IS 3310

Your page rank:

Total word count: 7783
Pages: 28

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

You work for a highly successful advertiser that is about to expand nationally. Of utmost importance will be finding a way to store and disseminate its clients’ frequently updated branding and style guides throughout the organization. The guides include multiple image files and text documents. What system will best serve these needs?

-An extranet with KMS capabilities
-A TPS with KMS capabilities
-A wiki
-A telepresence system
-A virtual world

An extranet with KMS capabilities

Which of the following would not be considered part of the implementation phase of problem solving?

-Purchasing hardware for an information systems solution
-Change management
-Training an employee on new systems software
-Determining the attitude of employees about the solution.
-Evaluating a selection of software packages for implementing a new business process

Evaluating a selection of software packages for implementing a new business process

All of the following describe the effects of globalization except:

-significant decreases in operating costs.
-replication of business models in multiple countries.
-reduction of labor costs through outsourcing.
-ability to find low-cost suppliers.
-increases in transaction costs.

increases in transaction costs.

the enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as:

-big data.
-business intelligence.
-cloud computing.
-IoT.
-the mobile digital platform.

big data

Financial managers work directly with ________ to ensure investments in information systems help achieve corporate goals.

-operations managers
-accounting managers
-knowledge workers
-marketing managers
-senior managers

senior managers

A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives?

-Operational excellence
-Survival
-Customer intimacy
-Competitive advantage
-Improved decision making

survival

Engineers and scientists are examples of:

-knowledge workers.
-operational management.
-middle management.
-senior management.
-production workers.

knowledge workers.

As discussed in the chapter case, what is the primary reason why Spacebook failed?

-It was designed and developed without taking the organization’s culture into consideration.
-It was too expensive to implement.
-Its user interface was confusing.
-It was riddled with technical issues.
-It did not include enough collaboration tools.

It was designed and developed without taking the organization’s culture into consideration.

inadequate database capacity is an example of the ________ dimension of business problems.

-organizational
-technology
-cultural
-management
-people

technology

The six important business objectives of information system investment include all of the following except:

-survival.
-new products.
-competitive advantage.
-employee morale.
-improved decision making.

employee morale

Telepresence is an example of which of the following?

-Social business
-Virtual meeting
-Business intelligence
-Mobile digital platform
-IoT

Virtual meeting

Data management technology consists of:

-the software governing the organization of data on physical storage media.
-the hardware and software used to transfer data.
-the universally accepted standards for storing data.
-the physical hardware and media used by an organization for storing data.
-the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.

the software governing the organization of data on physical storage media.

As described in the chapter case, which of the following constitutes an organizational element in the UPS tracking system?

-Promoting the company strategy of low-cost, superior service
-The specification of procedures for identifying packages with sender and recipient information
-Monitoring service levels
-Routing software that creates the most efficient delivery route for each driver
-The use of handheld computers and networks for managing package delivery

The specification of procedures for identifying packages with sender and recipient information

In 2015, what percent of Internet users will access the web through mobile devices?

-Around 25 percent
-More than 75 percent
-50 percent
-More than 60 percent
-Less than 15 percent

More than 60 percent

The average number of baseball tickets sold at a particular price is an example of:

-input.
-raw data.
-output.
-meaningful information.
-feedback.

meaningful information

Which of the following is an interorganizational business process?

-Creating financial statements
-Hiring an employee
-Ordering raw materials
-Checking product quality
-Identifying a customer

Ordering raw materials

Which of the following fields deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm?

-Management information systems
-Information systems architecture
-Information systems literacy
-Computer information systems
-Information technology infrastructure

Management information systems

________ is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format.

-An extranet
-Email
-HTML
-FTP
-The World Wide Web

the world wide web

Which of the following is an example of a business using information systems to create new products and services?

-Walmart’s Retail Link’s system
-Apple’s creation of the iPad
-JC Penney’s information system that allows its contract manufacturers to see what garments have been sold and need to be replaced
-The Mandarin Oriental’s use of computers to keep track of guests’ preferences
-Verizon’s web-based digital dashboard providing real-time company information for managers

Apple’s creation of the iPad

Which of the following types of systems could be used to enable different firms to work collaboratively on a product?

-DSS
-KMS
-Intranet
-Extranet
-CRM

extranet

A computerized system that performs and records the daily activities necessary to conduct business is classified as a(n):

-decision support system.
-business intelligence system.
-management-level system.
-transaction processing system.
-executive support system.

transaction processing system.

The culture of UPS places service to the customer among the company’s highest business objectives, which is reflected in their use of information systems to enable customer tracking of their packages. Based on your reading of Chapter 1, why is "culture" an important factor to consider when building information system solutions to business problems?

-Culture is a cauldron of employee perspectives and conflicts, which can be used to improve business processes.
-Culture is one element that can be radically changed, not always for the better, by new information systems.
-Culture affects how information system solutions are implemented and used.
-Culture is the basis for organizational politics.
-Culture is the driving force behind decision making and innovation.

Culture affects how information system solutions are implemented and used.

All of the following can be considered managerial responsibilities except:

-allocating human resources to coordinate the work to be done.
-creating new products and services.
-setting strategy for responding to business challenges in the environment.
-designing new information systems.
-making action plans to solve organizational problems.

designing new information systems

All of the following are examples of environmental actors in an information system except:

-feedback.
-customers.
-competitors.
-stockholders.
-regulatory agencies.

feedback

As discussed in the chapter opening case, the San Francisco Giants are taking advantage of wireless technology to do which of the following?

-Enhance fan experience
-Perform data analysis
-Implement dynamic ticket pricing
-Improve decision making
-Achieve operational excellence

Enhance fan experience

The Internet raises the bargaining power of customers most effectively by:

-creating new opportunities for building loyal customer bases.
-reducing barriers to entry.
-making information available to everyone.
-lowering transaction costs.
-making more products available.

making information available to everyone.

Which of the following statements about network economics is not true?

-Information technology can be strategically useful from a network economics perspective.
-From a network economics perspective, the value of a community of people grows as the number of participants in the community increases.
-In network economics, the marginal cost of adding new members to the network is higher than the marginal gain.
-eBay is an example of a business model that is based on the principle of network economics.
-The law of diminishing returns does not always apply to every situation.

In network economics, the marginal cost of adding new members to the network is higher than the marginal gain.

In a ________ system configuration, separate information systems are designed and managed by each foreign unit.

-centralized
-networked
-decentralized
-duplicated
-virtual

decentralized

Customer definitions of the quality of a product include all of the following except:

-uniformity of the product.
-accuracy of the advertising with respect to the product.
-ease of use of the product.
-customer support for the product.
-durability and safety of the product.

uniformity of the product

When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, ________ are created.

-synergies
-value chains
-core competencies
-value webs
-benchmarks

synergies

An information system can enhance core competencies by:

-allowing operational employees to interact with management.
-encouraging the sharing of knowledge across business units.
-providing better reporting facilities.
-creating educational opportunities for management.
-synchronizing the value chains of business partners with an industry.

encouraging the sharing of knowledge across business units.

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as:

-inelasticity.
-virtual economics.
-the law of diminishing returns.
-the point of no return.
-supply and demand.

the law of diminishing returns

According to the chapter case, the Nike+ ecosystem is part of which of the following larger phenomena?

-The Internet of Things
-CAD
-3-D printing
-TQM
-BPR

The Internet of Things

________ systems are those in which development occurs at the home base, but operations are handed over to autonomous units in foreign locations.

-Networked
-Decentralized
-Duplicated
-Virtual
-Transnational

duplicated

Which of the following is the first step in BPM?

-Identify processes for change.
-Identify synergies.
-Improve design quality and precision.
-Reduce cycle time and simplify the production process.
-Extend the value chain.

Identify processes for change.

Which of the following statements about BPR is not true?

BPR is the easiest type of BPM to implement.
BPR can lead to dramatic gains in productivity and efficiency.
BPR can result in a paradigm shift.
BPR typically involves radical change.
Amazon is an example of BPR.

BPR is the easiest type of BPM to implement.

Which of the following is not a true statement about value webs?

-Value webs involve a collection of independent firms that use information technology to coordinate their value chains.
-Value webs are inflexible and cannot adapt quickly to changes in supply and demand.
-Value webs operate in a less linear fashion than traditional value chains..
-Value webs involve highly synchronized industry value chains.
-Value webs are more customer-driven than traditional value chains.

Value webs are inflexible and cannot adapt quickly to changes in supply and demand.

Which of the following is not an advantage for new companies entering the marketplace?

They can establish new relationships with suppliers.
They can often hire younger, less expensive workers.
They are more highly motivated.
They are not locked into an existing brand image.
They can implement new systems and equipment

They can establish new relationships with suppliers.

________ is the ability to offer individually tailored products or services using the same production resources as bulk production.

-Demand customization
-CAD
-Mass customization
-Size customization
-Personalization

Mass customization

Caterpillar Corporation is example of which of the following?

-Domestic exporter
-Virtual company
-Transnational
-Franchiser
-Multinational

domestic exporter

Which of the following statements about 3-D printing is not true?

-3-D printing is also known as additive manufacturing.
-3-D printing can create objects from plastic, metal, or composite materials.
-3-D printing is often used to fashion items for small production runs.
-CAD systems supply data for 3-D printing.
-Unlike traditional techniques, 3-D printing results in some wasted material.

Unlike traditional techniques, 3-D printing results in some wasted material.

Which of the following industries has the lowest barrier to entry?

-Small retailer
-Airline
–Solar energy
-Computer chip
-Automotive

Small retailer

Which of the following illustrates the use of information systems to focus on market niche?

-A hot tub dealer’s use of information systems to determine which models and options its customers are most likely to buy
-A shoe manufacturer’s use of information systems in selling custom, made-to-order shoes directly to customers
-A PC manufacturer’s use of information systems to facilitate direct access from suppliers to production schedules
-A grocery store chain’s use of information systems to produce products and services at a lower price than competitors
-An airline’s use of information systems to analyze detailed data on customers to determine each customer’s profitability

A hot tub dealer’s use of information systems to determine which models and options its customers are most likely to buy

Which of the following is not one of the competitive forces in Porter’s model?

-Suppliers
-Technology
-Other competitors
-Customers
-External environment

external environment

The most successful solutions or methods for achieving a business objective are called:

-value webs
-core processes.
-best processes.
-best practices.
-benchmarks.

best practices.

The ________ strategy concentrates financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries.

-transnational
-franchise
-multinational
-domestic exporter
-virtual company

multinational

How are information systems used at the industry level to achieve strategic advantage?

-By enabling companies to develop customer intimacy
-By enforcing standards that reduce the differences between competitors
-By raising the bargaining power of suppliers
-By building industry-wide, IT-supported consortia and symposia
-By encouraging the entry of new competitors

By building industry-wide, IT-supported consortia and symposia

A firm can exercise greater control over its suppliers by having:

-fewer suppliers.
-more suppliers.
-only a single supplier.
-global suppliers.
-local suppliers.

more suppliers

________ typically develop a single information system, usually at the home base, and then replicate it around the world.

-Transnational firms
-Franchisers
-Domestic exporters
-Virtual companies
-Multinational firms

Franchisers

Which of the following technologies permits service calls to U.S. companies to be answered in India just as easily and inexpensively as if the help desk were in the United States?

-Software as a web service
-Internet telephony
-TQM
-Cellular networks
-The World Wide Web

Internet telephony

The main challenge coming to Microsoft’s Office software suite will be:

-Apple’s iWork.
-open-source, Linux-based suites such as OpenOffice.
-mobile software.
-cloud-based productivity software such as Google Docs and Google Apps.
-in-house, custom software created using open-source web services.

cloud-based productivity software such as Google Docs and Google Apps.

Which of the following is an example of a legacy system?

Answers:
-MDM software
-Quantum computing system
-Web services running on a cloud computing platform
-Scalable grid computing system
-Transaction processing system running on a mainframe

Transaction processing system running on a mainframe

The world’s data centers use as much energy as the output of ________ nuclear power plants, which is about ________ percent of all the energy use in the world.

Answers:
-100; 25
-30; 1.5
-20; 2.5
-50; 10
-10; 1

30; 1.5

In a relational database, a record is also called a(n):

Answers:
-table.
-entity.
-field.
-key field.
-tuple.

tuple

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends:

Answers:
-in one short mark.
-with a crow’s foot.
-with a crow’s foot preceded by a short mark.
-in three short marks.
-in two short marks.

with a crow’s foot preceded by a short mark.

The project operation:

Answers:
-combines relational tables to provide the user with more information than is otherwise available.
-stores definitions of data elements.
-organizes elements into segments.
-creates a subset consisting of columns in a table.
-identifies the table from which the columns will be selected.

creates a subset consisting of columns in a table.

Which of the following statements about data warehouses is not true?

Answers:
-Data warehouses make data available for anyone to access as needed.
-Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities.
-They store supply data to be used across the enterprise for management analysis and decision making.
-Data warehouse systems provide easy-to-use tools for managers to easily update data.
-They may include data from website transactions.

Data warehouse systems provide easy-to-use tools for managers to easily update data.

Translating software to different languages is commonly referred to as:

Answers:
-outsourcing.
-open sourcing.
-scaling.
-service-oriented architecture.
-software localization.

software localization.

Microsoft Excel is an example of:

Answers:
-word processing software.
-presentation graphics software.
-presentation graphics.
-data management software.
-spreadsheet software.

spreadsheet software.

DBMS typically include report-generating tools in order to:

Answers:
-display data in tables.
-display data in graphs.
-perform predictive analysis.
-retrieve and display data.
-display data in an easier-to-read-format.

display data in an easier-to-read-format.

In clustering, a data mining tool will find:

Answers:
-forecasts for future events.
-related predictions from existing values.
-several events grouped by time.
-new groupings within data.
-new associations.

new groupings within data.

What is the first step you should take in managing data for a firm?

Answers:
-Identify the data needed to run the business.
-Cleanse the data before importing it to any database.
-Remove redundancy.
-Normalize the data before importing to a database.
-Audit your data quality.

Identify the data needed to run the business.

A DBMS makes the:

Answers:
-physical database available for different logical views.
-relational database available for different physical views.
-physical database available for different relational views.
-relational database available for different analytical views.
-logical database available for different analytical views.

physical database available for different logical views

MySQL is a:

Answers:
-popular open-source DBMS.
-DBMS for desktop systems.
-DBMS for mobile devices.
-programming language.
-mainframe relational DBMS.

popular open-source DBMS.

The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources.

Answers:
-batch processing
-data freedom
-data redundancy
-data independence
-online processing

data redundancy

Which of the following is considered to be the fastest growing form of computing?

Answers:
-Nanocomputing
-Wearable computing
-Cloud computing
-Enterprise computing
-Green computing

cloud computing

Which of the following is the most prominent data manipulation language today?

Answers:
-Access
-Crystal Reports
-DB2
-Hadoop
-SQL

SQL

What is the foundation technology for web services?

Answers:
-UDDI
-HTML
-XML
-Java
-SOAP

XML

Which of the following would you use to find patterns in user interaction data recorded by web servers?

Answers:
-Web usage mining
-Web protocol mining
-Web content mining
-Web structure mining
-Web server mining

Web usage mining

In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n):

Answers:
-TCO.
-capacity plan.
-API.
-SLA.
-SOA.

SLA

Data mining is more ________ than OLAP.

Answers:
-query oriented
-multidimensional
-discovery driven
-streamlined
-data-focused

discovery driven

A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS.

Answers:
-client server
-database server
-application server
-web server
-online server

database server

Which of the following allows users to add, change, delete, or retrieve data in a database?

Answers:
-Data dictionary
-Query wizard tool
-Report generation tools
-Data manipulation language
-Attribute generation

Data manipulation language

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture.

Answers:
-multitiered client/server
-grid
–on-demand
-two-tiered client/server
-service-oriented

two-tiered client/server

What type of device gathers data and converts them into electronic form for use by the computer?

Answers:
-Optical storage
-SAN
-Magnetic storage
-Output device
-Input device

input device

Financial managers work directly with ________ to ensure investments in information systems help achieve corporate goals.

-marketing managers
-operations managers
-senior managers
-accounting managers
-knowledge workers

senior managers

Cisco’s WebEx is an example of which of the following types of collaboration tools?

-Team room
-Blog
-Online meeting
-Wiki
-Group calendar

Online meeting

Which of the following Google tools allows people to engage in group video chat?

-Google Docs
-Google Apps for Business
-Google Circles
-Google Hangouts
-Google Drive

Google Hangouts

A relocation control system that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of a/an:

-TPS.
-Correct MIS.
-KMS.
-ESS.
-CRM system

MIS

Legal compliance is an example of the ________ dimension of business problems.

-people
-organizational
-cultural
–management
-technology

PEOPLE

Producing a bill of materials is a responsibility of the ________ function.

-manufacturing and production
-finance and accounting
-technology
-sales and marketing
-human resources

manufacturing and production

The six important business objectives of information system investment include all of the following except:

-improved decision making.
-survival.
-competitive advantage.
-new products.
-employee morale.

employee morale.

The three principal levels of hierarchies within a business organization are:

-senior management, knowledge workers, and service workers.
-senior management, operational management, and data workers.
-senior management, data workers, and operational -management.
-senior management, operational management, and workers.
-senior management, middle management, and operational management.

-senior management, middle management, and operational management.

Key forces in a business’s immediate environment include:

-global events.
-stockholders.
-technological innovations.
-politic conditions.
-economic conditions.

stockholders

Which of the following can typically access a company’s intranet?

-The general public
-The firm’s employees
-The firm’s customers
-The firm’s outside contractors
-The firm’s suppliers

The firm’s employees

which of the following would not be considered part of the implementation phase of problem solving?

-Determining the attitude of employees about the solution.
-Purchasing hardware for an information systems solution
-Evaluating a selection of software packages for implementing a new business process
-Training an employee on new systems software
-Change management

Evaluating a selection of software packages for implementing a new business process

Telepresence is an example of which of the following?

-Business intelligence
-IoT
-Virtual meeting
-Mobile digital platform
-Social business

Virtual meeting

________ technology allows a videoconference participant to give the appearance of being present at a location other than his or her true physical location.

-Telepresence
-Mind mapping
-Virtual world
-Screen sharing
-Virtual reality

Telepresence

A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, usable by many parts of the business.

-TPS
-automatic reporting system
-MIS
-enterprise system
-DSS

enterprise system

________ is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format.

-Email
-FTP
-An extranet
-The World Wide Web
-HTML

The World Wide Web

Verizon’s implementation of a web-based digital dashboard to provide managers with real-time information, such as customer complaints, is an example of:

-competitive advantage.
-a new product.
-improved decision making.
-supplier intimacy.
-improved flexibility.

improved decision making.

An example of raw data from an automobile manufacturer would be:

-an average of 130 Subarus sold daily in New York in 2015.
-1,300 Subaru Outbacks sold during the first quarter 2015 in New York.
-annual sales of Subaru Outbacks increased 4.5 percent.
-1 Subaru Outback sold January 7, 2015 in Mount Kisco, New York for $25,000.
-an average sale price of $26,000 for all Subaru Outbacks sold during January 2015 in Mount Kisco, New York.

1 Subaru Outback sold January 7, 2015 in Mount Kisco, New York for $25,000.

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:

-responsibility.
-due process.
-accountability.
-liability.
-the courts of appeal.

due process.

The NAI is an industry association formed to help with which of the following?

-Copyright protection
-Patent protection
-Trade secret protection
-Trademark protection
-Online privacy issues

Online privacy issues

The introduction of new information technology has:

-a ripple effect, raising new ethical, social, and political issues.
-no impact.
-a waterfall effect in raising ever more complex ethical issues.
-a dampening effect on the discourse of business ethics.
-a beneficial effect for society as a whole, while raising dilemmas for consumers.

a ripple effect, raising new ethical, social, and political issues.

An information system can enable a company to focus on a market niche through:

-tailoring products to the client.
-complex trend forecasting.
-intensive product trend analysis.
-intensive customer data analysis.
-tightening linkages with suppliers.

intensive customer data analysis.

Which of the following illustrates the use of information systems to achieve product differentiation?

-A hot tub dealer’s use of information systems to determine which models and options its customers are most likely to buy
-A shoe manufacturer’s use of information systems in selling custom, made-to-order shoes directly to customers
-A PC manufacturer’s use of information systems to facilitate direct access from suppliers to production schedules
-A grocery store chain’s use of information systems to produce products and services at a lower price than competitors
-A hotel chain’s use of information systems to analyze detailed data on guests to determine each guest’s profitability

A shoe manufacturer’s use of information systems in selling custom, made-to-order shoes directly to customers

In a ________ system configuration, separate information systems are designed and managed by each foreign unit.

-networked
-centralized
-decentralized
-virtual
-duplicated

decentralized

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy?

-Firms should limit the length of time that any personal data is stored to six months or less.
-Firms should build products and services that protect privacy.
-Firms should adopt privacy by design.
-Firms should increase the transparency of their data collection.
-Firms should require consumer consent and provide clear options to opt out of data collection.

Firms should limit the length of time that any personal data is stored to six months or less.

How are information systems used at the industry level to achieve strategic advantage?

-By raising the bargaining power of suppliers
-By encouraging the entry of new competitors
-By enabling companies to develop customer intimacy
-By building industry-wide, IT-supported consortia and symposia
-By enforcing standards that reduce the differences between competitors

By building industry-wide, IT-supported consortia and symposia

Customer definitions of the quality of a product include all of the following except:

-customer support for the product.
-uniformity of the product.
-durability and safety of the product.
-accuracy of the advertising with respect to the product.
-ease of use of the product.

uniformity of the product.

________ typically develop a single information system, usually at the home base, and then replicate it around the world

-Multinational firms
-Domestic exporters
-Franchisers
-Transnational firms
-Virtual companies

Franchisers

All of the following could be considered substitute products for industrial electricity generation except:

-ethanol.
-coal.
-hydro-power.
-wind.
-solar.

ethanol

The U.S. CAN-SPAM Act:

-has dramatically cut down spamming.
-requires commercial email senders to identify themselves.
-has not yet gone into effect.
-does not override state anti-spamming laws.
-makes spamming illegal.

requires commercial email senders to identify themselves.

Which of the following is not one of the four basic strategies a company can employ to deal with competitive forces?

-Differentiate products
-Focus on market niche
-Strengthen customer and supplier intimacy
-Low-cost leadership
-Compete on employee loyalty

Compete on employee loyalty

Which of the following is not one of the competitive forces in Porter’s model?

-Other competitors
-External environment
-Customers
-Technology
-Suppliers

External environment

The Internet raises the bargaining power of customers most effectively by:

-lowering transaction costs.
-making information available to everyone.
-reducing barriers to entry.
-creating new opportunities for building loyal customer bases.
-making more products available.

making information available to everyone.

Benchmarking:

-allows industry participants to develop industry-wide standards.
-coordinates the value chains of independent firms to enable them to collectively produce a product or service.
-synchronizes the business processes of customers, suppliers, and trading partners.
-is used to measure the speed and responsiveness of information technology.
-compares the efficiency and effectiveness of your business processes against strict standards.

compares the efficiency and effectiveness of your business processes against strict standards.

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

-accountability.
-liability.
-responsibility.
-due process.
-ethics.

responsibility.

An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except:

-the volume of transactions.
-the minimum response time for processing business transactions.
-the maximum number of users a system can accommodate at one time.
-the purchase price of new computer hardware equipment.
-the impact of future software applications.

the purchase price of new computer hardware equipment.

A(n) ________ is a set of self-contained services that communicate with each other to create a working software application.

-web service
-hybrid cloud
-SOA
-ERP
-mashup

SOA

The logical view of a database:

-allows the creation of supplementary reports.
-presents data as they would be perceived by end users.
-presents an entry screen to the user.
-shows how data are organized and structured on the storage media.
-shows the relationships between entities and attributes.

presents data as they would be perceived by end users.

The ability of a person booking a flight on Southwest.com’s website to reserve a car from Dollar Rent-A-Car without having to leave the airline’s website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following?

-Web services
-SaaS
-PaaS
-Nanotechnology
-Cloud computing

Web services

Which of the following is an example of a pre-digital database?

-A doctor’s office invoice
-An SQL database
-A library’s card-catalog
-A list of sales totals on a spreadsheet
-A cash register receipt

A library’s card-catalog

Data mining is more ________ than OLAP.

-streamlined
-data-focused
-multidimensional
-query oriented
-discovery driven

discovery driven

Software used to apply the computer to a specific task for an end user is called:

-system software.
-application software.
-data management software.
-network software.
-web services software.

application software.

Which of the following statements is not true about cloud computing?

-It is the fastest-growing form of computing.
-It allows smaller firms to use resources previously unaffordable.
-Charges for cloud resources are based on resources actually used.
-It relies on the Internet as the platform for delivering services to users.
-It removes the concern about data and systems security for businesses.

It removes the concern about data and systems security for businesses.

An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except:

-lost productivity if hardware or software failures cause the system to be unavailable for processing and user tasks.
-the purchase or license of software for each user.
-the minimum response time for processing business transactions.
-real estate and utility costs for housing and providing power for the technology.
-the cost to provide training to information systems specialists and end users.

the minimum response time for processing business transactions.

In clustering, a data mining tool will find:

-new groupings within data.
-forecasts for future events.
-new associations.
-several events grouped by time.
-related predictions from existing values.

new groupings within data.

Which of the following database types would be best suited for storing multimedia?

-SQL DBMS
-NoSQL DBMS.
-Open-source DBMS
-Cloud-based database
-Non-relational DBMS

Non-relational DBMS

The business case for using grid computing involves all of the following except:

-agility.
-speed of computation.
-centralized maintenance.
-cost savings.
-increased computational power.

centralized maintenance.

Which of the following is an interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking?

-UNIX
-Chrome
-OS X
-Linux
-COBOL

UNIX

All of the following are features of smartwatches except a(n):

-barometer.
-compass.
-gyrometer.
-altimeter.
-accelerometer.

gyrometer.

You use ________ to predict when a computer hardware system becomes saturated.

-capacity planning
-virtualization
-SLAs
-localization
-measured service

capacity planning

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

-application proxy filtering
-stateful inspection
-high availability computing
-deep packet inspection
-fault-tolerant computing

deep packet inspection

CryptoLocker is an example of which of the following?

-Evil twin
-SQL injection attack
-Ransomware
-Sniffer
-Trojan Horse

Ransomware

The advanced networking consortium representing more than 500 universities, businesses, and government agencies is known as:

-IAB.
-ICANN.
-Internet2.
-W3C.
-FCC.

Internet2

Which of the following is not a characteristic of packet switching?

-Packets travel independently of each other.
-Packets are routed through many different paths.
-Packets include data for checking transmission errors.
-Packet switching makes efficient use of a network’s communications capacity.
-Packet switching requires point-to-point circuits.

Packet switching requires point-to-point circuits.

An example of phishing is:

-flooding a web server with thousands of requests for service.
-malware that displays annoying pop-up messages.
-a program that records the keystrokes on a computer.
-sending bulk email that asks for financial aid under a false pretext.
-setting up a fake medical website that asks users for confidential information.

setting up a fake medical website that asks users for confidential information.

Which of the following statements about botnets is not true?

-Ninety percent of the world’s spam is delivered by botnets.
-Botnets are often used for click fraud.
-Botnets are often used to perpetrate DDoS attacks.
-It is not possible to make a smartphone part of a botnet.
-Eighty percent of the world’s malware is delivered by botnets.

It is not possible to make a smartphone part of a botnet.

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

-Symmetric key encryption
-Public key encryption
-Private key encryption
-SSL
-TLS

Symmetric key encryption

The most common web server today, controlling 65 percent of the market, is:

-Netscape Server.
-WebSTAR.
-Apache HTTP Server.
-IBM NetServer.
-Microsoft IIS.

Apache HTTP Server.

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

-hot spot
-wireless sensor
-server
-access point
-wireless router

access point

Which of the following services enables logging on to one computer system and working on another?

-T1 lines
-World Wide Web
-LISTSERV
-FTP
-Telnet

Telnet

For 100 percent availability, online transaction processing requires:

-a multi-tier server network.
-dedicated phone lines.
-deep packet inspection.
-high-capacity storage.
-fault-tolerant computer systems.

fault-tolerant computer systems.

A salesperson clicks repeatedly on the online ads of a competitor’s in order to drive the competitor’s advertising costs up. This is an example of:

-click fraud.
-pharming.
-sniffing.
-phishing.
-spoofing.

click fraud

The Internet is based on which three key technologies?

-Client/server computing, packet switching, and HTTP
-TCP/IP, HTML, and HTTP
-HTTP, Web 3.0, and the mobile platform
-Client/server computing, packet switching, and the development of communications standards for linking networks and computers
-TCP/IP, HTTP, and packet switching

Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Which of the following statements about RFID is not true?

-Microchips embedded in RFIDs are used to store data.
-RFIDs require line-of-sight contact to be read.
-RFIDs use an antenna to transmit data.
-RFIDs can track individual units within a shipment.
-RFIDs transmit only over a short range.

RFIDs require line-of-sight contact to be read.

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

-Authentication
-Software
-Data security
-Administrative
-Implementation

Data security

Digital subscriber lines:

-are very-high-speed data lines typically leased from long-distance telephone companies.
-operate over coaxial lines to deliver Internet access.
are based on radio signals of various frequencies.
-operate over existing telephone lines to carry voice, data, and video.
-have up to twenty-four 64-Kbps channels.

operate over existing telephone lines to carry voice, data, and video.

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

-Cybervandalism
-Social engineering
-Identity theft
-Evil twins
-Spoofing

Identity theft

The child domain of the root is the:

-second-level domain.
-base domain.
-domain extension.
-host name.
-top-level domain.

top-level domain.

Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?

-AUP
-TLS
-VPN
-WPA2
-S-HTTP

WPA2

Which process is used to protect transmitted data in a VPN?

-Packet switching
-Tunneling
-VOIP
-Hypertext
-PPP

Tunneling

Which protocol is the Internet based on?

-FTP
-Telnet
-HTTP
-Packet-switching
-TCP/IP

TCP/IP

All of the following countries are popular sources of malware attacks except:

-Germany.
-the United States.
-the United Kingdom.
-the Netherlands.
-Mexico.

Mexico.

Which signal types are represented by a continuous waveform?

-Optical
-Hybrid
-Analog
-Digital
-Laser

Analog

Which of the following is the single greatest cause of network security breaches?

-Cyberwarfare
-Viruses
-Bugs
-User lack of knowledge
-Trojan horses

User lack of knowledge

What technology allows people to have content pulled from websites and fed automatically to their computers?

-FTP
-RSS
-Newsgroups
-Bluetooth
-HTTP

RSS

Components or parts of finished products are referred to as:

-secondary products.
-intermediate products.
-upstream materials.
-downstream materials.
-raw materials.

downstream materials.

According to a 2014 survey of 192 companies conducted by Panorama Consulting Solutions, the average cost of an ERP project was:

-$2.8 billion.
-$280,000.
-$28 million.
-$2.8 million.
-$280 million.

$2.8 million.

Which of the following would not be considered a contact point?

-website
-Retail store
-Facebook
-Email
-Intranet

Intranet

Which of the following is not an example of a next-generation enterprise application?

-Openbravo
-i2 Technologies
-Salesforce.com
-Social CRM
-SAP Business Suite

i2 Technologies

Enterprise application vendors are now including ________ features such as tools for data visualization, flexible reporting, and ad hoc analysis as part of the application.

-business intelligence
-SAP
-just-in-time
-on-demand
-ESS

business intelligence

Enterprise software is built around thousands of predefined business processes that reflect:

-cutting edge workflow analyses.
-best practices.
-government regulations.
-industry benchmarks.
-the firm’s organization.

best practices.

Marketing modules in CRM systems provide tools for all of the following except:

-capturing prospect and customer data.
-assigning and managing customer service requests.
-qualifying leads.
-identifying opportunities for cross-selling.
-identifying profitable and unprofitable customers.

assigning and managing customer service requests.

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

-Demand planning
-Just-in-time strategies
-Continuous replenishment
-Safety stock
-Bullwhip effect

Safety stock

According to the case study on Unilever, over a ten-year period, Unilever reduced the number of ERP systems it had from ________ to ________.

-1000; 100
-500; 50
-250; 4
-100; 10
-250; 25

250; 4

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.

-ripple
-bullwhip
-whirlpool
-just-in-time
-network

bullwhip

Which of the following statements about enterprise applications is not true?

-Enterprise applications are based on organization-wide definitions of data.
-Enterprise applications are best implemented when few changes in business processes are required.
-Enterprise applications introduce "switching costs."
-Open source enterprise applications are attractive to companies because of their low cost.
-Enterprise applications require organizational learning.

Enterprise applications are best implemented when few changes in business processes are required.

________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation.

-SCM
-ERM
-SCP
-PRM
-SFA

ERM

Transaction brokers:

-provide a digital environment where buyers and sellers can establish prices for products.
-generate revenue from advertising or from directing buyers to sellers.
-save users money and time by processing online sales transactions.
-sell physical products directly to consumers or individual businesses.
-create revenue by providing digital content.

save users money and time by processing online sales transactions.

Which of the following companies uses the market creator business model?

-Yahoo
-eBay
-Expedia
-ETrade
-Facebook

EBAY

Which of the following statements about m-commerce is not true?

-In 2015, in-app sales to mobile devices account for about $9 billion in m-commerce revenues.
-In 2015, m-commerce represented about 25 percent of all e-commerce.
-In 2015, the main areas of growth are in mass market retailing and location-based services.
-In 2015, m-commerce generated over $75 billion in revenue.
-M-commerce is the fastest growing form of e-commerce.

In 2015, the main areas of growth are in mass market retailing and location-based services.

Facebook’s Like button is an example of which of the following?

-Social search
-Collaborative shopping
-Social sign-on
-Crowdsourcing
-Network notification

Network notification

The Foursquare website is an example of which of the following?

-Geosocial services
-Social graph
-Collaborative shopping
-Crowdsourcing application
-Net marketplace

Geosocial services

Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience?

-Richness
-Interactivity
-Information density
-Ubiquity
-Personalization/customization

-Richness

Netflix’s public announcement of a reward for a technology solution to its movie recommendation system is an example of:

-prediction markets.
-crowdsourcing.
-long-tail marketing.
-behavioral targeting.
-social sign-on.

crowdsourcing.

All of the following are examples of "on demand" companies except:

-Lyft.
-Yummly.
-Airbnb.
-Uber.
-Instacart.

YUMMLY

Which of the following best illustrates the sales revenue model?

-eBay receives a small fee from a seller if a seller is successful in selling an item.
-Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase.
-Photobucket provides basic services for free, but charges a premium for advanced services.
-Apple accepts micropayments for single music track downloads.
-Pandora provides free service with limited play and advertising.

Apple accepts micropayments for single music track downloads.

Which of the following is the largest mobile advertising market?

-Microsoft
-Twitter
-Google
-Facebook
-Yahoo

Google

Which of the following is an example of a direct good in the automobile industry?

-Roofing shingles
-Sheet steel
-Office furniture
-Computer equipment
-Paper

Sheet steel

Which of the following dimensions of e-commerce technology involves engaging consumers in a dialog that dynamically adjusts the experience to the individual?

-Interactivity
-Ubiquity
-Richness
-Personalization/customization
-Information density

Interactivity

Which feature of Internet technology has had the most effect in the Internet’s rapid spread across the globe?

-Universal standards
-Global reach
-Social technology
-Personalization
-Ubiquity

Universal standards

What systems development model approach would you use to develop this system?

-data flow diagrams.
-process specifications diagrams.-
-structure charts.
-PERT charts.
-Gantt charts.

structure charts.

A(n) ________ is a free, online course made available via the web to very large numbers of participants.

-EOC
-multiperson online learning course
-universal online course
-online learning system
-massive open online course

massive open online course

You are an IT project manager for an advertising firm. The firm wishes to create an online survey tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project?

-JAD
-End-user development
-SDLC
-Prototyping
-RAD

Prototyping

Transferring data from a legacy system to the new system would be defined by which system design specification category?

-Database
-Software development and programming
-Manual procedures
-Input
-Conversion

Conversion

To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management, a firm would most likely use:
-genetic algorithms.
-neural networks.
-intelligent agents.
-CAD systems.
-fuzzy logic systems.

intelligent agents

Which types of decisions are more prevalent at lower organizational levels?

-Unstructured decisions
-Structured decisions
-Semistructured decisions
-Operational decisions
-Procedural decisions

Structured decisions

In order to search for and retrieve knowledge objects in an enterprise content management system, the objects themselves must be:

-indexed.
-associated with an in-house expert.
-linked to their original sources.
-tagged with a classification.
-organized into relevant directories.

tagged with a classification.

A(n) ________ shows each task as a horizontal bar whose length is proportional to the time required to complete it.

-DFD
-Gantt chart
-feasibility study
-PERT chart
-ergonomic chart

Gantt chart

According to the chapter case, which of the following is not one of the problems created by the Great Britain’s National Health Service (NHS) booking tool, Choose and Book?

-Improper handling of referrals
-Assigning wrong specialists to appointments
-Lack of paper trail
-Confusing interface
-Appointment booking errors

Lack of paper trail

According to the chapter case, the Girl Scouts’ conversion strategy of first introducing the modules for ordering cookies and then introducing the modules for transmitting orders and instructions to the cookie factory and shipper is called a(n) ________ strategy.

-indirect cutover
-parallel
-incremental conversion
-direct cutover
-phased approach

phased approach

Which of the following is not one of the main variables that project management seeks to control?

-Scope
-End-users
-Cost
-Time
-Quality

End-users

In the traditional systems development lifecycle, end users:

-contribute heavily throughout development.
-are important only during the conversion phase.
-are limited to providing information requirements and reviewing the technical staff’s work.
-contribute only during testing.
-have no input.

are limited to providing information requirements and reviewing the technical staff’s work.

As a technical project manager you have decided to propose implementing a prototyping methodology for a small web-based design project. What is the first step you will follow in this project?

-Use the existing prototype.
-Develop an initial prototype.
-Identify user requirements.
-Identify different solutions.
-Conduct a feasibility study.

Identify user requirements.

Which process develops a detailed description of the functions that a new information system must perform?

-Systems design
-Requirements analysis
-Feasibility study
-Test plan development
-PERT chart

Requirements analysis

Which is the first step in developing a new information system?

-Gathering information requirements
-Defining the problem
-Developing alternative solutions
-Programming
-Feasibility study

Defining the problem

Of the following, which is the most important reason for creating a mobile version of a business’s website?

-Mobile devices use touch interfaces.
-Mobile websites use different programming than traditional websites.
-Mobile devices use lower bandwidth.
-Mobile devices use different platforms.
-Mobile devices provide access from anywhere.

Mobile devices provide access from anywhere.

Which is the second step in Simon’s four different stages of decision making?

-Design
-Intelligence
-Choice
-Implementation
–Identification

choice

System testing:

-tests the functioning of the system as a whole.
-rolls system tests out to separate business divisions for independent results.
-provides the final certification that the system is ready to be used in a production setting.
-includes all the preparations for the series of tests to be performed on the system.
-tests each program separately.

tests the functioning of the system as a whole.

hich dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties?

-Fairness
-Coherence
-Due process
-Accuracy
-Justice

fairness

A(n) ________ capability allows users to view more detailed views of data.

drill-down
metrics
VRML
query and reporting
ad hoc

drill down

A systems analysis includes a ________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.

-test plan
-GANTT chart
-conversion plan
-feasibility study
-risk analysis

feasibility study

Expert systems:

work in very limited domains.
are based on DO WHILE rules.
are a type of case-based reasoning.
solve problems too difficult for human experts.
share characteristics with mainframe computing.

work in very limited domains.

Decision making is enhanced by a diverse group of ________, such as data mining and fuzzy logic.

-intelligent models
-expert systems
-intelligent techniques
-DSS
-parameterized reports

intelligent techniques

Which of the following is not a typical tool or technique used in responsive design?

-Flexible images
-Table-based layouts
-Flexible layouts
-Detecting user screen resolution
-Media queries to optimize design

Table-based layouts

"Hidden costs," such as ________ costs, can easily undercut anticipated benefits from outsourcing.

-communications costs
-vendor selection
-software
-hardware
-employee salary

vendor selection

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending