Exam Prep

Ace your homework & exams now with Quizwiz!

The key developments of Web ________ were the creation of websites and the commercialization of the web. · 4.0 · 1.0 · 3.0 · 2.0

1.0

________ attempt to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain. · BI · Dashboards · Supply chain systems · ES

ES

Data and information are synonyms. · True · False

False

The IT infrastructure and IT platform are synonyms. · True · False

False

________ use the hardware and software, interface with it, or use its output. · People · Databases · Networks · Procedures

People

________ analytics drives the coupons you get at the grocery store when you use your loyalty card. · Descriptive · Predictive · Prescriptive · Useful

Predictive

_________ is the first step in the general framework for ethics. · Make a decision and test it · Get the facts · Act and reflect on the outcome of your decision · Recognize an ethical issue · Evaluate alternative actions

Recognize an ethical issue

______ analysis examines the change in an output given the change in a particular input while keeping all other inputs constant. · Affinity · Goal-seeking · Sensitivity · What-if

Sensitivity

________ is a program or collection of programs that enable the hardware to process data. · A network · Hardware · A database · Software

Software

________ is a traditional function of the MIS department. · Staffing, training, and developing IS skills · Initiating and designing specific strategic IS · Partnering with business-unit executives · Managing system integration including the internet, intranets, and extranets

Staffing, training, and developing IS skills

_______ is a capability of dashboards that reflect the latest data available on KPIs or some other metric often in real time. · Drill down · Exception reporting · Status access · Trend analysis

Status access

___________ decisions deal with routine and repetitive problems. · Midstructured · Semistructured · Structured · Unstructured

Structured

Career opportunities in IS are strong and are projected to remain strong over the next 10 years. · True · False

True

No single functional area is responsible for cross-functional business processes. · True · False

True

The major objectives of ERP systems are to tightly integrate the functional areas of the organization and to enable information to flow seamlessly across them. · True · False

True

You are an executive working for a Fortune 500 company. You want to see CSFs, ROI, NPV, and other financial information. You would look at the ________ wall in the Management Cockpit. · black · blue · red · white

black

You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. · black · blue · red · white

blue

Verification/testing of the proposed solution and picking an option occur in the _____ phase of the IDC. · choice · design · intelligence · implementation

choice

Affinity analysis is a(n) _________ application. · data mining · DSS · OLAP · OLTP

data mining

Simpa Networks turned to DataKind to · develop a credit-scoring model for potential customers. · figure out a way to supply solar power inexpensively. · identify water leaks in pipes and prevent fraud. · predict how likely customers will defect to a competitor.

develop a credit-scoring model for potential customers.

Suppose you are failing one of your classes. If you don't know what the problem is, you need to enter the _______ phase of the IDC. · choice · design · intelligence · implementation

intelligence

The optimal result of the organization's CRM efforts is to ________ the number of high-value repeat customers while ________ customer churn. · maximize; maximizing · minimize; minimizing · minimize; maximizing · maximize; minimizing

maximize; minimizing

Data marts can be implemented ________ quickly than data warehouses and support ________ control. · more; local · less; local · less; central · more; central

more; local

Productivity is a · function of the number of inputs and outputs for which a manager is responsible. · measure of how useful a manager is. · ratio between the inputs and outputs for which a manager is responsible. · useful way of seeing how important a product is.

ratio between the inputs and outputs for which a manager is responsible.

________ is the largest book publisher and bookseller in the US today. · Wiley · Google · Amazon · McGraw-Hill

· Amazon

Electronic checks are primarily used in ________. · C2C · G2C · B2B · B2C

· B2B

_________ is a disadvantage of the buy option. · Hiring · Availability · Control · Time

· Control

_________ is the result of optimizing operations and supplier processes. · Productivity · Quality · Differentiation · Cost reduction

· Cost reduction

________ is the loss of a certain percentage of customers over time. · Customer life cycle · Lifetime value · Market capitalization · Customer churn

· Customer churn

________ is an example of a metasearch engine. · Bing · Dogpile · Google · Ask

· Dogpile

________ is a common LAN protocol. · Internet · Twisted-pair · Fiber · Ethernet

· Ethernet

________ are/is a customer-touching CRM application. · FAQs · SFA · CIC · CMAs

· FAQs

All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews. · True · False

· False

Deciding what is right or wrong is always easy and clear-cut. · True · False

· False

Efficiency focuses on high quality products. · True · False

· False

It is easy to assess the benefits of IT because they are so tangible. · True · False

· False

Only one person can update a TPS at a time. · True · False

· False

Organizations can adopt BPR to sustain BPI efforts over time. · True · False

· False

Purchasing a prewritten application is always the most cost-effective and time-saving solution. · True · False

· False

RAD produces prototypes rather than functional components. · True · False

· False

Shellcatch is only useful for large fisheries. · True · False

· False

Users can always roam from hotspot to hotspot seamlessly. · True · False

· False

You can't return to previous stages of the IDC, so it is really important to do a good job the first time. · True · False

· False

You check your credit report annually to ensure your identity hasn't been stolen. This is an example of a property issue. · True · False

· False

You need to be particularly careful of tailgating at airport terminals. · True · False

· False

You have satellite TV. Providers use ________ satellites to get this service to you. · MEO · LEO · GEO · VEO

· GEO

________ satellites are the most expensive to build and launch. · VEO · MEO · GEO · LEO

· GEO

________ satellites have the longest orbital life. · LEO · VEO · GEO MEO

· GEO

Google Fiber was first deployed in ________. · Atlanta · San Diego · Charlotte · Kansas City

· Kansas City

________ satellites are used to run the GPS system. · MEO · GEO · LEO · VEO

· MEO

________ satellites have an orbital life of 6-12 years. · LEO · GEO · MEO · VEO

· MEO

________ are/is a tool for democratizing higher education. · DSLs · E-learning · MOOCs · Distance learning

· MOOCs

________ is a medium-range wireless network. · UWB · WiMAX · MiFi · LTE

· MiFi

________ are exchange points for Internet traffic. · ISPs · IAPs · NSPs · NAPs

· NAPs

________ technology enables the use of mobile wallets. · Wi-Fi · NFC · WiMAX · UWB

· NFC

The _________ identifies the firm's overall mission, the goals that follow from that mission, and the broad steps required to reach these goals. · IS strategic plan · IT architecture · Organization strategic plan · IS operational plan

· Organization strategic plan

Which of the following is not a criterion for data quality? · Completeness · Accuracy · Originality · Accuracy

· Originality

_____ data are amassed with the goal of maintaining a running repository of all recordable details. · Structured · Passively collected · A priori · First-party

· Passively collected

________ is an example of a sponsored reviews website. · ThisNext · Metacritic · PayPerPost · Epinions

· PayPerPost

Which of the following techniques enables extrapolation of new information based on previous information? · Descriptive · Predictive · Analytic · Derivative

· Predictive

Microsoft Access uses ________ to conduct queries. · TPS · QBE · RFID · ETL

· QBE

________ is an advantage of telecommuting. · Stress-level · Socialization · Visibility · Promotion time

· Stress-level

________ is an extended ERP module. · HR management · Operations management · Supply chain management · Financial management

· Supply chain management

_________ is an advantage of the buy option. · Integration · Control · Time · Modification

· Time

_________ is NOT a major task of the IT steering committee. · Approving the allocation of resources for the MIS function · Linking corporate strategy with IT strategy · Establishing performance measures for the MIS function and ensuring they are met · Training the top managers from each functional area

· Training the top managers from each functional area

A "chicken leg" for cardinality represents a many relationship. · True · False

· True

A secondary key can be a foreign key. · True · False

· True

In ________, businesses request quotes from suppliers. · online direct marketing · viral marketing · electronic tendering · affiliate marketing

· electronic tendering

Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM. · return · plan · make · source deliver

· plan

Database systems minimize ________. · redundancy · independence · security · integrity

· redundancy

SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet. · an architecture · hardware · a platform · software

· software

The production process originates in the ________ department and ends in the ________ department. · warehouse; warehouse · warehouse; accounting · accounting; sales · sales; accounting

· warehouse; warehouse

Amazon Business is the biggest threat to ________. · distributors · retailers · wholesalers · manufacturers

· wholesalers

Suppose you use your university's computer lab to print your research papers. If this computer lab contains desktop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab. · mobile · wireless · mobile and wireless · a waste of resources

· wireless

GPS uses the known speed of the signals and distance from ________ satellite(s) to find the location of a receiving station or user. · 3 · 5 · 1 · 7

3

________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning. · Data · Information · Knowledge · Wisdom

Data

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). · the input; inputs · the input; outputs · the output; inputs · the output; outputs

the output; inputs

Organizations are using social computing in which of the following functions? · Marketing · Customer relationship management · Human resource management · All of these

· All of these

________ is a disadvantage of cloud-based ERP systems. · Scalability · Access · Cost · Control

· Control

Intellectual capital is another term for ________. · wisdom · data · information · knowledge

· knowledge

Completion rates in any one MOOC tend to be less than ________ of initial registrations. · 50 · 75 · 90 · 10

10

________ is expected to be deployed by 2020. · 2G · 3G · 5G 4G

5G

_________ is a decisional role. · Disseminator · Disturbance handler · Figurehead · Monitor

Disturbance handler

NICs allow devices to physically connect to the _______'s communications medium. · LAN · MAN · PAN · WAN

LAN

_________ is an interpersonal role. · Entrepreneur · Leader · Negotiator · Spokesperson

Leader

Which of the following techniques could be used to help accountants look at line items in fraudulent financial statements and predict future, or expected values? · Market Basket Analysis · Linear Regression · Association Analysis · All of the Above

Linear Regression

________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control. · Lower-level managers · Middle managers · Knowledge workers · Clerical workers

Middle managers

If you analyze a data cube, this is an example of using · data mining. · DSS. · OLAP. · OLTP.

OLAP

The traditional function of the MIS department centers on the idea that end users do not have the required technical expertise to address IT issues. · True · False

True

Suppose you use your university's computer lab to print your research papers. If this computer lab contains laptop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab. · mobile · a waste of resources · wireless · mobile and wireless

mobile and wireless

Negative consequences of big data are most often seen when _____. · predicting people's behavior, goals, and opinions · predicting tangible outputs · creating a model that learns · the model uses only publicly available data

predicting people's behavior, goals, and opinions

Simpa Networks provides · data analytics software to create a credit score. · insurance for impoverished people. · solar power to people and small businesses. · tracking for water leaks.

solar power to people and small businesses.

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of · the development of infrastructure to support enterprise-wide analytics. · the development of one or a few related analytics applications. · support for maintaining organizational strategy. · support for organizational transformation.

the development of infrastructure to support enterprise-wide analytics.

Less than ________ percent of all web content is composed in Hindi, the first language of approximately 260 million people. · 1.0 · 0.01 · 0.1 · 10.0

· 0.1

The ________ rule of thumb is that ________ percent of individuals contribute ________ percent of the content. · 40-60; 40; 60 · 20-80; 20; 80 · 80-20; 80; 20 · 60-40; 60; 40

· 20-80; 20; 80

Current US laws award patents for _________ years and copyright protection for _________ years. · 20; life+70 · life+70; life+70 · life+70; 20 · 20; 20

· 20; life+70

All unethical actions are illegal in the United States. · True · False

· False

________ feature remixable applications and data. · Web services · Tags · Wikis · Mashups

· Mashups

If a person intentionally or unintentionally interferes with your wireless network transmissions, they are ________. · eavesdropping · war driving · RF jamming · QR coding

· RF jamming

_______ is a decisional role. · Analyzer · Leader · Liaison · Resource allocator

· Resource allocator

PLM is a POM function. · True · False

· True

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating. · True · False

· True

A ________ is a group of eight ________. · file; fields · field; files · bit; bytes · byte; bits

· byte; bits

Companies prefer the _________ model of informed consent. · sign-up · opt-in · opt-out · sign-out

· opt-out

PayPerPost is an example of ________ reviews. · conversational · sponsored · customer · expert

· sponsored

Information overload is a _________ pressure. · market · technology · nonexistent · societal

· technology

The same data items, with no context, can mean entirely different things in different contexts. · True · False

True

Which of the following is an accurate representation of the data hierarchy from smallest to largest? · byte, bit, field, file, record, database · bit, byte, field, record, file, database · byte, bit, field, record, file, database · bit, byte, field, file, record, database

· bit, byte, field, record, file, database

You own a restaurant in New York City. This is an example of a _________ organization. · virtual · pure-play · brick-and-mortar · clicks-and-mortar

· brick-and-mortar

Group purchasing is a common technique in a ________. · buy-side marketplace · sell-side marketplace · sellers exchange · electronic exchange

· buy-side marketplace

The _________ is a model in which organizations attempt to procure needed products or services from other organizations electronically. · electronic exchange · sellers exchange · buy-side marketplace · sell-side marketplace

· buy-side marketplace

You live in a small town with only one large retailer. This means there is low ______. · buyer power · supplier power · threat of substitutes · threat of new entrants

· buyer power

A _________ site is the least expensive option. · warm · hot · medium · cold

· cold

A _________ site provides only rudimentary services and facilities. · hot · medium · warm · cold

· cold

A(n) ________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time. · industrywide · corporate · affinity · commercial

· commercial

Obamacare was created to address the _________ approach. · common good · rights · deontology · utilitarian · fairness

· common good

The _________ approach highlights the interlocking relationships that underlie all societies. · common good · fairness · rights · utilitarian · deontology

· common good

The IT ________ are/is the IT platform. · components · infrastructure · services · personnel

· components

In the _________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable. · analysis · measure · control · define · improve

· control

A(n) ________ portal is an intranet. · industrywide · corporate · commercial · affinity

· corporate

A(n) ________ portal offers a personalized, single point of access through a web browser to critical business information located inside and outside an organization. · corporate · affinity · industrywide · commercial

· corporate

If one variable increases as a result of another variable increasing, it can be said that there is a _____. · correlation · positive causation · negative causation · relationship coefficient that is close to 0

· correlation

With the ________ approach to on-premise ERP implementation, a company develops new ERP functions designed specifically for that firm. · custom · vanilla · best-of-breed · as-is

· custom

You want to implement an ERP system, but you do not want to buy something from SAP or Oracle. Since you are building an ERP system from scratch, this is called a(n) ________ approach to ERP implementation. · vanilla · as-is · best-of-breed · custom

· custom

Epinions is an example of ________ ratings and reviews. · conversational · customer · expert · sponsored

· customer

If a company wants to write some computer code, it would choose to ________. · custom-write an entire application · use a prewritten application · customize a prewritten application · outsource the application

· customize a prewritten application

NASCAR's new prerace app uses a _________ to track a car's inspection process. · KPI · TPS · value chain · dashboard

· dashboard

The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated. · cardinality · modality · data dictionary · business rules

· data dictionary

In the _________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs. · analysis · measure · define · improve · control

· define

The correct order of the BPI phases is ___________. · define, measure, analyze, improve, and control · analyze, control, define, measure, improve · analyze, define, control, improve, and measure · define, analyze, measure, control, improve

· define, measure, analyze, improve, and control

In the ________ component of SCM, organizations coordinate the receipt of customer orders, develop a network of warehouses, select carriers to transport their products to their customers, and create an invoicing system to receive payments. · return · plan · deliver · make · source

· deliver

The ________ component of SCM is often referred to as logistics. · make · deliver · return · plan · source

· deliver

If you have to speak into your phone to unlock it, this is an example of something the user _________. · does · knows · has · is

· does

A(n) ________ report displays a greater level of detail. · drill-down · comparative · ad hoc · key indicator

· drill-down

With ________, transactions are conducted efficiently because buyers and sellers all meet in one place. · group purchasing · product customization · electronic exchanges · bartering online

· electronic exchanges

The category "student" is a(n) ________. · database · entity · attribute · instance

· entity

The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. · threat · vulnerability · exposure · risk

· exposure

An/The ________ connects networks of multiple organizations so they can communicate securely. · intranet · extranet · Internet · externet

· extranet

The ________ creates links between two tables. · alien · primary · foreign · secondary

· foreign

The ________ process originates in the sales department and ends in the accounting department. · production · fulfillment · marketing · procurement

· fulfillment

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. · CSF · drill down · exception reporting · trend analysis

drill down

You would use linear, multiple, or logistic regression as statistical procedures for __________ analytics. · descriptive · predictive · prescriptive · Useful

predictive

In 2000, operating a basic internet application costs businesses approximately ________ per month. In mid-2016, operating the same application in Amazon's cloud cost approximately ________ per month. · $150,000; $1,000 · $1,000; $150,000 · $100,000; $100,000 · $500,000, $1

· $150,000; $1,000

________ cellular networks used analog signals and had low bandwidth. · 4G · 3G · 1G · 2G

· 1G

________ is a two-dimensional code that can store much more information than ________. · A QR code; bar codes · RFID; bar codes · RFID; QR codes · A QR code; RFID

· A QR code; bar codes

________ is an unauthorized access point into a wireless network. · Eavesdropping · War driving · An evil twin attack · A rogue access point

· A rogue access point

A(n) ____________ is an agent or a vendor who assembles the software needed by enterprises and then packages it with services such as development, operations, and maintenance. · SaaS · PaaS · ASP · ERP

· ASP

Microsoft ________ is a popular example of a relational database. · Access · Word · PowerPoint · Excel

· Access

_________ issues revolve around who should have access to information and whether they should pay a fee for this access. · Privacy · Accessibility · Property · Accuracy

· Accessibility

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. · Property · Accessibility · Accuracy · Privacy

· Accuracy

________ use internal batteries for power, and they broadcast radio waves to a reader. · Active RFID codes · Active QR codes · Passive RFID codes · Passive QR codes

· Active RFID codes

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? · Smaller, faster, cheaper computers and storage devices · International organized crime taking over cybercrime · Decreasing skills necessary to be a computer hacker · Additional management support · Today's interconnected, interdependent, wirelessly networked business environment

· Additional management support

_________ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks. · Agile development · End-user development · RAD · JAD

· Agile development

Which of the following is NOT a problem associated with channel conflict? · Logistics of online activities · Alienating customers · Handling returns · Marketing resource allocation

· Alienating customers

Which of the followng statements regarding the SAP Hana product implemented by UnderArmour is NOT true? · The program can run across platforms and devices. · The program provides real-time results. · The program allows legacy silos to remain intact. · All of the statements are true.

· All of the statements are true.

Which of the following Excel functions can help clean data? · CLEAN · CONCATENATE · FIXED · All of these

· All of these

Why is data analysis important? · It can reduce uncertainty · It can identify otherwise unknown threats, opportunities, and connections · It can lead to competitive advantage in business · All of these

· All of these

Which of the following descriptive mining methods might be used to discover unexpected or atypical associations? · Association Analysis · Discriminant Analysis · Linear Regression · LDA

· Association Analysis

_________ comprises the vast majority of e-commerce by volume. · B2B · B2C · B2E · C2C

· B2B

_________ is larger by volume; _________ is more complex. · B2B; B2C · B2B; B2B · B2C; B2B · B2C; B2C

· B2B; B2C

Analytical CRM systems provide ________ by analyzing customer behavior and perceptions. · CIC · ERP · SFA · BI

· BI

Chevron's initial effort to update its business processes was followed by several smaller, employee-driven _________ initiatives (many that used the Six Sigma improvement methodology). · BPR · BPI · BPM · BPC

· BPI

Which of the following visualization types is the best way to show relative counts of multiple variables? · Pie Chart · Bar Graph · Circles · Scatterplot

· Bar Graph

Which of the following is NOT a problem associated with Big Data? · Big Data lacks quality. · Big Data can be structured, unstructured, or semi-structured. · Big Data can come from untrusted sources. · Big Data changes.

· Big Data can be structured, unstructured, or semi-structured.

_________ organizations are purely physical. · Brick-and-mortar · Virtual · Pure-play · Clicks-and-mortar

· Brick-and-mortar

________ is when a business sells a group of products or services together at a lower price than their combined individual prices. · Upselling · Downselling · Cross-selling · Bundling

· Bundling

________ is an extended ERP module. · Financial management · Business intelligence · HR management · Operations management

· Business intelligence

When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n): · None of these · Electronic exchange · Sell-side marketplace · Buy-side marketplace

· Buy-side marketplace

________ is an example of a customer ratings and reviews website. · Buzzillions · Metacritic · SponsoredReviews · PayPerPost

· Buzzillions

Which of the following is an advantage of end-user development? · Enforces quality by maintaining standards · Involves many users in the development process · Works wells for ill-defined problems · Bypasses the IS department and avoids delays

· Bypasses the IS department and avoids delays

________ is an approach that integrates various automated factory systems. · CRM · TPS · MRP · CIM

· CIM

Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________. · ERP · SCM · HRM · CRM

· CRM

________ systems are important because customers are ________ powerful than ever; these systems put the intimacy back into customer service. · SCM; more · SCM; less · CRM; more · CRM; less

· CRM; more

________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the Internet at the same time. · Dial-up · Cable · Fiber · DSL

· Cable

_________ organizations have physical and online dimensions. · Clicks-and-mortar · Pure-play · Brick-and-mortar · Virtual

· Clicks-and-mortar

________ refers to efforts by two or more entities who work together to accomplish certain tasks. · A virtual team · Workflow · Collaboration · A workgroup

· Collaboration

________________ development is closely linked with the idea of web services and service-oriented architectures. · End-user · Object-oriented · Agile · Component-based

· Component-based

________ is part of the ________ process and involves customizing the product in response to a customer request. · Configure-to-order; procurement · Sell-from-stock; fulfillment · Configure-to-order; fulfillment · Sell-from-stock; procurement

· Configure-to-order; fulfillment

In this type of e-commerce, buyers and sellers are individuals. · Business-to-business · Government-to-citizen · Consumer-to-consumer · Business-to-consumer · Consumer-to-business

· Consumer-to-consumer

_________ is a challenge of BYOD. · Productivity · Cost · Satisfaction · Control

· Control

A(n) _________ is located between two firewalls. · spamware detector · DMZ · ERP · anti-malware system

· DMZ

________ modems convert information for use on the POTS and are almost extinct in most parts of the developed world today. · DSL · Cable · Fiber · Dial-up

· Dial-up

_________ materials are inputs to the manufacturing process. · Indirect · Direct · Horizontal · Vertical

· Direct

________ is an extended ERP module. · E-business · Operations management · Financial management · HR management

· E-business

_________ is a communication standard that enables business partners to exchange routine documents electronically. · ERP · VMI · EDI · JIT

· EDI

MRP is an earlier evolution of _________. · SCM · FAIS · ERP · CRM

· ERP

ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________. · ERP IV · ERP II · ERP III · ERP I

· ERP II

________ systems are interorganizational ERP systems that provide web-enabled links among a company's key business systems and its customers, suppliers, distributors, and other relevant parties. · ERP IV · ERP I · ERP II · ERP III

· ERP II

________ refers to efforts by unauthorized users to access data that are traveling over wireless networks. · War driving · Eavesdropping · An evil twin attack · A rogue access point

· Eavesdropping

_________ cards allow customers to charge online payments to their credit card accounts. · Smart · Electronic credit · Purchasing · Stored-value money

· Electronic credit

_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver. · Firewalling · Blacklisting · Encryption · Authorization

· Encryption

________ is NOT a problem caused by computers. · Repetitive strain injuries · Ergonomics · Carpal tunnel syndrome · Job stress

· Ergonomics

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. · Alien software · Information extortion · Espionage · Identity theft

· Espionage

_________ is the third step in the general framework for ethics. · Act and reflect on the outcome of your decision · Make a decision and test it · Recognize an ethical issue · Get the facts · Evaluate alternative actions

· Evaluate alternative actions

________ offer limited accessibility to the ________ of participating companies. · Intranets; extranets · Extranets; internets · Extranets; intranets · Intranets; internets

· Extranets; intranets

A relational database is basically one big table; it is also called a flat file. · True · False

· False

Analytical CRM systems are the input for operational CRM systems. · True · False

· False

Bundling is a form of upselling. · True · False

· False

Collaborative consumption services offer employees many benefits including higher pay, more paid vacation, and flexible hours. · True · False

· False

Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary. · True · False

· False

Customer-facing CRM applications allow customers to self-serve. · True · False

· False

Data reduction is the conversion of raw information into a smaller amount of more useful data. · True · False

· False

Electronic commerce makes national and international markets less accessible. · True · False

· False

Filter bubbles guarantee that you will see websites that widely disagree so you can come to an informed decision. · True · False

· False

Functional information systems support the entire enterprise or major portions of it. · True · False

· False

Group buying on websites like Airbnb helps consumers get special deals. · True · False

· False

HR relies primarily on CIM systems. · True · False

· False

If you purchase an e-book from Amazon, it is a clicks-and-mortar transaction. · True · False

· False

In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores. · True · False

· False

LEO satellites have the longest orbital life. · True · False

· False

LinkedIn's main market is upper-level executives. · True · False

· False

Most systems are implemented with direct conversion because it is the cheapest. · True · False

· False

Once a KMS is set-up, it is updated automatically by Big Data the organization collects. · True · False

· False

Only large organizations use business analytics applications. · True · False

· False

Pinterest is only for women who like to shop. · True · False

· False

Social networks are only useful for active job seekers. · True · False

· False

Super Wi-Fi is super-fast Wi-Fi technology. · True · False

· False

Tacit knowledge is easily codified. · True · False

· False

The IT architecture focuses on the technical aspects of information resources. · True · False

· False

The IT steering committee is comprised of the top IT managers in an organization. · True · False

· False

The MIS department creates the business rules necessary to develop an ER diagram. · True · False

· False

The best thing about blogs is that they accurately reflect the opinions of customers. · True · False

· False

The business processes in ERP software are typically defined by the company using the software. · True · False

· False

The right of privacy is absolute. · True · False

· False

The stock market is the only area of business that has experienced fraud on the Internet. · True · False

· False

The use of electronic commerce requires companies to hire additional employees. · True · False

· False

________ cables are made of glass. · Twisted-pair · Fiber-optic · Coaxial · Microwave

· Fiber-optic

________ are user-generated classifications that use ________ to categorize and retrieve web pages, photos, videos, and other web content. · Crowdsources; tags · Folksonomies; mashups · Folksonomies; tags · Crowdsources; mashups

· Folksonomies; tags

________ defines how messages are formulated and how their receivers interpret them. · DSL · HTTP · SMTP · TCP/IP

· HTTP

________ is NOT an advantage of twisted-pair wire. · Cost · Availability · High bandwidth · Easy to work with

· High bandwidth

· Security · Cost · High bandwidth · Easy to work with

· High bandwidth

_________ exchanges connect buyers and sellers across many industries. · Indirect · Vertical · Direct · Horizontal

· Horizontal

With ________, small buyers aggregate demand to create a large volume and then negotiate lower prices. · bartering online · group purchasing · electronic exchanges · product customization

· group purchasing

LinkedIn's main market segment is _________. · low-skill jobs · low-paying jobs · high-skill jobs · upper-level executives

· high-skill jobs

________ are a set of core data that span the enterprise information systems. · Master data management · Master data · Transaction data · Data governance

· Master data

________ is a process that spans all organizational business processes and applications. · Big data · Data governance · Master data · Master data management

· Master data management

________ flows are the physical products, raw materials, supplies, and so forth that flow along the chain. · Financial · Supply · Information · Material

· Material

The average value of a given data set is known as the _____. · Mean · Mode · Median · Standard Deviation

· Mean

________ is a broadcast medium. · Microwave · Twisted-pair · Coaxial · Fiber-optic

· Microwave

________ transmission systems transmit data through electromagnetic waves. · Fiber · Radio · Microwave · Satellite

· Microwave

________ attracts video game lovers and sports enthusiasts through contests. The company also encourages the most dedicated community members to contribute ideas on company products. · Levi's · PepsiCo · Disney · Mountain Dew

· Mountain Dew

________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content. · Network neutrality · Internet access equality · Network equality · Internet access neutrality

· Network neutrality

_________ are the fundamental elements in object-oriented development and represent tangible, real-world entities. · Objects · Operations · Behaviors · Properties

· Objects

________ is how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization. · Recruiting · Social networking · Onboarding · Employee development

· Onboarding

________ CRM systems have source code that is available to developers and users. · Open-source · On-demand · On-premise · Social

· Open-source

Which of the following has the strategy "I can do the same thing more efficiently than you can"? · Operational effectiveness · Innovation · Customer oriented · Differentiation · Cost leader

· Operational effectiveness

________ provides a live notification when its customers are close to physical stores that sell its products. The company then uses Foursquare to send them coupons and discount information. · Levi's · PepsiCo · Disney · Mountain Dew

· PepsiCo

Which type of data mining technique is used to sift through a database of transactions to extrapolate what future transactions will be? · Predictive · Descriptive · Prescriptive · Analytic

· Predictive

_________ are IS professionals who either modify existing computer programs or write new programs to satisfy user requirements. · Technical specialists · Programmers · Users · Systems analysts

· Programmers

________ is a disadvantage of telecommuting. · Retention · Productivity · Family life · Promotion time

· Promotion time

Which of the following is not a function of functional area information systems? · Providing data from business events to the corporate database · Providing analysis capabilities to middle-level managers and staff · Supporting the managerial tasks of planning, organizing, and controlling operations · Providing information to managers in the functional areas · Providing information primarily in the form of reports

· Providing data from business events to the corporate database

Which of the following is FALSE of QR codes? · QR codes are larger than bar codes because they store information both horizontally and vertically. · QR codes can store much more information than bar codes. · QR codes are more resistant to damage than bar codes. · QR codes can be read from any direction or angle.

· QR codes are larger than bar codes because they store information both horizontally and vertically.

_________ measures management's effectiveness in generating profits with its available assets by dividing the net income generated by a project by the average assets invested in the project. · The business case approach · ROI · NPV · Breakeven analysis

· ROI

Which of the following is NOT a basic function of TCP/IP? · Acknowledges the packets have been transmitted · Responsible for disassembling, delivering, and reassembling data during transmission · Sequences the transfer of packets · Manages the movement of data packets between computers by establishing a connection between the computers

· Responsible for disassembling, delivering, and reassembling data during transmission

________ reports are produced at scheduled intervals. · On-demand · Exception · Ad hoc · Routine

· Routine

________ is a customer-facing CRM application. · SFA · FAQ · E-mail · Search

· SFA

________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. · CIC · JIT · SFA · CMA

· SFA

_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith. · Sabotage · SCADA attacks · Espionage · Software attacks

· Sabotage

________ transmission systems can have a large coverage area but encryption must be used for security. · Microwave · Satellite · Radio · Fiber

· Satellite

Which of the following is the best way to view correlated data? · Scatterplot · Pie Chart · Interactive Graph · Bar Chart

· Scatterplot

_________ are similar to the B2C model. · Electronic exchanges · Buy-side marketplaces · Sell-side marketplaces · Sellers exchanges

· Sell-side marketplaces

Which of the following ways would color best be used in a chart to highlight a sliding scale? · Sequential Color · Categorical Color · Diverging Color · Color should not be used in this case.

· Sequential Color

When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true? · Participation by customers is more limited when using social computing. · Social computing generates faster and cheaper results. · Social computing generates faster results but is more expensive. · Social computing takes longer but is less expensive.

· Social computing generates faster and cheaper results.

_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. · Malware · Social engineering · Profiling · Espionage

· Social engineering

________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks. · Backbone · Personal area · Cloud · Software-defined

· Software-defined

This feature of Excel allows you to run various scenarios using constraints and variables to optimize business results. · Solution Maximizer · Conditional Formulas · Solver · PivotTable

· Solver

_________ cards allow you to store a fixed amount of prepaid money and then spend it as necessary. · Stored-value money · Smart · Purchasing · Electronic credit

· Stored-value money

Which of the following is NOT an interorganizational system? · CRM · TPS · ERP · SCM

· TPS

________ is the cumulative store of subjective or experiential learning. · Tacit information · Explicit information · Tacit knowledge · Explicit knowledge

· Tacit knowledge

________ allow users to place information in multiple, overlapping associations rather than in rigid categories. · Mashups · Web services · Wikis · Tags

· Tags

Find My iPhone is an example of ________. · a voice portal · l-commerce · Telemetry · a mobile portal

· Telemetry

Telemarketing and ads on Google are examples of accessibility issues. · True · False

· True

Temporary staffing services trade in a functional exchange. · True · False

· True

The European Union has stricter data protection laws than the US. · True · False

· True

The definition of broadband is fluid. · True · False

· True

The fundamental concept of CRM is to treat different customers differently because their needs differ and their value to the company may also differ. · True · False

· True

The join operation combines records from two or more tables in a database to obtain information that is located in different tables. · True · False

· True

The major objective of ERP Systems is to integrate an organization's various functional areas to facilitate the seamless flow of information. · True · False

· True

The number of active mobile social media accounts in Vietnam is increasing faster than in China, India, or Brazil. · True · False

· True

The web makes disintermediation easier, particularly for online services. · True · False

· True

Viral marketing lends itself especially well to social networking. · True · False

· True

Winning back a customer who has switched to a competitor is vastly more expensive than keeping that customer satisfied in the first place. · True · False

· True

You are a computer programmer who feels short-changed by your organization. To get back at them, you would most likely use a Trojan horse, back door, or logic bomb. · True · False

· True

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is piracy and is illegal. · True · False

· True

________ does NOT use a peer-to-peer business model. · Craigslist · Airbnb · eBay · Twitter

· Twitter

Email is an example of _____ data. · Unstructured · Structured · Transactional · Derived

· Unstructured

The Walmart and P&G relationship is an example of ________. · the bullwhip effect · vertical integration · VMI · JIT

· VMI

________ occurs when the supplier, rather than the retailer, manages the entire inventory process for a particular product or group of products. · Vertical integration · JIT · VMI · The bullwhip effect

· VMI

Which type of electronic exchange connects buyers with sellers within a specific industry? · Public exchanges · Functional exchanges · Vertical exchanges · Horizontal exchanges

· Vertical exchanges

________ is a business strategy in which a company purchases its ________ suppliers to ensure that its essential supplies are available as soon as the company needs them. · Vertical integration; downstream · VMI; upstream · Vertical integration; upstream · VMI; downstream

· Vertical integration; upstream

_________ is a remote attack requiring user action. · A logic bomb · Virus · DoS · A Trojan horse

· Virus

Which of the following is NOT a characteristic of Big Data? · Variety · Viscous · Volume · Velocity

· Viscous

_________ is the most recent example of ethical misbehavior in organizations. · Wells Fargo bank · WorldCom · Enron · Tyco

· Wells Fargo bank

If there are many alternatives to an organization's products or services, then the threat of substitutes is _________; if there are few alternatives, then the threat is ______. · low; high · high; high · high; low · low; low

· high; low

A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations. · hot · cold · warm · medium

· hot

Your company's employee base is mostly comprised of older people who generally dislike and distrust technology. This means the _________ feasibility of implementing a new system is low. · technical · economic · behavioral · competitive

· behavioral

Piracy costs businesses _________ of dollars per year. · hundreds · trillions · billions · millions

· billions

Computer crimes typically average _________ of dollars and cause businesses _________ of dollars in damages. · hundreds of thousands; billions · hundreds of thousands; millions · hundreds; millions · hundreds; billions

· hundreds of thousands; billions

When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI. · measure · control · improve · define · analysis

· improve

Database systems minimize ________. · independence · integrity · security · inconsistency

· inconsistency

Packing, assembly, or manufacturing are ________ activities. · irrelevant · upstream · internal · downstream

· internal

SCM systems are ________ systems. · intraorganizational · extraorganizational · interorganizational · extraorganizational

· interorganizational

Systems that manage processes originating in one company and concluding in another company are called ________ systems. · exterorganizational · intraorganizational · extraorganizational · interorganizational

· interorganizational

Businesses use customer ________ to create highly individualized offers that customers are more likely to accept. · intimacy · virality · customization · personalization

· intimacy

An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network. · externet · Internet · intranet · extranet

· intranet

Users have the greatest involvement in the _________ stage of the SDLC. · implementation · investigation · programming · design

· investigation

Folksonomies are ________. · collections of photos, videos, and other Web content · web sites that have been categorized as Web 1.0 sites · a user-generated classification that identifies the type of Web site you are viewing · keywords that describe a piece of information

· keywords that describe a piece of information

BPI is typically performed by ___________. · low-level managers · knowledge workers · executives · clerical workers

· knowledge workers

Organizations typically invest in cloud-based ERP systems because they are _________. · more secure · less expensive · more accessible · less error-prone

· less expensive

Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________. · answerability · liability · responsibility · accountability

· liability

Your company hires FireEye to install security software and monitor your systems. This is an example of risk _________. · avoidance · limitation · transference · acceptance

· limitation

A major method of procuring goods and services in the buy-side model is the _________ auction. · forward · reverse · upward · downward

· reverse

A major method of procuring goods and services in the buy-side model is the _________ auction. · upward · downward · reverse · forward

· reverse

Insourcing is also called ________. · nearshoring · reverse outsourcing · outsourcing · onshoring

· reverse outsourcing

As the CEO of Widget Inc., you get a monthly report on the percentage of orders going through e-commerce. This is a(n) ________ report. · ad hoc · routine · exception · on-demand

· routine

A _________ system lists potential customers or customers who have purchased related products; that is, products similar to those that the salesperson is trying to sell to the customer. · sales lead tracking · product knowledge · sales forecasting · contact management

· sales lead tracking

The _________ is the scrum approach typically replaces a project manager. · team · product owner · program developer · scrum master

· scrum master

The biggest problem associated with end-user development is ________. · cost · time · availability · security

· security

_________ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compatibility. · stored-value money · electronic credit · purchasing · smart

· smart

Morton's Steakhouse utilized a(n) ________ CRM system to surprise a customer with a meal. · open-source · real-time · social · mobile

· social

In the ________ component of SCM, organizations choose suppliers to deliver the goods and services they need to create their product or service. · deliver · make · plan · source · return

· source

In the ________ component of SCM, supply chain managers develop processes for managing their goods and services inventory. · make · deliver · return · source · plan

· source

Gift cards are _________ cards. · stored-value money · electronic credit · smart · purchasing

· stored-value money

Considering the nature of decisions, the long-range goals and policies for growth and resource allocation is · financial planning. · management control. · operational control. · strategic planning.

· strategic planning.

Suppose you are a salesperson. You take great pride in knowing each customers' favorite places to eat and their favorite meals. This is an example of ________. · tacit information · tacit knowledge · explicit knowledge · explicit information

· tacit knowledge

A ________ relationship exists when three entities are associated. · tertiary · ternary · unary · binary

· ternary

System developers have the greatest involvement in the _________ stage of the SDLC. · operation · testing · analysis · investigation

· testing

Data marts are typically associated with · the development of infrastructure to support enterprise-wide analytics. · the development of one or a few related analytics applications. · support for maintaining organizational strategy. · support for organizational transformation.

· the development of one or a few related analytics applications.

Auditing _________ the computer means auditors check inputs, outputs, and processing. · into · with · around · through

· through

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. · acceptance · avoidance · transference · limitation

· transference

The relational database model is based on the concept of ________-dimensional tables. · two · three · four · one

· two

If humans are careless with laptops, this is an _________ error which could cause theft of equipment or information (an _________ error). · intentional; intentional · unintentional; unintentional · unintentional; intentional · intentional; unintentional

· unintentional; intentional

You are the CEO of Widgets R Us. You know your widgets need to be more efficient and cost less, so you ask R&D to develop a plan. This is a(n) _____ task and a(n) ______ decision. · structured; management control · structured; operational control · unstructured; operational control · unstructured; strategic planning

· unstructured; strategic planning

"Garbage in, garbage out" refers to _____. · a model that predicts people's behavior · using inaccurate data · creating a model that is not transparent · relying solely on a data analytics model to predict

· using inaccurate data

The _________ approach states that an ethical action is the one that provides the most good or does the least harm. · common good · fairness · deontology · rights · utilitarian

· utilitarian

Suppose you go through your neighborhood to figure out how many wireless networks are unsecure. This is __________. · war driving · an evil twin attack · eavesdropping · a rogue access point

· war driving

The procurement process originates in the ________ department and ends in the ________ department. · warehouse; warehouse · warehouse; accounting · accounting; sales · sales; accounting

· warehouse; accounting

Your professor hands you a piece of paper with the number 75 on it. This is ________. · data · information · knowledge · wisdom

Data

Chevron supported internal improvement efforts by getting its suppliers involved using a unified _________ approach that involved standardizing processes across the entire company and consolidating process information within a central repository. · BPM · BPR · BPC · BPI

· BPM

The ________ is the highest-ranking IS manager and is responsible for all strategic planning in the organization. · information center manager · CIO · IS Director · applications development manager

· CIO

Which of the following is NOT an organizational response to business pressures? · Mass customization · Developing strategic systems · Creating a digital divide · Focusing on customer wants

· Creating a digital divide

________ is a consultative function of the MIS department. · Managing computer operations, including the computer center · Creating business alliances with business partners · Managing systems development · Infrastructure planning, development, and control

· Creating business alliances with business partners

_________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires. · Quality · Productivity · Customer satisfaction · Differentiation

· Customer satisfaction

Which of the following has the strategy "I am better because I am different"? · Operational effectiveness · Differentiation · Innovation · Cost leader · Customer oriented

· Differentiation

A(n) ________ is an intraorganizational system. · supply chain system · human resources system · portal · E-commerce system

· E-commerce system

Information is knowledge that has been organized to have meaning and value. · True · False

· False

_________ is the second step in the general framework for ethics. · Act and reflect on the outcome of your decision · Evaluate alternative actions · Recognize an ethical issue · Get the facts · Make a decision and test it

· Get the facts

_________ is the second step in the general framework for ethics. · Evaluate alternative actions · Act and reflect on the outcome of your decision · Make a decision and test it · Recognize an ethical issue · Get the facts

· Get the facts

Which of the following is an accuracy issue? · Under what circumstances can one use proprietary databases? · How much should companies charge for permitting access to information in their databases? · How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? · What information about individuals should be kept in databases, and how secure is the information there?

· How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

IT services, IT personnel, and IT components make up the organization's ___________. · IT infrastructure · TPS · IT platform · ERP system

· IT infrastructure

_________ is an example of effectiveness. · Reducing production time by one day · Increasing customer satisfaction · Automating order entry · Using RFID to track products

· Increasing customer satisfaction

________ is organized so that it has meaning and value to the recipient. · Data · Knowledge · Wisdom · Information

· Information

_________ is a technology pressure. · Protection against terrorist attacks · Globalization · Reducing the digital divide · Information overload

· Information overload

Which of the following increases supplier power? · Globalization · Integrated supply chains · Intermediation · Internet searching

· Integrated supply chains

________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem. · Wisdom · Information · Knowledge · Data

· Knowledge

_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. · Accountability · Answerability · Responsibility · Liability

· Liability

________ handle the day-to-day operations of the organization and make routine decisions. · Knowledge workers · Clerical workers · Lower-level managers · Middle managers

· Lower-level managers

________ is a traditional function of the MIS department. · Creating business alliances with business partners · Initiating and designing specific strategic IS · Managing computer operations, including the computer center · Educating the MIS staff about the business

· Managing computer operations, including the computer center

________ is a consultative function of the MIS department. · Managing computer operations including the computer center · Managing system integration including the internet, intranets, and extranets · Staffing, training, and developing IS skills · Infrastructure planning, development, and control

· Managing system integration including the internet, intranets, and extranets

_________ is an example of a primary activity for most firms. · Operations · Human resource management · Product and technology development · Procurement

· Operations

Which of the following is NOT an example of excellent alignment? · Organizations ensure that IT employees understand how the company makes or loses money. · Organizations create a vibrant and inclusive company culture. · Organizations allow IT employees to develop overarching goals for the business. · Organizations view their internal and external customers and their customer service function as supremely important. · Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams. · Organizations rotate business and IT professionals across departments and job functions.

· Organizations allow IT employees to develop overarching goals for the business.

The best-known framework for analyzing competitiveness is ________'s competitive forces model. · Job · Porter · Mintzberg · Gates

· Porter

_________ issues involve the ownership and value of information. · Accuracy · Privacy · Accessibility · Property

· Property

_________ is a societal pressure. · Technological innovation and obsolescence · Protection against terrorist attacks · Globalization · Information overload

· Protection against terrorist attacks

Which of the following is TRUE? · Managers have more time to make decisions. · Computerization reduces our level of isolation. · Remote supervision will probably become a norm. · IT increases the number of middle managers.

· Remote supervision will probably become a norm.

_________ are people and equipment that perform process activities. · Outputs · Resources · Inputs · Employees

· Resources

_________ means that you accept the consequences of your decisions and actions. · Responsibility · Accountability · Answerability · Liability

· Responsibility

A(n) ________ supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data. · ERP · FAIS · TPS · DBS

· TPS

All employees have a responsibility to encourage ethical uses of information and information technology. · True · False

· True

An organization's business processes can be a competitive advantage or disadvantage. · True · False

· True

Data aggregators can collect public and non-public information to create digital dossiers. · True · False

· True

It costs less to operating an internet application today than it did 15 years ago. · True · False

· True

The right to privacy is recognized today in all the US states and by the federal government, either by statute or in common law. · True · False

· True

Which of the following is a property issue? · Under what circumstances can one use proprietary databases? · How much should companies charge for permitting access to information in their databases? · How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? · What information about individuals should be kept in databases, and how secure is the information there?

· Under what circumstances can one use proprietary databases?

Companies like Google and Facebook make their money by selling your information to advertisers. This is an example of an ethical issue that falls into the category of ________. · privacy · accessibility · accuracy · property

· accessibility

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. · property · privacy · accessibility · accuracy

· accuracy

The ________ coordinates and manages new systems development projects. · IS Director · applications development manager · CIO · information center manager

· applications development manager

A(n) ________ focuses on designing solutions for business problems and interfaces closely with users to demonstrate how IT can be used innovatively. · business analyst · systems programmer · emerging technologies manager · systems analyst

· business analyst

A(n) ________ forecasts technology trends and evaluates and experiments with new technologies. · emerging technologies manager · systems programmer · systems analyst · business analyst

· emerging technologies manager

The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis. · financial; Wells Fargo bank · operational; Wells Fargo bank · financial; Enron · operational; Enron

· financial; Enron

American companies can easily do business with Chinese companies. This is phenomenon is called ________. · technological innovation and obsolescence · protection against terrorist attacks · information overload · globalization

· globalization

_________ is a market pressure. · information overload · globalization · protection against terrorist attacks · technological innovation and obsolescence

· globalization

Buyer power is high when buyers have _________ choices from whom to buy and low when buyers have _________ choices. · many; many · few; many · many; few · few; few

· many; few

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. · sign-up · opt-out · sign-out · opt-in

· opt-out

Threat of substitute products or services refers to companies _________ the industry; rivalry refers to companies _________ the industry. · inside; inside · inside; outside · outside; inside · outside; outside

· outside; inside

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach. · deontology · rights · fairness · utilitarian · common good

· rights

A(n) ________ is an interorganizational system. · ERP system · TPS · human resources system · supply chain system

· supply chain system

The music and newspaper industries were hurt primarily by _________. · supplier power · threat of substitutes · buyer power · threat of new entrants

· threat of substitutes

When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) ______________. · analysis; APS · analysis; TPS · transaction; TPS · transaction; APS

· transaction; TPS

TPSs are inputs for FAIS. · True · False

· True

_________ analytics is the first step in data reduction. · Descriptive · Predictive · Prescriptive · Useful

Descriptive

__________ analytics answers the question "what has happened". · Descriptive · Predictive · Prescriptive · Useful

Descriptive

If you grew up using IT, you are an informed user. · True · False

False

Nearly all TPSs are ERP systems. · True · False

False

Only computer science majors can become CIOs. · True · False

False

Social networks and mobile commerce are the greatest sources of e-commerce in Vietnam. · True · False

· True

135.62.128.91 is an example of an ________ address. · IPv6 · IPv4 · IPv2 · IPv8

· IPv4

________ consists of 32 bits. · IPv8 · IPv4 · IPv6 · IPv2

· IPv4

________ consists of 128 bits. · IPv8 · IPv6 · IPv4 · IPv2

· IPv6

________ was developed to address the Internet of Things. · IPv4 · IPv6 · IPv8 · IPv2

· IPv6

The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan. · IT architecture · organization mission · IS operational plan · organization strategic plan

· IS operational plan

If you were to measure age, education level, and marital status to predict income, which is the dependent variable? · Age · Education Level · Marital Status · Income

· Income

The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets. · application · transport · Internet · network interface

· Internet

The ________ functions as a transport mechanism; the ________ is an application. · Internet; World Wide Web · World Wide Web; Internet · World Wide Web; intranet · Internet; intranet

· Internet; World Wide Web

Which of the following is an advantage of JAD? · Bypasses the IS department and avoids delays · Works wells for ill-defined problems · Enforces quality by maintaining standards · Involves many users in the development process

· Involves many users in the development process

Which of the following is NOT an objective of the IT strategic plan? · It must efficiently allocate IS development resources among competing projects. · It must be aligned with the organization's strategic plan. · It must meet the needs of every functional area to ensure employee buy-in. · It must provide for an IT architecture that seamlessly networks users, applications, and databases.

· It must meet the needs of every functional area to ensure employee buy-in.

_________ is a group-based tool for collecting user requirements and creating system designs. · End-user development · Agile development · RAD · JAD

· JAD

Medium-range wireless networks are ________ technology. · WAN · LAN · PAN · MAN

· LAN

A large number of ________ satellites are needed for global coverage. · MEO · VEO · GEO · LEO

· LEO

Satellite telephone services are provided through ________ satellites. · MEO · VEO · LEO · GEO

· LEO

________ satellites are the least expensive to build and launch. · LEO · VEO · MEO · GEO

· LEO

________ is the customer's potential revenue stream over a number of years. · Market capitalization · Lifetime value · Customer churn · Customer life cycle

· Lifetime value

________ is an example of a group shopping website. · LivingSocial · Facebook · Tujia · Uber

· LivingSocial

________ is NOT an example of collaborative consumption. · Mass customization · Peer-to-peer lending · Collaborative production · Crowdfunding

· Mass customization

Which of the following statement regarding Backyard Adventures is false? · The Fishbowl system connects all of Backyard Adventure's distributors and allows them to share information. · The Fishbowl system specifically supports the manufacturing and warehouse environment. · The Fishbowl inventory management system is not able to integrate with Quickbooks. · The Backyard Adventure's website allows customers to locate the closest dealer and customize playsets online.

· The Fishbowl inventory management system is not able to integrate with Quickbooks.

_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction. · A mobile portal · The IoT · UWB · A wireless network

· The IoT

Which of the following statements regarding Three Square Market's microchip program is NOT true? · The company sells the microchip on their website. · The embedded chip provides access to the company's information systems eliminating the need for employees to have a password. · The microchip program is required for all employees. · The embedded chip provides physical access to the company.

· The microchip program is required for all employees.

What could be a problem with an employment model that uses testing to predict applicant success? · The model allows employers the ability to discard several candidates upfront. · The model does not learn from its previous decisions. · The model could be based on currently effective employees. · Employers might only rely on a predictive model to make decisions.

· The model does not learn from its previous decisions.

________ is a disadvantage of EDI. · Message length · Productivity · The number of standards Security

· The number of standards

Which of the following best defines data governance? · The process of putting standards, processes, and definitions about data in place · Data security · Using data effectively · Data completeness

· The process of putting standards, processes, and definitions about data in place

________ allows shoppers to create profiles and blogs about their favorite products in social communities. · Stylehive · InStyle · Epinions · ThisNext

· ThisNext

Affinity analysis is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups. · True · False

· True

An ASP hosts both an application and a database for each customer. · True · False

· True

An RFQ is associated with a reverse auction. · True · False

· True

An intranet is a trusted network. · True · False

· True

Backyard Adventure's inventory management system integrates with Quickbooks. · False · True

· True

Channel conflict and order fulfillment are the two most significant issues in e-tailing. · True · False

· True

Collaborative consumption services help establish a more sustainable global environment. · True · False

· True

Competitive intelligence is legal while espionage is illegal even though both involve collecting information about competitors. · True · False

· True

Cybercrime is typically nonviolent but lucrative. · True False

· True

Data from customer-facing and customer-touching applications are the inputs for analytical CRM systems. · True · False

· True

Data marts support the development of one or a few related analytics applications. · True · False

· True

Data warehouses and data marts are multidimensional. · True · False

· True

Download speed is much faster than upload speed when defining the term broadband. · True · False

· True

E-business is a broader concept than e-commerce. · True · False

· True

Experts argue business analytics and business intelligence should be used interchangeably. · True · False

· True

Google is useful only if users already know what they are looking for, while Pinterest exposes people to possibilities that they never would have known existed. · True · False

· True

If a hacker enters a building with an official-looking ID badge. This is considered social engineering. · True · False

· True

KMS are useful for creating best practices in an organization. · True · False

· True

Modern smartphones exhibit a process called dematerialization. · True · False

· True

Most US utilities are not using TaKaDu to track water leaks. · True · False

· True

Most states require Amazon to collect sales taxes. · True · False

· True

Organizations can use Big Data to conduct experiments. · True · False

· True

Privacy rights apply to individuals, groups, and institutions. · True · False

· True

Satellite TV runs using GEO satellites. · True · False

· True

Senior executives typically handle strategic planning decisions. · True · False

· True

Which of the following is a privacy issue? · How can we ensure that the information will be processed properly and presented accurately to users? · What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? · What information about oneself should an individual be required to reveal to others? · How should we handle illegally copying copyrighted software?

· What information about oneself should an individual be required to reveal to others?

________ is a wide-area wireless network. · MiFi · LTE · NFC · WiMAX

· WiMAX

________ are an example of harnessing collective intelligence. · Web services · Tags · Mashups · Wikis

· Wikis

________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures. · A workgroup · A virtual team · Workflow · Collaboration

· Workflow

Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked with _________ in 2016. · a SCADA attack · alien software · espionage · a DDoS

· a DDoS

A wiki is _________. · a collection of blog postings on a subject · an online encyclopedia · a Web site on which anyone can post material and make changes to already posted material · a site to access podcasts and netcasts

· a Web site on which anyone can post material and make changes to already posted material

You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. · social engineering; unintentional · a human error; intentional · social engineering; intentional · a human error; unintentional

· a human error; unintentional

You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake. · social engineering; intentional · a human error; unintentional · social engineering; unintentional · a human error; intentional

· a human error; unintentional

You lose the company's USB with your sales spreadsheets on it. This is _________ and is an _________ mistake. · social engineering; intentional · a human error; intentional · social engineering; unintentional · a human error; unintentional

· a human error; unintentional

If you bring your own router to school to set-up Wi-Fi but do not have permission from your university to do this, this is ________. · eavesdropping · a rogue access point · war driving · an evil twin attack

· a rogue access point

Really simple syndication is _________. · an easy way to subscribe to a magazine to be delivered to your home · a system that allows you to receive information from sites you identify without having to go to the individual Web sites · a very popular Web site · a replacement for going to the Web

· a system that allows you to receive information from sites you identify without having to go to the individual Web sites

If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person's knowledge, this is ________. · eavesdropping · an evil twin attack · war driving · a rogue access point

· an evil twin attack

The end product of the _________ stage is a set of system requirements. · investigation · operation · design · analysis

· analysis

The primary purpose of the systems _________ stage is to gather information about the existing system to determine the requirements for an enhanced system or a new system. · analysis · design · investigation operation

· analysis

TaKaDu designed cloud-based ___________ software to ___________. · analytics; detect water leaks · analytics; help customers choose the most appropriate martial arts style · intelligence; detect water leaks · intelligence; help customers choose the most appropriate martial arts style

· analytics; detect water leaks

The first step in the information systems planning process is to ________. · evaluation the potential IT architecture · consider potential IS development projects · create an IS strategic plan · analyze the organization's strategic plan

· analyze the organization's strategic plan

The ________ layer of TCP/IP enables client application programs to access the other layers. · transport · network interface · application · Internet

· application

The _________ is/are a prioritized inventory of present applications and a detailed plan of projects to be developed or continued during the current year. · application portfolio · IS environment · constraints of the IS function · objectives of the IS function

· application portfolio

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs. · into · with · through · around

· around

Each characteristic or quality of a particular entity is called a(n) ________. · field · record · instance · attribute

· attribute

RFID was developed to replace ________. · bar codes · NFC · UWB · QR codes

· bar codes

If your organization collects transactions and processes them at night, this is called _________. · OLAP · OLTP · source data processing · batch processing

· batch processing

Amazon uses a _________-end CRM system because it ________. · high; coordinates staff activities in a campaign to sell its products · high; recommends products to returning customers · low; coordinates staff activities in a campaign to sell its products · low; recommends products to returning customers

· low; recommends products to returning customers

In the ________ component of SCM, supply chain managers schedule the activities necessary for production, testing, packaging, and preparation for delivery. · source · plan · deliver · make · return

· make

A vertical line with a "chicken leg" to the entity represents the ________ cardinality symbol. · optional single · mandatory single · mandatory many · optional many

· mandatory many

Two vertical lines represent the ________ cardinality symbol. · mandatory single · mandatory many · optional single · optional many

· mandatory single

An electronic _________ is a central, virtual market space on the web where many buyers and many sellers can conduct e-commerce and e-business activities. · storefront · mall · marketplace · auction

· marketplace

The blogosphere is defined as _________. · the program that allows you to post and maintain blogs on the Web · the group of people whose opinions are influenced by blogs · millions of blogs on the Web · a list of the most popular blogs on the Web

· millions of blogs on the Web

Backyard Adventures sells ___________. · picnic supplies · specialized landscaping · patio furniture · modular playsets

· modular playsets

The ________ layer of TCP/IP places packets on, and receives them from, the network medium, which can be any networking technology. · network interface · transport · application · Internet

· network interface

Job coaches recommend spending most of your time ________ to get a job. · educating yourself · online · networking · talking to headhunters

· networking

Data marts and data warehouses are ________; this means they ________ be updated by users. · volatile; can · volatile; cannot · non-volatile; cannot · non-volatile; can

· non-volatile; cannot

In ________, manufacturers or retailers sell directly to customers. · online direct marketing · viral marketing · affiliate marketing · electronic tendering

· online direct marketing

Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system. · open-source · on-premise · social · mobile

· open-source

Considering the nature of decisions, executing specific tasks efficiently and effectively is · financial planning. · management control. · operational control. · strategic planning.

· operational control.

Europeans and privacy advocates prefer the _________ model of informed consent. · sign-out · sign-up · opt-out · opt-in

· opt-in

A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. · optional many · mandatory many · optional single · mandatory single

· optional many

A _________ conversion introduces components of the new system in stages. · parallel · phased · direct · pilot

· phased

Your company decides to implement the manufacturing module of SAP before implementing payroll. This is an example of _________ conversion. · parallel · direct · phased · pilot

· phased

Your company decides to implement the manufacturing module of SAP before implementing payroll. This is an example of _________ conversion. · parallel · direct · pilot · phased

· phased

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________. · social engineering; illegal · piracy; illegal · piracy; legal · social engineering; legal

· piracy; illegal

Intellectual property is NOT protected under _________ laws. · patent · copyright · privacy · trade secret

· privacy

The ________ process originates in the warehouse department and ends in the accounting department. · marketing · production · fulfillment · procurement

· procurement

With ________, customers use the internet to self-configure products or services. · bartering online · group purchasing · electronic exchanges · product customization

· product customization

The _________ represents the business users and any other stakeholders in the project. · scrum master · product owner · program developer · team

· product owner

Amazon uses a(n) ________ SCM system. · mobile · open-source · social · proprietary, on-premise

· proprietary, on-premise

In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking. · public; private · public; public · private; public · private; private

· public; private

Social computing forces companies to deal with customers ________ as opposed to ________. · retroactively; proactively · reactively; proactively · proactively; retroactively · proactively; reactively

· reactively; proactively


Related study sets

Accounting 101: Chapter 1-3 Exam

View Set

MARK4265 - CRM Final Exam (Chapters 7-12)

View Set

Compensation Test 3 Chapter 8 Slides

View Set

Osmoregulation VS Osmoconformers

View Set

Anatomy & Physiology I Exam 1 Study

View Set

Prioritization, Delegation, Mentoring, and Staff Development

View Set

CHAPTER 6/7, Audit Chapter 25, Auditing Chapter 6, Flashcards, Five components of COSO Internal control framework (CRIME), Cases, ADVANCED AUDITING FINAL PREP, ASC Judgement, Week 2 - Case 4.4: Waste Management Inc., Flashcards

View Set