Business Information Systems Final- CH5-9
TRUE The network categories include LAN, WAN, and MAN.
#1 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 2. The network providers include ISP, NSP, and RSP.
TRUE Integrations allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.
#1 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 2. Eintegration is the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources.
FALSE Conversion is the process of transferring information from a legacy system to a new system.
#1 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 2. Conversion modifies software to meet specific user or business requirements.
FALSE Network convergence includes VoIP, UC, and IPTV.
#10 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 11.
FALSE A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes.
#10 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 11.
TRUE A joint application development session is where employees meet, sometimes for several days, to define or review the business requirements for the system.
#10 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 11. Requirements management is the process of managing changes to the business requirements throughout the project.
FALSE Front-office operations deal directly with the customer.
#100 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 101. Analytical CRM supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers.
FALSE Operational CRM supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers.
#101 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 102. Operational CRM supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers.
TRUE Asset tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention.
#101 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 102. RFID accelerometer is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.
FALSE Project deliverables are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
#101 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 102. Project deliverables represent key dates when a certain group of activities must be performed.
TRUE RFID accelerometer is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.
#102 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 103. Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
FALSE Project milestones represent key dates when a certain group of activities must be performed.
#102 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 103. A communication plan defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations.
TRUE List generators compile customer information from a variety of sources and segment it for different marketing campaigns.
#103 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 104. Campaign management systems guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis.
FALSE Chipless RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
#103 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 104. RFID tag is an electronic identification device that is made up of a chip and antenna.
TRUE A communication plan defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations.
#103 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 104. The executive sponsor is the person or group who provides the financial resources for the project.
TRUE Campaign management systems guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis.
#104 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 105.
TRUE RFID tag is an electronic identification device that is made up of a chip and antenna.
#104 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 105. RFID reader (RFID interrogator) is a transmitter/receiver that reads the contents of RFID tags in the area. A RFID system is composed of one or more RFID tags, one or more RFID readers, two or more antennas.
TRUE The executive sponsor is the person or group who provides the financial resources for the project.
#104 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 105. Project constraints are factors considered to be
TRUE RFID reader (RFID interrogator) is a transmitter/receiver that reads the contents of RFID tags in the area. A RFID system is composed of one or more RFID tags, one or more RFID readers, two or more antennas.
#105 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 106. RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranching.
FALSE List generators fall under the category of the sales department's CRM tools. List generators fall under the category of the marketing department's CRM tools.
#105 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 106. Up-selling is selling additional products or services to an existing customer.
TRUE, real, or certain without proof or demonstration.
#105 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 106. Project assumptions are specific factors that can limit options including budget, delivery dates, available skilled resources, and organizational policies.
TRUE RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranching.
#106 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 107. A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map.
FALSE Cross-selling is selling additional products or services to an existing customer.
#106 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 107. Cross-selling is increasing the value of the sale.
FALSE Project constraints are specific factors that can limit options including budget, delivery dates, available skilled resources, and organizational policies.
#106 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 107. A project objective is any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
FALSE A global positioning system (GPS) is a satellite-based navigation system providing extremely accurate position, time, and speed information.
#107 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 108. A geographic information system (GIS) stores, views, and analyzes geographic data, creating multidimensional charts or maps.
FALSE Up-selling is increasing the value of the sale.
#107 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 108.
FALSE A project deliverable is any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
#107 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 108. The Project Management Office (PMO) is an internal department that oversees all organizational projects.
TRUE A geographic information system (GIS) stores, views, and analyzes geographic data, creating multidimensional charts or maps.
#108 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 109. Automatic vehicle location (AVL) uses GPS tracking to track vehicles.
FALSE Contact management falls under the category of the customer service department's CRM tools. Contact management falls under the category of the sales department's CRM tools.
#108 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 109. Automatic call distribution routes inbound calls to available agents.
TRUE The Project Management Office (PMO) is an internal department that oversees all organizational projects.
#108 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 109. Project assumptions represent key dates when a certain group of activities must be performed.
TRUE Automatic call distribution routes inbound calls to available agents.
#109 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 110. Interactive voice response directs customers to use touch-tone phones or keywords to navigate or provide information.
TRUE Automatic vehicle location (AVL) uses GPS tracking to track vehicles.
#109 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 110. Geographic information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.
FALSE Project milestones represent key dates when a certain group of activities must be performed.
#109 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 110. Project objectives are quantifiable criteria that must be met for the project to be considered a success.
TRUE A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources.
#11 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 12. A wide area network (WAN) spans a large geographic area such as a state, province, or country.
TRUE Integrations are achieved using middleware—several types of software that sit between and provide connectivity for two or more software applications. Middleware translates information between disparate systems. Integrations are achieved using middleware—several types of software that sit between and provide connectivity for two or more software applications. Middleware translates information between disparate systems.
#11 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 12. Enterprise application integration (EAI) middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors.
TRUE Requirements management is the process of managing changes to the business requirements throughout the project.
#11 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 12. Projects are typically dynamic in nature, and change should be expected and anticipated for successful project completion.
TRUE Interactive voice response directs customers to use touch-tone phones or keywords to navigate or provide information.
#110 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 111. Predictive dialing automatically dials outbound calls and forwards answered calls to an available agent.
TRUE Geographic information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.
#110 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 111. A global positioning system (GPS) is a satellite-based navigation system providing extremely accurate position, time, and speed information.
TRUE Project objectives are quantifiable criteria that must be met for the project to be considered a success.
#110 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 111. The project requirements document defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts.
TRUE Predictive dialing automatically dials outbound calls and forwards answered calls to an available agent.
#111 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 112. Interactive voice response routes inbound calls to available agents.
TRUE A global positioning system (GPS) is a satellite-based navigation system providing extremely accurate position, time, and speed information.
#111 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 112. Cartography is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.
TRUE The project requirements document defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts.
#111 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 112.
FALSE Automatic call distribution routes inbound calls to available agents.
#112 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 113. Automatic call distribution directs customers to use touch-tone phones or keywords to navigate or provide information.
TRUE Cartography is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.
#112 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 113. Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match.
TRUE The project scope statement links the project to the organization's overall business goals. It describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project. The project scope statement links the project to the organization's overall business goals. It describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project.
#112 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 113. The project managers are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion.
FALSE Interactive voice response directs customers to use touch-tone phones or keywords to navigate or provide information.
#113 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 114. Interactive voice response automatically dials outbound calls and forwards answered calls to an available agent.
FALSE Edge matching (warping, rubber sheeting) occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match. Edge matching is a critical component of creating a GIS database because map misalignments occur frequently for many reasons including survey error and cartographic errors.
#113 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 114. Longitude represents a north/south measurement of position.
FALSE The project stakeholders are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion.
#113 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 114.
FALSE Predictive dialing automatically dials outbound calls and forwards answered calls to an available agent.
#114 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 115. Opportunity management CRM systems target sales opportunities by finding new customers or companies for future sales.
FALSE Latitude represents a north/south measurement of position.
#114 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 115. Latitude represents an east/west measurement of position.
TRUE The responsibility matrix defines all project roles and indicates what responsibilities are associated with each role. The responsibility matrix defines all project roles and indicates what responsibilities are associated with each role.
#114 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 115. Status reports are periodic reviews of actual performance versus expected performance.
FALSE Longitude represents an east/west measurement of position.
#115 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 116. Geocache is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find. GPS users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find. Caches are often placed in locations that are interesting or challenging for people to discover.
TRUE Status reports are periodic reviews of actual performance versus expected performance.
#115 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 116. A kill switch is a trigger that enables a project manager to close the project before completion.
TRUE A kill switch is a trigger that enables a project manager to close the project before completion.
#116 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-05 Identify the primary project planning diagrams. Topic: Primary Project Planning Diagrams 117.
TRUE Geocache is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find. GPS users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find. Caches are often placed in locations that are interesting or challenging for people to discover.
#116 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 117. A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache. Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat. Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.
FALSE A Gantt chart is a graphical network model that depicts a project's tasks and the relationships between them. A PERT (Program Evaluation and Review Technique) chart is a graphical network model that depicts a project's tasks and the relationships between them.
#117 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-05 Identify the primary project planning diagrams. Topic: Primary Project Planning Diagrams 118. A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.
TRUE A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache. Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat. Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.
#117 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 118. Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.
TRUE A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.
#118 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-05 Identify the primary project planning diagrams. Topic: Primary Project Planning Diagrams 119. A dependency is a trigger that enables a project manager to close the project before completion.
TRUE Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.
#118 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 119. Estimated time en route (ETE) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.
FALSE A kill switch is a trigger that enables a project manager to close the project before completion.
#119 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-05 Identify the primary project planning diagrams. Topic: Primary Project Planning Diagrams 120. A kill switch is a logical relationship that exists between the project tasks, or between a project task and a milestone.
TRUE Estimated time en route (ETE) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.
#119 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 120. GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.
TRUE A wide area network (WAN)<i> </i>spans a large geographic area such as a state, province, or country.
#12 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 13. A wide area network (WAN) connects a group of computers in close proximity, such as in an office building, school, or home.
TRUE Enterprise application integration (EAI) middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors.
#12 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 13.
TRUE Projects are typically dynamic in nature, and change should be expected and anticipated for successful project completion.
#12 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 13. A requirements definition document prioritizes all of the business requirements by order of importance to the company.
FALSE A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.
#120 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-05 Identify the primary project planning diagrams. Topic: Primary Project Planning Diagrams 121. Gantt charts define dependency between project tasks before those tasks are scheduled.
TRUE GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.
#120 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 121.
FALSE PERT charts define dependency between project tasks before those tasks are scheduled.
#121 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-05 Identify the primary project planning diagrams. Topic: Primary Project Planning Diagrams 122. The critical path is the sequence of activities that determine the earliest date by which the project can be completed.
TRUE A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device. A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
#121 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 122. Spatial data (geospatial data or geographic information) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data.
TRUE The critical path is the sequence of activities that determine the earliest date by which the project can be completed.
#122 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-05 Identify the primary project planning diagrams. Topic: Primary Project Planning Diagrams 123. A PERT chart is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally.
TRUE Spatial data (geospatial data or geographic information) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data.
#122 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 123. WiMAX is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.
FALSE A Gantt chart is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally.
#123 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-05 Identify the primary project planning diagrams. Topic: Primary Project Planning Diagrams 124.
FALSE Geocoding in spatial databases is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.
#123 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 124. LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory.
FALSE LBS can track and monitor objects similar to RFID.
#124 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 07-04 Explain the different wireless network business applications. Topic: Business Applications of Wireless Networks 125. GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications.
FALSE Outsourcing is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems. In-sourcing is a common approach that uses the professional expertise within an organization to develop and maintain the organization's information technology systems.
#124 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 125. In-sourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
TRUE Offshore outsourcing uses organizations from developing countries to write code and develop systems. Offshore outsourcing uses organizations from developing countries to write code and develop systems.
#126 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 127. In-sourcing (in-house development) uses the professional expertise within an organization to develop and maintain its information technology systems. In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better quality workforce combining both technical and business skills.
TRUE In-sourcing (in-house development) uses the professional expertise within an organization to develop and maintain its information technology systems. In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better quality workforce combining both technical and business skills.
#127 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 128. In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better quality workforce combining both technical and business skills.
TRUE In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better quality workforce combining both technical and business skills.
#128 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 129. Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
TRUE Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
#129 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 130. Onshore outsourcing occurs when engaging another company within the same country for services.
FALSE A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources.
#13 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 14. A metropolitan area network (MAN) spans a large geographic area such as a state, province, or country.
FALSE Integrations provide enterprisewide support and data access for a firm's operations and business processes. Enterprise systems provide enterprisewide support and data access for a firm's operations and business processes.
#13 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 14. Middleware translates information between disparate systems.
TRUE A requirements definition document prioritizes all of the business requirements by order of importance to the company.
#13 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 14.
TRUE Onshore outsourcing occurs when engaging another company within the same country for services.
#130 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 131. Nearshore outsourcing occurs when contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.
TRUE Nearshore outsourcing occurs when contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.
#131 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 132. Offshore outsourcing occurs when using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away.
TRUE Offshore outsourcing occurs when using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away.
#132 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 133. Offshore outsourcing occurs when engaging another company within the same country for services.
FALSE Onshore outsourcing occurs when engaging another company within the same country for services.
#133 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 134. Onshore outsourcing occurs when contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.
FALSE Nearshore outsourcing occurs when contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.
#134 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-06 Identify the three different types of outsourcing along with their benefits and challenges. Topic: Outsourcing Projects 135. Nearshore outsourcing occurs when organizations from developing countries are used to write code and develop systems. In offshore outsourcing the country is geographically far away.
FALSE A wide area network (WAN)<i> </i>spans a large geographic area such as a state, province, or country.
#14 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 15. Attenuation represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.
TRUE Middleware translates information between disparate systems.
#14 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 15. Enterprise application integration (EAI) middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors.
TRUE Sign-off is the users' actual signatures indicating they approve all of the business requirements. Sign-off is the users' actual signatures indicating they approve all of the business requirements.
#14 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 15. Process modeling involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.
TRUE Attenuation<i> </i>represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.
#15 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 16. A repeater receives and repeats a signal to reduce its attenuation and extend its range.
TRUE Enterprise application integration (EAI) middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors.
#15 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 16.
TRUE Process modeling involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.
#15 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 16. A data flow diagram (DFD) illustrates the movement of information between external entities and the processes and data stores within the system.
TRUE A repeater<i> </i>receives and repeats a signal to reduce its attenuation and extend its range.
#16 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 17. A metropolitan area network (MAN) is a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN.
FALSE The customers' customer is upstream in the supply chain. The customers' customer is downstream in the supply chain.
#16 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 17. Plan, source, make, deliver, and return are the five basic supply chain management components.
TRUE A data flow diagram (DFD) illustrates the movement of information between external entities and the processes and data stores within the system.
#16 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 17. A data flow diagram involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.
TRUE A metropolitan area network (MAN)<i> </i>is a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN.
#17 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 18. A local area network (LAN) is a large computer network usually spanning a city.
TRUE Plan, source, make, deliver, and return are the five basic supply chain management components.
#17 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 18. Plan, source, give, get, and return are the five basic supply chain management components.
FALSE Process modeling involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.
#17 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 18. Process modeling illustrates the movement of information between external entities and the processes and data stores within the system.
FALSE A metropolitan area network (MAN) is a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN.
#18 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 19. A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs, and to wide area networks.
FALSE Plan, source, make, deliver, and return are the five basic supply chain management components.
#18 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 19.
FALSE A data flow diagram (DFD) illustrates the movement of information between external entities and the processes and data stores within the system.
#18 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 19. Computer-aided software engineering (CASE) tools are software suites that automate systems analysis, design, and development.
TRUE A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs, and to wide area networks.
#19 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 20. A wide area network (WAN) spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet.
TRUE In the basic supply chain, source refers to building relationships with suppliers to procure raw materials. In the basic supply chain, source refers to building relationships with suppliers to procure raw materials.
#19 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 20.
TRUE Computer-aided software engineering (CASE) tools are software suites that automate systems analysis, design, and development.
#19 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 20. Control objects for information and related technology (COBIT) are software suites that automate systems analysis, design, and development.
TRUE The network providers include ISP, NSP, and RSP.
#2 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 3. The network access technologies include DSL, cable modem, and broadband.
TRUE Eintegration is the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources.
#2 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 3.
FALSE Software customization modifies software to meet specific user or business requirements.
#2 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 3.
TRUE A wide area network (WAN) spans a large geographic area such as a state, province, or country.
#20 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 21. A repeater represents the loss of a network signal strength measured in decibels and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals.
FALSE In the basic supply chain, source refers to planning for transportation of goods to customers. In the basic supply chain, deliver refers to planning for transportation of goods to customers.
#20 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 21. In the basic supply chain, return refers to supporting customers and product returns.
FALSE Computer-aided software engineering (CASE) tools are software suites that automate systems analysis, design, and development.
#20 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 21. The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
FALSE Attenuation represents the loss of a network signal strength measured in decibels and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals.
#21 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 22. A repeater receives and repeats a signal extending its attenuation or range.
TRUE In the basic supply chain, return refers to supporting customers and product returns.
#21 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 22.
FALSE The development phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
#21 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 22. The analysis phase establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
TRUE A repeater receives and repeats a signal extending its attenuation or range.
#22 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 23. A metropolitan area network (MAN) is a large computer network usually spanning a city.
TRUE In the basic supply chain, make refers to manufacturing products and creating production schedules. In the basic supply chain, make refers to manufacturing products and creating production schedules.
#22 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 23.
FALSE The design phase establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
#22 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 23. The design phase establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
TRUE A metropolitan area network (MAN) is a large computer network usually spanning a city.
#23 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 24. Broadband over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems.
FALSE In the basic supply chain, return refers to preparing to manage all resources required to meet demands. In the basic supply chain, plan refers to preparing to manage all resources required to meet demands.
#23 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 24. In the basic supply chain, plan refers to preparing to manage all resources required to meet demand.
TRUE The design phase establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
#23 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 24. The testing phase takes all the detailed design documents from the design phase and transforms them into the actual system.
TRUE Broadband over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems.
#24 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 25. Telecommuting (virtual workforce) allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data.
TRUE In the basic supply chain, plan refers to preparing to manage all resources required to meet demand.
#24 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 25. In the basic supply chain, deliver refers to planning for transportation of goods to customers.
FALSE The development phase takes all the detailed design documents from the design phase and transforms them into the actual system.
#24 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 25. Software engineering is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.
TRUE Software engineering is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.
#25 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 26. Software engineers use computer-aided software engineering (CASE) software tools, which provide automated support for the development of the system.
FALSE A packet is a single unit of binary data routed through a network.
#26 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 27. Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.
TRUE Materials are transformed into semifinished and finished products—the organization's own production processes. Materials are transformed into semifinished and finished products—the organization's own production processes.
#26 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 27. Products are distributed to customers and their downstream customers at all levels.
TRUE Software engineers use computer-aided software engineering (CASE) software tools, which provide automated support for the development of the system.
#26 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 27. Control objects for information and related technology (COBIT) is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.
TRUE Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.
#27 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 28. Traceroute formats include a packet header, packet body containing the original message, and packet footer.
TRUE Products are distributed to customers and their downstream customers at all levels.
#27 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 28. Effective and efficient supply chain management systems can enable an organization to decrease the power of its buyers.
TRUE Control objects for information and related technology (COBIT) is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.
#27 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 28. Object-oriented languages provide a programming method that provides for interactive modules to a website.
FALSE Standard packet formats include a packet header, packet body containing the original message, and packet footer.
#28 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 29. The packet header lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data.
TRUE Organizations can decrease the power of its buyers through efficient and effective SCM.
#28 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 29. Supply chain visibility ensures supply chain cohesion by automating the different activities of the supply chain.
FALSE A scripting language is a programming method that provides for interactive modules to a website.
#28 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 29. Scripting languages group data and corresponding processes into objects.
TRUE The packet header lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data.
#29 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 30. The packet footer represents the end of the packet or transmission end. The packet header and packet footer contain error-checking information to ensure the entire message is sent and received. The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence.
FALSE Organizations can decrease the power of its buyers through efficient and effective SCM.
#29 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 30. A back order is an unfilled customer order for a product that is out of stock.
FALSE Object-oriented languages group data and corresponding processes into objects.
#29 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 30.
TRUE The network access technologies include DSL, cable modem, and broadband.
#3 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 4. The network protocols include TCP/IP, FTP, and DHCP.
FALSE Data integration is the integration of a company's existing management information systems. Application integration is the integration of a company's existing management information systems.
#3 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 4. Application integration is the integration of data from multiple sources, which provides a unified view of all data.
TRUE Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization's needs. Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization's needs.
#3 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 4. The systems development life cycle (SDLC) is the overall process for developing information systems, from planning and analysis through implementation and maintenance.
TRUE The packet footer represents the end of the packet or transmission end. The packet header and packet footer contain error-checking information to ensure the entire message is sent and received. The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence.
#30 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 31. IP address is a unique number that identifies where computers are located on the network.
TRUE A back order is an unfilled customer order for a product that is out of stock.
#30 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 31. Inventory cycle time is the time it takes to manufacture a product and deliver it to the retailer.
TRUE Fourth-generation languages (4GL) are programming languages that look similar to human languages. For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS 'SMITH'." Fourth-generation languages (4GL) are programming languages that look similar to human languages. For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS 'SMITH'."
#30 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 31. The development phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.
TRUE IP address is a unique number that identifies where computers are located on the network.
#31 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 32. IP address is a simple network protocol that allows the transfer of files between two computers on the Internet.
TRUE Inventory cycle time is the time it takes to manufacture a product and deliver it to the retailer.
#31 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 32. Customer order cycle time is the agreed upon time between the purchase of a product and the delivery of the product.
FALSE The testing phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.
#31 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 32. Bugs are defects in the code of an information system.
FALSE File Transfer Protocol (FTP) is a simple network protocol that allows the transfer of files between two computers on the Internet.
#32 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 33. Dynamic Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network.
TRUE Customer order cycle time is the agreed upon time between the purchase of a product and the delivery of the product.
#32 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 33. Inventory turnover is the frequency of inventory replacement.
TRUE Bugs are defects in the code of an information system.
#32 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 33. First-generation machine language is difficult for people to understand.
TRUE Dynamic Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network.
#33 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 34. A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.
TRUE Inventory turnover is the frequency of inventory replacement.
#33 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 34. Inventory turnover is an unfilled customer order for a product that is out of stock.
TRUE First-generation machine language is difficult for people to understand.
#33 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 34. Second-generation assembly language is difficult for people to understand.
TRUE A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.
#34 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 35. Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer.
FALSE A back order is an unfilled customer order for a product that is out of stock.
#34 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 35. Customer order cycle time is the time it takes to manufacture a product and deliver it to the retailer.
TRUE Second-generation assembly language is difficult for people to understand.
#34 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 35.
FALSE Traceroute is a utility application that monitors the network path of packet data sent to a remote computer.
#35 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 36. A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.
FALSE Inventory cycle time is the time it takes to manufacture a product and deliver it to the retailer.
#35 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 36. Inventory cycle time is the agreed upon time between the purchase of a product and the delivery of the product.
TRUE Examples of third-generation high-level programming languages are C+ and Java. Examples of third-generation high-level programming languages are C+ and Java.
#35 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 36. Fourth-generation programming languages look similar to human languages.
TRUE A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.
#36 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 37. Voice over IP (VoIP) uses IP technology to transmit telephone calls.
FALSE Customer order cycle time is the agreed upon time between the purchase of a product and the delivery of the product.
#36 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 37. Inventory cycle time is the frequency of inventory replacement.
TRUE Fourth-generation programming languages look similar to human languages.
#36 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 37. Fifth-generation programming languages are artificial intelligence and neural networks.
TRUE Voice over IP (VoIP) uses IP technology to transmit telephone calls.
#37 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 38. Network convergence is the integration of communication channels into a single service.
FALSE Inventory turnover is the frequency of inventory replacement.
#37 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 38.
TRUE Fifth-generation programming languages are artificial intelligence and neural networks.
#37 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 38. Alpha testing occurs when programmers test the system to ensure it is bug-free.
FALSE Unified communications is the integration of communication channels into a single service.
#38 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 39. Voice over IP is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
TRUE Information technology's primary role in supply chain management is creating the integrations or tight process and information linkages between functions within a firm—such as marketing, sales, finance, manufacturing, and distribution—and between firms. Information technology's primary role in supply chain management is creating the integrations or tight process and information linkages between functions within a firm—such as marketing, sales, finance, manufacturing, and distribution—and between firms.
#38 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 39. Supply chain visibility is the ability to view all areas up and down the supply chain.
FALSE Development testing occurs when programmers test the system to ensure it is bug-free.
#38 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 39. Development testing verifies that separate systems can work together passing data back and forth correctly.
FALSE Peer-to-peer (P2P) is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
#39 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 40. Peer-to-peer (P2P) is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
TRUE Organizations can decrease the power of its buyers through efficient and effective SCM.
#39 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 40. Supply chain execution systems ensure supply chain cohesion by automating the different activities of the supply chain.
FALSE Integration testing verifies that separate systems can work together passing data back and forth correctly.
#39 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 40. Integration testing verifies that the units or pieces of code function correctly when integrated together.
TRUE The network protocols include TCP/IP, FTP, and DHCP.
#4 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 5. Network convergence includes VoIP, UC, and IPTV.
FALSE Data integration is the integration of data from multiple sources, which provides a unified view of all data.
#4 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 5.
TRUE The systems development life cycle (SDLC) is the overall process for developing information systems, from planning and analysis through implementation and maintenance.
#4 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 5. The planning phase establishes a high-level plan of the intended project and determines project goals.
TRUE Peer-to-peer (P2P) is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
#40 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 41. Internet Protocol TV (IPTV), which distributes digital video content using IP across the Internet and private IP networks.
TRUE Organizations can decrease the power of its buyers through efficient and effective SCM.
#40 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 41.
FALSE System testing verifies that the units or pieces of code function correctly when integrated together.
#40 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 41. User acceptance testing (UAT) determines if the system satisfies the user and business requirements.
TRUE Internet Protocol TV (IPTV), which distributes digital video content using IP across the Internet and private IP networks.
#41 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 42. Peer-to-peer uses IP technology to transmit telephone calls.
FALSE A supply chain execution system is the ability to view all areas up and down the supply chain. Organizations can decrease the power of its buyers through efficient and effective SCM.
#41 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 42.
TRUE User acceptance testing (UAT) determines if the system satisfies the user and business requirements.
#41 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 42. User acceptance testing tests individual units or pieces of code for a system.
FALSE Voice over IP (VoIP) uses IP technology to transmit telephone calls.
#42 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 43. A repeater distributes digital video content using IP across the Internet and private IP networks.
TRUE Electronic data interchange (EDI) is a standard format for the electronic exchange of information between supply chain participants. Organizations can decrease the power of its buyers through efficient and effective SCM.
#42 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 43. The bullwhip effect occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain.
FALSE Unit testing tests individual units or pieces of code for a system.
#42 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 43.
FALSE Internet Protocol TV (IPTV), which distributes digital video content using IP across the Internet and private IP networks.
#43 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 44. An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.
TRUE Organizations can decrease the power of its buyers through efficient and effective SCM.
#43 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 44. The bullwhip effect is a standard format for the electronic exchange of information between supply chain participants.
FALSE Unit testing uses both the legacy system and new system until all users verify that the new system functions correctly. Parallel implementation uses both the legacy system and new system until all users verify that the new system functions correctly.
#43 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 44. Test conditions detail the steps the system must perform along with the expected result of each step; in the implementation phase, the organization places the system into production so users can begin to perform actual business operations with it.
TRUE An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.
#44 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-02 Identify the benefits and challenges of a connected world. Topic: Benefits of a Connected World 45. An intranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.
FALSE Organizations can decrease the power of its buyers through efficient and effective SCM.
#44 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 45. Electronic data interchange occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain.
TRUE Test conditions detail the steps the system must perform along with the expected result of each step; in the implementation phase, the organization places the system into production so users can begin to perform actual business operations with it.
#44 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 45. Detailed user documentation is created that highlights how to use the system and how to troubleshoot issues or problems.
FALSE An extranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.
#45 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-02 Identify the benefits and challenges of a connected world. Topic: Benefits of a Connected World 46. An extranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.
FALSE Organizations can decrease the power of its buyers through efficient and effective SCM.
#45 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 46. A supply chain execution system might electronically route orders from a manufacturer to a supplier using electronic data interchange (EDI), a standard format for the electronic exchange of information between supply chain participants.
TRUE Detailed user documentation is created that highlights how to use the system and how to troubleshoot issues or problems.
#45 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 46. Training is also provided for the system users and can be online or in a classroom.
TRUE An extranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.
#46 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-02 Identify the benefits and challenges of a connected world. Topic: Benefits of a Connected World 47. Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called a virtual private network (VPN).
TRUE A supply chain execution system might electronically route orders from a manufacturer to a supplier using electronic data interchange (EDI), a standard format for the electronic exchange of information between supply chain participants.
#46 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-02 Describe supply chain management along with its impact on business. Topic: Supply Chain Management 47.
TRUE Training is also provided for the system users and can be online or in a classroom.
#46 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 47. Online training runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace.
TRUE Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called a virtual private network (VPN).
#47 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-02 Identify the benefits and challenges of a connected world. Topic: Benefits of a Connected World 48. An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.
TRUE Procurement can help a company answer the following question—what quantity of raw materials should we purchase to minimize spoilage? Procurement can help a company answer this type of question.
#47 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 48. Logistics includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain.
TRUE Online training runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace.
#47 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 48. Development Testing assesses if the entire system meets the design requirements of the users.
FALSE An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.
#48 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-02 Identify the benefits and challenges of a connected world. Topic: Benefits of a Connected World 49. Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called an extranet.
TRUE Logistics includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain.
#48 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 49. Inbound logistics acquires raw materials and resources and distributes them to manufacturing as required.
FALSE Alpha Testing assesses if the entire system meets the design requirements of the users.
#48 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 49. Workshop training is held in a classroom environment and led by an instructor.
FALSE Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called a virtual private network (VPN).
#49 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-02 Identify the benefits and challenges of a connected world. Topic: Benefits of a Connected World 50. VPNs are often used to connect to a corporate server. VPN stands for a Valued Partner Network.
TRUE Inbound logistics acquires raw materials and resources and distributes them to manufacturing as required.
#49 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 50. Outbound logistics distributes goods and services to customers.
TRUE Workshop training is held in a classroom environment and led by an instructor.
#49 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 50.
TRUE Network convergence includes VoIP, UC, and IPTV.
#5 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 6. The network categories include ISP, NSP, and RSP.
TRUE Application integration is the integration of a company's existing management information systems. Application integration is the integration of a company's existing management information systems.
#5 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 6. Data integration is the integration of data from multiple sources, which provides a unified view of all data.
TRUE The planning phase establishes a high-level plan of the intended project and determines project goals.
#5 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 6. Preventing liabilities is a business-related consequence of failed software.
TRUE Logistics controls processes inside a company (warehouse logistics) and outside a company (transport logistics) and focuses on the physical execution part of the supply chain.
#51 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 52. Procurement is the purchasing of goods and services to meet the needs of the supply chain.
TRUE Plunge implementation discards the legacy system completely and immediately migrates all users to the new system.
#51 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 52. Pilot implementation assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system.
TRUE Procurement is the purchasing of goods and services to meet the needs of the supply chain.
#52 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 53.
TRUE Pilot implementation assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system.
#52 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 53. Pilot implementation installs the new system in phases (for example by department) until it is verified that it works correctly.
FALSE Logistics can help a company answer the following question—what quantity of raw materials should we purchase to minimize spoilage? Procurement can help a company answer this question.
#53 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 54. Procurement includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain.
FALSE Phased implementation installs the new system in phases (for example by department) until it is verified that it works correctly.
#53 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 54. Corrective maintenance makes system changes to repair design flaws, coding errors, or implementation issues.
FALSE Logistics includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain.
#54 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 55. Outbound logistics acquires raw materials and resources and distributes them to manufacturing as required.
TRUE Corrective maintenance makes system changes to repair design flaws, coding errors, or implementation issues.
#54 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 55. Corrective maintenance makes system changes to reduce the chance of future system failure.
FALSE Inbound logistics acquires raw materials and resources and distributes them to manufacturing as required.
#55 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 56. Inbound logistics distributes goods and services to customers.
FALSE Preventative maintenance makes system changes to reduce the chance of future system failure.
#55 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 56. Internal reports present data that is distributed inside the organization and is intended for employees within an organization. Internal reports typically support day-to-day operations monitoring that supports managerial decision making.
FALSE Outbound logistics distributes goods and services to customers.
#56 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 57. Logistics includes the increasingly complex management of processes, information, and communication to take a product from cradle to grave. Cradle to grave provides logistics support.
TRUE Internal reports present data that is distributed inside the organization and is intended for employees within an organization. Internal reports typically support day-to-day operations monitoring that supports managerial decision making.
#56 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 57. Detailed internal reports present information with little or no filtering or restrictions of the data.
TRUE Logistics includes the increasingly complex management of processes, information, and communication to take a product from cradle to grave. Cradle to grave provides logistics support.
#57 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 58. Cradle to grave provides materials management support.
TRUE Detailed internal reports present information with little or no filtering or restrictions of the data.
#57 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 58. Exception reports organize and categorize data for managerial perusal.
FALSE Cradle to grave provides logistics support.
#58 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 59. Materials management includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing.
FALSE Summary internal reports organize and categorize data for managerial perusal.
#58 Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 59. Summary internal reports highlight situations occurring outside of the normal operating range for a condition or standard.
TRUE Materials management includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing.
#59 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 60. Logistics includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing.
FALSE Exception reporting is an internal report that highlights situations occurring outside of the normal operating range for a condition or standard.
#59 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 60. Information system control reports ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or recordkeeping of actions and transactions.
FALSE The network categories include LAN, WAN, and MAN.
#6 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 7. The network providers include LAN, WAN, and MAN.
TRUE Data integration is the integration of data from multiple sources, which provides a unified view of all data.
#6 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 7. A forward integration takes information entered into a given system and sends it automatically to all downstream systems and processes.
FALSE Preventing liabilities is a business-related consequence of successful software.
#6 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 7. Conversion occurs when a person or event is the catalyst for implementing major changes for a system to meet business changes.
FALSE Materials management includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing.
#60 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 61. Materials management is the purchasing of goods and services to meet the needs of the supply chain.
TRUE Information system control reports ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or recordkeeping of actions and transactions.
#60 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 61.
FALSE Procurement is the purchasing of goods and services to meet the needs of the supply chain.
#61 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 62.
TRUE Information systems audit reports assess a company's information system to determine necessary changes and to help ensure the information systems' availability, confidentiality, and integrity. Information systems audit reports assess a company's information system to determine necessary changes and to help ensure the information systems' availability, confidentiality, and integrity.
#61 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 62. A methodology is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
TRUE The process of 3D printing (additive manufacturing) builds—layer by layer in an additive process—a three-dimensional solid object from a digital model. The process of 3D printing (additive manufacturing) builds—layer by layer in an additive process—a three-dimensional solid object from a digital model.
#62 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 63.
TRUE Methodology is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
#62 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 63. Plunge implementation is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
TRUE 3D printing is a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model. 3D printing is a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model.
#63 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 64.
FALSE Methodology is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
#63 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 64. Post-implementation reports are formal reports or audits of a project after it is up-and-running.
FALSE Drones include a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model. 3D printing is a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model.
#64 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 65. 3D printing supports procurement.
TRUE Post-implementation reports are formal reports or audits of a project after it is up-and-running.
#64 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 65. Preventative maintenance makes system changes to reduce the chance of future system failure.
TRUE 3D printing supports procurement.
#65 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 66. 3D printing supports materials management.
TRUE Preventative maintenance makes system changes to reduce the chance of future system failure.
#65 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 66. The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
FALSE 3D printing supports procurement.
#66 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 67. RFID uses electronic tags and labels to identify objects wirelessly over short distances.
TRUE The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
#66 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 67. The oldest and the best known is the waterfall methodology, a sequence of phases in which the output of each phase becomes the input for the next.
TRUE RFID uses electronic tags and labels to identify objects wirelessly over short distances.
#67 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 68. RFID supports logistics.
TRUE The oldest and the best known is the waterfall methodology, a sequence of phases in which the output of each phase becomes the input for the next.
#67 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 68. The oldest and the best known is the agile methodology, a sequence of phases in which the output of each phase becomes the input for the next.
TRUE RFID supports logistics.
#68 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 69. RFID supports procurement.
FALSE The oldest and the best known is the waterfall methodology, a sequence of phases in which the output of each phase becomes the input for the next.
#68 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 69. Prototyping is a modern design approach by which the designers and system users use an iterative approach to building the system.
FALSE RFID supports logistics.
#69 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 70. Computer-aided design/computer-aided manufacturing (CAD/CAM) systems are used to create the digital designs and then manufacture the products.
TRUE Prototyping is a modern design approach by which the designers and system users use an iterative approach to building the system.
#69 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 70. Discovery prototyping builds a small-scale representation or working model of the system to ensure that it meets the user and business requirements.
FALSE The network providers include ISP, NSP, and RSP.
#7 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 8. The network access technologies include VoIP, UC, and IPTV.
TRUE A forward integration takes information entered into a given system and sends it automatically to all downstream systems and processes.
#7 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 8. A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes.
FALSE A change agent is a person or event that is the catalyst for implementing major changes for a system to meet business changes.
#7 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 8. Brainstorming is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.
TRUE Computer-aided design/computer-aided manufacturing (CAD/CAM) systems are used to create the digital designs and then manufacture the products.
#70 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 71. RFID systems are used to create the digital designs and then manufacture the products.
TRUE Discovery prototyping builds a small-scale representation or working model of the system to ensure that it meets the user and business requirements.
#70 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 71.
FALSE Computer-aided design/computer-aided manufacturing (CAD/CAM) systems are used to create the digital designs and then manufacture the products.
#71 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 72.
TRUE A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system. A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
#71 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 72. Iterative development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies.
TRUE The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things. The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
#72 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 73.
TRUE Iterative development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies.
#72 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 73. Waterfall development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies.
FALSE The robotics movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things. The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
#73 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 74. Makerspaces is a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable.
FALSE Iterative development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies.
#73 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 74. An agile methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.
TRUE Makerspaces is a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable.
#74 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 75. Cradle to grave is a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable.
TRUE An agile methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.
#74 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 75. Rapid application development (RAD) methodology (also called rapid prototyping) emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process.
TRUE Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances.
#76 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 77.
TRUE Extreme programming (XP) methodology, like other agile methods, breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete.
#76 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 77. The rational unified process (RUP) methodology, owned by IBM, provides a framework for breaking down the development of software into four gates.
TRUE RFID's electronic product code (RFID EPC) promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag. RFID's electronic product code (RFID EPC) promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag.
#77 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 78. A drone is an unmanned aircraft that can fly autonomously, or without a human. Amazon.com is piloting drone aircraft for package deliveries.
TRUE The rational unified process (RUP) methodology, owned by IBM, provides a framework for breaking down the development of software into four gates.
#77 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 78.
TRUE A drone is an unmanned aircraft that can fly autonomously, or without a human. Amazon.com is piloting drone aircraft for package deliveries.
#78 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 79. Drones are unmanned aircraft that can fly autonomously, or without a human.
TRUE Gate one includes inception, and this phase ensures that all stakeholders have a shared understanding of the proposed system and what it will do. Gate one includes inception, and this phase ensures that all stakeholders have a shared understanding of the proposed system and what it will do.
#78 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 79.
TRUE Drones are unmanned aircraft that can fly autonomously, or without a human.
#79 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 80. 3D printing is an unmanned aircraft that can fly autonomously, or without a human.
TRUE Gate two is elaboration, and this phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it. Gate two is elaboration, and this phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.
#79 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 80.
FALSE The network access technologies include DSL, cable modem, and broadband.
#8 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 9. The network protocols include LAN, WAN, and MAN.
TRUE A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes.
#8 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 9. A backward integration takes information entered into a given system and sends it automatically to all downstream systems and processes.
TRUE Brainstorming is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.
#8 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 9. Business requirements are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.
FALSE Drones are unmanned aircraft that can fly autonomously, or without a human.
#80 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 81. Drones support logistics.
TRUE Gate three is construction, and this phase includes building and developing the product. Gate three is construction, and this phase includes building and developing the product.
#80 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 81. Rational unified process (RUP) methodology, owned by IBM, provides a framework for breaking down the development of software into four "gates."
TRUE Drones support logistics.
#81 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 82. Drones support materials management.
TRUE Rational unified process (RUP) methodology, owned by IBM, provides a framework for breaking down the development of software into four "gates."
#81 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 09-04 Explain project management and identify the primary reasons projects fail. Topic: Using Project Management to Deliver Successful Projects 82.
FALSE Drones support logistics.
#82 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 83. Robotics focus on creating artificial intelligence devices that can move and react to sensory input.
TRUE Gate four is transition, and the primary questions answered in this phase address ownership of the system and training of key personnel. Gate four is transition, and the primary questions answered in this phase address ownership of the system and training of key personnel.
#82 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 83. The scrum methodology uses small teams to produce small pieces of software using a series of sprints, or 30-day intervals, to achieve an appointed goal.
TRUE Robotics focus on creating artificial intelligence devices that can move and react to sensory input.
#83 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 84. Robotics supports materials management.
TRUE The scrum methodology uses small teams to produce small pieces of software using a series of sprints, or 30-day intervals, to achieve an appointed goal.
#83 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 84. SCRUM is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
TRUE Robotics supports materials management.
#84 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 85. Robotics supports procurement.
FALSE The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
#84 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-02 Summarize the different software development methodologies. Topic: Software Development Methodologies 85. Service-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services.
FALSE Robotics supports materials management.
#85 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 86. Supply chain event management (SCEM) enables an organization to react more quickly to resolve supply chain issues.
TRUE Service-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services.
#85 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 86. The waterfall approach is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services.
TRUE Supply chain event management (SCEM) enables an organization to react more quickly to resolve supply chain issues.
#86 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 87. Selling chain management applies technology to the activities in the order life cycle from inquiry to sale.
FALSE Service-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services.
#86 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 87. SOA ensures that MIS systems can adapt quickly, easily, and economically to support rapidly changing business needs.
TRUE Selling chain management applies technology to the activities in the order life cycle from inquiry to sale.
#87 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 88. Collaborative engineering allows an organization to reduce the cost and time required during the design process of a product.
TRUE SOA ensures that MIS systems can adapt quickly, easily, and economically to support rapidly changing business needs.
#87 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 88. SOA promotes a scalable and flexible enterprise architecture that can implement new or reuse existing MIS components, creating connections among disparate applications and systems.
TRUE Collaborative engineering allows an organization to reduce the cost and time required during the design process of a product.
#88 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 89. Collaborative demand planning helps organizations reduce their investment in inventory while improving customer satisfaction through product availability.
TRUE SOA promotes a scalable and flexible enterprise architecture that can implement new or reuse existing MIS components, creating connections among disparate applications and systems.
#88 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 89. It is important to understand that SOA is not a concrete architecture; it is thought that leads to a concrete architecture. It might be described as a style, paradigm, concept, perspective, philosophy, or representation. That is, SOA is an approach, a way of thinking, a value system that leads to decisions that design a concrete architecture allowing enterprises to plug in new services or upgrade existing services in a granular approach.
TRUE Collaborative demand planning helps organizations reduce their investment in inventory while improving customer satisfaction through product availability.
#89 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 90. Selling chain management enables an organization to react more quickly to resolve supply chain issues.
TRUE It is important to understand that SOA is not a concrete architecture; it is thought that leads to a concrete architecture. It might be described as a style, paradigm, concept, perspective, philosophy, or representation. That is, SOA is an approach, a way of thinking, a value system that leads to decisions that design a concrete architecture allowing enterprises to plug in new services or upgrade existing services in a granular approach.
#89 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 90. An SOA service is simply a business task, such as checking a potential customer's credit rating when opening a new account.
FALSE The network protocols include TCP/IP, FTP, and DHCP.
#9 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 07-01 Explain the five different networking elements creating a connected world. Topic: Overview of a Connected World 10. Network convergence includes TCP/IP and FTP.
FALSE A forward integration takes information entered into a given system and sends it automatically to all downstream systems and processes.
#9 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-01 Explain integrations and the role they play in connecting a corporation. Topic: Building a Connected Corporation through Integrations 10. A forward integration takes information entered into a given system and sends it automatically to all upstream systems and processes.
TRUE Business requirements are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.
#9 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-01 Describe the seven phases of the systems development life cycle. Topic: The Systems Development Life Cycle (SDLC) 10. A joint application development session is where employees meet, sometimes for several days, to define or review the business requirements for the system.
FALSE Supply chain event management (SCEM) enables an organization to react more quickly to resolve supply chain issues.
#90 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 91. Supply chain event management applies technology to the activities in the order life cycle from inquiry to sale.
TRUE An SOA service is simply a business task, such as checking a potential customer's credit rating when opening a new account.
#90 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 91. Interoperability is a business task.
FALSE Selling chain management applies technology to the activities in the order life cycle from inquiry to sale.
#91 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 92. Collaborative demand planning allows an organization to reduce the cost and time required during the design process of a product.
FALSE Service is a business task.
#91 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 92. A service is a business task.
FALSE Collaborative engineering allows an organization to reduce the cost and time required during the design process of a product.
#92 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 93. Collaborative engineering helps organizations reduce their investment in inventory while improving customer satisfaction through product availability.
TRUE Service is a business task.
#92 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 93. Loose coupling is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.
FALSE Collaborative demand planning helps organizations reduce their investment in inventory while improving customer satisfaction through product availability.
#93 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-03 Identify the three technologies that are reinventing the supply chain. Topic: Technologies Reinventing the Supply Chain 94. RFM stands for Regency, Frequency, and Monetary.
TRUE Loose coupling is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.
#93 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 94. Interoperability is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
TRUE Interoperability is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
#94 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 95. A service is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.
FALSE RFM stands for Recency (not regency), Frequency, and Monetary.
#94 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 95. The evolution of CRM is reporting, analyzing, and predicting.
TRUE The evolution of CRM is reporting, analyzing, and predicting.
#95 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 96. CRM predicting technologies help organizations identify their customers across other applications.
FALSE Loose coupling is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.
#95 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 96. Loose coupling is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
FALSE CRM reporting technologies help organizations identify their customers across other applications.
#96 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 97. CRM analysis technologies help organizations segment their customers into categories such as best and worst customers.
FALSE Interoperability is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
#96 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 97. A web service is an open-standards way of supporting interoperability.
TRUE CRM analysis technologies help organizations segment their customers into categories such as best and worst customers
#97 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 98. CRM predicting technologies help organizations predict customer behavior, such as which customers are at risk of leaving.
TRUE A web service is an open-standards way of supporting interoperability.
#97 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 98. Extensible Markup Language (XML) is a markup language for documents, containing structured information.
TRUE CRM predicting technologies help organizations predict customer behavior, such as which customers are at risk of leaving.
#98 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 99. The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its suppliers.
TRUE Extensible Markup Language (XML) is a markup language for documents, containing structured information.
#98 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 99. Extensible Markup Language is an open-standards way of supporting interoperability.
FALSE A web service is an open-standards way of supporting interoperability.
#99 Blooms: Remember Difficulty: 1 Easy Learning Outcome: 09-03 Explain why a company would implement a service-oriented architecture. Topic: Developing a Service-Oriented Architecture 100. A web service is a markup language for documents, containing structured information.
FALSE The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its customers.
#99 Blooms: Understand Difficulty: 2 Medium Learning Outcome: 08-04 Explain operational and analytical customer relationship management. Topic: The Benefits of CRM 100. Back-office operations deal directly with the customer.
What has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address?
- A. structured data
Why were data warehouses created?
- All of the above
What are the two main objectives associated with data mining
- B.
What is information that people use to support their decision-making efforts?
- D. business intelligence
33. Data governance refers to the overall management of the availability, usability, integrity, and security of company data.
- TRUE Data governance refers to the overall management of the availability, usability, integrity, and security of company data.
What is unstructured data?
. not defined, does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages
What domain is the most common and reserved for commercial organizations and businesses
.com
Which domain is reserved for accredited postsecondary institutions
.edu
What is the domain used for US government agencies
.gov
What domain is reserved for the US military
.mil
TRUE
3D printing is a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model.
FALSE
3D printing is an unmanned aircraft that can fly autonomously, or without a human. FALSE! Drones are unmanned aircraft that can fly autonomously, or without a human
FALSE
3D printing supports materials management. FALSE! 3D printing supports procurement.
TRUE
3D printing supports procurement.
What is the role of a foreign key?
A . It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
TRUE
A back order is an unfilled customer order for a product that is out of stock
FALSE
A backward integration takes information entered into a given system and sends it automatically to all downstream systems and processes. FALSE! A forward integration takes information entered into a given system and sends it automatically to all downstream systems and processes.
TRUE
A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes.
TRUE
A drone is an unmanned aircraft that can fly autonomously, or without a human. Amazon.com is piloting drone aircraft for package deliveries.
TRUE
A forward integration takes information entered into a given system and sends it automatically to all downstream systems and processes.
FALSE
A forward integration takes information entered into a given system and sends it automatically to all upstream systems and processes. FALSE! A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes.
FALSE
A supply chain execution system is the ability to view all areas up and down the supply chain. FALSE!
TRUE
A supply chain execution system might electronically route orders from a manufacturer to a supplier using electronic data interchange (EDI), a standard format for the electronic exchange of information between supply chain participants
Which of the following would not be considered part of the timely characteristic of high-quality information?
A. Is the zip code missing in the address?
What is the statement about what will happen or might happen in the future for example predicting future sales employee turnover
A. Prediction
What is another term for data that is already contained in a database or a spreadsheet?
A. Structured data
What is a primary key?
A. a field (or group of fields) that uniquely identifies a given entity in a table
Which of the following are examples of transactional information?
A. airline ticket, sales receipts, and packing slips
183. Which of the following encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks?
A. analytical information
How would the airline industry use business intelligence?
A. analyze popular vacation locations with current flight listings
What is social media analytics?
A. analyzes text flowing across the Internet, including unstructured text from blogs and messages
Which of the choices below reveals the relationship between variables along with the nature and frequency of the relationship?
A. association detection
What assigns records to one of a predefined set of classes?
A. classification
The primary purpose of a data warehouse is to ________.
A. combine strategic information
Which of the following is an example of external databases in the data warehouse model?
A. competitor and industry information, mailing lists, and stock market analysis
Who is the person responsible for creating the original website content?
A. content creator
What is a logical data structure that details the relationship among data elements using graphics or pictures?
A. data model
What is it called when a manager has so much data and information that he or she cannot make a decision?
A. data rich, information poor
What type of website is an interactive website kept constantly updated and relevant to the needs of its customers using a database?
A. data-driven website
What maintains information about various types of objects, events, people, and places?
A. database
173. Which of the following represents the different information granularities?
A. detail, summary, aggregate
What is estimation?
A. determines values for an unknown continuous variable behavior or estimated future value
What is erroneous or flawed data?
A. dirty data
Which of the following is a problem associated with dirty data?
A. duplicate data
What is stored in a dynamic catalog, or an area of a website that stores information about products in a database?
A. dynamic website
In the relational database model, what is a person, place, thing, transaction, or event about which information is stored?
A. entity
Which of the following stores information about a person, place, thing, transaction, or event, and is usually referred to as a table?
A. entity
What is structured data?
A. has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address
In terms of big data what is variety?
A. includes different forms of structured and unstructured data
The example the book gave of www.EllisIsland.org, which generates more than 2.5 billion hits, is a site that offers a database that can easily adjust to handle massive volumes of information. What is this an example of?
A. increased scalability and performance
What occurs when the same data element has different values?
A. information inconsistenc
180. Which of the following represent the four primary traits that help determine the value of information?
A. information type, information timeliness, information quality, and information governance
176. Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing individual and departmental goals, and generating financial analysis across departments and the enterprise as a whole for the executive team to review. Ben's duties provide value-added to his company and would be categorized as occurring at the different information ________.
A. lists
A data warehouse is a ________ collection of information, gathered from many different ________ databases, that supports business analysis activities and decision-making tasks.
A. logical; operational
Within the beginning stage of the data warehouse models process, which of the following are included in the internal databases?
A. marketing, sales, inventory, and billing
What is information inconsistency?
A. occurs when the same data element has different values
What is distributed computing?
A. processes and manages algorithms across many machines in a computing environment
What is immediate, up-to-date information?
A. real-time information
What type of integrity constraint does not allow someone to create an order for a nonexistent customer?
A. relational integrity constraint
What analyzes text flowing across the Internet, including unstructured text from blogs and messages?
A. social media analytics
Which of the following asks users to write lines of code to answer questions against a database?
A. structured query language
What is a content creator?
A. the person responsible for creating the original website content
How would the law enforcement industry use business intelligence?
A. track crime patterns, locations, and criminal behavior
178. What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performing of daily operational tasks?
A. transactional information
What is it called when each transaction, entity, and event is represented only once in the information?
A. uniqueness
What is web analytics?
A. unstructured data associated with websites to identify consumer behavior and website navigation
In terms of big data what includes different forms of structured and unstructured data?
A. variety
Which of the following is not a common form of data mining analysis?
A.division organization
One of the primary goals of a database is to eliminate information redundancy by recording each piece of data in only one place in the database. What does the elimination of information redundancy do for a database?
All of the above
What is VoIP
All of the above
What is a feature of IPT
All of the above
Which of the choices below offers a common example of a WAN?
All of the above
Which of the following is a problem associated with dirty data?
All of the above
Which of the following occurs during data cleansing?
All of the above
Which of the questions below can be answered using business intelligence?
All of the above
Why would a company use an intranet?
All of the above
FALSE
Analytical CRM supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers. FALSE! Operational CRM supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers.
TRUE
Application integration is the integration of a company's existing management information systems.
FALSE
Application integration is the integration of data from multiple sources, which provides a unified view of all data. FALSE! Data integration is the integration of data from multiple sources, which provides a unified view of all data.
FALSE
Automatic call distribution directs customers to use touch-tone phones or keywords to navigate or provide information. FALSE Interactive voice response directs customers to use touch-tone phones or keywords to navigate or provide information.
TRUE
Automatic call distribution routes inbound calls to available agents.
What are advanced analytics?
B . focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization
What is speech analytics?
B . the process of analyzing recorded calls to gather information; brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise
In terms of big data, what includes the uncertainty of data, including biases, noise, and abnormalities?
B Veracity
What encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis tasks?
B. analytical information
What is the overall management of the availability, usability, integrity, and security of company data?
B. data governance
172. Which of the following represents the different information formats?
B. document, presentation, spreadsheet, database
What is a real-time system?
B. provides real-time information in response to query requests
What provides real-time information in response to query requests?
B. real-time systems
Which of the following contains a subset of data warehouse information?
B. Data mart
What determines values for an unknown continuous variable behavior or estimated future value?
B. Estimation
Which of the following would not be considered part of the complete characteristic of high-quality information?
B. Is each transaction represented only once in the information
Which of the following would not be considered part of the consistent characteristic of high-quality information?
B. Is the two-digit state code missing in the information?
What is extraction, transformation, and loading
B. It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.
Which of the following is a problem associated with dirty data?
B. Misleading Data
What are the two main methods for encrypting network traffic on the web?
B. SSL and SHTTP
Which of the following is a business-critical integrity constraint?
B. System will not allow returns of fresh produce after 15 days past delivery
What is peer-to-peer (P2P)?
B. a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server
What is a foreign key?
B. a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables
What is optimization
B. a statistical process that finds the way to make a design system or decision as effective as possible for example finding the values of control will variables to determine maximal productivity or minimum waste.
How would the marketing industry use business intelligence?
B. analyze customer demographics
Most people request real-time information without understanding that continual ________ is one of its biggest pitfalls.
B. change
Which of the following forms of data mining assigns records to one of a predefined set of classes?
B. classification
Which of the following occurs during data cleansing?
B. clean redundant customer data
Who is the person responsible for updating and maintaining website content?
B. content editor
What is machine-generated data?
B. created by a machine without human intervention
What is the smallest or basic unit of information?
B. data element
What determines the accuracy and completeness of organizational data?
B. data quality audit
What is an interactive website kept constantly updated and relevant to the needs of its customers using a database
B. data-driven website
Which of the following creates, reads, updates, and deletes data in a database while controlling access and security?
B. database management system
What is affinity grouping?
B. determines which things go together
Which of the following illustrates the primary concepts of the relational database model?
B. entities, attributes, keys, and relationships
175. Ben works at a top accounting firm in Salt Lake City and his responsibilities include writing letters, memos, and emails along with generating reports for financial analysis and marketing materials for products. Ben's duties provide value-added to his company and would be categorized as occurring at the different information ________.
B. formats
In terms of big data what is veracity?
B. includes the uncertainty of data, including biases, noise, and abnormalities
179. Which of the following refers to the extent of detail within the information?
B. information granularity
Which of the following occurs when a system produces incorrect, inconsistent, or duplicate data?
B. information integrity issue
What occurs when a system produces incorrect, inconsistent, or duplicate data?
B. information integrity issues
What is another term for information cleansing?
B. information scrubbing
What are rules that help ensure the quality of information?
B. integrity constraints
What are the rules that help ensure the quality of information?
B. integrity constraints
Which of the following focuses on how individual users logically access information to meet their own particular business needs?
B. logical view
What is created by a machine without human intervention
B. machine generated data
What are information integrity issues?
B. occurs when a system produces incorrect, inconsistent, or duplicate data
Which of the following is incorrect in terms of data warehousing and business intelligence?
B. operational systems are integrated
What is a field that uniquely identifies a given record in a table?
B. primary key
What type of keys do you need to use to create a relational database model?
B. primary keys and foreign keys
What is a content editor?
B. the person responsible for updating and maintaining website content
How would the banking industry use business intelligence?
B. understand customer credit card usage and nonpayment rates
What is another term for data that does not exist in a fixed location?
B. unstructured data
FALSE
Back-office operations deal directly with the customer. FALSE Front-office operations deal directly with the customer.
What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time
BandWidth
The speed of transmission of a network is determined by the speed of its smallest
Bandwidth
What is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools?
Big Data
What is one of the biggest pitfalls associated with real-time information?
C. It continually changes
Which of the following implies that aggregate or summary information is in agreement with detailed information?
C. consistency
What is Internet protocol TV (IPTV)?
C. distributes digital video content using IP across the Internet and private IP networks
Which of the following represents the different information levels?
C. individual, department, enterprise
Which of the following is correct in reference to a database?
C. A database can support many logical views
What is the process of analyzing data to extract information NOT offered by the raw data alone?
C. Data mining
What are the primary differences between a data warehouse and a data mart?
C. Data warehouses have a more organization-wide focus, data marts have functional focus
Which of the following is incorrect in reference to a database?
C. Database information is accessed by physical structure
Which of the following would not be considered part of the unique characteristic of high-quality information?
C. Is aggregate information in agreement with detailed information?
Which of the statements below means the same as easy to manage content
C. Users can update data-driven website with little or no training
What determines which things go together?
C. affinity grouping
Which of the following will enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?
C. business critical integrity constraints
How would the health care industry use business intelligence?
C. compare the demographics of patients with critical illnesses
Which of the following is an example of an external databases in the data warehouse model? ?
C. competitor information
What refers to the overall management of the availability, usability, integrity, and security of company data?
C. data governance
What is human-generated data
C. data that humans, in interaction with computers, generate
Which of the following uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?
C. data-mining tools
What is the logical view of information?
C. focuses on how users logically access information to meet their particular business needs
What are predictions based on time-series information?
C. forecasting
177. Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing reports for each salesperson, product, and part as well as departmental-wide sales reports by salesperson, product, and part. Ben's duties provide value-added to his company and would be categorized as occurring at the different information ________.
C. granularities
What is data that humans, in interaction with computers, generate?
C. human generated data
Which of the following is true in regard to the elimination of redundant information?
C. improves information quality
What is static information?
C. includes fixed data incapable of change in the event of a user action
Which of the following is a disadvantage of database-stored information?
C. increased information redundancy
Which of the following is not an advantage to a data-driven website?
C. increasing update costs
What is a dynamic website?
C. information stored in a dynamic catalog, or an area of a website that stores information about products in a database
171. Employees need to compare different types of information for what they commonly reveal to make strategic decisions. Which of the choices below represents the three common types of information found throughout an organization?
C. levels, formats, granularities
What is a common association detection analysis technique where you analyze certain items to detect customers' buying behavior and predict future behavior?
C. maket basket analysis
How would the retail industry use business intelligence?
C. predict sales, inventory levels, and distribution
What are forecasts
C. predictions on time-series information
What is the primary tool that retrieves information and helps users graphically design the answer to a question?
C. query-by-example tool
Which of the following refers to immediate, up-to-date information
C. real-time information
Which of the following provides real-time information in response to requests?
C. real-time system
What is data governance?
C. refers to the overall management of the availability, usability, integrity, and security of company data
Which of the following systems allow users to create, read, update, and delete data in a relational database?
C. relational database management system
What is clustering?
C. segments a heterogeneous population of more homogeneous subgroups
Gender can be referred to in many ways (Male, Female, M/F, 1/0) in a data warehouse. Ensuring gender is referenced the same way is an example of ________.
C. standardizing information
What analyzes unstructured data to find trends and patterns in words and sentences?
C. text analytics
Some of the serious business consequences that occur due to using low-quality information to make decisions are all of the following except
C. the success of the organization depends on appreciating and leveraging the low-quality information.
Why do relational databases use primary keys and foreign keys?
C. to create logical relationships
181. What are the two different categories for information type?
C. transactional and analytical
Which of the following is a problem associated with dirty data?
C. violates business rules
Which of the following are examples of analytical information?
C.future growth analysis, sales projections, and product statistics
In terms of big data what is volume?
C.includes the scale of data
Which of the following is not one of the five characteristics common to high-quality information?
C.quantity
TRUE
CRM analysis technologies help organizations segment their customers into categories such as best and worst customers.
FALSE
CRM predicting technologies help organizations identify their customers across other applications. FALSE! CRM reporting technologies help organizations identify their customers across other applications
TRUE
CRM predicting technologies help organizations predict customer behavior, such as which customers are at risk of leaving.
TRUE
Campaign management systems guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis.
What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?
Cluster analysis
FALSE
Collaborative demand planning allows an organization to reduce the cost and time required during the design process of a product. FALSE! Collaborative engineering allows an organization to reduce the cost and time required during the design process of a product.
TRUE
Collaborative demand planning helps organizations reduce their investment in inventory while improving customer satisfaction through product availability.
TRUE
Collaborative engineering allows an organization to reduce the cost and time required during the design process of a product.
FALSE
Collaborative engineering helps organizations reduce their investment in inventory while improving customer satisfaction through product availability. FALSE! Collaborative demand planning helps organizations reduce their investment in inventory while improving customer satisfaction through product availability.
Which of the choices below offers a common example of a LAN
College Campus
TRUE
Computer-aided design/computer-aided manufacturing (CAD/CAM) systems are used to create the digital designs and then manufacture the products.
FALSE
Contact management falls under the category of the customer service department's CRM tools. FALSE! Contact management falls under the category of the sales department's CRM tools.
Lans, Wans, and Mans, all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions?
Cost and Performance
FALSE
Cradle to grave is a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable. FALSE! Makerspaces is a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable.
FALSE
Cradle to grave provides materials management support. FALSE! Cradle to grave provides logistics support.
FALSE
Cross-selling is increasing the value of the sale. FALSE Up-selling is increasing the value of the sale.
TRUE
Customer order cycle time is the agreed upon time between the purchase of a product and the delivery of the product.
FALSE
Customer order cycle time is the time it takes to manufacture a product and deliver it to the retailer. FALSE! Inventory cycle time is the time it takes to manufacture a product and deliver it to the retailer
What is a data scientist?
D . extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
What is master data management?
D . the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems
What is regression
D a statistical process for estimating relationships among variables
How would the insurance industry use business intelligence?
D. predict claim amounts and medical coverage costs
Which of the following describes ETL?
D. All of the Above
A database maintains information on ________.
D. All of the above
What is information redundancy?
D. All of the above
Which of the following offers an advantage of using a data-driven website?
D. All of the above
Which of the following represents a reason for low-quality information?
D. All of the above
Which of the following statements is TRUE regarding customer information?
D. All of the above
What segments a heterogeneous population of more homogeneous subgroups?
D. Clustering
Which of the following is not an example of an advantage of using a relational database?
D. Decreased Information Security
Which of the following would not be considered part of the accurate characteristic of high-quality information?
D. Is aggregate information in agreement with detailed information
What is a statistical process for estimating the relationships among variables?
D. Regression
Which of the following statements does not describe the Zappos database?
D. The Zappos database was highly redundant.
What is data that is not defined, does not follow a specified format, and is typically freeform text such as emails, Twitter tweets, and text messages?
D. Unstructured data
Which of the following lists include all of the five characteristics common to high-quality information?
D. accuracy, completeness, consistency, timeliness, and uniqueness
What is the primary problem with redundant information?
D. all of these are correct
What is the primary difference between an entity and an attribute?
D. an entity is a table that stores information about people, places, or events, whereas an attribute is a column or specific field of the data elements associated with an entity
What is data-driven website?
D. an interactive website kept constantly updated and relevant to the needs of its customers using a database
What is classification?
D. assigns records to one of a predefined set of classes
Which of the following is a valid type of integrity constraint?
D. business-critical integrity constraint
Which of the choices below does not represent an organization that requires up-to-the-second information?
D. construction companies
Which of the following is the common term for the representation of multidimensional information
D. cube
What compiles all of the metadata about the data elements in the data model?
D. data dictionary
What is the ultimate outcome of a data warehouse?
D. data marts
What includes data that change based on user actions?
D. dynamic information
Which of the following is not an information cleansing activity?
D. identifies sales trends
What is dynamic information?
D. includes data that change based on user action
In terms of big data what is velocity?
D. includes the analysis of streaming data as it travels around the Interne
Your textbook discussed a record store example where one user could perform a query to determine which recordings had a track length of four minutes or more, and another user could perform an analysis to determine the distribution of recordings as they relate to the different categories. This is an advantage of which database example?
D. increased flexibility
Which of the following occurs when the same data element has different values?
D. information inconsistency issue
What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?
D. master data managament
How would the technology industry use business intelligence?
D. predict hardware failures
What is data mining?
D. process of analyzing data to extract information not offered by the raw data alone
174. Which of the following is not a primary trait of information?
D. quantity
What are rules that enforce basic and fundamental information-based constraints?
D. relational integrity constraint
Which of the following implies that information is current with respect to the business requirement?
D. timeliness
182. Which of the following encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks?
D. transactional information
FALSE
Data integration is the integration of a company's existing management information systems. FALSE! Application integration is the integration of a company's existing management information systems
TRUE
Data integration is the integration of data from multiple sources, which provides a unified view of all data.
What can help uncover correlations and trends in data that would otherwise go unrecognized?
Data visualization tools
Which of the following allows high-speed digital data transmission over standard telephone lines?
Digital subscriber line
What processes and manages algorithms across many machines in a computing environment?
Distributed computing
TRUE
Drones are unmanned aircraft that can fly autonomously, or without a human.
FALSE
Drones include a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model. FALSE! 3D printing is a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model.
TRUE
Drones support logistics.
FALSE
Drones support materials management. FALSE! Drones support logistics.
TRUE
Effective and efficient supply chain management systems can enable an organization to decrease the power of its buyers.
TRUE
Eintegration is the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources.
TRUE
Electronic data interchange (EDI) is a standard format for the electronic exchange of information between supply chain participants.
FALSE
Electronic data interchange occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain. FALSE!
TRUE
Enterprise application integration (EAI) middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors.
What is an extension of an intranet that is available only to authorized outsiders?
Extranet
84. A content creator is the person responsible for updating and maintaining website content.
FALSE A content editor is the person responsible for updating and maintaining website content.
170. A data miner is a business analytics specialist who uses visual tools to help people understand complex data.
FALSE A data artist is a business analytics specialist who uses visual tools to help people understand complex data.
48. Structured query language compiles all of the metadata about the data elements in the data model.
FALSE A data dictionary compiles all of the metadata about the data elements in the data model.
98. A data miner contains a subset of data warehouse information.
FALSE A data mart contains a subset of data warehouse information.
59. A primary key is a foreign key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
FALSE A foreign key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
51. A foreign key is a field (or group of fields) that uniquely identifies a given entity in a table.
FALSE A primary key is a field (or group of fields) that uniquely identifies a given entity in a table.
58. A foreign key uniquely identifies a given record in a table.
FALSE A primary key is a field (or group of fields) that uniquely identifies a given record in a table.
57. A field is a collection of related data elements.
FALSE A record is a collection of related data elements.
49. A hierarchical database model stores information in the form of logically related two-dimensional tables.
FALSE A relational database model stores information in the form of logically related two-dimensional tables.
23. Complete information asks if there is an incorrect value in the information.
FALSE Accurate information asks if there is an incorrect value in the information.
155. Distributed computing focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization.
FALSE Advanced analytics focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization.
128. Estimation determine which things go together.
FALSE Affinity grouping determine which things go together.
169. Association detection occurs when the user goes into an emotional state of over-analysis (or overthinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome.
FALSE Analysis paralysis occurs when the user goes into an emotional state of over-analysis (or overthinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome.
56. Entities are the data elements associated with an attribute.
FALSE Attributes (also called columns or fields) are the data elements associated with an entity.
78. Relational integrity constraints enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints.
FALSE Business critical integrity constraints enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints.
126. Clustering assigns records to one of a predefined set of classes.
FALSE Classification assigns records to one of a predefined set of classes.
153. Association detection is a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.
FALSE Cluster analysis is a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.
129. Classification segments a heterogeneous population of more homogeneous subgroups.
FALSE Clustering segments a heterogeneous population of more homogeneous subgroups.
24. Consistent information asks if there is a value missing from the information.
FALSE Complete information asks if there is a value missing from the information.
25. Accurate information asks if the aggregate or summary information is in agreement with detailed information.
FALSE Consistent information asks if the aggregate or summary is information in agreement with detailed information.
36. MMSDB creates, reads, updates, and deletes data in a database while controlling access and security.
FALSE DBMS creates, reads, updates, and deletes data in a database while controlling access and security.
44. A primary key is the smallest or basic unit of information.
FALSE Data element (or data field) is the smallest or basic unit of information.
45 Data models can include a customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, and so on.
FALSE Data elements can include a customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, and so on.
109. A data mart is the process of analyzing data to extract information not offered by the raw data alone.
FALSE Data mining is the process of analyzing data to extract information not offered by the raw data alone.
46. Metadata are logical data structures that detail the relationships among data elements by using graphics or pictures.
FALSE Data models are logical data structures that detail the relationships among data elements by using graphics or pictures.
164. Web mining analysis describes technologies that allow users to "see" or visualize data to transform information into a business perspective.
FALSE Data visualization describes technologies that allow users to "see" or visualize data to transform information into a business perspective.
154. Advanced analytics processes and manages algorithms across many machines in a computing environment.
FALSE Distributed computing processes and manages algorithms across many machines in a computing environment.
87. Static information includes data that changes based on user actions.
FALSE Dynamic information includes data that change based on user actions.
100. ETL, within a data warehouse model, stands for exit, track, and load.
FALSE ETL stands for extraction, transformation, and loading.
127. Affinity determines values for an unknown continuous variable behavior or estimated future value.
FALSE Estimation determines values for an unknown continuous variable behavior or estimated future value.
120. Regression is a prediction based on time-series information.
FALSE Forecasts are predictions based on time-series information.
137. Machine-generated data is data that humans, in interaction with computers, generate. Humangenerated structured data includes input data, click-stream data, or gaming data.
FALSE Human-generated data is data that humans, in interaction with computers, generate. Human-generated structured data includes input data, click-stream data, or gaming data.
11. Real-time information refers to the extent of detail within the information (fine and detailed or coarse and abstract).
FALSE Information granularity refers to the extent of detail within the information (fine and detailed or coarse and abstract).
Information quality refers to the extent of detail within the information (fine and detailed or coarse and abstract).
FALSE Information granularity refers to the extent of detail within the information (fine and detailed or coarse and abstract).
15. Information integrity issues occur when the same data element has different values.
FALSE Information inconsistency occurs when the same data element has different values.
75. Information constraints is a measure of the quality of information.
FALSE Information integrity is a measure of the quality of information.
76. Information integrity are rules that help ensure the quality of information.
FALSE Integrity constraints are rules that help ensure the quality of information.
136. Human-generated data is created by a machine without human intervention. Machine-generated structured data includes sensor data, point-of-sale data, and web log (blog) data.
FALSE Machine-generated data is created by a machine without human intervention. Machine-generated structured data includes sensor data, point-of-sale data, and web log (blog) data.
34. Data governance is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems.
FALSE Master data management (MDM) is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems. MDM is commonly included in data governance.
37. A foreign key provides details about data.
FALSE Metadata provides details about data.
47. A DBMS provides details about data.
FALSE Metadata provides details about data. For example, metadata for an image could include its size, resolution, and date created.
119. Prediction is a statistical process that finds the way to make a design, system, or decision as effective as possible; for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
FALSE Optimization is a statistical process that finds the way to make a design, system, or decision as effective as possible; for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
9. Organizational information comes at the same level, formats, and granularities.
FALSE Organizational information comes at different formats, levels, and granularities of information.
Organizational information has three characteristics including timeliness, quality, and governance.
FALSE Organizational information has three characteristics including levels, formats, and granularities.
118. Regression is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover.
FALSE Prediction is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover.
12. Information granularity means immediate, up-to-date information.
FALSE Real-time information means immediate, up-to-date information.
121. Optimization is a statistical process for estimating the relationships among variables.
FALSE Regression is a statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables when the focus is on the relationship between a dependent variable and one or more independent variables
61. Relational databases offer many advantages over using a text document or a spreadsheet, which include decreased flexibility and decreased scalability and performance.
FALSE Relational databases offer many advantages over using a text document or a spreadsheet, which include increased flexibility and increased scalability and performance.
65. One of the advantages found in a relational database is increased information redundancy.
FALSE Relational databases reduce information redundancy, not increase information redundancy.
77. Relationship integrity criteria are rules that enforce basic and fundamental information-based constraints.
FALSE Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.
132. Unstructured data has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.
FALSE Structured data has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.
133. Unstructured data is typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.
FALSE Structured data is typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.
161. Web analytics analyzes unstructured data to find trends and patterns in words and sentences.
FALSE Text analytics analyzes unstructured data to find trends and patterns in words and sentences.
7. The four primary traits of the value of information include levels, formats, granularities, and type.
FALSE The four primary traits of the value of information include type, timeliness, quality, and governance.
66. The physical view of information focuses on how individual users logically access information to meet their own particular business needs.
FALSE The logical view of information focuses on how individual users logically access information to meet their own particular business needs.
64. The logical view of information deals with the physical storage of information on a storage device.
FALSE The physical view of information deals with the physical storage of information on a storage device.
96. The primary purpose of a data warehouse is to perform transactional processes.
FALSE The primary purpose of a data warehouse is to perform analytical process.
92. The financial industry uses business intelligence to predict hardware failures.
FALSE The technology industry uses business intelligence to predict hardware failures, where the retail industry uses it to predict sales, inventory levels, and distribution.
8. There are only two main primary traits that help you determine the value of information including timeliness and quality.
FALSE There are four main primary traits that help you determine the value of information including timeliness, quality, type, and governance.
95. Data warehouses struggle with combining too much standardized information.
FALSE These are the two primary activities data warehouses do effectively.
26. Unique information asks if the information is current with respect to the business needs.
FALSE Timely information asks if the information is current with respect to the business needs.
13. Timely information must be up-to-the-second to be accurate.
FALSE Timely information can change for each business decision. Some decisions require weekly information while others require daily information.
27. Timely information asks if each transaction and event is represented only once in the information.
FALSE Unique information asks if each transaction and event is represented only once in the information.
147. Velocity includes different forms of structured and unstructured data.
FALSE Variety includes different forms of structured and unstructured data.
148. Volume includes the uncertainty of data, including biases, noise, and abnormalities.
FALSE Veracity includes the uncertainty of data, including biases, noise, and abnormalities.
162. Social media analytics analyzes unstructured data associated with websites to identify consumer behavior and website navigation.
FALSE Web analytics analyzes unstructured data associated with websites to identify consumer behavior and website navigation.
Which of the following include the three primary network providers?
ISP, NSP, RSP
TRUE
In the basic supply chain, deliver refers to planning for transportation of goods to customers.
TRUE
In the basic supply chain, make refers to manufacturing products and creating production schedules.
TRUE
In the basic supply chain, plan refers to preparing to manage all resources required to meet demand.
FALSE
In the basic supply chain, return refers to preparing to manage all resources required to meet demands. FALSE! In the basic supply chain, plan refers to preparing to manage all resources required to meet demands.
TRUE
In the basic supply chain, return refers to supporting customers and product returns
TRUE
In the basic supply chain, source refers to building relationships with suppliers to procure raw materials.
FALSE
In the basic supply chain, source refers to planning for transportation of goods to customers. FALSE! In the basic supply chain, deliver refers to planning for transportation of goods to customers.
TRUE
Inbound logistics acquires raw materials and resources and distributes them to manufacturing as required.
FALSE
Inbound logistics distributes goods and services to customers. FALSE! Outbound logistics distributes goods and services to customers.
What displays information graphically so it can be easily understood?
Infographics
TRUE
Information technology's primary role in supply chain management is creating the integrations or tight process and information linkages between functions within a firm—such as marketing, sales, finance, manufacturing, and distribution—and between firms.
TRUE
Integrations allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems
TRUE
Integrations are achieved using middleware—several types of software that sit between and provide connectivity for two or more software applications. Middleware translates information between disparate systems
FALSE
Integrations provide enterprisewide support and data access for a firm's operations and business processes. FALSE! Enterprise systems provide enterprisewide support and data access for a firm's operations and business processes.
FALSE
Interactive voice response automatically dials outbound calls and forwards answered calls to an available agent. FALSE Predictive dialing automatically dials outbound calls and forwards answered calls to an available agent.
TRUE
Interactive voice response directs customers to use touch-tone phones or keywords to navigate or provide information.
FALSE
Interactive voice response routes inbound calls to available agents. FALSE Automatic call distribution routes inbound calls to available agents
What distributes digital video content using IP across the Internet and private IP networks?
Internet Protocol TV IPTV
What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing
Intranet
FALSE
Inventory cycle time is the agreed upon time between the purchase of a product and the delivery of the product. FALSE! Customer order cycle time is the agreed upon time between the purchase of a product and the delivery of the product.
FALSE
Inventory cycle time is the frequency of inventory replacement. FALSE! Inventory turnover is the frequency of inventory replacement.
TRUE
Inventory cycle time is the time it takes to manufacture a product and deliver it to the retailer
FALSE
Inventory turnover is an unfilled customer order for a product that is out of stock.
TRUE
Inventory turnover is the frequency of inventory replacement
Which of the following is not an example of an advantage to using the Web to access organizational databases?
It is cleaner and virus-free.
Which of the following include the three primary network categories
LAN, WAN, MAN
TRUE
List generators compile customer information from a variety of sources and segment it for different marketing campaigns.
FALSE
List generators fall under the category of the sales department's CRM tools. List generators fall under the category of the marketing department's CRM tools.
What connects a group of computers in close proximity, such as a school or office building?
Local Area Network (LAN)
FALSE
Logistics can help a company answer the following question—what quantity of raw materials should we purchase to minimize spoilage? FALSE! Procurement can help a company answer this question.
TRUE
Logistics controls processes inside a company (warehouse logistics) and outside a company (transport logistics) and focuses on the physical execution part of the supply chain.
FALSE
Logistics includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing. FALSE! Materials management includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing.
TRUE
Logistics includes the increasingly complex management of processes, information, and communication to take a product from cradle to grave. Cradle to grave provides logistics support.
TRUE
Logistics includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain.
197 What is the biggest benefit of VoIP
Lower Costs
TRUE
Makerspaces is a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable
TRUE
Materials are transformed into semifinished and finished products—the organization's own production processes
TRUE
Materials management includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing.
FALSE
Materials management is the purchasing of goods and services to meet the needs of the supply chain. FALSE! Procurement is the purchasing of goods and services to meet the needs of the supply chain
What is a large computer network usually spanning a city of a specific infrastructure like a college?
Metropolitan Area Network (MAN)
TRUE
Middleware translates information between disparate systems.
What do data warehouses support?
OLAP and analytical processing
FALSE
Operational CRM supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers. FALSE! Analytical CRM supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers.
TRUE
Opportunity management CRM systems target sales opportunities by finding new customers or companies for future sales.
FALSE
Outbound logistics acquires raw materials and resources and distributes them to manufacturing as required. FALSE! Inbound logistics acquires raw materials and resources and distributes them to manufacturing as required.
TRUE
Outbound logistics distributes goods and services to customers
What represents the end of the packet or transmission end?
Packet footer
What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server?
Peer-to-Peer p2p
FALSE
Plan, source, give, get, and return are the five basic supply chain management components. FALSE! Plan, source, make, deliver, and return are the five basic supply chain management components
TRUE
Plan, source, make, deliver, and return are the five basic supply chain management components
TRUE
Predictive dialing automatically dials outbound calls and forwards answered calls to an available agent.
TRUE
Procurement can help a company answer the following question—what quantity of raw materials should we purchase to minimize spoilage? Procurement can help a company answer this type of question
FALSE
Procurement includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain. FALSE! Logistics includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain.
TRUE
Procurement is the purchasing of goods and services to meet the needs of the supply chain.
TRUE
Products are distributed to customers and their downstream customers at all levels.
TRUE
RFID SUPPORTS LOGISTICS
FALSE
RFID supports procurement.
FALSE
RFID systems are used to create the digital designs and then manufacture the products. FALSE! Computer-aided design/computer-aided manufacturing (CAD/CAM) systems are used to create the digital designs and then manufacture the products
TRUE
RFID uses electronic tags and labels to identify objects wirelessly over short distances.
TRUE
RFID's electronic product code (RFID EPC) promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag.
FALSE
RFM stands for Regency, Frequency, and Monetary. FALSE! RFM stands for Recency (not regency), Frequency, and Monetary.
TRUE
Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances.
What is a packet footer
Represents the end of the packet or transmission end
TRUE
Robotics focus on creating artificial intelligence devices that can move and react to sensory input.
TRUE
Robotics supports materials management.
FALSE
Robotics supports procurement. FALSE! Robotics supports materials management.
Which of the below is an example of P2P?
SKYPE
TRUE
Selling chain management applies technology to the activities in the order life cycle from inquiry to sale.
FALSE
Selling chain management enables an organization to react more quickly to resolve supply chain issues. FALSE! Supply chain event management (SCEM) enables an organization to react more quickly to resolve supply chain issues.
What is the process of analyzing recorded calls to gather information; brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise?
Speech analytics
TRUE
Supply chain event management (SCEM) enables an organization to react more quickly to resolve supply chain issues.
FALSE
Supply chain event management applies technology to the activities in the order life cycle from inquiry to sale. FALSE! Selling chain management applies technology to the activities in the order life cycle from inquiry to sale.
TRUE
Supply chain execution systems ensure supply chain cohesion by automating the different activities of the supply chain.
FALSE
Supply chain visibility ensures supply chain cohesion by automating the different activities of the supply chain.
TRUE
Supply chain visibility is the ability to view all areas up and down the supply chain.
How do TCP and IP differ?
TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address
Which of the following include the three primary network protocols?
TCP/IP, FTP, DHCP
117. Regression is a statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables when the focus is on the relationship between a dependent variable and one or more independent variables.
TRUE
150. Advanced analytics focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization.
TRUE
157. Speech analytics is the process of analyzing recorded calls to gather information; brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise.
TRUE
159. Text analytics analyzes unstructured data to find trends and patterns in words and sentences. Text mining a firm's customer support email might identify which customer service representative is best able to handle the question, allowing the system to forward it to the right person.
TRUE
32. Master data management (MDM) is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems. MDM is commonly included in data governance.
TRUE
Information granularity refers to the extent of detail within the information (fine and detailed or coarse and abstract).
TRUE
38. A DBMS uses three primary data models for organizing information—the hierarchical, network, and the relational database.
TRUE A DBMS uses three primary data models for organizing information—the hierarchical, network, and the relational database.
83. A content creator is the person responsible for creating the original website content.
TRUE A content creator is the person responsible for creating the original website content.
85. A content editor is the person responsible for updating and maintaining website content.
TRUE A content editor is the person responsible for updating and maintaining website content.
168. A data artist is a business analytics specialist who uses visual tools to help people understand complex data.
TRUE A data artist is a business analytics specialist who uses visual tools to help people understand complex data.
43. A data dictionary compiles all of the metadata about the data elements in the data model.
TRUE A data dictionary compiles all of the metadata about the data elements in the data model.
99. A data mart contains a subset of data warehouse information.
TRUE A data mart contains a subset of data warehouse information.
81. A data-driven website can help limit the amount of information displayed to customers based on unique search requirements.
TRUE A data-driven website can help limit the amount of information displayed to customers based on unique search requirements.
90. A data-driven website is an interactive website kept constantly updated and relevant to the needs of its customers using a database.
TRUE A data-driven website is an interactive website kept constantly updated and relevant to the needs of its customers using a database.
60. A foreign key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
TRUE A foreign key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
55. A primary key is a field (or group of fields) that uniquely identifies a given record in a table.
TRUE A primary key is a field (or group of fields) that uniquely identifies a given record in a table.
52. A relational database management system allows users to create, read, update, and delete data in a relational database.
TRUE A relational database management system allows users to create, read, update, and delete data in a relational database.
50. A relational database model stores information in the form of logically related two-dimensional tables.
TRUE A relational database model stores information in the form of logically related two-dimensional tables.
18. Accurate information asks if there is an incorrect value in the information.
TRUE Accurate information asks if there is an incorrect value in the information.
82. Data-driven websites offer several advantages as it is far easier to manage content and store large amounts of data.
TRUE Additional data-driven website advantages are easy to manage content and easy to store large amounts of data.
124. Affinity grouping determine which things go together.
TRUE Affinity grouping determine which things go together.
104. An information cube is the common term for the representation of multidimensional information.
TRUE An information cube<i> </i>is the common term for the representation of multidimensional information.
167. Analysis paralysis occurs when the user goes into an emotional state of over-analysis (or overthinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome.
TRUE Analysis paralysis occurs when the user goes into an emotional state of over-analysis (or overthinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome.
152. Association detection reveals the relationship between variables along with the nature and frequency of the relationship.
TRUE Association detection reveals the relationship between variables along with the nature and frequency of the relationship.
53. Attributes (also called columns or fields) are the data elements associated with an entity.
TRUE Attributes (also called columns or fields) are the data elements associated with an entity.
141. Big data is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
TRUE Big data is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
79. Business critical integrity constraints enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints.
TRUE Business critical integrity constraints enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints.
122. Classification assigns records to one of a predefined set of classes.
TRUE Classification assigns records to one of a predefined set of classes.
Analytics 125. Clustering segments a heterogeneous population of more homogeneous subgroups.
TRUE Clustering segments a heterogeneous population of more homogeneous subgroups.
19. Complete information asks if there is a value missing from the information.
TRUE Complete information asks if there is a value missing from the information.
20. Consistent information asks if the aggregate or summary information is in agreement with detailed information.
TRUE Consistent information asks if the aggregate or summary information is in agreement with detailed information.
39. Data element (or data field) is the smallest or basic unit of information.
TRUE Data element (or data field) is the smallest or basic unit of information.
40. Data elements can include a customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, and so on.
TRUE Data elements can include a customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, and so on.
111. Data mining occurs on structured data that are already in a database or a spreadsheet.
TRUE Data mining occurs on structured data that are already in a database or a spreadsheet.
41. Data models are logical data structures that detail the relationships among data elements by using graphics or pictures.
TRUE Data models are logical data structures that detail the relationships among data elements by using graphics or pictures.
166. Data visualization tools can help uncover correlations and trends in data that would otherwise go unrecognized.
TRUE Data visualization tools can help uncover correlations and trends in data that would otherwise go unrecognized.
165. Data visualization tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more.
TRUE Data visualization tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more.
68. Databases offer many security features including passwords to provide authentication, access levels to determine who can access the data, and access controls to determine what type of access they have to the information.
TRUE Databases offer many security features including passwords to provide authentication, access levels to determine who can access the data, and access controls to determine what type of access they have to the information.
30. Determining if a name is spelled correctly is an example of an accurate characteristic of high-quality information.
TRUE Determining if a name is spelled correctly is an example of an accurate characteristic of high-quality information.
29. Determining if all total columns equal the true total of the individual item is an example of a consistent characteristic of high-quality information.
TRUE Determining if all total columns equal the true total of the individual item is an example of a consistent characteristic of high-quality information.
31. Determining if information is updated weekly, daily, or hourly is an example of a timely characteristic of high-quality information.
TRUE Determining if information is updated weekly, daily, or hourly is an example of a timely characteristic of high-quality information.
28. Determining if there are any duplicate customers in the data is an example of a unique characteristic of high-quality information.
TRUE Determining if there are any duplicate customers in the data is an example of a unique characteristic of high-quality information.
105. Dirty data is erroneous or flawed data. The complete removal of dirty data from a source is impractical or virtually impossible.
TRUE Dirty data is erroneous or flawed data. The complete removal of dirty data from a source is impractical or virtually impossible.
149. Distributed computing processes and manages algorithms across many machines in a computing environment.
TRUE Distributed computing processes and manages algorithms across many machines in a computing environment.
106. Duplicate data, inaccurate data, misleading data, and incorrect data are all problems associated with dirty data.
TRUE Duplicate data, inaccurate data, misleading data, and incorrect data are all problems associated with dirty data.
88. Dynamic information includes data that change based on user actions.
TRUE Dynamic information includes data that change based on user actions.
89. Dynamic website information is stored in a dynamic catalog, or an area of a website that stores information about products in a database.
TRUE Dynamic website information is stored in a dynamic catalog, or an area of a website that stores information about products in a database.
102. ETL stands for extraction, transformation, and loading.
TRUE ETL stands for extraction, transformation, and loading.
123. Estimation determines values for an unknown continuous variable behavior or estimated future value.
TRUE Estimation determines values for an unknown continuous variable behavior or estimated future value.
116. Forecasts are predictions based on time-series information.
TRUE Forecasts are predictions based on time-series information.
135. Human-generated data is data that humans, in interaction with computers, generate. Human-generated structured data includes input data, click-stream data, or gaming data.
TRUE Human-generated data is data that humans, in interaction with computers, generate. Human-generated structured data includes input data, click-stream data, or gaming data.
140. Human-generated unstructured data includes text messages, social media data, and emails.
TRUE Human-generated unstructured data includes text messages, social media data, and emails.
151. Infographics (information graphics) displays information graphically so it can be easily understood.
TRUE Infographics (information graphics) displays information graphically so it can be easily understood.
163. Infographics can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.
TRUE Infographics can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.
107. Information cleansing or scrubbing is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.
TRUE Information cleansing or scrubbing<i> </i>is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.
10. Reports for each sales person, product, and part are examples of detail or fine information granularities.
TRUE Information granularities include detailed (or fine) information such as reports for each sales person, product, or parts.
72. Information integrity is a measure of the quality of information.
TRUE Information integrity is a measure of the quality of information.
16. Information integrity issues occur when a system produces incorrect, inconsistent, or duplicate data.
TRUE Information integrity issues occur when a system produces incorrect, inconsistent, or duplicate data.
69. Information redundancy is the duplication of data, or the storage of the same data in multiple places.
TRUE Information redundancy is the duplication of data, or the storage of the same data in multiple places.
71. Information redundancy is the duplication of data, or the storage of the same data in multiple places.
TRUE Information redundancy is the duplication of data, or the storage of the same data in multiple places.
73. Integrity constraints are rules that help ensure the quality of information.
TRUE Integrity constraints are rules that help ensure the quality of information.
134. Machine-generated data is created by a machine without human intervention. Machine-generated structured data includes sensor data, point-of-sale data, and web log (blog) data.
TRUE Machine-generated data is created by a machine without human intervention. Machine-generated structured data includes sensor data, point-of-sale data, and web log (blog) data.
139.Machine-generated unstructured data includes satellite images, scientific atmosphere data, and radar data.
TRUE Machine-generated unstructured data includes satellite images, scientific atmosphere data, and radar data.
17. If a manager identifies numerous information integrity issues, he or she should consider the reports generated from that data as invalid and not use them when making decisions.
TRUE Managers can sometimes utilize information integrity issues to consider reports invalid and should not make decisions from such sources.
108. Many firms complete data quality audits to determine the accuracy and completeness of its data.
TRUE Many firms complete data quality audits to determine the accuracy and completeness of its data.
91 Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, managers struggle with the challenge of turning their business data into business intelligence.
TRUE Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, managers struggle with the challenge of turning their business data into business intelligence.
42. Metadata provides details about data. For example, metadata for an image could include its size, resolution, and date created.
TRUE Metadata provides details about data. For example, metadata for an image could include its size, resolution, and date created.
Optimization is a statistical process that finds the way to make a design, system, or decision as effective as possible; for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
TRUE Optimization is a statistical process that finds the way to make a design, system, or decision as effective as possible; for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
113. Prediction is a statement about what will happen or might happen in the future; for example, predicting future sales or employee turnover.
TRUE Prediction is a statement about what will happen or might happen in the future; for example, predicting future sales or employee turnover.
14. Real-time systems provide real-time information in response to requests.
TRUE Real-time systems provide real-time information in response to requests.
74. Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.
TRUE Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.
80. Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.
TRUE Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.
156. Social media analytics analyzes text flowing across the Internet, including unstructured text from blogs and messages.
TRUE Social media analytics analyzes text flowing across the Internet, including unstructured text from blogs and messages.
158. Speech analytics is heavily used in the customer service department to help improve processes by identifying angry customers and routing them to the appropriate customer service representative.
TRUE Speech analytics is heavily used in the customer service department to help improve processes by identifying angry customers and routing them to the appropriate customer service representative.
86. Static information includes fixed data incapable of change in the event of a user action.
TRUE Static information includes fixed data incapable of change in the event of a user action.
130. Structured data has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.
TRUE Structured data has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.
131. Structured data is typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.
TRUE Structured data is typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.
93. The banking industry uses business intelligence to understand customer credit card usage and nonpayment rates.
TRUE The banking industry uses business intelligence to understand customer credit card usage and nonpayment rates.
35. The core component of any system, regardless of size, is a database and a database management system.
TRUE The core component of any system, regardless of size, is a database and a database management system.
142. The four common characteristics of big data include variety, veracity, volume, velocity.
TRUE The four common characteristics of big data include variety, veracity, volume, velocity.
4. The four primary traits of the value of information include type, timeliness, quality, and governance.
TRUE The four primary traits of the value of information include type, timeliness, quality, and governance.
63. The logical view of information focuses on how individual users logically access information to meet their own particular business needs.
TRUE The logical view of information focuses on how individual users logically access information to meet their own particular business needs.
62. The physical view of information deals with the physical storage of information on a storage device.
TRUE The physical view of information deals with the physical storage of information on a storage device.
97. The primary purpose of a data warehouse is to perform analytical processes.
TRUE The primary purpose of a data warehouse is to perform analytical processes.
94. A data warehouse is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks.
TRUE This is the definition of a data warehouse.
110. Data-mining tools use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making.
TRUE This is the definition of data-mining tools. Data-mining tools use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making.
115. Time-series information is time-stamped information collected at a particular frequency.
TRUE Time-series information is time-stamped information collected at a particular frequency.
21. Timely information asks if the information is current with respect to the business needs.
TRUE Timely information asks if the information is current with respect to the business needs.
5. Transactional information is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry.
TRUE Transactional information is used to perform operational tasks.
22. Unique information asks if each transaction and event is represented only once in the information.
TRUE Unique information asks if each transaction and event is represented only once in the information.
112. Unstructured data do not exist in a fixed location and can include text documents, PDFs, voice messages, emails, and so on.
TRUE Unstructured data do not exist in a fixed location and can include text documents, PDFs, voice messages, emails, and so on.
138. Unstructured data is not defined, does not follow a specified format, and is typically freeform text such as emails, Twitter tweets, and text messages. Unstructured data accounts for about 80 percent of the data that surrounds us.
TRUE Unstructured data is not defined, does not follow a specified format, and is typically freeform text such as emails, Twitter tweets, and text messages. Unstructured data accounts for about 80 percent of the data that surrounds us.
143. Variety includes different forms of structured and unstructured data.
TRUE Variety includes different forms of structured and unstructured data.
146. Velocity includes the analysis of streaming data as it travels around the Internet.
TRUE Velocity includes the analysis of streaming data as it travels around the Internet.
144. Veracity includes the uncertainty of data, including biases, noise, and abnormalities.
TRUE Veracity includes the uncertainty of data, including biases, noise, and abnormalities.
145. Volume includes the scale of data.
TRUE Volume includes the scale of data.
160. Web analytics analyzes unstructured data associated with websites to identify consumer behavior and website navigation.
TRUE Web analytics analyzes unstructured data associated with websites to identify consumer behavior and website navigation.
103. Within the data warehouse model, the external databases could include competitor information, industry information and stock market analysis.
TRUE Within the data warehouse model, the external databases are competitor information, industry information, mailing lists, and stock market analysis.
101. Within the data warehouse model, the internal databases could include marketing, sales, inventory, and billing.
TRUE Within the data warehouse model, the internal databases are marketing, sales, inventory, and billing.
70. A business catalog defines how a company performs certain aspects of its business and typically results in either a yes/no or
TRUE/ --- FALSE answer. --- FALSE A business rule<i> </i>defines how a company performs certain aspects of its business and typically results in either a yes/no or --- TRUE/ --- FALSE answer.
67. A business rule defines how a company performs certain aspects of its business and typically results in either a yes/no or
TRUE/ --- FALSE answer. --- TRUE A business rule<i> </i>defines how a company performs certain aspects of its business and typically results in either a yes/no or --- TRUE/ --- FALSE answer.
What analyzes unstructured data to find trends and patterns in words and sentences?
Text analytics
FALSE
The bullwhip effect is a standard format for the electronic exchange of information between supply chain participants. FALSE!
FALSE
The customers' customer is upstream in the supply chain. FALSE! The customers' customer is downstream in the supply chain.
TRUE
The evolution of CRM is reporting, analyzing, and predicting.
TRUE
The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
Which of the following statements is true?
The more complete and accurate an organization wants to get its information, the more it costs.
FALSE
The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its suppliers. FALSE! The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its customers.
TRUE
The process of 3D printing (additive manufacturing) builds—layer by layer in an additive process—a three-dimensional solid object from a digital model.
FALSE
The robotics movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things. FALSE! The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
Which of the following statements is inaccurate in reference to unified communication
UC increased communication expenses
FALSE
Up-selling is selling additional products or services to an existing customer. FALSE Cross-selling is selling additional products or services to an existing customer.
In terms of big data, what includes the analysis of streaming data as it travels around the Internet?
Velocity
Which of the following include the three forms of primary network convergence?
VoIP, UC, IPTV
In terms of big data, what includes the scale of data?
Volume
What analyzes unstructured data associated with websites to identify consumer behavior and website navigation?
Web analytics
What spans a large geographic area such as a state, province, or country, similar to the internet?
Wide are network (WAN)
What is a data artist?
a business analytics specialist who uses visual tools to help people understand complex data
What is big data?
a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools
what is vpn
a direct private network that creates a "private tunnel" within the Internet to connect to the corporate server
What is a file transfer protocol (FTP)
a simple network protocol that allows the transfer of files between two computers on the internet
What is a packet
a single unit of binary data routed through a network
What is transmission control protocol/Internet protocol (TCP/IP)
a standard internet protocol that provides the technical foundation for the public internet as well as for large numbers of private networks
What is a protocol
a standard that specifies the format of data as well as the rules to be followed during transmission
What is a prediction
a statement about what will happen or might happen in the future for example predicting future sales or employee turnover
What is traceroute
a utility application that monitors the network path of packet data sent to a remote computer
What focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization
advanced analytics
What focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization?
advanced anayltics
VoIP allows users to
all of the above
What can unified communications merge
all of the above
What is a benefit of network convergence
all of the above
Which of the choices below allows a user to access the internet?
all of the above
What is Dynamic Host configuration Protocol
allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network
What occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome
analysis paralysis
What is web analytics?
analyzes unstructured data associated with websites to identify consumer behavior and website navigation
What is text analytics?
analyzes unstructured data to find trends and patterns in words and sentences
What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference of physical obstructions like walks impact communication signals?
attenuation
Which of the following terms refers to the smallest element of data and has a value of either 0 or 1
bit
What measures bandwidth in terms of numbers transferred or received per unit of time
bit rate
What is a high speed internet connection that is always connected and has a bandwidth greater than 2 mbps
broadband
What technology makes possible high speed internet access over ordinary residential electrical lines and offers and alternative to DSL or high-speed cable modems
broadband over power line
What tracks corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls, allowing users to manipulate data for analysis?
business intelligence dashboards
What are the five elements that are needed to create a connected world or a network?
categories, providers, access technologies, protocols, and convergence
An extranet is not available for use by a ________.
competitor
What is the domain name system
converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions
What is a business analytics specialist who uses visual tools to help people understand complex data?
data artist
What extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
data scientist
What describes technologies that allow users to "see" or visualize data to transform information into a business perspective?
data visualization
What has moved beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more?
data visualization tools
What are the two most prevalent types of broadband access
digital subscriber line and cable connections
What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions
domain name system (DNS)
Which of the following is inaccurate in reference to domain names
domain names are owned
What is advanced analytics
focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization
What are standard packet formats
include a packet header, packet body containing the original message, and packet footer
What can present the results of large data analysis, looking for patterns and relationships that monitor changes in variables over time?
infographics
What is the largest and most important network that has evolved into a global information super highway?
internet
What is a packet header
lists the destination (for example an IP packets the destination is the IP address) along with the length of the message data
What is a device that enables a computer to transmit and receive data
modem
What is a benefit of network convergence
multiple devices supported by one provider
The internet is a hierarchal structure linking different levels of service providers who millions of devices supply all the interconnections. The three levels outlined in this book from the top down include ---
national service provider (NSP), regional service provider (RSP), and internet service provider (ISP)
What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructure
network convergence
What is analysis paralysis?
occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome
What is a single unit of binary data routed through a network
packet
What lists the destination (for example in an IP packet the destination is the IP address) along with the length of the message data
packet header
What is distributed computing
processes and manages algorithms across many machines in a computing environment
What is the standard that specifies the format of data as well as the rules to be followed during transmission
protocol
What is the software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons?
proxy
What are the rules that enforce basic and fundamental information-based constraints?
relational integrity constraints
What receives and repeats a signal extending its attenuation or range?
repeater
What is the major challenge of networking or performing business in a connected world
security issues
What is a proxy
software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons
Which formats include a packet header, a packet body containing the original message, and packet footer?
standard packet
What includes fixed data incapable of change in the event of a user action?
static information
Which allows users to work from remote locations such as home or hotel using high speed internet to access business applications and data
telecommuting
What is network convergence
the efficient coexistence of telephone, vide, and data communications within a single network, offering convenience and flexibility not possible with separate infrastructure
What is unified communication (UC)
the integration of communication channels into a single service
Which of the choices below offer a common example of a WAN
the internet
What is a utility application that monitors the network path of packet data sent to a remote computer
traceroute
What is the standard Internet protocol, which provides the technical foundation for the public internet?
transmission control protocol/internet protocol (TCP/IP)
What is the integration of communication channels into a single service
unified communication
What is VoIP
uses IP technology to transmit telephone calls
What is an example of using cluster analysis in business to create target-marketing strategies
zip code segmentation