Exam Prep
The key developments of Web ________ were the creation of websites and the commercialization of the web. · 4.0 · 1.0 · 3.0 · 2.0
1.0
________ attempt to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain. · BI · Dashboards · Supply chain systems · ES
ES
Data and information are synonyms. · True · False
False
The IT infrastructure and IT platform are synonyms. · True · False
False
________ use the hardware and software, interface with it, or use its output. · People · Databases · Networks · Procedures
People
________ analytics drives the coupons you get at the grocery store when you use your loyalty card. · Descriptive · Predictive · Prescriptive · Useful
Predictive
_________ is the first step in the general framework for ethics. · Make a decision and test it · Get the facts · Act and reflect on the outcome of your decision · Recognize an ethical issue · Evaluate alternative actions
Recognize an ethical issue
______ analysis examines the change in an output given the change in a particular input while keeping all other inputs constant. · Affinity · Goal-seeking · Sensitivity · What-if
Sensitivity
________ is a program or collection of programs that enable the hardware to process data. · A network · Hardware · A database · Software
Software
________ is a traditional function of the MIS department. · Staffing, training, and developing IS skills · Initiating and designing specific strategic IS · Partnering with business-unit executives · Managing system integration including the internet, intranets, and extranets
Staffing, training, and developing IS skills
_______ is a capability of dashboards that reflect the latest data available on KPIs or some other metric often in real time. · Drill down · Exception reporting · Status access · Trend analysis
Status access
___________ decisions deal with routine and repetitive problems. · Midstructured · Semistructured · Structured · Unstructured
Structured
Career opportunities in IS are strong and are projected to remain strong over the next 10 years. · True · False
True
No single functional area is responsible for cross-functional business processes. · True · False
True
The major objectives of ERP systems are to tightly integrate the functional areas of the organization and to enable information to flow seamlessly across them. · True · False
True
You are an executive working for a Fortune 500 company. You want to see CSFs, ROI, NPV, and other financial information. You would look at the ________ wall in the Management Cockpit. · black · blue · red · white
black
You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. · black · blue · red · white
blue
Verification/testing of the proposed solution and picking an option occur in the _____ phase of the IDC. · choice · design · intelligence · implementation
choice
Affinity analysis is a(n) _________ application. · data mining · DSS · OLAP · OLTP
data mining
Simpa Networks turned to DataKind to · develop a credit-scoring model for potential customers. · figure out a way to supply solar power inexpensively. · identify water leaks in pipes and prevent fraud. · predict how likely customers will defect to a competitor.
develop a credit-scoring model for potential customers.
Suppose you are failing one of your classes. If you don't know what the problem is, you need to enter the _______ phase of the IDC. · choice · design · intelligence · implementation
intelligence
The optimal result of the organization's CRM efforts is to ________ the number of high-value repeat customers while ________ customer churn. · maximize; maximizing · minimize; minimizing · minimize; maximizing · maximize; minimizing
maximize; minimizing
Data marts can be implemented ________ quickly than data warehouses and support ________ control. · more; local · less; local · less; central · more; central
more; local
Productivity is a · function of the number of inputs and outputs for which a manager is responsible. · measure of how useful a manager is. · ratio between the inputs and outputs for which a manager is responsible. · useful way of seeing how important a product is.
ratio between the inputs and outputs for which a manager is responsible.
________ is the largest book publisher and bookseller in the US today. · Wiley · Google · Amazon · McGraw-Hill
· Amazon
Electronic checks are primarily used in ________. · C2C · G2C · B2B · B2C
· B2B
_________ is a disadvantage of the buy option. · Hiring · Availability · Control · Time
· Control
_________ is the result of optimizing operations and supplier processes. · Productivity · Quality · Differentiation · Cost reduction
· Cost reduction
________ is the loss of a certain percentage of customers over time. · Customer life cycle · Lifetime value · Market capitalization · Customer churn
· Customer churn
________ is an example of a metasearch engine. · Bing · Dogpile · Google · Ask
· Dogpile
________ is a common LAN protocol. · Internet · Twisted-pair · Fiber · Ethernet
· Ethernet
________ are/is a customer-touching CRM application. · FAQs · SFA · CIC · CMAs
· FAQs
All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews. · True · False
· False
Deciding what is right or wrong is always easy and clear-cut. · True · False
· False
Efficiency focuses on high quality products. · True · False
· False
It is easy to assess the benefits of IT because they are so tangible. · True · False
· False
Only one person can update a TPS at a time. · True · False
· False
Organizations can adopt BPR to sustain BPI efforts over time. · True · False
· False
Purchasing a prewritten application is always the most cost-effective and time-saving solution. · True · False
· False
RAD produces prototypes rather than functional components. · True · False
· False
Shellcatch is only useful for large fisheries. · True · False
· False
Users can always roam from hotspot to hotspot seamlessly. · True · False
· False
You can't return to previous stages of the IDC, so it is really important to do a good job the first time. · True · False
· False
You check your credit report annually to ensure your identity hasn't been stolen. This is an example of a property issue. · True · False
· False
You need to be particularly careful of tailgating at airport terminals. · True · False
· False
You have satellite TV. Providers use ________ satellites to get this service to you. · MEO · LEO · GEO · VEO
· GEO
________ satellites are the most expensive to build and launch. · VEO · MEO · GEO · LEO
· GEO
________ satellites have the longest orbital life. · LEO · VEO · GEO MEO
· GEO
Google Fiber was first deployed in ________. · Atlanta · San Diego · Charlotte · Kansas City
· Kansas City
________ satellites are used to run the GPS system. · MEO · GEO · LEO · VEO
· MEO
________ satellites have an orbital life of 6-12 years. · LEO · GEO · MEO · VEO
· MEO
________ are/is a tool for democratizing higher education. · DSLs · E-learning · MOOCs · Distance learning
· MOOCs
________ is a medium-range wireless network. · UWB · WiMAX · MiFi · LTE
· MiFi
________ are exchange points for Internet traffic. · ISPs · IAPs · NSPs · NAPs
· NAPs
________ technology enables the use of mobile wallets. · Wi-Fi · NFC · WiMAX · UWB
· NFC
The _________ identifies the firm's overall mission, the goals that follow from that mission, and the broad steps required to reach these goals. · IS strategic plan · IT architecture · Organization strategic plan · IS operational plan
· Organization strategic plan
Which of the following is not a criterion for data quality? · Completeness · Accuracy · Originality · Accuracy
· Originality
_____ data are amassed with the goal of maintaining a running repository of all recordable details. · Structured · Passively collected · A priori · First-party
· Passively collected
________ is an example of a sponsored reviews website. · ThisNext · Metacritic · PayPerPost · Epinions
· PayPerPost
Which of the following techniques enables extrapolation of new information based on previous information? · Descriptive · Predictive · Analytic · Derivative
· Predictive
Microsoft Access uses ________ to conduct queries. · TPS · QBE · RFID · ETL
· QBE
________ is an advantage of telecommuting. · Stress-level · Socialization · Visibility · Promotion time
· Stress-level
________ is an extended ERP module. · HR management · Operations management · Supply chain management · Financial management
· Supply chain management
_________ is an advantage of the buy option. · Integration · Control · Time · Modification
· Time
_________ is NOT a major task of the IT steering committee. · Approving the allocation of resources for the MIS function · Linking corporate strategy with IT strategy · Establishing performance measures for the MIS function and ensuring they are met · Training the top managers from each functional area
· Training the top managers from each functional area
A "chicken leg" for cardinality represents a many relationship. · True · False
· True
A secondary key can be a foreign key. · True · False
· True
In ________, businesses request quotes from suppliers. · online direct marketing · viral marketing · electronic tendering · affiliate marketing
· electronic tendering
Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM. · return · plan · make · source deliver
· plan
Database systems minimize ________. · redundancy · independence · security · integrity
· redundancy
SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet. · an architecture · hardware · a platform · software
· software
The production process originates in the ________ department and ends in the ________ department. · warehouse; warehouse · warehouse; accounting · accounting; sales · sales; accounting
· warehouse; warehouse
Amazon Business is the biggest threat to ________. · distributors · retailers · wholesalers · manufacturers
· wholesalers
Suppose you use your university's computer lab to print your research papers. If this computer lab contains desktop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab. · mobile · wireless · mobile and wireless · a waste of resources
· wireless
GPS uses the known speed of the signals and distance from ________ satellite(s) to find the location of a receiving station or user. · 3 · 5 · 1 · 7
3
________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning. · Data · Information · Knowledge · Wisdom
Data
Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). · the input; inputs · the input; outputs · the output; inputs · the output; outputs
the output; inputs
Organizations are using social computing in which of the following functions? · Marketing · Customer relationship management · Human resource management · All of these
· All of these
________ is a disadvantage of cloud-based ERP systems. · Scalability · Access · Cost · Control
· Control
Intellectual capital is another term for ________. · wisdom · data · information · knowledge
· knowledge
Completion rates in any one MOOC tend to be less than ________ of initial registrations. · 50 · 75 · 90 · 10
10
________ is expected to be deployed by 2020. · 2G · 3G · 5G 4G
5G
_________ is a decisional role. · Disseminator · Disturbance handler · Figurehead · Monitor
Disturbance handler
NICs allow devices to physically connect to the _______'s communications medium. · LAN · MAN · PAN · WAN
LAN
_________ is an interpersonal role. · Entrepreneur · Leader · Negotiator · Spokesperson
Leader
Which of the following techniques could be used to help accountants look at line items in fraudulent financial statements and predict future, or expected values? · Market Basket Analysis · Linear Regression · Association Analysis · All of the Above
Linear Regression
________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control. · Lower-level managers · Middle managers · Knowledge workers · Clerical workers
Middle managers
If you analyze a data cube, this is an example of using · data mining. · DSS. · OLAP. · OLTP.
OLAP
The traditional function of the MIS department centers on the idea that end users do not have the required technical expertise to address IT issues. · True · False
True
Suppose you use your university's computer lab to print your research papers. If this computer lab contains laptop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab. · mobile · a waste of resources · wireless · mobile and wireless
mobile and wireless
Negative consequences of big data are most often seen when _____. · predicting people's behavior, goals, and opinions · predicting tangible outputs · creating a model that learns · the model uses only publicly available data
predicting people's behavior, goals, and opinions
Simpa Networks provides · data analytics software to create a credit score. · insurance for impoverished people. · solar power to people and small businesses. · tracking for water leaks.
solar power to people and small businesses.
You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of · the development of infrastructure to support enterprise-wide analytics. · the development of one or a few related analytics applications. · support for maintaining organizational strategy. · support for organizational transformation.
the development of infrastructure to support enterprise-wide analytics.
Less than ________ percent of all web content is composed in Hindi, the first language of approximately 260 million people. · 1.0 · 0.01 · 0.1 · 10.0
· 0.1
The ________ rule of thumb is that ________ percent of individuals contribute ________ percent of the content. · 40-60; 40; 60 · 20-80; 20; 80 · 80-20; 80; 20 · 60-40; 60; 40
· 20-80; 20; 80
Current US laws award patents for _________ years and copyright protection for _________ years. · 20; life+70 · life+70; life+70 · life+70; 20 · 20; 20
· 20; life+70
All unethical actions are illegal in the United States. · True · False
· False
________ feature remixable applications and data. · Web services · Tags · Wikis · Mashups
· Mashups
If a person intentionally or unintentionally interferes with your wireless network transmissions, they are ________. · eavesdropping · war driving · RF jamming · QR coding
· RF jamming
_______ is a decisional role. · Analyzer · Leader · Liaison · Resource allocator
· Resource allocator
PLM is a POM function. · True · False
· True
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating. · True · False
· True
A ________ is a group of eight ________. · file; fields · field; files · bit; bytes · byte; bits
· byte; bits
Companies prefer the _________ model of informed consent. · sign-up · opt-in · opt-out · sign-out
· opt-out
PayPerPost is an example of ________ reviews. · conversational · sponsored · customer · expert
· sponsored
Information overload is a _________ pressure. · market · technology · nonexistent · societal
· technology
The same data items, with no context, can mean entirely different things in different contexts. · True · False
True
Which of the following is an accurate representation of the data hierarchy from smallest to largest? · byte, bit, field, file, record, database · bit, byte, field, record, file, database · byte, bit, field, record, file, database · bit, byte, field, file, record, database
· bit, byte, field, record, file, database
You own a restaurant in New York City. This is an example of a _________ organization. · virtual · pure-play · brick-and-mortar · clicks-and-mortar
· brick-and-mortar
Group purchasing is a common technique in a ________. · buy-side marketplace · sell-side marketplace · sellers exchange · electronic exchange
· buy-side marketplace
The _________ is a model in which organizations attempt to procure needed products or services from other organizations electronically. · electronic exchange · sellers exchange · buy-side marketplace · sell-side marketplace
· buy-side marketplace
You live in a small town with only one large retailer. This means there is low ______. · buyer power · supplier power · threat of substitutes · threat of new entrants
· buyer power
A _________ site is the least expensive option. · warm · hot · medium · cold
· cold
A _________ site provides only rudimentary services and facilities. · hot · medium · warm · cold
· cold
A(n) ________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time. · industrywide · corporate · affinity · commercial
· commercial
Obamacare was created to address the _________ approach. · common good · rights · deontology · utilitarian · fairness
· common good
The _________ approach highlights the interlocking relationships that underlie all societies. · common good · fairness · rights · utilitarian · deontology
· common good
The IT ________ are/is the IT platform. · components · infrastructure · services · personnel
· components
In the _________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable. · analysis · measure · control · define · improve
· control
A(n) ________ portal is an intranet. · industrywide · corporate · commercial · affinity
· corporate
A(n) ________ portal offers a personalized, single point of access through a web browser to critical business information located inside and outside an organization. · corporate · affinity · industrywide · commercial
· corporate
If one variable increases as a result of another variable increasing, it can be said that there is a _____. · correlation · positive causation · negative causation · relationship coefficient that is close to 0
· correlation
With the ________ approach to on-premise ERP implementation, a company develops new ERP functions designed specifically for that firm. · custom · vanilla · best-of-breed · as-is
· custom
You want to implement an ERP system, but you do not want to buy something from SAP or Oracle. Since you are building an ERP system from scratch, this is called a(n) ________ approach to ERP implementation. · vanilla · as-is · best-of-breed · custom
· custom
Epinions is an example of ________ ratings and reviews. · conversational · customer · expert · sponsored
· customer
If a company wants to write some computer code, it would choose to ________. · custom-write an entire application · use a prewritten application · customize a prewritten application · outsource the application
· customize a prewritten application
NASCAR's new prerace app uses a _________ to track a car's inspection process. · KPI · TPS · value chain · dashboard
· dashboard
The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated. · cardinality · modality · data dictionary · business rules
· data dictionary
In the _________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs. · analysis · measure · define · improve · control
· define
The correct order of the BPI phases is ___________. · define, measure, analyze, improve, and control · analyze, control, define, measure, improve · analyze, define, control, improve, and measure · define, analyze, measure, control, improve
· define, measure, analyze, improve, and control
In the ________ component of SCM, organizations coordinate the receipt of customer orders, develop a network of warehouses, select carriers to transport their products to their customers, and create an invoicing system to receive payments. · return · plan · deliver · make · source
· deliver
The ________ component of SCM is often referred to as logistics. · make · deliver · return · plan · source
· deliver
If you have to speak into your phone to unlock it, this is an example of something the user _________. · does · knows · has · is
· does
A(n) ________ report displays a greater level of detail. · drill-down · comparative · ad hoc · key indicator
· drill-down
With ________, transactions are conducted efficiently because buyers and sellers all meet in one place. · group purchasing · product customization · electronic exchanges · bartering online
· electronic exchanges
The category "student" is a(n) ________. · database · entity · attribute · instance
· entity
The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. · threat · vulnerability · exposure · risk
· exposure
An/The ________ connects networks of multiple organizations so they can communicate securely. · intranet · extranet · Internet · externet
· extranet
The ________ creates links between two tables. · alien · primary · foreign · secondary
· foreign
The ________ process originates in the sales department and ends in the accounting department. · production · fulfillment · marketing · procurement
· fulfillment
You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. · CSF · drill down · exception reporting · trend analysis
drill down
You would use linear, multiple, or logistic regression as statistical procedures for __________ analytics. · descriptive · predictive · prescriptive · Useful
predictive
In 2000, operating a basic internet application costs businesses approximately ________ per month. In mid-2016, operating the same application in Amazon's cloud cost approximately ________ per month. · $150,000; $1,000 · $1,000; $150,000 · $100,000; $100,000 · $500,000, $1
· $150,000; $1,000
________ cellular networks used analog signals and had low bandwidth. · 4G · 3G · 1G · 2G
· 1G
________ is a two-dimensional code that can store much more information than ________. · A QR code; bar codes · RFID; bar codes · RFID; QR codes · A QR code; RFID
· A QR code; bar codes
________ is an unauthorized access point into a wireless network. · Eavesdropping · War driving · An evil twin attack · A rogue access point
· A rogue access point
A(n) ____________ is an agent or a vendor who assembles the software needed by enterprises and then packages it with services such as development, operations, and maintenance. · SaaS · PaaS · ASP · ERP
· ASP
Microsoft ________ is a popular example of a relational database. · Access · Word · PowerPoint · Excel
· Access
_________ issues revolve around who should have access to information and whether they should pay a fee for this access. · Privacy · Accessibility · Property · Accuracy
· Accessibility
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. · Property · Accessibility · Accuracy · Privacy
· Accuracy
________ use internal batteries for power, and they broadcast radio waves to a reader. · Active RFID codes · Active QR codes · Passive RFID codes · Passive QR codes
· Active RFID codes
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? · Smaller, faster, cheaper computers and storage devices · International organized crime taking over cybercrime · Decreasing skills necessary to be a computer hacker · Additional management support · Today's interconnected, interdependent, wirelessly networked business environment
· Additional management support
_________ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks. · Agile development · End-user development · RAD · JAD
· Agile development
Which of the following is NOT a problem associated with channel conflict? · Logistics of online activities · Alienating customers · Handling returns · Marketing resource allocation
· Alienating customers
Which of the followng statements regarding the SAP Hana product implemented by UnderArmour is NOT true? · The program can run across platforms and devices. · The program provides real-time results. · The program allows legacy silos to remain intact. · All of the statements are true.
· All of the statements are true.
Which of the following Excel functions can help clean data? · CLEAN · CONCATENATE · FIXED · All of these
· All of these
Why is data analysis important? · It can reduce uncertainty · It can identify otherwise unknown threats, opportunities, and connections · It can lead to competitive advantage in business · All of these
· All of these
Which of the following descriptive mining methods might be used to discover unexpected or atypical associations? · Association Analysis · Discriminant Analysis · Linear Regression · LDA
· Association Analysis
_________ comprises the vast majority of e-commerce by volume. · B2B · B2C · B2E · C2C
· B2B
_________ is larger by volume; _________ is more complex. · B2B; B2C · B2B; B2B · B2C; B2B · B2C; B2C
· B2B; B2C
Analytical CRM systems provide ________ by analyzing customer behavior and perceptions. · CIC · ERP · SFA · BI
· BI
Chevron's initial effort to update its business processes was followed by several smaller, employee-driven _________ initiatives (many that used the Six Sigma improvement methodology). · BPR · BPI · BPM · BPC
· BPI
Which of the following visualization types is the best way to show relative counts of multiple variables? · Pie Chart · Bar Graph · Circles · Scatterplot
· Bar Graph
Which of the following is NOT a problem associated with Big Data? · Big Data lacks quality. · Big Data can be structured, unstructured, or semi-structured. · Big Data can come from untrusted sources. · Big Data changes.
· Big Data can be structured, unstructured, or semi-structured.
_________ organizations are purely physical. · Brick-and-mortar · Virtual · Pure-play · Clicks-and-mortar
· Brick-and-mortar
________ is when a business sells a group of products or services together at a lower price than their combined individual prices. · Upselling · Downselling · Cross-selling · Bundling
· Bundling
________ is an extended ERP module. · Financial management · Business intelligence · HR management · Operations management
· Business intelligence
When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n): · None of these · Electronic exchange · Sell-side marketplace · Buy-side marketplace
· Buy-side marketplace
________ is an example of a customer ratings and reviews website. · Buzzillions · Metacritic · SponsoredReviews · PayPerPost
· Buzzillions
Which of the following is an advantage of end-user development? · Enforces quality by maintaining standards · Involves many users in the development process · Works wells for ill-defined problems · Bypasses the IS department and avoids delays
· Bypasses the IS department and avoids delays
________ is an approach that integrates various automated factory systems. · CRM · TPS · MRP · CIM
· CIM
Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________. · ERP · SCM · HRM · CRM
· CRM
________ systems are important because customers are ________ powerful than ever; these systems put the intimacy back into customer service. · SCM; more · SCM; less · CRM; more · CRM; less
· CRM; more
________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the Internet at the same time. · Dial-up · Cable · Fiber · DSL
· Cable
_________ organizations have physical and online dimensions. · Clicks-and-mortar · Pure-play · Brick-and-mortar · Virtual
· Clicks-and-mortar
________ refers to efforts by two or more entities who work together to accomplish certain tasks. · A virtual team · Workflow · Collaboration · A workgroup
· Collaboration
________________ development is closely linked with the idea of web services and service-oriented architectures. · End-user · Object-oriented · Agile · Component-based
· Component-based
________ is part of the ________ process and involves customizing the product in response to a customer request. · Configure-to-order; procurement · Sell-from-stock; fulfillment · Configure-to-order; fulfillment · Sell-from-stock; procurement
· Configure-to-order; fulfillment
In this type of e-commerce, buyers and sellers are individuals. · Business-to-business · Government-to-citizen · Consumer-to-consumer · Business-to-consumer · Consumer-to-business
· Consumer-to-consumer
_________ is a challenge of BYOD. · Productivity · Cost · Satisfaction · Control
· Control
A(n) _________ is located between two firewalls. · spamware detector · DMZ · ERP · anti-malware system
· DMZ
________ modems convert information for use on the POTS and are almost extinct in most parts of the developed world today. · DSL · Cable · Fiber · Dial-up
· Dial-up
_________ materials are inputs to the manufacturing process. · Indirect · Direct · Horizontal · Vertical
· Direct
________ is an extended ERP module. · E-business · Operations management · Financial management · HR management
· E-business
_________ is a communication standard that enables business partners to exchange routine documents electronically. · ERP · VMI · EDI · JIT
· EDI
MRP is an earlier evolution of _________. · SCM · FAIS · ERP · CRM
· ERP
ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________. · ERP IV · ERP II · ERP III · ERP I
· ERP II
________ systems are interorganizational ERP systems that provide web-enabled links among a company's key business systems and its customers, suppliers, distributors, and other relevant parties. · ERP IV · ERP I · ERP II · ERP III
· ERP II
________ refers to efforts by unauthorized users to access data that are traveling over wireless networks. · War driving · Eavesdropping · An evil twin attack · A rogue access point
· Eavesdropping
_________ cards allow customers to charge online payments to their credit card accounts. · Smart · Electronic credit · Purchasing · Stored-value money
· Electronic credit
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver. · Firewalling · Blacklisting · Encryption · Authorization
· Encryption
________ is NOT a problem caused by computers. · Repetitive strain injuries · Ergonomics · Carpal tunnel syndrome · Job stress
· Ergonomics
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. · Alien software · Information extortion · Espionage · Identity theft
· Espionage
_________ is the third step in the general framework for ethics. · Act and reflect on the outcome of your decision · Make a decision and test it · Recognize an ethical issue · Get the facts · Evaluate alternative actions
· Evaluate alternative actions
________ offer limited accessibility to the ________ of participating companies. · Intranets; extranets · Extranets; internets · Extranets; intranets · Intranets; internets
· Extranets; intranets
A relational database is basically one big table; it is also called a flat file. · True · False
· False
Analytical CRM systems are the input for operational CRM systems. · True · False
· False
Bundling is a form of upselling. · True · False
· False
Collaborative consumption services offer employees many benefits including higher pay, more paid vacation, and flexible hours. · True · False
· False
Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary. · True · False
· False
Customer-facing CRM applications allow customers to self-serve. · True · False
· False
Data reduction is the conversion of raw information into a smaller amount of more useful data. · True · False
· False
Electronic commerce makes national and international markets less accessible. · True · False
· False
Filter bubbles guarantee that you will see websites that widely disagree so you can come to an informed decision. · True · False
· False
Functional information systems support the entire enterprise or major portions of it. · True · False
· False
Group buying on websites like Airbnb helps consumers get special deals. · True · False
· False
HR relies primarily on CIM systems. · True · False
· False
If you purchase an e-book from Amazon, it is a clicks-and-mortar transaction. · True · False
· False
In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores. · True · False
· False
LEO satellites have the longest orbital life. · True · False
· False
LinkedIn's main market is upper-level executives. · True · False
· False
Most systems are implemented with direct conversion because it is the cheapest. · True · False
· False
Once a KMS is set-up, it is updated automatically by Big Data the organization collects. · True · False
· False
Only large organizations use business analytics applications. · True · False
· False
Pinterest is only for women who like to shop. · True · False
· False
Social networks are only useful for active job seekers. · True · False
· False
Super Wi-Fi is super-fast Wi-Fi technology. · True · False
· False
Tacit knowledge is easily codified. · True · False
· False
The IT architecture focuses on the technical aspects of information resources. · True · False
· False
The IT steering committee is comprised of the top IT managers in an organization. · True · False
· False
The MIS department creates the business rules necessary to develop an ER diagram. · True · False
· False
The best thing about blogs is that they accurately reflect the opinions of customers. · True · False
· False
The business processes in ERP software are typically defined by the company using the software. · True · False
· False
The right of privacy is absolute. · True · False
· False
The stock market is the only area of business that has experienced fraud on the Internet. · True · False
· False
The use of electronic commerce requires companies to hire additional employees. · True · False
· False
________ cables are made of glass. · Twisted-pair · Fiber-optic · Coaxial · Microwave
· Fiber-optic
________ are user-generated classifications that use ________ to categorize and retrieve web pages, photos, videos, and other web content. · Crowdsources; tags · Folksonomies; mashups · Folksonomies; tags · Crowdsources; mashups
· Folksonomies; tags
________ defines how messages are formulated and how their receivers interpret them. · DSL · HTTP · SMTP · TCP/IP
· HTTP
________ is NOT an advantage of twisted-pair wire. · Cost · Availability · High bandwidth · Easy to work with
· High bandwidth
· Security · Cost · High bandwidth · Easy to work with
· High bandwidth
_________ exchanges connect buyers and sellers across many industries. · Indirect · Vertical · Direct · Horizontal
· Horizontal
With ________, small buyers aggregate demand to create a large volume and then negotiate lower prices. · bartering online · group purchasing · electronic exchanges · product customization
· group purchasing
LinkedIn's main market segment is _________. · low-skill jobs · low-paying jobs · high-skill jobs · upper-level executives
· high-skill jobs
________ are a set of core data that span the enterprise information systems. · Master data management · Master data · Transaction data · Data governance
· Master data
________ is a process that spans all organizational business processes and applications. · Big data · Data governance · Master data · Master data management
· Master data management
________ flows are the physical products, raw materials, supplies, and so forth that flow along the chain. · Financial · Supply · Information · Material
· Material
The average value of a given data set is known as the _____. · Mean · Mode · Median · Standard Deviation
· Mean
________ is a broadcast medium. · Microwave · Twisted-pair · Coaxial · Fiber-optic
· Microwave
________ transmission systems transmit data through electromagnetic waves. · Fiber · Radio · Microwave · Satellite
· Microwave
________ attracts video game lovers and sports enthusiasts through contests. The company also encourages the most dedicated community members to contribute ideas on company products. · Levi's · PepsiCo · Disney · Mountain Dew
· Mountain Dew
________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content. · Network neutrality · Internet access equality · Network equality · Internet access neutrality
· Network neutrality
_________ are the fundamental elements in object-oriented development and represent tangible, real-world entities. · Objects · Operations · Behaviors · Properties
· Objects
________ is how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization. · Recruiting · Social networking · Onboarding · Employee development
· Onboarding
________ CRM systems have source code that is available to developers and users. · Open-source · On-demand · On-premise · Social
· Open-source
Which of the following has the strategy "I can do the same thing more efficiently than you can"? · Operational effectiveness · Innovation · Customer oriented · Differentiation · Cost leader
· Operational effectiveness
________ provides a live notification when its customers are close to physical stores that sell its products. The company then uses Foursquare to send them coupons and discount information. · Levi's · PepsiCo · Disney · Mountain Dew
· PepsiCo
Which type of data mining technique is used to sift through a database of transactions to extrapolate what future transactions will be? · Predictive · Descriptive · Prescriptive · Analytic
· Predictive
_________ are IS professionals who either modify existing computer programs or write new programs to satisfy user requirements. · Technical specialists · Programmers · Users · Systems analysts
· Programmers
________ is a disadvantage of telecommuting. · Retention · Productivity · Family life · Promotion time
· Promotion time
Which of the following is not a function of functional area information systems? · Providing data from business events to the corporate database · Providing analysis capabilities to middle-level managers and staff · Supporting the managerial tasks of planning, organizing, and controlling operations · Providing information to managers in the functional areas · Providing information primarily in the form of reports
· Providing data from business events to the corporate database
Which of the following is FALSE of QR codes? · QR codes are larger than bar codes because they store information both horizontally and vertically. · QR codes can store much more information than bar codes. · QR codes are more resistant to damage than bar codes. · QR codes can be read from any direction or angle.
· QR codes are larger than bar codes because they store information both horizontally and vertically.
_________ measures management's effectiveness in generating profits with its available assets by dividing the net income generated by a project by the average assets invested in the project. · The business case approach · ROI · NPV · Breakeven analysis
· ROI
Which of the following is NOT a basic function of TCP/IP? · Acknowledges the packets have been transmitted · Responsible for disassembling, delivering, and reassembling data during transmission · Sequences the transfer of packets · Manages the movement of data packets between computers by establishing a connection between the computers
· Responsible for disassembling, delivering, and reassembling data during transmission
________ reports are produced at scheduled intervals. · On-demand · Exception · Ad hoc · Routine
· Routine
________ is a customer-facing CRM application. · SFA · FAQ · E-mail · Search
· SFA
________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. · CIC · JIT · SFA · CMA
· SFA
_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith. · Sabotage · SCADA attacks · Espionage · Software attacks
· Sabotage
________ transmission systems can have a large coverage area but encryption must be used for security. · Microwave · Satellite · Radio · Fiber
· Satellite
Which of the following is the best way to view correlated data? · Scatterplot · Pie Chart · Interactive Graph · Bar Chart
· Scatterplot
_________ are similar to the B2C model. · Electronic exchanges · Buy-side marketplaces · Sell-side marketplaces · Sellers exchanges
· Sell-side marketplaces
Which of the following ways would color best be used in a chart to highlight a sliding scale? · Sequential Color · Categorical Color · Diverging Color · Color should not be used in this case.
· Sequential Color
When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true? · Participation by customers is more limited when using social computing. · Social computing generates faster and cheaper results. · Social computing generates faster results but is more expensive. · Social computing takes longer but is less expensive.
· Social computing generates faster and cheaper results.
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. · Malware · Social engineering · Profiling · Espionage
· Social engineering
________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks. · Backbone · Personal area · Cloud · Software-defined
· Software-defined
This feature of Excel allows you to run various scenarios using constraints and variables to optimize business results. · Solution Maximizer · Conditional Formulas · Solver · PivotTable
· Solver
_________ cards allow you to store a fixed amount of prepaid money and then spend it as necessary. · Stored-value money · Smart · Purchasing · Electronic credit
· Stored-value money
Which of the following is NOT an interorganizational system? · CRM · TPS · ERP · SCM
· TPS
________ is the cumulative store of subjective or experiential learning. · Tacit information · Explicit information · Tacit knowledge · Explicit knowledge
· Tacit knowledge
________ allow users to place information in multiple, overlapping associations rather than in rigid categories. · Mashups · Web services · Wikis · Tags
· Tags
Find My iPhone is an example of ________. · a voice portal · l-commerce · Telemetry · a mobile portal
· Telemetry
Telemarketing and ads on Google are examples of accessibility issues. · True · False
· True
Temporary staffing services trade in a functional exchange. · True · False
· True
The European Union has stricter data protection laws than the US. · True · False
· True
The definition of broadband is fluid. · True · False
· True
The fundamental concept of CRM is to treat different customers differently because their needs differ and their value to the company may also differ. · True · False
· True
The join operation combines records from two or more tables in a database to obtain information that is located in different tables. · True · False
· True
The major objective of ERP Systems is to integrate an organization's various functional areas to facilitate the seamless flow of information. · True · False
· True
The number of active mobile social media accounts in Vietnam is increasing faster than in China, India, or Brazil. · True · False
· True
The web makes disintermediation easier, particularly for online services. · True · False
· True
Viral marketing lends itself especially well to social networking. · True · False
· True
Winning back a customer who has switched to a competitor is vastly more expensive than keeping that customer satisfied in the first place. · True · False
· True
You are a computer programmer who feels short-changed by your organization. To get back at them, you would most likely use a Trojan horse, back door, or logic bomb. · True · False
· True
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is piracy and is illegal. · True · False
· True
________ does NOT use a peer-to-peer business model. · Craigslist · Airbnb · eBay · Twitter
Email is an example of _____ data. · Unstructured · Structured · Transactional · Derived
· Unstructured
The Walmart and P&G relationship is an example of ________. · the bullwhip effect · vertical integration · VMI · JIT
· VMI
________ occurs when the supplier, rather than the retailer, manages the entire inventory process for a particular product or group of products. · Vertical integration · JIT · VMI · The bullwhip effect
· VMI
Which type of electronic exchange connects buyers with sellers within a specific industry? · Public exchanges · Functional exchanges · Vertical exchanges · Horizontal exchanges
· Vertical exchanges
________ is a business strategy in which a company purchases its ________ suppliers to ensure that its essential supplies are available as soon as the company needs them. · Vertical integration; downstream · VMI; upstream · Vertical integration; upstream · VMI; downstream
· Vertical integration; upstream
_________ is a remote attack requiring user action. · A logic bomb · Virus · DoS · A Trojan horse
· Virus
Which of the following is NOT a characteristic of Big Data? · Variety · Viscous · Volume · Velocity
· Viscous
_________ is the most recent example of ethical misbehavior in organizations. · Wells Fargo bank · WorldCom · Enron · Tyco
· Wells Fargo bank
If there are many alternatives to an organization's products or services, then the threat of substitutes is _________; if there are few alternatives, then the threat is ______. · low; high · high; high · high; low · low; low
· high; low
A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations. · hot · cold · warm · medium
· hot
Your company's employee base is mostly comprised of older people who generally dislike and distrust technology. This means the _________ feasibility of implementing a new system is low. · technical · economic · behavioral · competitive
· behavioral
Piracy costs businesses _________ of dollars per year. · hundreds · trillions · billions · millions
· billions
Computer crimes typically average _________ of dollars and cause businesses _________ of dollars in damages. · hundreds of thousands; billions · hundreds of thousands; millions · hundreds; millions · hundreds; billions
· hundreds of thousands; billions
When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI. · measure · control · improve · define · analysis
· improve
Database systems minimize ________. · independence · integrity · security · inconsistency
· inconsistency
Packing, assembly, or manufacturing are ________ activities. · irrelevant · upstream · internal · downstream
· internal
SCM systems are ________ systems. · intraorganizational · extraorganizational · interorganizational · extraorganizational
· interorganizational
Systems that manage processes originating in one company and concluding in another company are called ________ systems. · exterorganizational · intraorganizational · extraorganizational · interorganizational
· interorganizational
Businesses use customer ________ to create highly individualized offers that customers are more likely to accept. · intimacy · virality · customization · personalization
· intimacy
An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network. · externet · Internet · intranet · extranet
· intranet
Users have the greatest involvement in the _________ stage of the SDLC. · implementation · investigation · programming · design
· investigation
Folksonomies are ________. · collections of photos, videos, and other Web content · web sites that have been categorized as Web 1.0 sites · a user-generated classification that identifies the type of Web site you are viewing · keywords that describe a piece of information
· keywords that describe a piece of information
BPI is typically performed by ___________. · low-level managers · knowledge workers · executives · clerical workers
· knowledge workers
Organizations typically invest in cloud-based ERP systems because they are _________. · more secure · less expensive · more accessible · less error-prone
· less expensive
Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________. · answerability · liability · responsibility · accountability
· liability
Your company hires FireEye to install security software and monitor your systems. This is an example of risk _________. · avoidance · limitation · transference · acceptance
· limitation
A major method of procuring goods and services in the buy-side model is the _________ auction. · forward · reverse · upward · downward
· reverse
A major method of procuring goods and services in the buy-side model is the _________ auction. · upward · downward · reverse · forward
· reverse
Insourcing is also called ________. · nearshoring · reverse outsourcing · outsourcing · onshoring
· reverse outsourcing
As the CEO of Widget Inc., you get a monthly report on the percentage of orders going through e-commerce. This is a(n) ________ report. · ad hoc · routine · exception · on-demand
· routine
A _________ system lists potential customers or customers who have purchased related products; that is, products similar to those that the salesperson is trying to sell to the customer. · sales lead tracking · product knowledge · sales forecasting · contact management
· sales lead tracking
The _________ is the scrum approach typically replaces a project manager. · team · product owner · program developer · scrum master
· scrum master
The biggest problem associated with end-user development is ________. · cost · time · availability · security
· security
_________ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compatibility. · stored-value money · electronic credit · purchasing · smart
· smart
Morton's Steakhouse utilized a(n) ________ CRM system to surprise a customer with a meal. · open-source · real-time · social · mobile
· social
In the ________ component of SCM, organizations choose suppliers to deliver the goods and services they need to create their product or service. · deliver · make · plan · source · return
· source
In the ________ component of SCM, supply chain managers develop processes for managing their goods and services inventory. · make · deliver · return · source · plan
· source
Gift cards are _________ cards. · stored-value money · electronic credit · smart · purchasing
· stored-value money
Considering the nature of decisions, the long-range goals and policies for growth and resource allocation is · financial planning. · management control. · operational control. · strategic planning.
· strategic planning.
Suppose you are a salesperson. You take great pride in knowing each customers' favorite places to eat and their favorite meals. This is an example of ________. · tacit information · tacit knowledge · explicit knowledge · explicit information
· tacit knowledge
A ________ relationship exists when three entities are associated. · tertiary · ternary · unary · binary
· ternary
System developers have the greatest involvement in the _________ stage of the SDLC. · operation · testing · analysis · investigation
· testing
Data marts are typically associated with · the development of infrastructure to support enterprise-wide analytics. · the development of one or a few related analytics applications. · support for maintaining organizational strategy. · support for organizational transformation.
· the development of one or a few related analytics applications.
Auditing _________ the computer means auditors check inputs, outputs, and processing. · into · with · around · through
· through
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. · acceptance · avoidance · transference · limitation
· transference
The relational database model is based on the concept of ________-dimensional tables. · two · three · four · one
· two
If humans are careless with laptops, this is an _________ error which could cause theft of equipment or information (an _________ error). · intentional; intentional · unintentional; unintentional · unintentional; intentional · intentional; unintentional
· unintentional; intentional
You are the CEO of Widgets R Us. You know your widgets need to be more efficient and cost less, so you ask R&D to develop a plan. This is a(n) _____ task and a(n) ______ decision. · structured; management control · structured; operational control · unstructured; operational control · unstructured; strategic planning
· unstructured; strategic planning
"Garbage in, garbage out" refers to _____. · a model that predicts people's behavior · using inaccurate data · creating a model that is not transparent · relying solely on a data analytics model to predict
· using inaccurate data
The _________ approach states that an ethical action is the one that provides the most good or does the least harm. · common good · fairness · deontology · rights · utilitarian
· utilitarian
Suppose you go through your neighborhood to figure out how many wireless networks are unsecure. This is __________. · war driving · an evil twin attack · eavesdropping · a rogue access point
· war driving
The procurement process originates in the ________ department and ends in the ________ department. · warehouse; warehouse · warehouse; accounting · accounting; sales · sales; accounting
· warehouse; accounting
Your professor hands you a piece of paper with the number 75 on it. This is ________. · data · information · knowledge · wisdom
Data
Chevron supported internal improvement efforts by getting its suppliers involved using a unified _________ approach that involved standardizing processes across the entire company and consolidating process information within a central repository. · BPM · BPR · BPC · BPI
· BPM
The ________ is the highest-ranking IS manager and is responsible for all strategic planning in the organization. · information center manager · CIO · IS Director · applications development manager
· CIO
Which of the following is NOT an organizational response to business pressures? · Mass customization · Developing strategic systems · Creating a digital divide · Focusing on customer wants
· Creating a digital divide
________ is a consultative function of the MIS department. · Managing computer operations, including the computer center · Creating business alliances with business partners · Managing systems development · Infrastructure planning, development, and control
· Creating business alliances with business partners
_________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires. · Quality · Productivity · Customer satisfaction · Differentiation
· Customer satisfaction
Which of the following has the strategy "I am better because I am different"? · Operational effectiveness · Differentiation · Innovation · Cost leader · Customer oriented
· Differentiation
A(n) ________ is an intraorganizational system. · supply chain system · human resources system · portal · E-commerce system
· E-commerce system
Information is knowledge that has been organized to have meaning and value. · True · False
· False
_________ is the second step in the general framework for ethics. · Act and reflect on the outcome of your decision · Evaluate alternative actions · Recognize an ethical issue · Get the facts · Make a decision and test it
· Get the facts
_________ is the second step in the general framework for ethics. · Evaluate alternative actions · Act and reflect on the outcome of your decision · Make a decision and test it · Recognize an ethical issue · Get the facts
· Get the facts
Which of the following is an accuracy issue? · Under what circumstances can one use proprietary databases? · How much should companies charge for permitting access to information in their databases? · How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? · What information about individuals should be kept in databases, and how secure is the information there?
· How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
IT services, IT personnel, and IT components make up the organization's ___________. · IT infrastructure · TPS · IT platform · ERP system
· IT infrastructure
_________ is an example of effectiveness. · Reducing production time by one day · Increasing customer satisfaction · Automating order entry · Using RFID to track products
· Increasing customer satisfaction
________ is organized so that it has meaning and value to the recipient. · Data · Knowledge · Wisdom · Information
· Information
_________ is a technology pressure. · Protection against terrorist attacks · Globalization · Reducing the digital divide · Information overload
· Information overload
Which of the following increases supplier power? · Globalization · Integrated supply chains · Intermediation · Internet searching
· Integrated supply chains
________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem. · Wisdom · Information · Knowledge · Data
· Knowledge
_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. · Accountability · Answerability · Responsibility · Liability
· Liability
________ handle the day-to-day operations of the organization and make routine decisions. · Knowledge workers · Clerical workers · Lower-level managers · Middle managers
· Lower-level managers
________ is a traditional function of the MIS department. · Creating business alliances with business partners · Initiating and designing specific strategic IS · Managing computer operations, including the computer center · Educating the MIS staff about the business
· Managing computer operations, including the computer center
________ is a consultative function of the MIS department. · Managing computer operations including the computer center · Managing system integration including the internet, intranets, and extranets · Staffing, training, and developing IS skills · Infrastructure planning, development, and control
· Managing system integration including the internet, intranets, and extranets
_________ is an example of a primary activity for most firms. · Operations · Human resource management · Product and technology development · Procurement
· Operations
Which of the following is NOT an example of excellent alignment? · Organizations ensure that IT employees understand how the company makes or loses money. · Organizations create a vibrant and inclusive company culture. · Organizations allow IT employees to develop overarching goals for the business. · Organizations view their internal and external customers and their customer service function as supremely important. · Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams. · Organizations rotate business and IT professionals across departments and job functions.
· Organizations allow IT employees to develop overarching goals for the business.
The best-known framework for analyzing competitiveness is ________'s competitive forces model. · Job · Porter · Mintzberg · Gates
· Porter
_________ issues involve the ownership and value of information. · Accuracy · Privacy · Accessibility · Property
· Property
_________ is a societal pressure. · Technological innovation and obsolescence · Protection against terrorist attacks · Globalization · Information overload
· Protection against terrorist attacks
Which of the following is TRUE? · Managers have more time to make decisions. · Computerization reduces our level of isolation. · Remote supervision will probably become a norm. · IT increases the number of middle managers.
· Remote supervision will probably become a norm.
_________ are people and equipment that perform process activities. · Outputs · Resources · Inputs · Employees
· Resources
_________ means that you accept the consequences of your decisions and actions. · Responsibility · Accountability · Answerability · Liability
· Responsibility
A(n) ________ supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data. · ERP · FAIS · TPS · DBS
· TPS
All employees have a responsibility to encourage ethical uses of information and information technology. · True · False
· True
An organization's business processes can be a competitive advantage or disadvantage. · True · False
· True
Data aggregators can collect public and non-public information to create digital dossiers. · True · False
· True
It costs less to operating an internet application today than it did 15 years ago. · True · False
· True
The right to privacy is recognized today in all the US states and by the federal government, either by statute or in common law. · True · False
· True
Which of the following is a property issue? · Under what circumstances can one use proprietary databases? · How much should companies charge for permitting access to information in their databases? · How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? · What information about individuals should be kept in databases, and how secure is the information there?
· Under what circumstances can one use proprietary databases?
Companies like Google and Facebook make their money by selling your information to advertisers. This is an example of an ethical issue that falls into the category of ________. · privacy · accessibility · accuracy · property
· accessibility
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. · property · privacy · accessibility · accuracy
· accuracy
The ________ coordinates and manages new systems development projects. · IS Director · applications development manager · CIO · information center manager
· applications development manager
A(n) ________ focuses on designing solutions for business problems and interfaces closely with users to demonstrate how IT can be used innovatively. · business analyst · systems programmer · emerging technologies manager · systems analyst
· business analyst
A(n) ________ forecasts technology trends and evaluates and experiments with new technologies. · emerging technologies manager · systems programmer · systems analyst · business analyst
· emerging technologies manager
The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis. · financial; Wells Fargo bank · operational; Wells Fargo bank · financial; Enron · operational; Enron
· financial; Enron
American companies can easily do business with Chinese companies. This is phenomenon is called ________. · technological innovation and obsolescence · protection against terrorist attacks · information overload · globalization
· globalization
_________ is a market pressure. · information overload · globalization · protection against terrorist attacks · technological innovation and obsolescence
· globalization
Buyer power is high when buyers have _________ choices from whom to buy and low when buyers have _________ choices. · many; many · few; many · many; few · few; few
· many; few
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. · sign-up · opt-out · sign-out · opt-in
· opt-out
Threat of substitute products or services refers to companies _________ the industry; rivalry refers to companies _________ the industry. · inside; inside · inside; outside · outside; inside · outside; outside
· outside; inside
The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach. · deontology · rights · fairness · utilitarian · common good
· rights
A(n) ________ is an interorganizational system. · ERP system · TPS · human resources system · supply chain system
· supply chain system
The music and newspaper industries were hurt primarily by _________. · supplier power · threat of substitutes · buyer power · threat of new entrants
· threat of substitutes
When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) ______________. · analysis; APS · analysis; TPS · transaction; TPS · transaction; APS
· transaction; TPS
TPSs are inputs for FAIS. · True · False
· True
_________ analytics is the first step in data reduction. · Descriptive · Predictive · Prescriptive · Useful
Descriptive
__________ analytics answers the question "what has happened". · Descriptive · Predictive · Prescriptive · Useful
Descriptive
If you grew up using IT, you are an informed user. · True · False
False
Nearly all TPSs are ERP systems. · True · False
False
Only computer science majors can become CIOs. · True · False
False
Social networks and mobile commerce are the greatest sources of e-commerce in Vietnam. · True · False
· True
135.62.128.91 is an example of an ________ address. · IPv6 · IPv4 · IPv2 · IPv8
· IPv4
________ consists of 32 bits. · IPv8 · IPv4 · IPv6 · IPv2
· IPv4
________ consists of 128 bits. · IPv8 · IPv6 · IPv4 · IPv2
· IPv6
________ was developed to address the Internet of Things. · IPv4 · IPv6 · IPv8 · IPv2
· IPv6
The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan. · IT architecture · organization mission · IS operational plan · organization strategic plan
· IS operational plan
If you were to measure age, education level, and marital status to predict income, which is the dependent variable? · Age · Education Level · Marital Status · Income
· Income
The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets. · application · transport · Internet · network interface
· Internet
The ________ functions as a transport mechanism; the ________ is an application. · Internet; World Wide Web · World Wide Web; Internet · World Wide Web; intranet · Internet; intranet
· Internet; World Wide Web
Which of the following is an advantage of JAD? · Bypasses the IS department and avoids delays · Works wells for ill-defined problems · Enforces quality by maintaining standards · Involves many users in the development process
· Involves many users in the development process
Which of the following is NOT an objective of the IT strategic plan? · It must efficiently allocate IS development resources among competing projects. · It must be aligned with the organization's strategic plan. · It must meet the needs of every functional area to ensure employee buy-in. · It must provide for an IT architecture that seamlessly networks users, applications, and databases.
· It must meet the needs of every functional area to ensure employee buy-in.
_________ is a group-based tool for collecting user requirements and creating system designs. · End-user development · Agile development · RAD · JAD
· JAD
Medium-range wireless networks are ________ technology. · WAN · LAN · PAN · MAN
· LAN
A large number of ________ satellites are needed for global coverage. · MEO · VEO · GEO · LEO
· LEO
Satellite telephone services are provided through ________ satellites. · MEO · VEO · LEO · GEO
· LEO
________ satellites are the least expensive to build and launch. · LEO · VEO · MEO · GEO
· LEO
________ is the customer's potential revenue stream over a number of years. · Market capitalization · Lifetime value · Customer churn · Customer life cycle
· Lifetime value
________ is an example of a group shopping website. · LivingSocial · Facebook · Tujia · Uber
· LivingSocial
________ is NOT an example of collaborative consumption. · Mass customization · Peer-to-peer lending · Collaborative production · Crowdfunding
· Mass customization
Which of the following statement regarding Backyard Adventures is false? · The Fishbowl system connects all of Backyard Adventure's distributors and allows them to share information. · The Fishbowl system specifically supports the manufacturing and warehouse environment. · The Fishbowl inventory management system is not able to integrate with Quickbooks. · The Backyard Adventure's website allows customers to locate the closest dealer and customize playsets online.
· The Fishbowl inventory management system is not able to integrate with Quickbooks.
_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction. · A mobile portal · The IoT · UWB · A wireless network
· The IoT
Which of the following statements regarding Three Square Market's microchip program is NOT true? · The company sells the microchip on their website. · The embedded chip provides access to the company's information systems eliminating the need for employees to have a password. · The microchip program is required for all employees. · The embedded chip provides physical access to the company.
· The microchip program is required for all employees.
What could be a problem with an employment model that uses testing to predict applicant success? · The model allows employers the ability to discard several candidates upfront. · The model does not learn from its previous decisions. · The model could be based on currently effective employees. · Employers might only rely on a predictive model to make decisions.
· The model does not learn from its previous decisions.
________ is a disadvantage of EDI. · Message length · Productivity · The number of standards Security
· The number of standards
Which of the following best defines data governance? · The process of putting standards, processes, and definitions about data in place · Data security · Using data effectively · Data completeness
· The process of putting standards, processes, and definitions about data in place
________ allows shoppers to create profiles and blogs about their favorite products in social communities. · Stylehive · InStyle · Epinions · ThisNext
· ThisNext
Affinity analysis is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups. · True · False
· True
An ASP hosts both an application and a database for each customer. · True · False
· True
An RFQ is associated with a reverse auction. · True · False
· True
An intranet is a trusted network. · True · False
· True
Backyard Adventure's inventory management system integrates with Quickbooks. · False · True
· True
Channel conflict and order fulfillment are the two most significant issues in e-tailing. · True · False
· True
Collaborative consumption services help establish a more sustainable global environment. · True · False
· True
Competitive intelligence is legal while espionage is illegal even though both involve collecting information about competitors. · True · False
· True
Cybercrime is typically nonviolent but lucrative. · True False
· True
Data from customer-facing and customer-touching applications are the inputs for analytical CRM systems. · True · False
· True
Data marts support the development of one or a few related analytics applications. · True · False
· True
Data warehouses and data marts are multidimensional. · True · False
· True
Download speed is much faster than upload speed when defining the term broadband. · True · False
· True
E-business is a broader concept than e-commerce. · True · False
· True
Experts argue business analytics and business intelligence should be used interchangeably. · True · False
· True
Google is useful only if users already know what they are looking for, while Pinterest exposes people to possibilities that they never would have known existed. · True · False
· True
If a hacker enters a building with an official-looking ID badge. This is considered social engineering. · True · False
· True
KMS are useful for creating best practices in an organization. · True · False
· True
Modern smartphones exhibit a process called dematerialization. · True · False
· True
Most US utilities are not using TaKaDu to track water leaks. · True · False
· True
Most states require Amazon to collect sales taxes. · True · False
· True
Organizations can use Big Data to conduct experiments. · True · False
· True
Privacy rights apply to individuals, groups, and institutions. · True · False
· True
Satellite TV runs using GEO satellites. · True · False
· True
Senior executives typically handle strategic planning decisions. · True · False
· True
Which of the following is a privacy issue? · How can we ensure that the information will be processed properly and presented accurately to users? · What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? · What information about oneself should an individual be required to reveal to others? · How should we handle illegally copying copyrighted software?
· What information about oneself should an individual be required to reveal to others?
________ is a wide-area wireless network. · MiFi · LTE · NFC · WiMAX
· WiMAX
________ are an example of harnessing collective intelligence. · Web services · Tags · Mashups · Wikis
· Wikis
________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures. · A workgroup · A virtual team · Workflow · Collaboration
· Workflow
Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked with _________ in 2016. · a SCADA attack · alien software · espionage · a DDoS
· a DDoS
A wiki is _________. · a collection of blog postings on a subject · an online encyclopedia · a Web site on which anyone can post material and make changes to already posted material · a site to access podcasts and netcasts
· a Web site on which anyone can post material and make changes to already posted material
You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. · social engineering; unintentional · a human error; intentional · social engineering; intentional · a human error; unintentional
· a human error; unintentional
You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake. · social engineering; intentional · a human error; unintentional · social engineering; unintentional · a human error; intentional
· a human error; unintentional
You lose the company's USB with your sales spreadsheets on it. This is _________ and is an _________ mistake. · social engineering; intentional · a human error; intentional · social engineering; unintentional · a human error; unintentional
· a human error; unintentional
If you bring your own router to school to set-up Wi-Fi but do not have permission from your university to do this, this is ________. · eavesdropping · a rogue access point · war driving · an evil twin attack
· a rogue access point
Really simple syndication is _________. · an easy way to subscribe to a magazine to be delivered to your home · a system that allows you to receive information from sites you identify without having to go to the individual Web sites · a very popular Web site · a replacement for going to the Web
· a system that allows you to receive information from sites you identify without having to go to the individual Web sites
If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person's knowledge, this is ________. · eavesdropping · an evil twin attack · war driving · a rogue access point
· an evil twin attack
The end product of the _________ stage is a set of system requirements. · investigation · operation · design · analysis
· analysis
The primary purpose of the systems _________ stage is to gather information about the existing system to determine the requirements for an enhanced system or a new system. · analysis · design · investigation operation
· analysis
TaKaDu designed cloud-based ___________ software to ___________. · analytics; detect water leaks · analytics; help customers choose the most appropriate martial arts style · intelligence; detect water leaks · intelligence; help customers choose the most appropriate martial arts style
· analytics; detect water leaks
The first step in the information systems planning process is to ________. · evaluation the potential IT architecture · consider potential IS development projects · create an IS strategic plan · analyze the organization's strategic plan
· analyze the organization's strategic plan
The ________ layer of TCP/IP enables client application programs to access the other layers. · transport · network interface · application · Internet
· application
The _________ is/are a prioritized inventory of present applications and a detailed plan of projects to be developed or continued during the current year. · application portfolio · IS environment · constraints of the IS function · objectives of the IS function
· application portfolio
Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs. · into · with · through · around
· around
Each characteristic or quality of a particular entity is called a(n) ________. · field · record · instance · attribute
· attribute
RFID was developed to replace ________. · bar codes · NFC · UWB · QR codes
· bar codes
If your organization collects transactions and processes them at night, this is called _________. · OLAP · OLTP · source data processing · batch processing
· batch processing
Amazon uses a _________-end CRM system because it ________. · high; coordinates staff activities in a campaign to sell its products · high; recommends products to returning customers · low; coordinates staff activities in a campaign to sell its products · low; recommends products to returning customers
· low; recommends products to returning customers
In the ________ component of SCM, supply chain managers schedule the activities necessary for production, testing, packaging, and preparation for delivery. · source · plan · deliver · make · return
· make
A vertical line with a "chicken leg" to the entity represents the ________ cardinality symbol. · optional single · mandatory single · mandatory many · optional many
· mandatory many
Two vertical lines represent the ________ cardinality symbol. · mandatory single · mandatory many · optional single · optional many
· mandatory single
An electronic _________ is a central, virtual market space on the web where many buyers and many sellers can conduct e-commerce and e-business activities. · storefront · mall · marketplace · auction
· marketplace
The blogosphere is defined as _________. · the program that allows you to post and maintain blogs on the Web · the group of people whose opinions are influenced by blogs · millions of blogs on the Web · a list of the most popular blogs on the Web
· millions of blogs on the Web
Backyard Adventures sells ___________. · picnic supplies · specialized landscaping · patio furniture · modular playsets
· modular playsets
The ________ layer of TCP/IP places packets on, and receives them from, the network medium, which can be any networking technology. · network interface · transport · application · Internet
· network interface
Job coaches recommend spending most of your time ________ to get a job. · educating yourself · online · networking · talking to headhunters
· networking
Data marts and data warehouses are ________; this means they ________ be updated by users. · volatile; can · volatile; cannot · non-volatile; cannot · non-volatile; can
· non-volatile; cannot
In ________, manufacturers or retailers sell directly to customers. · online direct marketing · viral marketing · affiliate marketing · electronic tendering
· online direct marketing
Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system. · open-source · on-premise · social · mobile
· open-source
Considering the nature of decisions, executing specific tasks efficiently and effectively is · financial planning. · management control. · operational control. · strategic planning.
· operational control.
Europeans and privacy advocates prefer the _________ model of informed consent. · sign-out · sign-up · opt-out · opt-in
· opt-in
A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. · optional many · mandatory many · optional single · mandatory single
· optional many
A _________ conversion introduces components of the new system in stages. · parallel · phased · direct · pilot
· phased
Your company decides to implement the manufacturing module of SAP before implementing payroll. This is an example of _________ conversion. · parallel · direct · phased · pilot
· phased
Your company decides to implement the manufacturing module of SAP before implementing payroll. This is an example of _________ conversion. · parallel · direct · pilot · phased
· phased
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________. · social engineering; illegal · piracy; illegal · piracy; legal · social engineering; legal
· piracy; illegal
Intellectual property is NOT protected under _________ laws. · patent · copyright · privacy · trade secret
· privacy
The ________ process originates in the warehouse department and ends in the accounting department. · marketing · production · fulfillment · procurement
· procurement
With ________, customers use the internet to self-configure products or services. · bartering online · group purchasing · electronic exchanges · product customization
· product customization
The _________ represents the business users and any other stakeholders in the project. · scrum master · product owner · program developer · team
· product owner
Amazon uses a(n) ________ SCM system. · mobile · open-source · social · proprietary, on-premise
· proprietary, on-premise
In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking. · public; private · public; public · private; public · private; private
· public; private
Social computing forces companies to deal with customers ________ as opposed to ________. · retroactively; proactively · reactively; proactively · proactively; retroactively · proactively; reactively
· reactively; proactively