CIS 2050 exam 2, ISMN 3140 Exam 2 Practice Questions, CIS 2050 Exam 2 (Ch. 5-8), MIS 320 (Ch. 7), MIS Chapter 5-8
bartering online
an intermediary administers online exchange of surplus products, and/or company receives "points" for its contribution, and the points can be used to purchase other needed items
88) You decide to start a landscaping business called Trim Grass. Some of your residential clients would like to pay their bills online. Which of the following methods will not be appropriate for this type of payment? a) Electronic checks b) Electronic credit cards c) Purchasing cards d) Person-to-person payments e) Stored-value money cards
c) Purchasing cards
A(n) _____ is a logical grouping of related fields. a) Byte b) Field c) Record d) File e) Database
c) Record
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) tacit b) explicit c) managerial d) geographical e) cultural
b) explicit
33) In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins. a) forward b) static c) reverse d) physical e) simple
c) reverse
Tacit knowledge has which of the following characteristics? a) codified b) objective c) unstructured d) rational e) technical
c) unstructured
41) Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. a) 802.11a b) 802.11b c) 802.11c d) 802.11g e) WiMAX
d) 802.11g
46) With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices. a) Ubiquity b) Convenience c) Instant connectivity d) B and C e) A, B, and C
d) B and C
The part of a network that handles the major traffic is the ________. a) Front end b) Network interface c) Multiplexer d) Backbone e) Front end processor
d) Backbone
40) Which type of electronic commerce does Amazon practice? a) business-to-employee b) consumer-to-consumer c) consumer- to-business d) business-to-consumer e) employee-to-business
d) business-to-consumer
electronic business
(e-business) a broader definition of electronic commerce, including buying and selling of goods and services as well as servicing customers, collaborating with business partners, conducting e-learning, and conducting electronic transactions within an organization
electronic money
(e-cash) a digital equivalent of cash, stored on an electronic device or remotely at a service ("electronic purse")
electronic checks
(e-cash) a financial transaction in which one person withdraws funds from another person's bank account
electronic commerce
(e-commerce) the process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet
electronic credit
(e-credit) online payments are charged to a credit card
world wide web
(WWW or W3) a system of universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture; it uses the transport functions of the Internet
wireless fidelity
(Wi-Fi) a set of standards for wireless local area networks based on the IEEE 802.11 standard
group purchasing
(coops) small buyers aggregate demand to get a large volume
electronic government
(e-government) the uses of electronic commerce to deliver information and public services to citizens, business partners, and suppliers of government entities, and those working in the public sector
electronic marketplace
(e-marketplace) a virtual market space on the Web where many buyers and many sellers conduct electronic business activities
Auction
A competitive process in which either a seller or buyer solicits it consecutive bids from buyers or a buyer solicits bids from sellers, and prices are determined dynamically by competitive bidding.
The process of moving data from various sources into the data warehouse is called: a) uploading. b) extracting, transforming, and loading. c) online transaction processing. d) master data management. e) online analytical processing.
b) extracting, transforming, and loading.
In a relational database, every row represents a(n) _____. a) file b) record c) attribute d) primary key e) secondary key
b) record
55) In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange
b) sell-side
56) The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange
b) sell-side
2) Visiting the Web site of a car manufacturer (e.g., www.gm.com), entering the specifications for the car you want, and then picking up your car at your local dealership is an example of partial electronic commerce.
Answer: True
4) Forward auctions are auctions that sellers use as a channel to many potential buyers.
Answer: True
6) An electronic storefront is a Web site on the Internet that represents a single store.
Answer: True
8) Selling products such as books and computers on the Internet may reduce vendors' selling costs by 20 to 40 percent, with further reductions being difficult because the products must be delivered physically.
Answer: True
9) Virtual banks are those banks that are dedicated only to Internet transactions.
Answer: True
A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site.
Answer: True
A local area network connects two or more communicating devices in a limited geographical area.
Answer: True
A major problem of the discovery applications of networks is the huge amount of information available.
Answer: True
A negative value for a student's grade point average is an example of a data integrity problem.
Answer: True
An Internet service provider is a company that offers Internet connections for a fee.
Answer: True
An attribute is any characteristic or quality that describes a particular entity.
Answer: True
An entity is a person, place, thing, or event about which information is maintained.
Answer: True
An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
Answer: True
Cable media use wires or cables to transmit data and information.
Answer: True
Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber.
Answer: True
Commercial portals are intended for broad audiences and offer fairly routine content.
Answer: True
Currently, ATM networks operate only on fiber-optic cable.
Answer: True
Data marts are designed for the end-user needs in a strategic business unit or department.
Answer: True
Electronic mail is the largest-volume application running over the Internet.
Answer: True
Extranets offer limited accessibility to the intranets of participating companies.
Answer: True
Increasing amounts of external data need to be considered in making organizational decisions.
Answer: True
Internet kiosks are computer terminals located in public places like libraries and airports.
Answer: True
Intranets support discovery, communication, and collaboration inside an organization.
Answer: True
Metasearch engines search several engines at once and integrate the findings of the various search engines.
Answer: True
Network interface cards are special adapters that link an individual device to the communications medium on a local area network.
Answer: True
Online analytical processing (OLAP) involves the analysis of accumulated data by end users.
Answer: True
Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.
Answer: True
The Internet is a global network of computer networks.
Answer: True
The U.S. public telephone system was designed as an analog network to carry voice signals.
Answer: True
The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture.
Answer: True
The best way to capture the data in an organized format is to use a database.
Answer: True
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.
Answer: True
The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet.
Answer: True
The rightmost part of an Internet name is the top-level specification, or the zone.
Answer: True
Uniform resource locators (URLs) point to the address of a specific resource or site on the Web.
Answer: True
Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet.
Answer: True
You would be an instance of your university's STUDENT class.
Answer: True
Buy-side Marketplace
B2B model in which organizations buy needed products or services from other organizations electronically, often through a reverse auction.
buy-side marketplace
B2B model in which organizations buy needed products or services from other organizations electronically, often through a reverse auctions
sell-side marketplace
B2B model in which organizations sell to other organizations from their own private e-marketplace and/or from a third party site
Sell-side Marketplace
B2B model in which organizations sell to other organizations from their own private e-marketplace and/or from a third-party site.
Online Advertising methods
Banners- Electronic billboards Pop-up- Appear in front of current window Pop-under- Appear underneath current window
Components of a LAN
Server Client Communication media- Ethernet cable Network interface Card
Twisted Pair
Consists of strands of copper wire twisted in pairs Advantages: Inexpensive Widely available easy to work with unobtrusive Disadvantages: Slow Subject to interference easily tapped- Low security
Analog
Continuous waves that transmit information by altering the characteristics of the waves
Name your own price
Customers decide how much they are willing to pay, and an intermediary tries to find a provider Ex. Priceline .com
Name-your-own-price
Customers decide how much they are willing to pay. An intermediary tries to match a provider.
Find the best price
Customers specify a need, and an intermediary compares providers and shows that lowest price, short time to accept Ex. Hotwire.com
59) In _____, direct and indirect materials in one industry are purchased on an as-needed basis. a) horizontal exchanges b) vertical exchanges c) buy-side marketplaces d) functional exchanges e) sell-side marketplaces
b) vertical exchanges
High-speed central networks to which multiple smaller networks (such as LANs and smaller WANs) connect.
backbone networks
Telepresence
The latest form of video conferencing enables participants to seamlessly share data, voice, pictures, graphics, and animations by electronic means
Find-the-best-price
Customers specify a need; an intermediary compares providers and shows the lowest price. Customers must accept the offer in a short time, or they may loose the deal.
Product Customization
Customers use the internet to self-configure products or services. Sellers then price them and fulfill them quickly (build-to-order).
Benefits of E- Commerce
Customers- being able to access a vast number of products and services Organizations- national and international markets more accessible and lower costs Society- allows easy and convenient delivery of information, services and products to rural or developing areas
Banners
Electronic billboards, which typically contain a short text or graphical message to promote a product or vendor.
Mobile Commerce (M-commerce)
Electronic commerce conducted in a wireless environment.
Consumer-to-consumer Electronic Commerce (C2C)
Electronic commerce in which both the buyer and the seller are individuals (not businesses).
Business-to-business Electronic Commerce (B2B)
Electronic commerce in which both the sellers and the buyers are businesses organizations.
Business-to-consumer Electronic Commerce (B2C)
Electronic commerce in which the sellers are organizations and the buyers are individuals, also known as e-tailing.
Public Exchange (or exchange)
Electronic marketplace in which there are many sellers and many buyers, and entry is open to all; it is frequently owned and operated by a third party.
Swarming
Eliminates bottle necking by enabling all users to share little pieces of a file at the same time
Disintermediation
Elimination of intermediaries in electronic commerce.
53) _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. a) Viral marketing b) Personalized marketing c) Permission marketing d) Paper catalogs e) Direct mail
c) Permission marketing
64) _____ are typically used for unplanned B2B purchases for amounts under $2000. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
c) Purchasing cards
reverse auction
an auction in which one buyer, usually an organization, seeks to buy a product or a service, and suppliers submit bids; the lowest bidder wins
forward auctions
an auction that sellers use as a selling channel to many potential buyers; the highest bidder wins the items
secondary key
an identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy
Bluetooth
an industry specification used to create small PAN's
E-procurement
Purchasing by using electronic support.
Viral Marketing
Receivers send information about your product to their friends
Cybersquatting
Refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else.
Cyberbanking
Registering domain names in the hope of selling them later at a higher price.
digital subscriber lines
(DSL) a high-speed, digital data transmission technology using existing analog telephone lines
Master data are generated and captured by operational systems.
Answer: False
Systems that use digital subscriber lines (DSL) do not require modems.
Answer: False
Tacit knowledge is the more objective, rational, and technical types of knowledge.
Answer: False
The network interface card typically houses the LAN's network operating system.
Answer: False
The quality of automatic translation of Web pages is usually just as good as human translation.
Answer: False
The relational database model is based on the concept of three-dimensional tables.
Answer: False
The secondary key is a field that identifies a record with complete uniqueness.
Answer: False
Twisted-pair wire is the least-used form of communications wiring.
Answer: False
Uniform resource locators (URLs) are software applications through which users access the Web.
Answer: False
When data are normalized, attributes in the table depend on the primary key and any secondary keys.
Answer: False
Wide-area networks have a large capacity, and they typically use a single communications channel.
Answer: False
With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call.
Answer: False
10) Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online.
Answer: True
12) Banners are the most common form of advertisement on the Internet.
Answer: True
17) Horizontal exchanges connect buyers and sellers across many industries.
Answer: True
18) In most cases, traditional payment systems are not effective for electronic commerce.
Answer: True
19) Smart cards can be used as credit cards, debit cards, and/or loyalty cards.
Answer: True
Business to Customer (B2C)
The sellers are organizations and the buyers are individuals
9. Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices.
True
wireless sensor network
(WSN) networks of interconnected, battery-powered, wireless sensors placed in the physical environment
the internet
("the net") the massive network that connects computer networks of businesses, organizations, government agencies, and schools around the world, quickly, seamlessly, and inexpensively
asynchronous transfer mode
(ATM) data transmission technology that sues packet switching and allows for almost unlimited bandwidth on demand
business-to-business electronic commerce
(B2B) electronic commerce in which both the sellers and the buyers are business organizations
business-to-consumer electronic commerce
(B2C) electronic commerce in which the sellers are organizations and the buyers are individuals; also known as e-tailing
business-to-employee electronic commerce
(B2E) an organization that uses electronic commerce internally to provide information and services to its employees
consumer-to-consumer electronic commerce
(C2C) electronic commerce in which both the buyer and the seller are individuals (not businesses)
Database Management System
(DBMS) the software program (or group of programs) that provides access to a database
distance learning
(DL) leraning situations in which teachers and students do not meet face-to-face
domain name system
(DNS) the system administered by the Internet Corporation for Assigned Names (ICANN) that assigns names to each site on the Internet
government-to-business
(G2B) the online non-commercial interaction between local and central government and the commercial business sector, rather than private individuals (G2C), with the purpose of providing businesses information and advice on e-business 'best practices'
government-to-citizen
(G2Cz) the communication link between a government and private individuals or residents
geostationary earth orbit
(GEO) orbits 22,300 miles directly above the equator or over the North and South poles; maintains a relatively fixed position in relation to a dish on earth; excellent for TV signals; most expensive to build and launch; long orbital life (many years)
global positioning system
(GPS) a wireless system that uses satellites to enable users to determine their position anywhere on earth
hypertext transport protocol
(HTTP) the communications standard used to transfer pages across the WWW portion of the Internet; defines how messages are formulated and transmitted
internet protocol
(IP) a set of rules responsible for disassembling, delivering, and reassembling packets over the Internet
internet service provider
(ISP) companies that provide Internet connections for free
knowledge management
(KM) a process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory and that typically reside within the organization in an unstructured manner
knowledge management system
(KMS) information technologies used to systematize, enhance, and expedite intra- and inter firm knowledge management
local area network
(LAN) a network that connects communications devices in a limited geographical region (for example, a building), so that every user device on the network can communicate with every other device
low earth orbit
(LEO) 400 to 700 miles above the surface; requires many to cover the earth; least expensive to build; short orbital life (5 years); used for telephone
metropolitan area network
(MAN) a computer network in which two or more computers or communicating devices or networks which are geographically separated but in the same metropolitan city are connected to each other are said to be connected on this network
medium earth orbit
(MEO) located 6,434 miles above the earth's surface and move; used for the GPS system; 6-12 year orbital life
network access points
(NAPs) computers that act as exchange points for Internet traffic and determine how traffic is routed
near-field communication
(NFC) the smallest of the short-range wireless networks, designed to be embedded in mobile devices such as cell phones and credit cards
network interface card
(NIC) a computer hardware component that connects a computer to a computer network
wireless interface card
(NIC) needed to connect a laptop or PC wirelessly
online transaction processing
(OLTP) a class of information systems that facilitate and manage transaction-oriented applications, typically for data entry and retrieval transaction processing
personal area network
(PAN) a computer network used for data transmission among devices such as computers, telephones, and personal digital assistants
plain old telephone service
(POTS) the voice-grade telephone service that is based on analog signal transmission that was common before the advent of advanced forms of telephony such as Integrated Services Digital Network (ISDN), cellular telephone systems, and voice over Internet Protocol (VoIP)
query by example
(QBE) database language that enables the user to fill out a grid (form) to construct a sample or a description of the data wanted
radio-frequency identification technology
(RFID) a wireless technology that allows manufacturers to attach tags with antennas and computer chips to goods and then track their movement through radio signals
short message service
(SMS) is a text messaging service component of phone, Web, or mobile communication systems
synchronous optical network
(SONET) an interface standard for transporting digital signals over fiber-optic lines; allows the integration of transmissions from multiple vendors
structured query language
(SQL) popular relational database language that enables users to perform complicated searches with relatively simple instructions
transmission control protocol/Internet protocol
(TCP/IP) a file transfer protocol that can send large files of information across sometimes unreliable networks with assurance that the data will arrive uncorrupted
unified communications
(UC) hardware and software platform that simplifies and integrates all forms of communications- voice, e-mail, instant message, location, and videoconferencing- across an organization
uniform resource locator
(URL) the set of letters that identifies the address of a specific resource on the Web
ultra-wideband
(UWB) a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps that can be used for applications such as streaming multimedia from, say, a personal computer to a television
voice over internet protocol
(VoIP; also internet telephony) the use of the Internet as the transmission medium for telephone calls
wide are networks
(WANs) a network, generally provided by common carriers, that covers a wide geographic area
wireless application protocol
(WAP) standard that allows wireless devices to access web-based information and services
electronic procurement
(e-procurement) the business-to-business or business-to-consumer or business-to-government purchase and sale of supplies, work, and services through the Internet as well as other information and networking systems, such as electronic data interchange and enterprise resource planning
electronic retailing
(e-tailing) the direct sale of products and service through storefronts or electronic malls, usually designed around an electronic catalog format and/or auctions
digital wallet
(e-wallet) an electronic device that allows an individual to make electronic commerce transactions
electronic wallet
(e-wallet) an electronic device that allows an individual to make electronic commerce transactions
network server
(file server) a computer that contains various software and data files for a local area network, and contains the network operating system
column
(in relational data model) attributes
rows
(in relational data model) records
location-based commerce
(l-commerce) mobile commerce transactions targeted to individuals in specific locations, at specific times
mobile commerce
(m-commerce) electronic commerce conducted in a wireless environment
file server
(network server) a computer that contains various software and data files for a local area network, and contains the network operating system
auctions
(online) a competitive process in which either a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers, and prices are determined dynamically by competitive bidding
virtual group
(or team) a work group whose members are in different locations and who meet electronically
commercial portal
(public portal) a Web site that offers fairly routine content for diverse audiences; offers customization only at the user interface
client computing
(server computing) form of distributed processing in which some machines (servers) perform computing functions for end-user PCs (clients)
internet telephony
(voice-over internet protocol or VoIP) the use of the Internet as the transmission medium for telephone calls
cable media
(wired media) communications channels that use physical wires or cables to transmit data and information
broadcast media
(wireless media) communications channels that use electromagnetic media (the "airwaves") to transmit data
viral marketing
(word of mouth) receives send information about your product to their friends
Chapter 8: Why do individuals carry wireless devices?
-Small enough to carry -Sufficient computing power to perform productive tasks -They can communicate wirelessly with the internet and other devices -Make productive use of wasted time -work time can be scheduled around professional and personal obligations
Top Level Domain
.Com .edu .mil .gov .org
Chapter 6: Advantages of computer networks
1. Enable organizations to be more flexible 2. allow companies to share hardware, computer applications, and data across the organization 3. Make it possible for geographically dispersed employees and work groups to shore documents, ideas, and creative insight
Development of Mobile Commerce is driven by?
1. Widespread availability of mobile devices 2. No need for a PC 3. The "Cell phone culture"- Social phenomenon 4. Declining prices 5. Bandwidth improvement- 3G and LTE connection
Geostationary earth orbit
22000 miles, 8, TV Signal Largest footprint
Medium Earth Orbit
6000 miles, 10-12, used for GPS
Virtual Bank
A banking institution dedicated solely to internet transactions.
Electronic Business (E-business)
A broader definition of electronic commerce, including buying and selling of goods and services as well as servicing customers, collaborating with business partners, conducting e-learning, and conducting electronic transactions within an organization.
Electronic Mall
A collection of individual shops under one internet address.
ISP
A company that offers internet connections for a fee
Smart Card
A credit card that contains a microprocessor (chip) that enables the card to store a considerable amount of information (including stored funds) and to conduct processing.
Stored-value Money Card
A form of electronic cash on which a fixed amount of prepaid money is stored; the amount is reduced each time the card is used.
Person-to-person Payments
A form of electronic cash that enables the transfer of funds between two individuals, or between an individual and a business, without the use of a credit card.
Field
A logical grouping of characters into a word, a small group of words, or an identification number is called a field
File
A logical grouping of related fields
Record
A logical grouping of related fields
Database
A logical grouping of related files
Normalization
A method used for reducing a relational database to its most streamlined form for minimum redundancy When data are normalized, attributes in the table depend only on the primary key Eliminate repeating groups by using a primary key
Ubiquity
A mobile device can provide information and communication regardless of the users location
Industrywide portals
A portal for an entire industry Ex. Fourms, www.truck.net
Multichanneling
A process in which a company integrates its online and offline channels.
One: Many
A professor can have one or many courses but a course can only have one professor Ex. Class to Professor
Protocols
A set of rules and procedures that govern transmission across a network
One: One
A single entity instance of one type is related to a singe entity instance of another type Ex. Student to Parking permit
Many: Many
A student can have one or more courses and a course can have one or more students. Ex. Student to Course
Forward Auctions
An auction that sellers use as a selling channel to many potential buyers; the highest bidder wins the items.
Electronic Marketplace (E-marketplace)
A virtual market space on the web where many buyers and many sellers conduct electronic business activities.
Hotspot
A wireless access point provied service to a number of users within a small geographical perimeter
11. Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics? A. Mobility, broad reach B. Mobility, lack of expense C. Security, broad reach D. Security, mobility E. Broad reach, localization
A. Mobility, broad reach
12. _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. A. Near-field communications B. Bluetooth C. Ultra-wideband D. Wi-Fi
A. Near-field communications
Cable Modem
Access over your cable TV coaxial cable
Dial-Up
Access via telephone companies where broadband is not available
It is easy to manage all the data coming into an organization.
Answer: False
It is important for applications and data to be dependent on each other.
Answer: False
Communication
Allow people to be connected Ex. Email, chat room
Radio Frequency Identification (RFID)
Allows manufacturers to attach tags with antennas and computer chips to goods and then track their movement through radio signals
Pop-under Ad
An advertisement that is automatically launched by some trigger and appears behind the active window.
Pop-up Ad
An advertisement that is automatically launched by some trigger and appears in front of the active window.
Reverse Auction
An auction in which one buyer, usually an organization, seeks to buy a product or service, and suppliers submit bids; the lowest bidder wins.
Skype
An example of a voice IP Application or VOIP
Customer to Customer (C2C)
An individual sells products or services to other individuals Ex. Auctions and classified ads
Business-to-employee Electronic Commerce (B2E)
An organization that uses electronic commerce internally to provide information and services to its employees.
Business to Employee
An organization uses EC internally to provide information and services to its employees
1) In traditional commerce, one or more of the following can be digital: the product or service, the process, and the delivery agent.
Answer: False
11) Internet advertising is impersonal, one-way mass communication.
Answer: False
13) Hacking is the indiscriminate distribution of electronic ads without permission of the receiver.
Answer: False
14) Business-to-consumer applications comprise the majority of electronic commerce volume.
Answer: False
15) The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions.
Answer: False
16) The buy-side marketplace is similar to the business-to-consumer model.
Answer: False
20) Each buyer needs only one e-wallet for all merchants.
Answer: False
21) E-commerce affects only businesses that sell products online.
Answer: False
3) eBay is a good example of business-to-consumer electronic commerce.
Answer: False
5) Even though B2C EC is much larger by volume, B2B is more complex.
Answer: False
7) You can make a purchase in a referral mall.
Answer: False
An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
Answer: False
An organization's data warehouse generally maintains its operational data.
Answer: False
Data rot refers to the quality of the data itself.
Answer: False
Digital signals are continuous waves that transmit information by altering the characteristics of the waves.
Answer: False
Digital signals have two parameters: frequency and amplitude.
Answer: False
E-learning is conducted only in virtual classrooms, where all coursework is completed online.
Answer: False
Employees who telecommute have generally found that the experience enhances their careers.
Answer: False
Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.
Answer: False
Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.
Answer: False
In a data warehouse, existing data are constantly purged as new data come in.
Answer: False
Industrywide portals are intended for broad audiences and offer fairly routine content.
Answer: False
Data Isolation
Applications cannot access data associated with other applications
Forward Auction
Auctions that sellers use as a channel to many potential buyers Ex. Ebay.com
Data Hierarchy
Bit-Byte-Field-Record-File-Database
Chip technology that enables short-range connection (data and voice) between wireless devices.
Bluetooth
Business to Business (B2B)
Both sellers and the buyers are business organizations Largest by volume
Propagation delay
Brief pause due to time necessary to send and return signal.
DSL
Broadband access via telephone companies
Chapter 7: E-Business
Broader than E- Commerce In addition to buying and selling of goods and services it also deals with customers, collaboration and electronic transactions
Electronic tendering system
Business request quotes from suppliers
Electronic Tendering System
Businesses request quotes from suppliers. Uses B2B with a reverse auction mechanism.
E- Commerce
Buying selling transferring of exchanging products services of information via computer networks
8. Which type of electronic commerce is the largest by volume? A. business-to-employee B. consumer-to-consumer C. business-to-business D. business-to-consumer
C. business-to-business
6. _____ auctions are the most common auction model for large purchases. A. forward B. static C. reverse D. physical
C. reverse
The alienation of existing distributors when a company decides to sell to customers directly online.
Channel conflict
Online Auctions
Companies run auctions of various types on the internet. Very popular in C2C, but is starting to gain ground in other types of Electronic Commerce.
Deep Disounters
Company offers deep price discounts. Appeals to customers who consider only price in their purchasing decisions.
Electronic Payment Systems
Computer-based systems that allow customers to pay for goods and services electronically, rather than writing a check or using cash.
Local Area Network
Connects two or more devices in a limited geographical region, usually with in the same building, so that every device on the network can communicate with every other device
How to read a domain name?
Consist of multiple parts read from right to left, separated by dots
4. Consider this domain name, www.business.gsu.edu. The "business" is the ________. A. Top-level domain B. Name of the organization C. URL D. Name of the specific computer E. Address of the Webmaster
D. Name of the specific computer
10. Which of the following is not an advantage of radio? A. no metallic wires needed B. propagate easily through office walls C. devices are inexpensive D. creates no electrical interference problems E. devices are easy to install
D. creates no electrical interference problems
Data Integrity
Data meet certain constraints, such as no alphabetic characters in a Social security number field
Explicit Knowledge
Deals with more objective, rational, and technical knowledge. Ex. Policies, procedures, products reports
Digital
Discrete pulses that are either on of off Bits- 0s and 1s
Electronic Payment Types
E-check- similar to paper checks Electronic credit cards- allows customers to charge online payments to their credit cards accounts Stored value cards- prepaid phone card, gift card Smart card- contain a chip that stores mass amounts of data, micro-payments
3. BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. A. Leeching B. Collaboration C. Packet switching D. Torrents E. Swarming
E. Swarming
Advantages of the radio
Easily travel through normal office walls inexpensive and easy to install transmit at high speeds
Collaboration
Efforts by two or more entities who work together to accomplish certain tasks
Primary Key
Every record in a file must contain at least one field that uniquely identifies that record so that it can be retrieved, updated, and sorted Ex: Your student ID
1) Wireless computing does not really affect productivity.
False
11) Wi-Fi provides excellent security.
False
12) In a mesh network, the motes transmit their data to a central computer.
False
14) Personalization means that a mobile device can provide real-time communication, independent of the user's location.
False
15) A voice portal is a standard Web site that accepts voice commands.
False
18) Pervasive computing and virtual reality are just different names for the same thing.
False
3) Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.
False
7) The global positioning system is supported by GEO satellites.
False
7. The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions
False
8) Radio transmissions are highly secure.
False
Refer to IT's About Business 8.6 - BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans.
False
Today, large corporations are able to process big data but only at great expense.
False
Secondary Key
Fields that have some identifying information but typically do not identify the file with complete accuracy Ex: Students major
Permission Marketing
Method of marketing that asks consumers to give their permission to voluntarily accept online advertising and e-mail.
What are microwave transmission systems used for?
High volume, Long distance, and Line-of-sight communications
Discovery
The internet enables users to access information located in databases all over the world
Electronic exchanges
Independently owned by a third party and connect sellers and buyers Private exchanges- one buyer many sellers Public exchanges- many buyers and many sellers Vertical exchanges- Connect buyers and sellers in a given industry Horizontal exchange- connects buyers and sellers across many industries
Spamming
Indiscriminate distribution of e-mail, without the receiver's permission.
Coaxial Cable
Insulated copper wire Ad. Higher bandwidth than twisted Less susceptible to electromagnetic interference Dis. Expensive Inflexible Easily tapped Somewhat difficult to work with
Bartering Online
Intermediary administers online exchange of surplus products and/or company receives "points" for its contribution, which can be used to purchase other needed items.
A new, faster telecommunications network that deploys advanced network applications such as remote medical diagnosis, digital libraries, distance education, online simulation, and virtual laboratories.
Internet2
Satellite types
LEO MEO GEO
Low Earth Orbit
LEO- 400 to 700miles, many of these, used for telephones
Table
Lays out different entities and their relationships
Domain Tasting
Lets registrars profit from the complex money trail of pay-per-click advertising. Claim internet domain names for the free five-day period and jam them full of advertisements from search engines to make a profit.
Byte
Made up of 8 bits and represents a single character
Online direct marketing
Manufacturers or retailers sell directly to customers Ex. Dell.com
Online Direct Marketing
Manufacturers or retailers sell directly to customers. Very efficient for digital products and services. Can allow for product or service customization.
Wireless-Fidelity (Wi-Fi)
Medium range wireless area network which acts like a wired LAN without the cables
Two characteristics which differentiate mobile computing
Mobility- users carry a device with them and can initiate a real time contact with other systems from wherever they happen to be Broad Reach- the fact that users carrying an open mobile device can be reached instantly even across great distances
E-Learning Limitations
Must be computer literate Lack of Face- to- face Assessing progress is hard because students could get someone else to complete assignments
The smallest of the short-range wireless networks that is designed to be embedded in mobile devices such as cell phones and credit cards.
Near-field Communications (NFC)
Mobile/ Wireless security
Rogue access- an unauthorized access point to a wireless network War driving- driving around until you find an unsecured network Eavesdropping- efforts by unauthorized users to access data traveling wireless networks Radio- Frequency Jamming- a person or a device whether intentionally or unintentionally interfering with your wireless network transmission.
Corporate portals
Offer a personalized single point of access through a web browser to critical business information located inside and outside an organization
Reverse Auction
One buyer usually an organization wants to buy a product or service
E-Learning Benefits
Online material can deliver up to date content which is high quality and consistant Flexible Quicker
Viral Marketing
Online word-of-mouth marketing. Receivers send information about your product to their friends.
Membership
Only members can use the services provided, including access to certain information, conducting trades, etc.
B2B Buy-Side marketplace
Organizations attempt to buy needed products or services from other organizations electronically Ex. Reverse auction
B2B Sell-Side Marketplace
Organizations attempt to sell their products or services to other organizations electronically from their own private e-marketplace, or 3rd party, Forward Auction
Virtual Organizations
Organizations in which the product, the process, and the delivery agent are all digital; also called pure-play organizations.
Brick-and-mortar Organizations
Organizations in which the product, the process, and the delivery agent are all physical.
Click-and-mortar Organizations
Organizations that do business in both the physical and digital dimensions.
Network size
PAN- personal area network, few meters LAN- Local area network MAN- Metropolitan area network WAN- Wide area network, large geographical areas Internet- Global
Video Conferencing
Participants in one location can see participants, document, and presentations at other locations
Leeching
People download content but refuse to share it
Mobile Portal
Portals that are accessible from mobile devices
Group Purchasing (e-coops)
Small buyers aggregate demand to get a large volume. The group then conducts tendering or negotiates a low price.
Group Purchasing
Smaller buyers aggregate demand to get a large volume
Limitations of E- Commerce
Tech- Lack of universal accepted security standards, and in some countries have limited access to the internet and bandwidth, expensive accessibility NonTech- Perceptions of EC are insecure, unsolved legal issues, Lacks critical mass
Group Purchasing
The aggregation of purchasing orders from many buyers so that a volume discount can be obtained.
Channel Conflict
The alienation of existing distributors when a company decides to sell to customers directly online.
Tacit Knowledge
The cumulative store of subjective or experiential learning Ex. Know-how, Set skills, Trade secrets
Electronic Retailing (E-tailing)
The direct sale of products and services through storefronts or electronic malls, usually designed around an electronic catalog format and/or auctions.
Business Model
The method by which a company generates revenue to sustain itself.
Commercial (Public) Portals
The more popular on the internet Intended for broad and diverse audiences Ex. www.msn.com
Structured Query Language (SQL)
The most popular query language used for requesting information. Allows people to perform complicated searches by using relatively simple statements or keywords
Electronic Commerce (E-commerce)
The process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the internet.
Transmission Control Protocol/ Internet Protocol (TCP/IP)
The protocol of the internet TCP Purpose 1. Manage movement of packets between computers by establishing a connection between the computers 2. sequences the transfer of packets 3. Acknowledges the packets that have been transmitted IP Purpose Disassembling transmitting and reassembling the data.
Data Redundancy
The same data are stored in many places
Near-Field Communication
The smallest range of any short range wireless network Ex. wave your cell phone/credit card centimeters away from a scanner to pay
E-government
The use of electronic commerce to deliver information and public services to citizens, business partners, and suppliers of government entities, and those working in the public sector.
Electronic Storefront
The website of a single company, with its own internet address, at which orders can be placed.
Fiber Optic Cable
Thousands of very thing filaments of glass fibers that transmit information via light pulses generated by lasers Ad. Very fast Relatively inexpensive Difficult to tap Dis. Difficult to work with- Hard to splice
Electronic Marketplaces and Exchanges
Transactions are conducted efficiently (more information to buyers and sellers, lower transaction costs) in electronic marketplaces (private or public).
1. An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
True
10) A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.
True
13) Mesh networks are reliable, efficient, and fault tolerant.
True
16) Mobile wallets enable users to make purchases with a single click from a mobile device.
True
17) Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station.
True
19) Two systems being developed to replace bar codes are QR codes and RFID systems.
True
2) Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
True
2. Metasearch engines search several engines at once and integrate the findings of the various search engines.
True
20) Rogue access points can be set up by employees.
True
21) War driving is the act of locating wireless networks while driving around a certain area.
True
4) Short message service allows users to send short text messages on digital cell phones.
True
5) Microwave transmissions are affected by environmental conditions such as storms.
True
5. Going to the Web site of a car manufacturer (e.g., www.gm.com), entering the specifications for the car you want, and then picking up your car at your local dealership is an example of partial electronic commerce.
True
6) The higher the orbit of a satellite, the larger its footprint.
True
9) Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices.
True
Mesh network
Using many Wi-Fi access points to create a wide area network that can be quite large
Data Consistency
Various versions of the data agree
Date inconsistency
Various versions of the data do not agree.
Affiliate marketing
Vendors ask partners to place logos (or banners) on partner's site. If customers click on the logo, go to the vendor's site, and buy, then the vendor pays commissions to partners.
Affiliate marketing
Vendors ask partners to place logos on partners sites. If customers click on the logo go to the vendors sire and buy then vendor pays commissions to partners
Collectively, all of the Web pages of a particular company or individual.
Voice-over Internet Protocol (VOIP; see Internet telephony) Web site
A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte b) Field c) Record d) File e) Database
a) Byte
data mart
a low-cost, scaled-down version of a data warehouse designed for the end-user needs in a small organization, or in a strategic business unit (SBU) or department in a large organization
Wi-Max (speed and range)
Wireless Broadband Range= 31 miles Speed= 75 Mbps
modality
a sense through with the human can receive the output of the computer or a sensor or device through which the computer can receive the input from the human
_____ occurs when applications cannot access data associated with other applications. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
a) Data isolation
micropayment
a financial transaction involving a very small sum of money and usually one that occurs online
mobile portal
a Web site that is accessible from mobile devices
affinity portal
a Web site that offers a single point of entry to an entire community of affiliated interests
corporate portal
a Web site that provides a single point of access to critical business information located inside and outside of an organization
voice portal
a Web site with an audio interface
industrywide portal
a Web-based gateway to information and knowledge for an entire industry
portal
a Web-based personalized gateway to information and knowledge that provides information from disparate information systems and the Internet, using advanced search and indexing techniques
virtual bank
a banking institution dedicated solely to Internet transactions
bit
a binary digit; that is, a 0 or a 1
smart card
a card that contains a microprocessor (chip) that enables the card to store a considerable amount of information (including stored funds) and to conduct processing
electronic mall
a collection of individual shops under one Internet address
ethernet
a common local area network protocol
twisted-pair wire
a communications medium consisting of strands of copper wire twisted together in pairs
fiber-optic cables
a communications medium consisting of thousands of very thin filaments of glass fibers, surrounded by cladding, that transmit information via light pulses generated by lasers
router
a communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a wide area network such as the Internet
pervasive computing
a computer environment where virtually every object has processing power together with wireless or wired connections to a global network
ubiquitous computing
a computer environment where virtually every object has processing power together with wireless or wired connections to a global network
search engines
a computer program that searches for specific information by key words and reports the results
metasearch engine
a computer program that searches several engines at once and integrate the findings of the various search engines to answer queries posted by users
servers
a computer that provides access to various network services, such as printing, data, and communications
T-carrier system
a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call
digital signals
a discrete pulse, either on or off, that conveys information in a binary form
purchasing cards
a form of company charge card that allows goods and services to be procured without using a traditional purchasing power
stored-value money card
a form of electronic cash on which a fixed amount of prepaid money is stored; the amount is reduced each time the card is used
person-to-person payment
a form of electronic cash that enables the transfer of funds between two individuals, or between an individual and a business, without the use of a credit card
byte
a group of eight bits that represents a single character
database
a group of logically related files that stores data and the associations among them
field
a grouping of logically related characters into a word, a small group of words, or a complete number
record
a grouping of logically related fields
file or table
a grouping or logically related records
internet advertising
an attempt to disseminate information to influence a buyer-seller transaction
normalization
a method for analyzing and reducing a relational data base to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance
mesh network
a network composed of motes in the physical environment that "wake up" at intervals to transmit data to their nearest neighbor mate
extranet
a network that connects parts of the intranets of different organizations
enterprise network
a network, encompassing an organizations, composed of interconnected multiple LANs and WANs
internet2
a new, faster telecommunications network that deploys advanced network applications such as remote medical diagnosis, digital libraries, distance education, online simulation, and virtual laboratories
entity
a person, place, thing, or event about which information is maintained in a record
intranet
a private network that uses Internet software and TCP/IP protocols
multichanneling
a process in which a company integrates its online and offline channels
master data management
a process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core master data
mobile computing
a real-time connection between a mobile device and other computing environments, such as the Internet or an intranet
data warehouse
a repository of historical data that are organized by subject to support decision makers in the organization
identifier
an attribute that identifies an entity instance
master data
a set of core data, such as customer, product, employee, vendor, geographic location, and so on that span the enterprise information systems
data
a set of values of qualitative or quantitative variables; restated, individual pieces of information
data shadow
a slang term that refers to the sum of all small traces of information that an individual leaves behind through everyday activities
hotspot
a small geographical perimeter within which a wireless access point provides service to a number of users
ZigBee
a specification for a suite of high level communication protocols used to create personal area networks built from small, low-power digital radios
computer network
a system that connects computes and other devices via communications media so that data and information can be transmitted among them
telecommuting
a work arrangement whereby employees work at home, at the customer's premises, in special workplaces, or while traveling, usually using a computer linked to their place of employment
34) _____ is a wireless standard that enables temporary, short-range connection between mobile devices. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system
a) Bluetooth
evil twin
a term for a rogue Wi-Fi access point that appears to be a a legitimate one offered on the premisses, but actually has been set up to eavesdrop on wireless communications
broadband
a transmission speed ranging from approximately one megabit per second up to several terabits per second
QR codes
a two-dimensional code, readable by dedicated QR readers and camera phones
peer-to-peer processing
a type of client/server distributed processing that allows two or more computers to pool their resources, making each computer both a client and a server
electronic marketplaces and exchanges
a virtual market space on the Web where many buyers and many sellers conduct electronic business activities
videoconference
a virtual meeting in which participants in one location can see and hear participants at other locations and can share data and graphics by electronic means
chat room
a virtual meeting place where groups of regulars come to "gab" electronically
affiliate marketing
a way for a company to sell its products by signing up individuals or companies ("affiliates") who market the company's products for a commission
microbrowser
a web browser designed for use on a mobile device such as a mobile phone or PDA
Wi-Max
a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations
GPS
a wireless system that utilizes satellites to enable users to determine their position anywhere on the earth 24 MEO satellites shared worldwide
In TCP/IP, IP is responsible for: a) Disassembling and reassembling of packets during transmission. b) Establishing the Internet connection between two computers. c) Moving packets over the network. d) Sequencing the transfer of packets across the network. e) Error checking
a) Disassembling and reassembling of packets during transmission.
Portals are an example of which network application? a) Discovery b) Collaboration c) Communications d) Web services e) None of these
a) Discovery
Which network application(s) enable(s) users to access information located in databases all over the world? a) Discovery b) Communications c) Collaboration d) Web services e) None of these
a) Discovery
62) _____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards
a) Electronic checks
58) The major problem with RFID has been _______. a) Expense b) Bandwidth c) Location d) RFID readers e) RFID tags
a) Expense
Which of the following is not a disadvantage of telecommuting for employees? a) Fewer opportunities for housebound people b) Possible loss of fringe benefits c) Lower pay (in some cases) d) No workplace visibility e) Slower promotions
a) Fewer opportunities for housebound people
60) _____ connect buyers and sellers across many industries and are used mainly for indirect materials. a) Horizontal exchanges b) Vertical exchanges c) Buy-side marketplaces d) Functional exchanges e) Sell-side marketplaces
a) Horizontal exchanges
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information b) Data, information c) Information, data d) Information, knowledge e) Data, knowledge
a) Knowledge, information
A(n) _____ connects two or more devices in a limited geographical area. a) Local area network b) Wide-area network c) Personal area network d) Enterprise network e) Value added network
a) Local area network
42) _____ networks use multiple Wi-Fi access points to create a wide area network. a) Mesh b) Pervasive c) Global d) Fixed e) Ubiquitous
a) Mesh
45) The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. a) Mobility, broad reach b) Mobility, lack of expense c) Security, broad reach d) Security, mobility e) Broad reach, localization
a) Mobility, broad reach
The function of _____ is to convert digital signals to analog signals and vice-versa. a) Modems b) Multiplexers c) Front-end processors d) Servers e) Clients
a) Modems
37) _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. a) Near-field communications b) Bluetooth c) Ultra-wideband d) Wi-Fi e) Infrared
a) Near-field communications
25) Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. a) Phones, digital cameras b) Phones, pagers c) Digital cameras, phones d) Digital cameras, pagers e) Cheap, expensive devices
a) Phones, digital cameras
_____ tell the database management system which records are joined with others in related tables. a) Primary keys b) Secondary keys c) Common attributes d) Common files e) Common fields
a) Primary keys
29) The greatest problem with GEO satellites is which of the following? a) Propagation delay b) Expense c) Orbital life d) Size of the footprint e) Relative speed with respect to a point on the earth's surface
a) Propagation delay
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed. a) Protocols b) Client/server architectures c) WANs d) Application software packages e) Developmental architectures
a) Protocols
Data dictionaries perform all of the following functions except: a) Providing information on each record. b) Providing information on why attributes are needed in the database. c) Defining the format necessary to enter data into the database. d) Providing information on the name of each attribute. e) Providing information on how often attributes should be updated.
a) Providing information on each record.
65) In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices
a) RF jamming
A _____ sends messages through several connected LANs or to a wide-area network. a) Router b) Network interface card c) Bridge d) Gateway e) File server
a) Router
55) _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. a) Telemetry b) Wireless access point c) Near-field communications d) Microwave e) Wireless positioning
a) Telemetry
Refer to Opening Case - Big Data. Which of the following is not a problem created by "Big Data"? a) The data is not reliable. b) The amount of data exceeds the available storage. c) The existing networks can't handle the volume. d) It is more difficult to protect the data. e) The vast amounts of data make decision making more complicated.
a) The data is not reliable.
The data in a data warehouse have which of the following characteristics? a) They are organized by subject. b) They are coded in different formats. c) They are updated in real time. d) They are typically retained for a defined, but limited, period of time. e) They are organized in a hierarchical structure.
a) They are organized by subject.
All of the following statements concerning wide-area networks are true except: a) They are provided by individual companies. b) They have large capacity. c) They cover large geographical areas. d) They combine multiple communications channels. e) The Internet is an example of a wide-area network.
a) They are provided by individual companies.
product customization
customers use the Internet to self-configure products or services
Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. b) They have longer lead times for implementation. c) They provide for central rather than local control. d) They contain more information. e) They are more difficult to navigate
a) They cost less
Consider this domain name, www.business.gsu.edu. The "edu" is the _______. a) Top-level domain b) URL c) Web site locator d) Name of the computer e) Address of the Webmaster
a) Top-level domain
_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. a) Transaction data, master data b) Source data, transaction data c) Operational data, master data d) Master data, source data e) Business dimensional data, databases
a) Transaction data, master data
49) Which of the following is not a mobile application in financial services? a) Transaction processing systems b) Mobile banking c) Wireless electronic payment systems d) Micropayments e) Wireless wallets
a) Transaction processing systems
With _____, phone calls are treated as just another kind of data. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat
a) Voice over IP
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): a) attribute. b) entity. c) primary key. d) object. e) file.
a) attribute.
29) In ________ e-commerce, an organization provides information and services to its workers. a) business-to-employee b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) government-to-business
a) business-to-employee
57) In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange
a) buy-side
34) eBay uses a _____ auction. a) forward b) static c) reverse d) physical e) simple
a) forward
30) Direct payment of Social Security benefits is an example of ______ e-commerce. a) government-to-citizen b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) business-to-business
a) government-to-citizen
As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. a) instance b) individual c) representative d) entity e) relationship
a) instance
Explicit knowledge has which of the following characteristics? a) objective b) personal c) slow d) costly to transfer e) ambiguous
a) objective
Refer to IT's About Business 5.3 - Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) to process transactions faster. b) to provide a complete view of the customer. c) to enhance its marketing campaigns d) to provide business users access to business-wide data. e) to determine where to place its slot machines.
a) to process transactions faster.
Kiosks
access to the internet via libraries, airports
pop-under ad
an advertisement that is automatically launched by some trigger and appears in front of the active window
pop-up ad
an advertisement that is automatically launched by some trigger and appears in front of the active window
wireless access point
an antenna connecting a mobile device to a wired local area network
data governance
an approach to managing information across an entire organization
internet protocol address
an assigned address that uniquely identifies a computer on the Internet
propagation delay
any delay in communications due to signal transmission time through a physical medium
A protocol is: a) A device that handles the switching of voice and data in a local area network. b) A standard set of rules and procedures for the control of communications in a network. c) A communications service for the connection of devices in a local area network. d) The main communications channel in a wide-area network. e) Synonymous with network interface card
b) A standard set of rules and procedures for the control of communications in a network
_____ signals convey information in wave form, whereas _____ signals convey information in binary form. a) Analog, packet b) Analog, digital c) Digital, packet d) Digital, analog e) Packet, analog
b) Analog, digital
Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
b) Asynchronous transfer mode
In the data hierarchy, the smallest element is the _____. a) Record. b) Bit. c) Byte. d) Character. e) File.
b) Bit.
43) _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. a) Bluetooth b) Cell phones c) A satellite d) Ultra-wideband e) Near-field communications
b) Cell phones
A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______. a) Open systems b) Client/server c) Peer-to-peer d) Centralized e) Mainframe-centric
b) Client/server
24) Which of the following is not a source for external data? a) Commercial databases b) Corporate databases c) Sensors d) Satellites e) Government reports
b) Corporate databases
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy b) Data inconsistency c) Data isolation d) Data security e) Data dependence
b) Data inconsistency
Not including alphabetic characters in a Social Security Number field is an example of _____ . a) Data isolation. b) Data integrity. c) Data consistency. d) Data redundancy. e) Application/data dependence
b) Data integrity.
68) _____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing. a) Electronic checks b) Digital wallets c) Purchasing cards d) Smart cards e) Person-to-person payments
b) Digital wallets
26) _____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization. a) Business-to-business electronic commerce, business-to-customer electronic commerce b) Electronic commerce, electronic business c) Business-to-customer electronic commerce, business-to-business electronic commerce d) Business-to-business electronic commerce, intrabusiness electronic commerce e) Electronic business, electronic commerce
b) Electronic commerce, electronic business
63) _____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer's and seller's banks. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards
b) Electronic credit cards
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. a) Unencrypted node b) Evil twin c) Open node d) Illegal server e) Unauthorized rogue access point
b) Evil twin
A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web
b) Extranet
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte b) Field c) Record d) File e) Database
b) Field
40) A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. a) Transceiver b) Hotspot c) Local reception node d) Wireless network e) GPS location
b) Hotspot
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. a) Discovery b) Knowledge management c) Decision support d) Online analytical processing e) Data mining
b) Knowledge management
47) Which of the following is a problem that e-commerce can cause for the airline industry? a) Too many fares b) Mistakes in fares c) Too few fares d) No fares offered on certain routes e) Too many fares offered on certain routes
b) Mistakes in fares
Consider this domain name, www.business.gsu.edu. The "gsu" is the __________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster
b) Name of the organization
A _____ allows a device to physically connect to a local area network's communications medium. a) File server b) Network interface card c) Network operating system d) Communications channel e) Gateway
b) Network interface card
_____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query b) Normalization c) Query by example d) Joining e) Relational analysis
b) Normalization
With _____, every call opens up a dedicated circuit for the duration of the call. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat
b) Plain old telephone service
_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. a) Primary keys b) Secondary keys c) Duplicate keys d) Attribute keys e) Record keys
b) Secondary keys
65) ______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
b) Stored-value money cards
59) What would be the best use of RFID in a business? a) Transaction processing b) Supply chain management c) Personnel tracking d) Enabling communications with customers e) Decreasing network costs
b) Supply chain management
Which of the following enables users to send data across sometimes unreliable networks? a) Ethernet b) TCP/IP c) Protocols d) Digital subscriber lines e) Integrated services digital network
b) TCP/IP
53) _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. a) Location-based services b) Telematics c) Pervasive services d) RFID e) Wi-Fi
b) Telematics
The newest type of videoconferencing technology is ________. a) Teleconferencing b) Telepresence c) Work group analysis software d) Workflow software e) Groupware
b) Telepresence
Organizations are turning to data governance for which of the following reasons? a) They have too little data. b) They are responding to federal regulations. c) Their data are typically structured. d) Their data are usually located in the organization's databases. e) Data across their organizations are generally consistent.
b) They are responding to federal regulations
The most important benefit of knowledge management systems is: a) They improve customer service. b) They make best practices available to employees. c) They enable the organization to retain scarce knowledge when employees retire. d) They improve employee morale. e) They make product development more efficient.
b) They make best practices available to employees.
54) Sense networks track users via all of the following technologies except _______. a) GPS b) Traffic cameras c) Cell towers d) Wi-Fi networks e) None of these
b) Traffic cameras
89) You decide to start a landscaping business called Trim Grass. You expect to use the Web to help clients find you and communicate with you. You will mow lands, clean flower beds, and pick up leaves in the fall. You will send your clients monthly bills. Which of the following is true? a) Trim Grass is using an e-commerce model. b) Trim Grass is using an e-business model. c) Trim Grass is using a forward auction. d) Trim Grass is an electronic marketplace. e) Trim Grass needs to worry about channel conflict.
b) Trim Grass is using an e-business model.
62) The act of locating wireless local area networks while moving around a city is called ____. a) Eavesdropping b) War driving c) RF jamming d) Cybersquatting e) Installing rogue access devices
b) War driving
32) The main problem with radio transmission is which of the following? a) Radio waves cannot travel through walls. b) When you travel too far from the source, the signal fades. c) Devices are difficult to install. d) Radio waves are slow. e) Devices are expensive to install.
b) When you travel too far from the source, the signal fades.
50) Parking meters that you can pay via your mobile telephone are an example of _________. a) Mobile banking b) Wireless electronic payment c) Wireless wallets d) Brokerage service e) Money transfer
b) Wireless electronic payment
44) Which of the following is not an advantage of e-tailing? a) You can buy from home, 24 hours per day. b) You have only a few products to choose from. c) You can obtain detailed information on products. d) You can compare competitors' products and prices. e) All of these
b) You have only a few products to choose from.
61) Which of the following can be used for reading utility meters without a person having to get out of a truck? a) RuBee b) ZigBee c) Wi-Fi d) Near-field communications e) RFID
b) ZigBee
50) Difficulties in order fulfillment are most closely associated with which type of electronic commerce? a) business-to-business b) business-to-consumer c) government-to-citizen d) business-to-employee e) mobile commerce
b) business-to-consumer
37) In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? a) find-the-best-price b) electronic tendering system c) name-your-own-price d) online direct marketing e) affiliate marketing
b) electronic tendering system
Bit
binary digit 0 or 1
electronic tendering system
business request quotes form suppliers
electronic tendering system
business request quotes from suppliers
_____ portals support communities such as hobby groups or political parties. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial
c) Affinity
Which of the following is not a component of a local area network? a) File server b) Client computers c) Bridge d) Network interface cards e) All of these
c) Bridge
Workflow, groupware, and telepresence systems are examples of which network application? a) Discovery b) Communications c) Collaboration d) Web services e) None of these
c) Collaboration
_____ are hardware devices that support data transmission and reception across a telecommunications system. a) Integrated services digital networks b) Digital subscriber lines c) Communications channels d) Integrated circuits e) Communications processors
c) Communications channels
_____ occurs when various copies of the data agree. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
c) Data consistency
Which of the following has (have) the broadest impact on an organization? a) Decisions about hardware. b) Decisions about software. c) Decisions about data. d) Both "decisions about hardware" and "decisions about software." e) All of these have an equal impact.
c) Decisions about data.
25) Which of the following is not an effect that E-commerce has had on organizations? a) E-commerce enables smaller businesses to operate in areas dominated by larger companies. b) E-commerce increases the number of potential customers to whom the company can market its products. c) E-commerce is a costly medium for increasing market share. d) E-commerce removes many barriers for start-up businesses. e) E-commerce makes it easy to reach customers around the world.
c) E-commerce is a costly medium for increasing market share.
64) _____ refers to efforts by unauthorized users to access data traveling over wireless networks. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices
c) Eavesdropping
The cable medium with the highest bandwidth is: a) Twisted-pair wire b) Coaxial cable c) Fiber-optic cable d) Cellular radio e) Copper cable
c) Fiber-optic cable
28) The area of the earth reached by a satellite's transmission is referred to as its _____. a) Hotspot b) Coverage c) Footprint d) Zone e) Wireless area
c) Footprint
27) Which type of satellite has the largest footprint? a) Low-earth-orbit b) Medium-earth-orbit c) Geostationary d) Polar orbit e) Equatorial orbit
c) Geostationary
48) The development of mobile commerce is driven by all of the following factors except: a) The widespread availability of mobile devices. b) The cell phone culture. c) Increasing prices. d) Bandwidth improvement. e) It eliminates the need for a PC.
c) Increasing prices.
The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. a) Ethernet b) Extranet c) Internet d) Intranet e) World Wide Web
c) Internet
51) Internet advertising improves on traditional advertising in all of the following ways except: a) Internet ads can be updated at any time at minimal cost. b) Internet ads can reach large numbers of potential buyers all over the world. c) Internet ads are always more effective than other types of advertising. d) Internet ads can make effective use of multimedia. e) Internet ads are current.
c) Internet ads are always more effective than other types of advertising.
Data are sent through a fiber-optic cable by a(n) _______. a) Optical switch b) Electromagnetic switch c) Laser d) Multiplexer e) Optical modem
c) Laser
Internet service providers connect to one another through _____. a) Internet connection points b) Common carrier connection points c) Network access points d) Network connection points e) An extranet
c) Network access points
Which of the following statements concerning packet switching is not true? a) Packets contain a sequence number. b) Packets are routed through different paths. c) Packets require dedicated circuits. d) Packets use TCP/IP to carry their data. e) Packets contain destination addressing. Answer: c
c) Packets require dedicated circuits
32) Which of the following statements regarding the relationship between electronic commerce and search is not correct? a) Purchases often follow successful online searches. b) Shopping carts are often abandoned after unsuccessful online searches. c) Retailers will provide fewer product details to avoid information overload for customers. d) Customers will be able to find the closest store offering the product that they want. e) Customers will have more relevant product information in the near future.
c) Retailers will provide fewer product details to avoid information overload for customers.
35) _____ auctions employ a request for quotation. a) Forward b) Static c) Reverse d) Physical e) Simple
c) Reverse
36) _____ auctions are the most common auction model for large purchases. a) Forward b) Static c) Reverse d) Physical e) Simple
c) Reverse
87) You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn't seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial? a) Banner ads b) Pop-up or pop-under ads c) Spamming d) Permission marketing e) Viral marketing
c) Spamming
Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
c) Synchronous optical network
In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. a) Teleconference b) Group decision support c) Telepresence d) Telephone conference call e) Crowdsourcing
c) Telepresence
39) Which of the following is not inhibiting faster Wi-Fi expansion? a) Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b) A lack of security. c) The growth of WiMAX d) Unless the service is free, users have to log on to separate accounts for each hotspot. e) Wi-Fi services may not survive in the face of free hotspot access.
c) The growth of WiMAX
23) Of the following, which is the major problem with smart phones? a) They are too slow. b) They are too expensive. c) They can be used to compromise security. d) Their screens are too small. e) Their browsers are not fully functional.
c) They can be used to compromise security.
57) Which of the following is not a limitation of barcodes? a) They require line-of-sight to the scanning device. b) They are printed on paper. c) They identify the manufacturer, product, and item. d) They are difficult to use in a manufacturing plant. e) They are useless in determining expiration date.
c) They identify the manufacturer, product, and item.
90) You have been running a landscaping business called Trim Grass for about two years. You have developed a special blend of grass seed for your area that you use when you reseed your clients' lawns. You are receiving e-mails via your Web site from people who would like to purchase some. You decide to start selling seed online, and you hire someone to rebuild your Web site. Which of the following statements is not true? a) Trim Grass is now multichanneling. b) Trim Grass needs to think about how to ship the seed. c) Trim Grass will have to collect sales tax from all sales. d) Trim Grass will have more expenses. e) Trim Grass will need to consider different advertising methods.
c) Trim Grass will have to collect sales tax from all sales.
Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address b) IP address c) URL address d) ISO/OSI identifier e) World Wide Web address
c) URL address
36) Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a) Wi-Fi b) Microwave c) Ultra-wideband d) Infrared e) Bluetooth
c) Ultra-wideband
60) _____ networks collect data from many points over an extended space. a) Bluetooth b) Ultra-wideband c) Wireless sensor d) WiMAX e) Wi-Fi
c) Wireless sensor
42) The advantages of electronic commerce for consumers include all of the following except: a) You can buy from home 24 hours per day, 7 days per week. b) You have a wider variety of products to choose from. c) You typically cannot access additional information, so you do not have information overload. d) You can easily compare prices and features. e) You can find unique items.
c) You typically cannot access additional information, so you do not have information overload.
The data in a data warehouse: a) are updated constantly in real time. b) are updated in batch mode, approximately once per day. c) are not updated. d) are purged constantly as new data enter. e) are available for MIS analysts, but not users
c) are not updated.
28) In _______ e-commerce, the sellers and buyers are organizations. a) government-to-citizen b) consumer-to-consumer c) business-to-business d) business-to-consumer e) consumer-to-business
c) business-to-business
39) Which type of electronic commerce is the largest by volume? a) business-to-employee b) consumer-to-consumer c) business-to-business d) business-to-consumer e) none of these
c) business-to-business
69) The practice of using similar but not identical domain names is called _____. a) domain spoofing b) domain masquerading c) domain tasting d) cybersquatting e) domain fraud
c) domain tasting
43) Which of the following is not an electronic commerce application? a) home banking b) buying stocks c) evaluating an employee d) conducting an auction e) buying real estate
c) evaluating an employee
A database management system is primarily a(n) _____. a) file-handling program b) data-modeling program c) interface between applications and a database d) interface between data and a database e) interface between queries and a database
c) interface between applications and a database
When data are normalized, attributes in the table depend only on the _____. a) secondary key b) common attribute c) primary key d) common row e) common record
c) primary key
simple
carried out interactively in real time, with bidders present either physically or electronically
bluetooth
chip technology that enables short-range connection (data and voice) between wireless devices
data dictionary
collection of definitions of data elements, data characteristics that use the data elements, and the individuals, business functions, applications, and reports that use the data elements
web site
collectively, all of the Web pages of a particular company or individual
company name
company
deep discounters
company offers deep price discounts
specific computer
computer
clients
computers, such as users' personal computers, that use any of the services provided by servers
horizontal exchange
connect buyers and sellers across many industries (usually for maintenance, operation, and repair equipment or supplies)- findMRO.com
vertical exchange
connect buyers and sellers in a given industry- paper site
analog signals
continuous waves that transmit information by altering the amplitude and frequency of the waves
name-your-own-price
customer decides how much they want to pay. Intermediary tries to match with a provider
Place the following members of the data hierarchy in their correct order: a) Bit - byte - field - record - database - file b) Bit - field - byte - record - file - database c) Byte - bit - record - field - database d) Bit - byte - field - record - file - database e) Bit - record - field - byte - file -- database
d) Bit - byte - field - record - file - database
35) Which of the following is the most appropriate wireless networking standard for creating personal area networks? a) Wi-Fi b) Cellular radio c) Microwave d) Bluetooth e) WiMAX
d) Bluetooth
41) _______ e-commerce is also known as e-tailing. a) Business-to-business b) Collaborative commerce c) Intrabusiness d) Business-to-consumer e) Consumer-to-business
d) Business-to-consumer
_____ portals coordinate content within relatively narrow organizational and partners' communities. a) Publishing b) Personal c) Affinity d) Corporate e) Commercial
d) Corporate
24) The capabilities of smart phones include all of the following except _________. a) A calculator b) E-mail c) A global positioning system d) Corporate transaction processing e) A full-function Internet browser
d) Corporate transaction processing
70) _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. a) Domain spoofing b) Domain masquerading c) Domain tasting d) Cybersquatting e) Domain fraud
d) Cybersquatting
_____ is a formal approach to managing data consistently across an entire organization. a) Database management b) Enterprise information management c) Data warehousing d) Data governance e) Data mart
d) Data governance
_____ occurs when the same data are stored in many places. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
d) Data redundancy
45) ________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen. a) Disintegration b) Supply chain integration c) Direct sales d) Disintermediation e) Value-added services
d) Disintermediation
A(n) _____ is a logical grouping of related records. a) Byte b) Field c) Record d) File e) Database
d) File
A _____ connects dissimilar networks. a) Router b) Network interface card c) Bridge d) Gateway e) File server
d) Gateway
Which of the following is not a communications channel? a) Fiber-optic cable b) Satellite transmission c) Twisted-pair wire d) Integrated circuits e) Cellular radio
d) Integrated circuits
) A(n) _____ is a network designed to serve the internal informational needs of a single organization. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web
d) Intranet
61) All of the following are limitations of traditional payment methods in electronic commerce except: a) Cash cannot be used because there is no face-to-face contact. b) Paying for goods and services via the mail takes more time. c) Not all organizations accept credit cards. d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer. e) None of these
d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer.
52) Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. a) Viral marketing b) Permission advertising c) Geographical advertising d) Location-based advertising e) Direct marketing
d) Location-based advertising
_____ provide(s) companies with a single version of the truth for their data. a) Data warehouses b) Data marts c) Databases d) Master data management e) Enterprise information management
d) Master data management
Consider this domain name, www.business.gsu.edu. The "business" is the ________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster
d) Name of the specific computer
31) Which of the following is not an advantage of radio? a) No metallic wires are needed. b) Radio waves propagate easily through office walls. c) Radio devices are inexpensive. d) Radio waves do not create electrical interference problems. e) Radio devices are easy to install.
d) Radio waves do not create electrical interference problems.
56) The generic term for technologies that use radio waves to automatically identify individual items is __________. a) Telemetry b) Bar codes c) Shipping labels d) Radio-frequency identification e) Wireless access points
d) Radio-frequency identification
Which of the following is not a characteristic of twisted-pair wire? a) Inexpensive b) Easy to work with c) Subject to interference from other electrical sources d) Secure transmissions e) None of these
d) Secure transmissions
66) _____ contain a chip that can store information and be used for several purposes. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
d) Smart cards
Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
d) T-carrier system
72) Companies use Web sites for all of the following reasons except: a) To reduce operational and transaction costs. b) To enhance their reputation. c) To sell goods and services. d) To reduce the amount of actual cash they need to deal with. e) To induce people to visit a physical location.
d) To reduce the amount of actual cash they need to deal with.
54) _____ refers to online word-of-mouth marketing. a) Permission marketing b) One-to-one marketing c) Personalized marketing d) Viral marketing e) Direct mail
d) Viral marketing
Skype is an example of _______. a) Teleconference b) Telepresence c) Plain old telephone service d) Voice over IP e) Videoconference
d) Voice over IP
31) If you are an worker managing your fringe benefits over your company's intranet, you are engaging in _________ e-commerce. a) business-to-business b) business-to-consumer c) consumer-to-consumer d) business-to-employee e) government-to-citizen
d) business-to-employee
In the relational database model, related tables can be joined when they contain common _____. a) primary keys b) rows c) records d) columns e) files
d) columns
58) In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange
d) group purchasing
At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) one-to-one b) one-to-many c) many-to-one d) many-to-many e) some-to-many
d) many-to-many
52) A _____ is automatically launched by some trigger and appears behind the active window. a) keyword banner b) random banner c) pop-up ad d) pop-under ad e) text box
d) pop-under ad
A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) query-by-example language d) structured query language e) data-manipulation language
d) structured query language
71) The device that Treat America installed on top of each of their machines communicates the following pieces of data except: a) the amount of money in the machine at any given minute. b) the amount of product inventory remaining. c) whether the machine had been moved. d) the number of customers. e) whether the door had been opened after business hours.
d) the number of customers.
27) The degree of digitization relates to all of the following except: a) the product or service sold b) the process by which the product is produced c) the delivery agent or intermediary d) the size of e-commerce transactions e) none of these
d) the size of e-commerce transactions
In a database, the primary key field is used to _____. a) specify an entity b) create linked lists c) identify duplicated data d) uniquely identify a record e) uniquely identify an attribute
d) uniquely identify a record
clickstream data
data collected about user behavior and browsing patterns by monitoring users' activities when they visit a Web site
relational data model
data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data
Many organizations have implemented corporate portals for which of the following reasons? a) To cut costs b) To free up time for busy managers c) To improve profitability d) To offer customers self-service opportunities e) All of these
e) All of these
Networks enable which of the following applications? a) Discovery b) Communications c) Collaboration d) Web services e) All of these
e) All of these
The benefits of e-learning include which of the following? a) Increased content retention b) Current, high-quality content c) Consistency d) Flexibility e) All of these
e) All of these
The components of a local area network include which of the following? a) File server b) Client computers c) Wireline or wireless communications media d) Network interface cards e) All of these
e) All of these
modem
device that converts signals from analog to digital and vice versa
entity-relationshiop diagram
document that shows data entities and attributes and relationships among them
22) Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? a) To make use of time that was formerly wasted b) To become more efficient c) Work locations are more flexible d) To be able to allocate working time around personal and professional obligations e) All of these
e) All of these
Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. b) They enable faster program development. c) They make it easier to modify data and information. d) Both "They enable faster program development." and "They make it easier to modify data and information." e) All of these
e) All of these
Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these
e) All of these
Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time.
e) All of these are reasons why managing data is difficult over time.
Refer to Closing Case - CoStar Group. The target audience for CoStar's aggregated commercial real estate data was a) banks. b) building owners. c) real estate agents. d) builders. e) All these
e) All these
_____ refers to the range of frequencies available in any communications channel. a) Protocol b) Broadband c) Capacity d) Narrowband e) Bandwidth
e) Bandwidth
Refer to IT's About Business 5.2 - Cell phone owners in Mexico: The cell phone registry is useless because: a) data for some cell phones are missing. b) data for some cell phones are inaccurate. c) very few Mexicans can afford cell phones. d) All of these e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."
e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."
_____ portals offer content for diverse communities and are intended for broad audiences. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial
e) Commercial
30) _____ is a satellite-based tracking system that enables users to determine a person's position. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system
e) Global positioning system
26) Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a) Low, long, broadcast b) Low, short, line-of-sight c) High, long, broadcast d) High, short, broadcast e) High, long, line-of-sight
e) High, long, line-of-sight
33) The most common wireless technology for TV and DVD remote control devices is _______. a) Bluetooth b) Ultra-wideband c) Near-field communications d) WiMAX e) Infrared
e) Infrared
_____ are Internet access points that are located in public places, such as libraries and airports. a) Clients b) Servers c) Internet access computers d) Network computer e) Internet kiosks
e) Internet kiosks
46) Cyberbanking offers all of the following advantages except: a) It is convenient for customers. b) It saves time for customers. c) It includes inexpensive transactions for the bank. d) It can help recruit remote customers. e) It is more expensive for the customer.
e) It is more expensive for the customer.
Which of the following statements about publication of material in foreign languages is not correct? a) It is a competitive necessity. b) It must be accurate. c) It is expensive. d) Content must be localized to the needs of people in local markets. e) It is not yet a major consideration for most companies.
e) It is not yet a major consideration for most companies
47) With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a) Ubiquity b) Convenience c) Instant connectivity d) Personalization e) Localization of products and services
e) Localization of products and services
86) You decide to start a landscaping business called Trim Grass. One of your services will be to perform fertilizer treatments. You will need to buy a great deal of fertilizer for your many clients. You can use all of the following methods to purchase the fertilizer except: a) Forward auction b) Reverse auction c) Name your Own Price d) Electronic Marketplace e) Multichanneling
e) Multichanneling
67) _____ enable two individuals to transfer funds without using a credit card. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
e) Person-to-person payments
In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart's sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month b) Customer, product, store c) Customer, product, store, and month d) Customer, product, store, and week e) Product, store, and week
e) Product, store, and week
63) A(n) _____ allows unauthorized entry into a wireless network. a) Lack of encryption b) Disgruntled employee c) Open node d) Illegal server e) Rogue access point
e) Rogue access point
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. a) Leeching b) Collaboration c) Packet switching d) Torrents e) Swarming
e) Swarming
Refer to Opening Case - The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? a) The amount of video traffic on the Internet is increasing. b) Under current models, the investment required to meet future demand exceeds projected revenue growth. c) Net neutrality might hinder U.S. competitiveness. d) Network providers could censor certain content by slowing down or blocking access. e) Telecommunications and cable companies are in favor of net neutrality.
e) Telecommunications and cable companies are in favor of net neutrality.
38) Which of the following statements about Wi-Fi is not correct? a) Wi-Fi provides simple Internet access. b) Laptop PC scans contain chips that can send and receive Wi-Fi signals. c) Many companies offer free Wi-Fi access in their stores. d) Wi-Fi requires encryption for secure transmissions. e) Wi-Fi is expensive to set up.
e) Wi-Fi is expensive to set up.
44) The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. a) Wi-Fi b) 802.11b c) 802.11c d) 802.11g e) WiMAX
e) WiMAX
51) If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a) Wireless money transfer b) Wireless wallet c) Wireless bill payment d) Micropayment e) Wireless electronic payment system
e) Wireless electronic payment system
38) A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model? a) find-the-best-price b) electronic tendering system c) name-your-own-price d) online direct marketing e) affiliate marketing
e) affiliate marketing
Applications offered by the Internet2 include which of the following? a) remote diagnosis b) digital libraries c) distance education d) virtual laboratories e) all of these
e) all of these
Mobile Commerce
eCommerce that is conducted entirely in a wireless environment. Ex. shopping on your phone
attribute
each characteristic or quality describing a particular entity
eavesdropping
efforts by unauthorized users to try to access data traveling over wireless networks
baner ad
electronic billboards, which typically contain a short text or graphical message to promote a product or a vendor
Disadvantages of the radio
electronic interference problems susceptible to snooping geographical constraints
public exchange
electronic marketplace in which there are many sellers and many buyers, and entry is open to all; it is frequently owned and operated by a third party
disintermediation
elimination of intermediaries in electronic commerce
Modem
encodes and decodes data so that it can pass between your home network and your Internet Service Provider (ISP) Brings the information in ROUTER distributes it
entity classes
groups of entities of a certain type
E-learning
learning supported by the Web; can be done inside traditional classrooms or in virtual classrooms
radio
high bandwidth; inexpensive; short range that needs encryption for security
satellite
high bandwidth; large coverage area; expensive; sign and delay; needs encryption for security
microwave
high bandwidth; somewhat inexpensive; line of sight transmission
backbone networks
high-speed central networks to which multiple smaller networks (such as LANs and smaller WANs) connect
data problems
inconsistency/consistency, integrity, independence, isolation, redundancy, security
spamming
indiscriminate distribution of e-mail without the receiver's permission
digital nomad
individuals that leverage wireless digital technologies to perform their work duties, and more generally conduct their lifestyle in a nomadic manner
knowledge
information that is contextual, relevant, and actionable
coaxial cable
insulated copper wire; used to carry high-speed data traffic and television signals
RF jamming
intentionally or unintentionally interferes with your wireless network transmissions
find-the-best-price
intermediary compares providers and shows comparative prices
infrared
low bandwidth; short distances; line of sight transmission
external data
made up of the electronic pathways that connect the different external devices, such as a printer, etc. to the computer
permission marketing
method of marketing that asks consumers to give their permission to voluntarily accept online advertising and e-mail
wireless electronic payments
mobile phones into secure, self-contained purchasing tools capable of instantly authorizing payments over the cellular network
collaboration
mutual efforts by two or more individuals who perform activities in order to accomplish certain tasks
virtual organization
organizations in which the product, the process, and the delivery agent are all digital; also called pure-play organizations
brick-and-mortar organizations
organizations in which the product, the process, and the delivery agent are all physical
clicks-and-mortar organization
organizations that do business in both the physical and digital dimensions
intellectual capital
other terms for knowledge
Computers that act as exchange points for Internet traffic and determine how traffic is routed.
network access points (NAPs)
distributed processing
network architecture that divides processing work between two or more computers, linked together in a network
Reasons for Difficulty in Managing Data
o Amount of data increasing exponentially over time; o Data are scattered throughout organizations; o Data obtained from multiple internal and external sources; o Data degrade over time; (move to new addresses, change names, new products are developed) o Data subject to data rot; (HDD's don't last forever, tech changes so it is hard to get information to pull from (FDD's aren't really around anymore so if you one with information on it you can't access it) o Data security, quality, and integrity are critical, yet easily jeopardized; o Information systems that do not communicate with each other can result in inconsistent data; o Federal regulations.
E- Commerce Business Models
o Online direct marketing o Electronic tendering system o Name your own price o Find the best price o Affiliate marketing o Viral marketing o Group Purchasing
footprint
of a communications satellite is the ground area that its transponders offer coverage, and determines the satellite dish diameter required to receive each transponder's signal
Affinity Portals
offer a single point of entry to an entire community of affiliated interests. Ex. appalnet.appstate.edu
data relationships
one to one (1:1), one to many (1:M), and many to many (M:M)
virtual universities
online universities from which students take classes from home or an off-site location, via the Internet
Fiber to home (GOOGLE Fiber)
only placed in new housing developments
communications channels
pathway for communicating data from one location to another
cellular telephone
phones that provide two-way radio communications over a cellular network or base stations with seamless handoffs
Electronic marketplaces in which there are many sellers and many buyers, and entry is open to all; frequently owned and operated by a third party.
public exchanges
Cyber-squatting
purchasing a domain name for the purpose of profiting from the goodwill or the trademark that belongs to someone else
cardinality
refers to the maximum number of times an instance of one entity can be associated with an instance of the related entity
data hierarchy
refers to the systematic organization of data
Domain Tasting
register a domain name for a short amount of time for free and fill it with ads which you profit off
cybersquatting
registering domain names in the hope of selling them later at a higher price
online direct marketing
sell directly to the customers
functional exchange
services are traded on an "as needed" basis (temporary help, office space, etc.)- ADP
browsers
software applications through which users primarily access the web
The wireless transmission and receipt of data gathered from remote sensors.
telemetry
electronic storefront
the Web site of a single company, with its own Internet address, at which orders can be placed
war driving
the act of locating WLANs while driving around a city or elsewhere
channel conflict
the alienation of existing distributors when a company decides to sell to customers directly online
tacit knowledge
the cumulative store of subjective or experiential learning; it is highly personal and hard to formalize
primary key
the identifier field or attribute that uniquely identifies a record
multidimensional structure
the manner in which data are structured in a data warehouse so that they can be analyzed by different views or perspectives, which are called dimensions
bandwidth
the measurement of bit-rate of available or consumed data communication resources expressed in bits per second or multiples of it
business model
the method by which a company generates revenue to sustain itself
explicit knowledge
the more objective, rational, and technical types of knowledge
best practices
the most effective and efficient way to do things
workflow
the movement of information as it flows through the sequence of steps that make up an organization's work procedures
domain names
the name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left
e-commerce business models
the organization of product, service, and information flows, and the sources of revenues and benefits for suppliers and customers in an online setting
crowdsourcing
the practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers
entity-relationship modeling
the process of designing a database by organizing data entities to be used and identifying the relationships among them
protocol
the set of rules and procedures governing transmissions across a network
packet switching
the transmission technology that breaks up blocks of texts into packets
virtual collaboration
the use of digital technologies that enable organizations or individuals to collaboratively plan, design, develop, manage, and research products, services, and innovative information systems and electronic commerce applications
teleconferencing
the use of electronic communications that allows two or more people at different locations to have a simultaneous conference
E- Government
the use of internet technology in general and eCommerce in particular to deliver information and public services to citizens
telemetry
the wireless transmission and receipt of data gathered from remote sensors
work group
two or more individuals who act together to perform some task, on either a permanent or temporary basis
top-level domain
type of site
rogue access point
unauthorized access point to a wireless network
digital radio
uninterrupted, near CD-quality music that is beamed to your radio from space
telepresence system
used to describe a set of technologies, such as high definition audio, video, and other interactive elements that enable people to feel or appear as if they were present in a location which they are not physically in
RuBee
uses magnetic photons, so signals will go through metal and liquids, where RFID sigmas will not
cyberbanking
various banking activities conducted electronically from home, a business, or on the road instead of at a physical bank location
location-based advertising
when companies use the location of their customers to see where they need to advertise more
Convenience and Instant Connectivity
you can access the web quickly and easily without even turning on a PC