Secure Sockets Layer is also known as ________. A) Advanced Persistent Threat Layer B) Transport Layer Security C) Presentation Interface Layer D) Network Interface Layer Security

b

The characteristics of McAfee's Enterprise 2.0 model are given by the acronym SLATES; L in SLATES stands for ________. A) local network B) links C) language D) leader

b

The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS. A) test B) baseline C) standard D) benchmark

b

The traditional process for developing information systems is ________. A) the software testing life cycle B) the systems development life cycle C) the software defect life cycle D) product life cycle

b

The work done during ________ phase is either to fix the system so that it works correctly or to adapt it to changes in requirements. A) implementation B) maintenance C) requirements analysis D) component design

b

Thompson is the chief information officer at a processed food manufacturing company. The information systems used in the company are manufacturing oriented and provide little support to accounting. In this case, Thompson will most likely report to the ________ of the company. A) chief financial officer B) chief executive officer C) director of information services D) chief technology officer

b

To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization. A) metric of a relationship B) strength of a relationship C) value of human capital D) customer lifetime value

b

To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________. A) service descriptions B) industry-specific solutions C) inherent processes D) DIY modules

b

Tranware Inc., an apparel manufacturer, receives cotton and other raw materials from its suppliers at the beginning of every quarter. With reference to this information, Tranware receives its ________ at the beginning of every quarter. A) deliverables B) physical repository C) data repository D) resources

b

When an organization has inconsistent duplicated data, it is said to have a(n) ________. A) information silo B) data integrity problem C) error of omission D) data segregation problem

b

Which of the following can be represented using the Business Process Modeling Notation (BPMN)? A) Gantt charts B) as-is models C) scatter plots D) PERT charts showing the critical path

b

Which of the following components of McAfee's Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, and other social media platforms? A) search B) author C) extension D) signal

b

Which of the following is a characteristic of BigData? A) It is usually around 100 gigabytes in size. B) It is generated rapidly. C) It is processed using traditional techniques. D) It is unstructured.

b

Which of the following is a characteristic of decision trees? A) They are a supervised data mining technique. B) They are used to select variables that are then used by other types of data mining tools. C) Special training is required to understand and implement them. D) Partial data or multiple variables cannot be used while using decision trees.

b

Which of the following is a form of outsourcing hardware infrastructure? A) acquiring licensed products B) Infrastructure as a service (IaaS) cloud hosting C) Software as a Service (SaaS) D) business function

b

Which of the following is classified as a technical safeguard? A) cookies B) firewalls C) key escrow D) passwords

b

Which of the following is performed by enterprise application integration? A) It duplicates the data because each application has its own database. B) It connects system "islands" via a new layer of software. C) It prevents a gradual move to ERP. D) It prevents existing applications from communicating and sharing data.

b

Which of the following is the key to successful systems development life cycle (SDLC) projects? A) critical path template B) work breakdown structure C) scatter plot D) control chart

b

Which of the following is true of implementing new enterprise systems? A) It poses no risks. B) It is expensive and can be well over the budget. C) It does not require updates. D) It is simple and adaptable.

b

Which of the following observations about RFM and OLAP reports is true? A) RFM reports are more generic than OLAP reports. B) OLAP reports are more dynamic than RFM reports. C) RFM reports have measures and dimensions. D) RFM reports can drill down into the data to a greater extent than OLAP reports.

b

Which of the following phenomena states that the more attributes there are, the easier it is to build a model that fits the sample data? A) attribute paradox B) curse of dimensionality C) uncertainty principle D) economies of scale

b

Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services? A) traditional marketing B) pay-per-click C) user participation D) venture capital

b

Which of the following statements is true about a data administration staff function? A) The chief technology officer (CTO) heads the data administration staff function. B) The group establishes standards to protect information assets. C) This group includes system and network administrators exclusively. D) This group manages the process of creating new information systems.

b

Which of the following statements is true about human safeguards for employees? A) Security screening in an organization is a one-time process and applies only to new employees. B) User accounts should be defined to give users the least possible privilege needed to perform their jobs. C) Companies should provide user accounts and passwords to employees prior to their security training. D) System administrators should retain user accounts after an employee has been terminated.

b

Which of the following statements is true about outsourcing? A) It increases budgetary instability due to the level of risk involved. B) It saves both direct and indirect management time. C) It invariably leads to diseconomies of scale. D) It guarantees a higher level of quality than that provided in-house.

b

Which of the following statements is true about the Secure Sockets Layer (SSL)? A) It uses asymmetric encryption exclusively. B) It is used to send sensitive data such as credit card numbers. C) It uses one set of encryption keys for multiple sessions. D) It is a stronger version of https.

b

Which of the following statements is true of information systems? A) Information systems include all business process activities. B) Every information system has at least one application. C) Information systems should be bought entirely off-the-shelf. D) Every business process should include at least one information system.

b

Which of the following statements is true of source data for a business intelligence (BI) system? A) It refers to the organization's metadata. B) It refers to data that the organization purchases from data vendors. C) It refers to the detailed level of data. D) It refers to the hierarchical arrangement of criteria that predict a classification or a value.

b

Which of the following statements is true of the operations group in an organization's information system (IS) department? A) It establishes data standards and data management practices and policies. B) It monitors the user experience and responds to their problems. C) It manages all computing infrastructure except in-house server farms and communications media. D) It includes technical writers if the programs are developed in-house.

b

Which of the following statements is true of the swim-lane layout used for modeling business processes? A) It complicates the process diagrams. B) It draws attention to the interactions among components of the diagram. C) Each role in the business process has to share the swim-lane with other roles. D) All activities for a given role are repeated in all the swim-lanes.

b

Which of the following techniques determine sales patterns? A) regression analysis B) market-basket analysis C) neural networks D) cluster analysis

b

Which of the following usually happens in a malicious denial-of-service attack? A) A hacker monitors and intercepts wireless traffic at will. B) A hacker floods a Web server with millions of bogus service requests. C) An intruder uses another site's IP address to masquerade as that other site. D) A phisher pretends to be a legitimate company and requests confidential data.

b

Which of the following workgroup processes is related to customer service? A) assessment B) account tracking C) sales forecasting D) accounts payable

b

________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system. A) Pretexting B) Hardening C) Phishing D) Spoofing

b

________ are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities. A) Operational processes B) Dynamic processes C) Inherent processes D) Structured processes

b

________ are information system (IS) professionals who understand both business and information technology. A) Development analysts B) Systems analysts C) Network administrators D) Database designers

b

________ includes a query language titled Pig. A) MapReduce B) Hadoop C) RFM Analysis D) Online analytical processing (OLAP)

b

________ is a concept that computer systems will become sophisticated enough that they can adapt and create their own software and hence adapt their behavior without human assistance. A) Expert systems B) The Singularity C) Knowledge management D) Business intelligence systems

b

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database. A) Data encryption B) Database administration C) Data authentication D) Database normalization

b

________ is a measure of the ratio of process outputs to inputs. A) Process effectiveness B) Process efficiency C) Process conformance D) Process reliability

b

________ is a technique for harnessing the power of thousands of computers working in parallel. A) RFM analysis B) MapReduce C) Granularity D) Reposition

b

________ is an example of an inter-enterprise information system. A) CRM B) PRIDE C) ERP D) EAI

b

________ is the activity of altering existing and designing new business processes to take advantage of new information systems. A) Business process modeling B) Business process reengineering C) Business process outsourcing D) Enterprise resource planning

b

________ is the application of social media and related applications for the management and delivery of organizational knowledge resources. A) Business intelligence server management B) Hyper-social knowledge management C) Knowledge management protocol D) Online analytical processing

b

________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. A) Intellectual property protection B) Knowledge management C) Business process reengineering D) Repository management

b

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data entry B) Data acquisition C) Data mining D) Data encryption

b

________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser. A) Pay-per-click B) Conversion rate C) Folksonomy D) Enterprise 2.0

b

________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. A) Unauthorized data disclosure B) Incorrect data modification C) Denial of service D) Loss of infrastructure

b

________ present(s) the largest risk for an organization's infrastructure loss. A) Employees' dissatisfaction B) Natural disasters C) Hackers D) Competitors

b

________ requires the user to request business intelligence (BI) results. A) Push publishing B) Pull publishing C) Desktop publishing D) Accessible publishing

b

If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software.

business and system analysts

________ is defined as information containing patterns, relationships, and trends of various forms of data.

business intelligence

________ set the stage for the requirements for any information systems and applications that need to be created or adapted.

business process models

) The total number of points of work a team can accomplish in each scrum period is called ________. A) score B) speed C) velocity D) degree

c

) Which of the following are the dimensions of feasibility? A) planning, process, technical, and schedule feasibility B) operational, strategic, technical, and tactical feasibility C) cost, schedule, technical, and organizational feasibility D) schedule, process, technical, and competitive feasibility

c

) ________ play a key role in moving development projects through the SDLC or scrum development process. A) Business analysts B) Programmers C) Systems analysts D) Database designers

c

A ________ is a hierarchical arrangement of criteria that predict a classification or a value. A) value chain B) cluster analysis C) decision tree D) neural network

c

A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function. A) business stature B) business analysis C) business process D) business policy

c

Ben is in his final term of college, and he plans to start working as soon as he graduates. He believes it will be beneficial for his career if he accompanies his dad on one of his business functions and gets acquainted with people in the corporate world. In this scenario, Ben is investing in his ________. A) human capital B) process capital C) social capital D) structural capital

c

Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle. A) component creation B) implementation C) assessment D) process modeling

c

Crispies is a breakfast cereal manufacturing company. It is shifting its manufacturing process from batch processing to assembly line production. The information system for the assembly line is ready to be installed. Crispies decides to completely shut down the batch processing system and install the new assembly line. This style of conversion is known as ________. A) parallel installation B) pilot installation C) plunge installation D) phased installation

c

During the requirements definition stage of developing an information system, the project team will consist mostly of ________. A) finance and account managers B) test engineers and business users C) business and systems analysts D) database designers and administrators

c

Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall. A) honeypots B) blogs C) activity logs D) Rich Site Summary (RSS) feeds

c

If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. A) programmers and development personnel B) PQA test engineers C) business and systems analysts D) technical writers

c

In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing. A) network B) software C) business function D) application

c

In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. A) cluster analysis B) unsupervised data mining C) supervised data mining D) click streaming

c

In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process. A) dotted arrows B) diamonds C) solid arrows D) circles

c

In asymmetric encryption, each site has a ________ for encoding messages. A) botnet B) private key C) public key D) cookie

c

In business process management (BPM), once the as-is model is created, the very next step that a team must take is to ________. A) obtain feedback about implementation B) assess the results of the changes C) look for improvement opportunities D) implement changes in the organization

c

In the information system (IS) department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. A) operations B) technology C) development D) outsourcing relations

c

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. A) pilot B) phased C) parallel D) plunge

c

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business. A) parallel B) phased C) pilot D) plunge

c

Jackson Steel Inc. has four major customers. Based on the following RFM scores of these customers, the sales team at Jackson's should attempt to up-sell more expensive steel to ________. A) SM Constructions with an RFM score of 311 B) Shanghai Heavy Industries with an RFM score of 551 C) Castellano Automobiles with an RFM score of 113 D) Heavy Duty Cables Inc. with an RFM score of 542

c

Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a ________. A) botnet B) hot site C) honeypot D) Web beacon

c

Joanna is appointed as a media advisor at a publishing house. With her love of writing and a graduate degree in mass communication, Joanna is confident of being successful at her job. Joanna's confidence is a reflection of her ________. A) self-appraisal B) self-actualization C) self-efficacy D) self-elevation

c

John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility? A) writing software program codes B) using systems to perform job tasks C) creating a backup of system databases D) knowing whom to contact when a security breach occurs

c

Kate was among the top ten applicants for an honorary scholarship at her university. The scholarship would be decided by a written exam and an interview. Kate had outperformed the others in the interview, but she was not sure of her written exam's results. She illegally accessed the system where the final results were stored and changed her grades before the results were sent out to the scholarship committee. Kate's act can be termed as ________. A) pretexting B) phishing C) hacking D) spoofing

c

Lilian interviews ten applicants for the position of sales manager in her organization. Based on the applicants' qualification and experience, she selects the best candidate. Lilian belongs to the ________ workgroup. A) customer service B) operations C) human resources D) marketing

c

Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the Secure Sockets Layer (SSL) protocol? A) ftp B) www C) https D) .com

c

Matt works at a take-out restaurant. His job is to take orders over the phone and then pass it on to the kitchen staff. As a result of being short-staffed, the restaurant management decided to automate Matt's job and assign him kitchen duties instead. In this case, information systems is ________. A) augmenting a human performing an activity B) controlling data quality process flow C) performing an activity D) cutting down expenses

c

Metrics that don't improve one's decision-making skills are commonly referred to as ________ metrics. A) success B) failure C) vanity D) viral

c

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters. A) denial-of-service B) sniffing C) brute force D) phishing

c

Outsourcing is done to ________. A) diversify the business portfolio B) increase costs for outsourcing vendors C) cap an organization's financial exposure D) enhance management's focus on nonessential functions

c

Problematic operational data is termed as ________. A) metadata B) rough data C) dirty data D) granular data

c

Process ________ is a measure of how well a process achieves organizational strategy. A) efficiency B) conformance C) effectiveness D) reliability

c

Rapid application development, the unified process, extreme programming, and scrum have led to ________. A) joint application development B) dynamic systems development model C) agile development D) systems development life cycle (SDLC)

c

Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost. A) bookmarks B) pop-ups C) cookies D) toolbars

c

Since the features and functions of complex products like CRM or ERP are not easy to identify, ________ is a major task when implementing enterprise systems. A) virtualization B) encapsulation C) gap identification D) data duplication

c

Social media (SM) communities differ from communities in the past because SM communities are ________. A) formed based on family relationships B) limited by geographic location C) formed based on mutual interests D) limited by organizational boundaries

c

Striking Apparels has launched its new stock of summer wear. It plans to target shoppers between the ages of twenty and thirty to sell its products. Daniel is responsible for sending out promotional emails and messages to these target customers. Daniel belongs to the ________ department of Striking Apparels. A) relationship management B) loss/churn C) marketing D) customer acquisition

c

Supply chain management is an example of a(n) ________. A) enterprise information system B) personal information system C) inter-enterprise information system D) departmental information system

c

The ________ is a sequence of activities that determine the earliest date by which a project can be completed. A) exit path B) cycle route C) critical path D) scatter route

c

The ________ is the representative for information systems (IS) and information technology (IT) issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. A) chief operating officer B) chief technology officer C) chief information officer D) chief executive officer

c

The ________ phase of the systems development life cycle (SDLC) involves determining hardware and program specifications, designing the database and procedures, and creating job definitions. A) requirements analysis B) system implementation C) component design D) system definition

c

The characteristics of McAfee's Enterprise 2.0 model are given by the acronym SLATES; A in SLATES stands for ________. A) auditing B) alerts C) authoring D) announcements

c

The final phase of the systems development life cycle (SDLC) is ________. A) implementing the system B) determining the requirements C) maintaining the system D) designing system components

c

The first step in the system definition phase of the systems development life cycle (SDLC) is to ________. A) plan the project B) conduct a feasibility study C) define the goals and scope D) form the project team

c

The primary purpose of an ERP system is ________. A) customization B) duplication C) integration D) customer acquisition

c

The process of hardening a Web site is a ________ safeguard. A) political B) financial C) technical D) physical

c

The project plan which results from defining the system is the input to ________, which is the second phase of the SDLC. A) system design B) requirement collection C) requirements analysis D) system maintenance

c

The storage of ________ differentiates social media information systems (SMIS) from Web site applications. A) secondary data B) content data C) connection data D) continuous data

c

Tranbase Inc., a software firm, licensed an enterprise product to suit its needs. During the implementation stage, a number of differences were found between the product's characteristics and the needs of the organization. This challenge in implementing the enterprise system is an example of ________. A) employee resistance B) transition problems C) requirement gaps D) lack of collaborative management

c

Users of smart cards are required to enter a ________ to be authenticated. A) Social Security number B) public key C) personal identification number D) private key

c

Which of the following conditions exists when data are isolated in separated information systems? A) information overload B) encapsulation C) information silo D) data segregation

c

Which of the following is a critical security function that should be addressed by the senior management of an organization? A) sharing the private key with all systems connected to the network B) creating IS security software programs C) establishing the security policy D) avoiding the use of perimeter firewalls

c

Which of the following is a form of outsourcing? A) ANP Infotech buying off-the-shelf software from a vendor B) ANP Infotech customizing its information systems C) ANP Infotech acquiring licensed manufacturing software from a vendor D) ANP Infotech updating its data standards to protect its information assets

c

Which of the following is a function of the technology office in an organization's information systems (IS) department? A) managing computing infrastructure B) creating new information systems C) investigating new information systems D) maintaining existing information systems

c

Which of the following is a personal security safeguard? A) sending valuable data only via email or IM B) using single password for all the sites C) removing high-value assets from computers D) storing browsing history, temporary files, and cookies

c

Which of the following is a right of users of information systems? A) right to install programs and applications of their choice B) right to make hardware modifications when desired C) right to receive effective training D) right to obtain the configuration of their choice

c

Which of the following is a risk of outsourcing information systems (IS)/information technology (IT) functions? A) It is easier to end an agreement between a vendor and an organization that hired the vendor. B) It provides the hiring organization with too many choices. C) It involves the potential loss of intellectual capital. D) It invariably results in diseconomies of scale.

c

Which of the following is a significant risk of using social media for inbound and outbound logistics? A) loss of control B) loss of credibility C) loss of privacy D) loss of effectiveness

c

Which of the following is a solution for problems arising from information silos? A) departmentalization of an organization B) limiting communication to top-level management C) integrating data into a single database D) isolating functional applications

c

Which of the following is an example of a structured process? A) ill-defined situations B) collaboration C) customer returns D) social networking

c

Which of the following is an example of a supervised data mining technique? A) cluster analysis B) market-basket analysis C) regression analysis D) click streaming

c

Which of the following is an example of outsourcing an entire business function? A) acquiring licensed security software instead of developing it in-house B) making customizations to licensed software C) paying another organization to arrange for employee travel D) acquiring virtualization technologies

c

Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased? A) licensed software B) Infrastructure as a Service (IaaS) cloud hosting C) Software as a Service (SaaS) D) virtualization

c

Which of the following is most likely to be a result of hacking? A) certain Web sites being censored for hurting sentiments B) small amounts of spam in a user's inbox C) an unauthorized transaction from a user's credit card D) pop-up ads appearing frequently

c

Which of the following is true of scrum? A) It was developed to overcome the problems that occur when using the Business Process Modeling Notation (BPMN). B) It does not adapt to change easily. C) It is generic enough to be used for the development of business processes, information systems, and applications. D) Its work periods are usually three months or longer.

c

Which of the following observations regarding the value of social capital is true? A) A huge network of relationships with people who have few resources is of greater value than a smaller network of people with substantial resources. B) People should ideally ignore entity assets and try to connect to more people with stronger relationships. C) Social capital depreciates and such depreciation can be ameliorated by adding something of value to interactions. D) The value of social capital is best expressed as the summation of the number of relationships in a social network and the resources controlled by those related.

c

Which of the following statements about enterprise information systems is true? A) The procedures are not formalized or documented. B) They do not require users to have any formal training. C) They are very difficult to change. D) They support 10 to 100 users.

c

Which of the following statements is true about business intelligence (BI) publishing alternatives? A) Dynamic reports are published as PDF documents. B) The push option is manual for Web servers and SharePoint. C) BI servers extend alert/RSS functionality to support user subscriptions. D) Publishing static BI content requires more skill, compared to publishing dynamic BI content.

c

Which of the following statements is true about data marts? A) A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. B) Data mart users possess the data management expertise that data warehouse employees have. C) Data marts address the needs of a particular department or functional area of a business. D) Data marts are larger than data warehouses.

c

Which of the following statements is true about operational data? A) It is always better to have data with too coarse a granularity than with too fine a granularity. B) If the data granularity is too coarse, the data can be made finer by summing and combining. C) Purchased operational data often contains missing elements. D) Problematic operational data is termed rough data.

c

Which of the following statements is true about reporting applications? A) Reporting applications deliver business intelligence to users as a result of an event or particular data condition. B) Reporting applications consist of five standard components: hardware, software, data, procedures, and people. C) Reporting applications refer to business applications that input data from one or more sources and applies reporting operations to that data to produce business intelligence. D) Reporting applications produce business intelligence using highly sophisticated operations.

c

Which of the following statements is true about social CRM? A) Customers likely to generate the most business get the most attention from the organization. B) All the customer relationship processes in social CRM are structured and controlled. C) Each customer crafts his or her own relationship with the company. D) Though relationships emerge from joint activity, companies control the customers.

c

Which of the following statements is true about the maintenance group of information systems (IS)? A) It is undertaken by the business analysts. B) It is overseen by the chief technology officer. C) It involves adapting existing systems to support new features. D) It comprises developing test plans and designing automated test scripts.

c

Which of the following statements is true about the position definitions component of human safeguards? A) System administrators should retain user accounts after an employee has been terminated. B) All employees must be provided with uniform, general training on security regardless of the sensitivity of their positions. C) Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk. D) Holding public users of Web sites accountable for security violations is easy and inexpensive.

c

Which of the following statements is true about users of information systems? A) They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. B) They can avoid security and backup procedures. C) They should learn standard techniques and procedures for the applications they use. D) They should learn to install hardware and software on their own.

c

Which of the following statements is true of outsourcing? A) Management should have expertise on a subject before it can decide to outsource. B) An outsource vendor transfers the responsibility of risk management to the development group. C) To achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff. D) Outsourcing leads to increased financial risk.

c

Which of the following statements is true of the information systems (IS) department? A) If the IS primarily support accounting and finance activities, the chief financial officer (CFO) is appointed as the chief information officer (CIO). B) Programs used in all information systems are developed in-house by the maintenance group. C) The operations group monitors user experience and responds to user problems. D) Data administration is performed exclusively by the outsourcing relations group.

c

Which of the following terms is used as a synonym for data mining? A) regression analysis B) data warehousing C) knowledge discovery in databases (KDD) D) parallel processing in databases (PPD)

c

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? A) the Privacy Act of 1974 B) the Sarbanes-Oxley Act C) the HIPAA of 1996 D) the Gramm-Leach-Bliley Act

c

Which of the following workgroup processes is related to operations? A) account updating and tracking B) sales forecasting C) finished goods inventory management D) treasury and account management

c

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product? A) marketing B) customer acquisition C) relationship management D) loss/churn

c

________ are an extension of bad reviews. A) Critic's comments B) Vanity metrics C) Mutinous movements D) Viral hooks

c

________ are formally defined, standardized processes that involve day-to-day operations. A) Dynamic processes B) Unstructured processes C) Structured processes D) Kinetic processes

c

________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. A) Decision Support Systems (DSS) B) Online Analytical Processing (OLAP) systems C) Content Management Systems (CMS) D) Data Transfer Protocols (DTP)

c

________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access. A) Private keys B) User names C) Passwords D) Personal identification numbers

c

________ are viruses that masquerade as useful programs or files. A) Adware programs B) Spyware programs C) Trojan horses D) Worms

c

________ involve the people and procedure components of information systems. A) Firewalls B) Technical safeguards C) Human safeguards D) Payloads

c

________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks. A) Spoofing B) Phishing C) Sniffing D) Pretexting

c

________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Process mining B) Business process management C) Business intelligence D) Spatial intelligence

c

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data optimization B) Database normalization C) Data mining D) Data warehousing

c

________ protect databases and other organizational data. A) Cookies B) Payloads C) Data safeguards D) Data strings

c

________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks. A) Keyloggers B) Pretexters C) Wardrivers D) Phishers

c

Which of the following workgroup processes is related to manufacturing?

capacity planning and scheduling

The storage of ________ differentiates social media information systems (SMIS) from Web site applications.

connection data

Alisha's startup has another record month. She posts pictures of her best selling handbag to Facebook and Instagram. Her friends and customers leave her positive comments. Alisha's post and her friends' comments are an example of ________.

content data

ANo________ system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.

customer relationship management

) Responding to problematic content on social networking sites is best reserved for when the problematic content ________. A) is obscene and inappropriate B) does not affect the site where the content has been posted C) represents reasonable criticism of an organization's products or services D) has caused an organization to do something positive as a result

d

) Which of the following ERP products did Infor acquire? A) Solomon B) PeopleSoft C) GP D) Baan

d

Dentoin Pharmaceuticals requires an information system to support its new assembly line. The management has assigned a team of ten members to plan this project. Which of the following will be the first major task for this team? A) designing the system components B) assessing the project's feasibility C) planning the project D) defining the system goals and scope

d

Dollar Bill Supermarket is one of the best in the city. However, shoppers prefer other supermarkets to it as there is always a long queue at the billing counter. The outdated billing registers make the entire process inefficient. Which of the following steps should the supermarket management take to improve the billing process? A) limit the number of products customers can buy B) limit the number of customers in the supermarket C) change the process structure D) change process resources

d

Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________. A) links B) authoring C) signals D) extensions

d

In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means that ________. A) a question can be answered with no B) it is the end of the process C) a question can be answered with yes D) an activity is considered to be a subprocess of a process

d

In a business process, a role refers to ________. A) a physical repository B) the movement of data C) a collection of data D) a collection of activities

d

In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. A) confidence B) support C) granularity D) lift

d

In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________. A) reports B) resources C) components D) deliverables

d

Information systems improve process quality by ________. A) duplicating data B) entirely replacing human activity C) changing the work culture D) controlling process flow

d

Jamie's company manufactures 3D printers, and his job is to prepare user manuals for the products. Jamie also prepares training material for the workers who are involved in the manufacturing process. With reference to his job profile, Jamie is a ________. A) system analyst B) consultant C) programmer D) technical writer

d

KPL Inc. is an outsource vendor. It handles the recruiting process for Numero Uno Computers. KPL recently changed its business strategy to a more profit-oriented one. This modification would require the company to charge more for its services. This change will be a ________ risk for Numero Uno Computers. A) de facto sole source B) benefits outweighed by long-term costs C) no easy exit D) loss of control

d

Knowledge management (KM) benefits organizations because it ________. A) allows distributors to work within the company premises B) allows suppliers to work according to the organizational policies C) enables employees to solve problems and rectify mistakes later D) improves process quality and increases team strength

d

Molly received a call from a person claiming to be her bank representative. The representative asked her to verify her bank account details and credit card number. A few days after the call Molly noticed unusual activity on her account; a large sum had been withdrawn. Molly was a victim of ________. A) hacking B) usurping C) sniffing D) pretexting

d

Organizational feasibility concerns ________. A) the organization's budget and schedule requirements B) the competitor's business process model C) whether the organization has the technical infrastructure to implement the new system D) whether the new system fits within the organization's customs or legal requirements

d

PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, attempts to fix the damage by retrieving information from backed up data. George is involved in the process of ________. A) authentication B) hardening C) usurpation D) recovery

d

Social CRM is a(n) ________ process. A) structured and controlled B) uncontrolled but structured C) unstructured but controlled D) unstructured and uncontrolled

d

Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. A) system definition B) component design C) system maintenance D) system implementation

d

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________. A) stop SQL injection attacks B) prevent email spoofing C) prevent brute force attacks D) provide physical security

d

The first step that any organization should take to manage the risk of employee communication is to develop and publicize a(n) ________ policy. A) human resource B) insurance C) corporate social responsibility D) social media

d

The inherent processes defined in an ERP solution are referred to by some ERP vendors as ________. A) database transactions B) stored procedures C) transaction logs D) process blueprints

d

The major benefit of enterprise application integration is that it ________. A) minimizes the requirement for formalized procedures B) acts as a cost effective alternative to ERP, with greater capabilities C) utilizes a centralized database D) enables organizations to use existing applications

d

The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. A) accurate B) informal C) specific D) dynamic

d

Tony requests a credit approval of $25,000. Instead, he gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? A) data duplication B) isolated decisions C) limited information D) disjointed processes

d

U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score? A) SAMCROW has ordered recently and orders frequently, but it orders the least expensive goods. B) SAMCROW has not ordered anything for a while, but when it did order in the past, it ordered frequently, and its orders were of the highest monetary value. C) SAMCROW has not ordered anything for a while and it did not order frequently, but when it did order, it bought the least-expensive items. D) SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.

d

When an employee is terminated, IS administrators should receive advance notice so that they can ________. A) destroy the employee's records B) plan the recruitment of their positions C) disseminate information D) remove the user account and password

d

Which of the following are the steps in the business process management (BPM) cycle? A) model processes; implement processes; assess results; create components B) create components; model processes; implement processes; assess results C) implement processes; create components; model processes; assess results D) model processes; create components; implement processes; assess results

d

Which of the following information systems eliminates data duplication and carefully manages changes to duplicated data to maintain consistency? A) departmental information systems B) workgroup information systems C) personal information systems D) enterprise information systems

d

Which of the following is a basic operation used by reporting applications to produce business intelligence? A) coalescing B) transposing C) dispersing D) calculating

d

Which of the following is a function of the steering committee for the information systems (IS) department? A) writing program code B) imparting training C) adapting software D) setting IS priorities

d

Which of the following is a fundamental category of business intelligence (BI) analysis? A) automation B) encapsulation C) data hiding D) data mining

d

Which of the following is a risk associated with using social media in human resources to form conclusions about employees? A) loss of privacy of the employees B) loss of control over the employees C) decrease in efficiency of the evaluation process D) possibility of error on the site

d

Which of the following is a sniffing technique? A) IP spoofing B) caches C) denial of service D) adware

d

Which of the following is a social media (SM) application provider? A) Oracle B) SAP C) McAfee D) LinkedIn

d

Which of the following is an effective and acceptable technique to overcome employee resistance while implementing new enterprise systems? A) giving employees ultimatums and deadlines B) paying employees straight-out for transitioning to the new system C) coercing employees to learn the new system D) conducting contests with cash prizes among employees

d

Which of the following is an example of a dynamic process? A) Samsung accepts the return of a defective television from its dealer. B) Starbucks places an order for coffee beans from its local supplier. C) Amazon.com hires customer service representatives to help customers with their online orders. D) Nike uses Facebook and Twitter to generate buzz about its new line of running shoes.

d

Which of the following is an example of a measure in an OLAP report? A) customer type B) purchase date C) sales region D) average cost

d

Which of the following is considered a computer crime? A) accidental deletion of important records B) poorly written programs resulting in information loss C) loss of data as a result of flooding D) hacking of information systems

d

Which of the following is generally a responsibility of users of information systems (IS)? A) reporting trivial problems B) replacing legacy systems with improved ones C) installing unauthorized hardware and programs D) following security and backup procedures

d

Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data? A) public key B) asymmetric encryption C) key escrow D) SQL injection

d

Which of the following is true of online ad revenue? A) Mobile ad clicks are more effective, on average, than PC clicks. B) Advertisers can find out who responds to ads but not how strongly. C) One of the principal means of attracting viewers is to provide low-cost content. D) Most ads on social media generate revenue only when customers click on them.

d

Which of the following is true of paired programming? A) Two team members write the same program by coordinating from different locations. B) Two programs are run simultaneously on one device. C) Two processors are required to run one program. D) Two programmers share the same computer to write a computer program together.

d

Which of the following observations concerning expert systems is true? A) These systems are not affected by any changes made to it. B) These systems have lived up to the high expectations set by their name. C) These systems are easy to develop and maintain. D) These systems encode human knowledge in the form of If/Then rules.

d

Which of the following statements is true about biometric identification? A) It involves the use of a personal identification number (PIN) for authentication. B) It provides weak authentication. C) It is a relatively inexpensive mode of authentication. D) It often faces resistance from users for its invasive nature.

d

Which of the following statements is true about data administration? A) It is a line function to the chief information officer. B) It merely involves developing data policies. C) It applies to individuals and not to the entire organization. D) It is involved in establishing data safeguards.

d

Which of the following statements is true about information systems (IS) planning functions? A) The chief operating officer (COO) is the sole representative for IS and IT issues within the executive staff. B) The steering committee represents the IS department exclusively in high-level discussions. C) The information systems (IS) department's priorities are developed by the chief executive officer (CEO). D) The chief executive officer (CEO) and other executive staff decide the membership of the steering committee.

d

Which of the following statements is true about the steering committee of the information systems (IS) department? A) The steering committee is comprised of employees from the IS department in an organization. B) The steering committee's membership is determined by the IS department. C) The steering committee's schedule and agenda are typically set by the chief executive officer (CEO) and other members of the executive staff. D) The steering committee's meetings are conducted by the IS department.

d

Which of the following statements is true about workgroup information systems? A) They are easy to change. B) They minimize data duplication among departments. C) They can be operated without training. D) They support 10 to 100 users.

d

Which of the following workgroup processes is related to manufacturing? A) order entry and tracking B) finished goods inventory management C) product and brand management D) capacity planning and scheduling

d

________ analysis is a way of analyzing and ranking customers according to their purchasing patterns. A) Regression B) CRM C) Market-basket D) RFM

d

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications. A) Encryption B) Spoofing C) Phishing D) Usurpation

d

________ refers to the source, format, assumptions and constraints, and other facts about the data. A) Clickstream data B) Dimensional data C) Outsourced data D) Metadata

d

________ set the stage for the requirements for any information systems and applications that need to be created or adapted. A) Business repositories B) Business policies C) Business reports D) Business process models

d

The first step in developing a social media information system (SMIS) is to ________.

define the goals of the organization

In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________.

deliverables

Which of the following social media (SM) providers has the largest number of users?

facebook

Business process reengineering is a quick process but is exceedingly expensive.

false

Business processes, information systems, and applications have the same characteristics and components.

false

Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.

false

In all companies, the chief information officer (CIO) reports directly to the chief financial officer.

false

In market-basket terminology, confidence is the probability that two items will be purchased together.

false

Information systems and business processes are synonymous terms.

false

Order tracking and account tracking are business processes concerning the operations department.

false

The losses due to human error are minimal, and hence, organizations tend to ignore these losses.

false

The structure of the information systems (IS) department remains constant across organizations.

false

Unlike humans, organizations do not have social capital.

false

Which of the following workgroup processes is related to operations?

finished goods inventory management

A ________ is content structure that has emerged from the processing of many user tags in social media.

folksonomy

Social media (SM) communities differ from communities in the past because SM communities are ________.

formed based on mutual interests

________ is a term that refers to the level of detail represented by the data.

granularity

Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that she is already the highest paid employee on the floor. Sally doesn't believe her manager, and illegally accesses the employee database to look at salary data. Sally's act can be termed as ________.

hacking

Which of the following is considered a computer crime?

hacking of information systems

Which of the following is a function of the technology office in an organization's information systems (IS) department?

investigating new information systems

Which of the following workgroup processes is related to sales and marketing?

lead tracking

In an information systems (IS) department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.

operations

Which of the following is a responsibility of a chief information officer (CIO)?

serving as the principal manager of the IS department

_______ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.

sniffing

Anthony is in his senior year of college. He spends time creating a LinkedIn page so recruiters can more easily find him. He also goes to the university sponsored "meet the firms" nights to become more acquainted with people in the corporate world. In this scenario, Anthony is investing in his ________.

social capital

__ is the investment in social relations with the expectation of returns in the marketplace.

social capital

________ is the use of information technology to support the sharing of content among networks of users.

social media

The traditional process for developing information systems is ________.

the systems development cycle


Set pelajaran terkait

Offentlige myndigheders erstatningsansvar

View Set

Historical issues in psy. (100%)

View Set

Real Estate Unit 8 (Underwriting Residential Property

View Set

Protein Energy Malnutrition (Dr. Low)

View Set

Unit 15:12 Applying Dressings and Bandages

View Set