It is easy to manage all the data coming into an organization. |
Answer: False |
The best way to capture the data in an organized format is to use a database. |
Answer: True |
Increasing amounts of external data need to be considered in making organizational decisions. |
Answer: True |
Data rot refers to the quality of the data itself. |
Answer: False |
It is important for applications and data to be dependent on each other. |
Answer: False |
A negative value for a student’s grade point average is an example of a data integrity problem. |
Answer: True |
An entity is a person, place, thing, or event about which information is maintained. |
Answer: True |
An attribute is any characteristic or quality that describes a particular entity. |
Answer: True |
The secondary key is a field that identifies a record with complete uniqueness. |
Answer: False |
Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model. |
Answer: False |
You would be an instance of your university’s STUDENT class. |
Answer: True |
The relational database model is based on the concept of three-dimensional tables. |
Answer: False |
Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements. |
Answer: True |
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security. |
Answer: True |
When data are normalized, attributes in the table depend on the primary key and any secondary keys. |
Answer: False |
In a data warehouse, existing data are constantly purged as new data come in. |
Answer: False |
An organization’s data warehouse generally maintains its operational data. |
Answer: False |
Online analytical processing (OLAP) involves the analysis of accumulated data by end users. |
Answer: True |
Data marts are designed for the end-user needs in a strategic business unit or department. |
Answer: True |
Master data are generated and captured by operational systems. |
Answer: False |
Tacit knowledge is the more objective, rational, and technical types of knowledge. |
Answer: False |
Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize. |
Answer: False |
Which of the following has (have) the broadest impact on an organization? a) Decisions about hardware. |
c) Decisions about data. |
24) Which of the following is not a source for external data? a) Commercial databases |
b) Corporate databases |
Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. |
e) All of these are reasons why managing data is difficult over time. |
Not including alphabetic characters in a Social Security Number field is an example of _____ . a) Data isolation. |
b) Data integrity. |
_____ occurs when applications cannot access data associated with other applications. a) Data isolation |
a) Data isolation |
_____ occurs when the same data are stored in many places. a) Data isolation |
d) Data redundancy |
_____ occurs when various copies of the data agree. a) Data isolation |
c) Data consistency |
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy |
b) Data inconsistency |
Place the following members of the data hierarchy in their correct order: a) Bit – byte – field – record – database – file |
d) Bit – byte – field – record – file – database |
In the data hierarchy, the smallest element is the _____. a) Record. |
b) Bit. |
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte |
b) Field |
A(n) _____ is a logical grouping of related fields. a) Byte |
c) Record |
A(n) _____ is a logical grouping of related records. a) Byte |
d) File |
A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte |
a) Byte |
In a database, the primary key field is used to _____. a) specify an entity |
d) uniquely identify a record |
_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. a) Primary keys |
b) Secondary keys |
As an individual student in your university’s student database, you are a(n) _____ of the STUDENT class. a) instance |
a) instance |
At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) one-to-one |
d) many-to-many |
In a university’s relational database, the student record contains information regarding the student’s last name. The last name is a(n): a) attribute. |
a) attribute. |
A database management system is primarily a(n) _____. a) file-handling program |
c) interface between applications and a database |
In the relational database model, related tables can be joined when they contain common _____. a) primary keys |
d) columns |
_____ tell the database management system which records are joined with others in related tables. a) Primary keys |
a) Primary keys |
Data dictionaries perform all of the following functions except: a) Providing information on each record. |
a) Providing information on each record. |
In a relational database, every row represents a(n) _____. a) file |
b) record |
A standardized language used to manipulate data is _____. a) MS-Access |
d) structured query language |
Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. |
e) All of these |
_____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query |
b) Normalization |
When data are normalized, attributes in the table depend only on the _____. a) secondary key |
c) primary key |
The data in a data warehouse have which of the following characteristics? a) They are organized by subject. |
a) They are organized by subject. |
The data in a data warehouse: a) are updated constantly in real time. |
c) are not updated. |
The process of moving data from various sources into the data warehouse is called: a) uploading. |
b) extracting, transforming, and loading. |
Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. |
a) They cost less |
_____ is a formal approach to managing data consistently across an entire organization. a) Database management |
d) Data governance |
_____ provide(s) companies with a single version of the truth for their data. a) Data warehouses |
d) Master data management |
Organizations are turning to data governance for which of the following reasons? a) They have too little data. |
b) They are responding to federal regulations |
_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization’s activities. a) Transaction data, master data |
a) Transaction data, master data |
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner. a) Discovery |
b) Knowledge management |
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information |
a) Knowledge, information |
Explicit knowledge has which of the following characteristics? a) objective |
a) objective |
Tacit knowledge has which of the following characteristics? a) codified |
c) unstructured |
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) tacit |
b) explicit |
The most important benefit of knowledge management systems is: |
b) They make best practices available to employees. |
Refer to IT’s About Business 5.2 – Cell phone owners in Mexico: The cell phone registry is useless because: a) data for some cell phones are missing. |
e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate." |
Refer to IT’s About Business 5.3 – Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) to process transactions faster. |
a) to process transactions faster. |
Refer to Opening Case – Big Data. Which of the following is not a problem created by "Big Data"? a) The data is not reliable. |
a) The data is not reliable. |
Refer to Closing Case – CoStar Group. The target audience for CoStar’s aggregated commercial real estate data was a) banks. |
e) All these |
In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart’s sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month |
e) Product, store, and week |
Today, large corporations are able to process big data but only at great expense. |
False |
A local area network connects two or more communicating devices in a limited geographical area. |
Answer: True |
Network interface cards are special adapters that link an individual device to the communications medium on a local area network. |
Answer: True |
The network interface card typically houses the LAN’s network operating system. |
Answer: False |
Wide-area networks have a large capacity, and they typically use a single communications channel. |
Answer: False |
Digital signals are continuous waves that transmit information by altering the characteristics of the waves. |
Answer: False |
Digital signals have two parameters: frequency and amplitude. |
Answer: False |
The U.S. public telephone system was designed as an analog network to carry voice signals. |
Answer: True |
Cable media use wires or cables to transmit data and information. |
Answer: True |
Twisted-pair wire is the least-used form of communications wiring. |
Answer: False |
Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber. |
Answer: True |
Systems that use digital subscriber lines (DSL) do not require modems. |
Answer: False |
Currently, ATM networks operate only on fiber-optic cable. |
Answer: True |
The Internet is a global network of computer networks. |
Answer: True |
An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. |
Answer: True |
Intranets support discovery, communication, and collaboration inside an organization. |
Answer: True |
An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. |
Answer: False |
Extranets offer limited accessibility to the intranets of participating companies. |
Answer: True |
An Internet service provider is a company that offers Internet connections for a fee. |
Answer: True |
Internet kiosks are computer terminals located in public places like libraries and airports. |
Answer: True |
A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site. |
Answer: True |
The rightmost part of an Internet name is the top-level specification, or the zone. |
Answer: True |
The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture. |
Answer: True |
Uniform resource locators (URLs) point to the address of a specific resource or site on the Web. |
Answer: True |
Uniform resource locators (URLs) are software applications through which users access the Web. |
Answer: False |
The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet. |
Answer: True |
A major problem of the discovery applications of networks is the huge amount of information available. |
Answer: True |
Metasearch engines search several engines at once and integrate the findings of the various search engines. |
Answer: True |
The quality of automatic translation of Web pages is usually just as good as human translation. |
Answer: False |
Commercial portals are intended for broad audiences and offer fairly routine content. |
Answer: True |
Industrywide portals are intended for broad audiences and offer fairly routine content. |
Answer: False |
Electronic mail is the largest-volume application running over the Internet. |
Answer: True |
With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call. |
Answer: False |
E-learning is conducted only in virtual classrooms, where all coursework is completed online. |
Answer: False |
Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet. |
Answer: True |
Employees who telecommute have generally found that the experience enhances their careers. |
Answer: False |
_____ refers to the range of frequencies available in any communications channel. a) Protocol |
e) Bandwidth |
Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. |
e) All of these |
The components of a local area network include which of the following? a) File server |
e) All of these |
Which of the following is not a component of a local area network? a) File server |
c) Bridge |
A _____ connects dissimilar networks. a) Router |
d) Gateway |
A(n) _____ connects two or more devices in a limited geographical area. a) Local area network |
a) Local area network |
A _____ sends messages through several connected LANs or to a wide-area network. a) Router |
a) Router |
A _____ allows a device to physically connect to a local area network’s communications medium. a) File server |
b) Network interface card |
All of the following statements concerning wide-area networks are true except: a) They are provided by individual companies. |
a) They are provided by individual companies. |
The function of _____ is to convert digital signals to analog signals and vice-versa. a) Modems |
a) Modems |
_____ signals convey information in wave form, whereas _____ signals convey information in binary form. a) Analog, packet |
b) Analog, digital |
_____ are hardware devices that support data transmission and reception across a telecommunications system. a) Integrated services digital networks |
c) Communications channels |
Which of the following is not a communications channel? a) Fiber-optic cable |
d) Integrated circuits |
Which of the following is not a characteristic of twisted-pair wire? a) Inexpensive |
d) Secure transmissions |
The cable medium with the highest bandwidth is: a) Twisted-pair wire |
c) Fiber-optic cable |
Data are sent through a fiber-optic cable by a(n) _______. a) Optical switch |
c) Laser |
Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? a) Digital subscriber line |
b) Asynchronous transfer mode |
Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors? a) Digital subscriber line |
c) Synchronous optical network |
Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call? a) Digital subscriber line |
d) T-carrier system |
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed. a) Protocols |
a) Protocols |
A protocol is: a) A device that handles the switching of voice and data in a local area network. |
b) A standard set of rules and procedures for the control of communications in a network |
The part of a network that handles the major traffic is the ________. a) Front end |
d) Backbone |
Which of the following enables users to send data across sometimes unreliable networks? a) Ethernet |
b) TCP/IP |
In TCP/IP, IP is responsible for: a) Disassembling and reassembling of packets during transmission. |
a) Disassembling and reassembling of packets during transmission. |
Which of the following statements concerning packet switching is not true? a) Packets contain a sequence number. Answer: c |
c) Packets require dedicated circuits |
A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______. a) Open systems |
b) Client/server |
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. a) Leeching |
e) Swarming |
The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. a) Ethernet |
c) Internet |
) A(n) _____ is a network designed to serve the internal informational needs of a single organization. a) Global network |
d) Intranet |
A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners. a) Global network |
b) Extranet |
Internet service providers connect to one another through _____. a) Internet connection points |
c) Network access points |
_____ are Internet access points that are located in public places, such as libraries and airports. a) Clients |
e) Internet kiosks |
Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address |
c) URL address |
Consider this domain name, www.business.gsu.edu. The "edu" is the _______. a) Top-level domain |
a) Top-level domain |
Consider this domain name, www.business.gsu.edu. The "gsu" is the __________. a) Top-level domain |
b) Name of the organization |
Consider this domain name, www.business.gsu.edu. The "business" is the ________. a) Top-level domain |
d) Name of the specific computer |
Applications offered by the Internet2 include which of the following? a) remote diagnosis |
e) all of these |
Networks enable which of the following applications? a) Discovery |
e) All of these |
Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. |
e) All of these |
Which network application(s) enable(s) users to access information located in databases all over the world? a) Discovery |
a) Discovery |
Which of the following statements about publication of material in foreign languages is not correct? a) It is a competitive necessity. |
e) It is not yet a major consideration for most companies |
_____ portals offer content for diverse communities and are intended for broad audiences. a) Industrywide |
e) Commercial |
_____ portals support communities such as hobby groups or political parties. a) Industrywide |
c) Affinity |
_____ portals coordinate content within relatively narrow organizational and partners’ communities. a) Publishing |
d) Corporate |
Many organizations have implemented corporate portals for which of the following reasons? a) To cut costs |
e) All of these |
Portals are an example of which network application? a) Discovery |
a) Discovery |
With _____, every call opens up a dedicated circuit for the duration of the call. a) Voice over IP |
b) Plain old telephone service |
With _____, phone calls are treated as just another kind of data. a) Voice over IP |
a) Voice over IP |
Skype is an example of _______. a) Teleconference |
d) Voice over IP |
Workflow, groupware, and telepresence systems are examples of which network application? a) Discovery |
c) Collaboration |
The newest type of videoconferencing technology is ________. a) Teleconferencing |
b) Telepresence |
In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. a) Teleconference |
c) Telepresence |
The benefits of e-learning include which of the following? a) Increased content retention |
e) All of these |
Which of the following is not a disadvantage of telecommuting for employees? a) Fewer opportunities for housebound people |
a) Fewer opportunities for housebound people |
Refer to Opening Case – The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? a) The amount of video traffic on the Internet is increasing. |
e) Telecommunications and cable companies are in favor of net neutrality. |
1) In traditional commerce, one or more of the following can be digital: the product or service, the process, and the delivery agent. |
Answer: False |
2) Visiting the Web site of a car manufacturer (e.g., www.gm.com), entering the specifications for the car you want, and then picking up your car at your local dealership is an example of partial electronic commerce. |
Answer: True |
3) eBay is a good example of business-to-consumer electronic commerce. |
Answer: False |
4) Forward auctions are auctions that sellers use as a channel to many potential buyers. |
Answer: True |
5) Even though B2C EC is much larger by volume, B2B is more complex. |
Answer: False |
6) An electronic storefront is a Web site on the Internet that represents a single store. |
Answer: True |
7) You can make a purchase in a referral mall. |
Answer: False |
8) Selling products such as books and computers on the Internet may reduce vendors’ selling costs by 20 to 40 percent, with further reductions being difficult because the products must be delivered physically. |
Answer: True |
9) Virtual banks are those banks that are dedicated only to Internet transactions. |
Answer: True |
10) Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online. |
Answer: True |
11) Internet advertising is impersonal, one-way mass communication. |
Answer: False |
12) Banners are the most common form of advertisement on the Internet. |
Answer: True |
13) Hacking is the indiscriminate distribution of electronic ads without permission of the receiver. |
Answer: False |
14) Business-to-consumer applications comprise the majority of electronic commerce volume. |
Answer: False |
15) The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions. |
Answer: False |
16) The buy-side marketplace is similar to the business-to-consumer model. |
Answer: False |
17) Horizontal exchanges connect buyers and sellers across many industries. |
Answer: True |
18) In most cases, traditional payment systems are not effective for electronic commerce. |
Answer: True |
19) Smart cards can be used as credit cards, debit cards, and/or loyalty cards. |
Answer: True |
20) Each buyer needs only one e-wallet for all merchants. |
Answer: False |
21) E-commerce affects only businesses that sell products online. |
Answer: False |
25) Which of the following is not an effect that E-commerce has had on organizations? |
c) E-commerce is a costly medium for increasing market share. |
26) _____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization. |
b) Electronic commerce, electronic business |
27) The degree of digitization relates to all of the following except: |
d) the size of e-commerce transactions |
28) In _______ e-commerce, the sellers and buyers are organizations. |
c) business-to-business |
29) In ________ e-commerce, an organization provides information and services to its workers. a) business-to-employee |
a) business-to-employee |
30) Direct payment of Social Security benefits is an example of ______ e-commerce. a) government-to-citizen |
a) government-to-citizen |
31) If you are an worker managing your fringe benefits over your company’s intranet, you are engaging in _________ e-commerce. |
d) business-to-employee |
32) Which of the following statements regarding the relationship between electronic commerce and search is not correct? |
c) Retailers will provide fewer product details to avoid information overload for customers. |
33) In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins. |
c) reverse |
34) eBay uses a _____ auction. |
a) forward |
35) _____ auctions employ a request for quotation. |
c) Reverse |
36) _____ auctions are the most common auction model for large purchases. a) Forward |
c) Reverse |
37) In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? |
b) electronic tendering system |
38) A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor’s site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model? |
e) affiliate marketing |
39) Which type of electronic commerce is the largest by volume? a) business-to-employee |
c) business-to-business |
40) Which type of electronic commerce does Amazon practice? a) business-to-employee |
d) business-to-consumer |
41) _______ e-commerce is also known as e-tailing. a) Business-to-business |
d) Business-to-consumer |
42) The advantages of electronic commerce for consumers include all of the following except: a) You can buy from home 24 hours per day, 7 days per week. |
c) You typically cannot access additional information, so you do not have information overload. |
43) Which of the following is not an electronic commerce application? a) home banking |
c) evaluating an employee |
44) Which of the following is not an advantage of e-tailing? a) You can buy from home, 24 hours per day. |
b) You have only a few products to choose from. |
45) ________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen. a) Disintegration |
d) Disintermediation |
46) Cyberbanking offers all of the following advantages except: a) It is convenient for customers. b) It saves time for customers. |
e) It is more expensive for the customer. |
47) Which of the following is a problem that e-commerce can cause for the airline industry? a) Too many fares |
b) Mistakes in fares |
50) Difficulties in order fulfillment are most closely associated with which type of electronic commerce? a) business-to-business |
b) business-to-consumer |
51) Internet advertising improves on traditional advertising in all of the following ways except: |
c) Internet ads are always more effective than other types of advertising. |
52) A _____ is automatically launched by some trigger and appears behind the active window. a) keyword banner |
d) pop-under ad |
53) _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. a) Viral marketing |
c) Permission marketing |
54) _____ refers to online word-of-mouth marketing. a) Permission marketing |
d) Viral marketing |
55) In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically. a) buy-side |
b) sell-side |
56) The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer. a) buy-side |
b) sell-side |
57) In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time. |
a) buy-side |
58) In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention. a) buy-side |
d) group purchasing |
59) In _____, direct and indirect materials in one industry are purchased on an as-needed basis. a) horizontal exchanges |
b) vertical exchanges |
60) _____ connect buyers and sellers across many industries and are used mainly for indirect materials. a) Horizontal exchanges |
a) Horizontal exchanges |
61) All of the following are limitations of traditional payment methods in electronic commerce except: a) Cash cannot be used because there is no face-to-face contact. |
d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer. |
62) _____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. a) Electronic checks |
a) Electronic checks |
63) _____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer’s and seller’s banks. a) Electronic checks |
b) Electronic credit cards |
64) _____ are typically used for unplanned B2B purchases for amounts under $2000. a) Electronic checks |
c) Purchasing cards |
65) ______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. a) Electronic checks |
b) Stored-value money cards |
66) _____ contain a chip that can store information and be used for several purposes. a) Electronic checks |
d) Smart cards |
67) _____ enable two individuals to transfer funds without using a credit card. a) Electronic checks |
e) Person-to-person payments |
68) _____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing. a) Electronic checks |
b) Digital wallets |
69) The practice of using similar but not identical domain names is called _____. a) domain spoofing |
c) domain tasting |
70) _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. a) Domain spoofing |
d) Cybersquatting |
71) The device that Treat America installed on top of each of their machines communicates the following pieces of data except: a) the amount of money in the machine at any given minute. |
d) the number of customers. |
72) Companies use Web sites for all of the following reasons except: a) To reduce operational and transaction costs. |
d) To reduce the amount of actual cash they need to deal with. |
86) You decide to start a landscaping business called Trim Grass. One of your services will be to perform fertilizer treatments. You will need to buy a great deal of fertilizer for your many clients. You can use all of the following methods to purchase the fertilizer except: a) Forward auction |
e) Multichanneling |
87) You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial? a) Banner ads |
c) Spamming |
88) You decide to start a landscaping business called Trim Grass. Some of your residential clients would like to pay their bills online. Which of the following methods will not be appropriate for this type of payment? a) Electronic checks |
c) Purchasing cards |
89) You decide to start a landscaping business called Trim Grass. You expect to use the Web to help clients find you and communicate with you. You will mow lands, clean flower beds, and pick up leaves in the fall. You will send your clients monthly bills. Which of the following is true? a) Trim Grass is using an e-commerce model. |
b) Trim Grass is using an e-business model. |
90) You have been running a landscaping business called Trim Grass for about two years. You have developed a special blend of grass seed for your area that you use when you reseed your clients’ lawns. You are receiving e-mails via your Web site from people who would like to purchase some. You decide to start selling seed online, and you hire someone to rebuild your Web site. Which of the following statements is not true? a) Trim Grass is now multichanneling. |
c) Trim Grass will have to collect sales tax from all sales. |
1) Wireless computing does not really affect productivity. |
False |
2) Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices. |
True |
3) Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster. |
False |
4) Short message service allows users to send short text messages on digital cell phones. |
True |
5) Microwave transmissions are affected by environmental conditions such as storms. |
True |
6) The higher the orbit of a satellite, the larger its footprint. |
True |
7) The global positioning system is supported by GEO satellites. |
False |
8) Radio transmissions are highly secure. |
False |
9) Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices. |
True |
10) A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users. |
True |
11) Wi-Fi provides excellent security. |
False |
12) In a mesh network, the motes transmit their data to a central computer. |
False |
13) Mesh networks are reliable, efficient, and fault tolerant. |
True |
14) Personalization means that a mobile device can provide real-time communication, independent of the user’s location. |
False |
15) A voice portal is a standard Web site that accepts voice commands. |
False |
16) Mobile wallets enable users to make purchases with a single click from a mobile device. |
True |
17) Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station. |
True |
18) Pervasive computing and virtual reality are just different names for the same thing. |
False |
19) Two systems being developed to replace bar codes are QR codes and RFID systems. |
True |
20) Rogue access points can be set up by employees. |
True |
21) War driving is the act of locating wireless networks while driving around a certain area. |
True |
22) Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? |
e) All of these |
23) Of the following, which is the major problem with smart phones? |
c) They can be used to compromise security. |
24) The capabilities of smart phones include all of the following except _________. |
d) Corporate transaction processing |
25) Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. |
a) Phones, digital cameras |
26) Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. |
e) High, long, line-of-sight |
27) Which type of satellite has the largest footprint? a) Low-earth-orbit |
c) Geostationary |
28) The area of the earth reached by a satellite’s transmission is referred to as its _____. |
c) Footprint |
29) The greatest problem with GEO satellites is which of the following? |
a) Propagation delay |
30) _____ is a satellite-based tracking system that enables users to determine a person’s position. |
e) Global positioning system |
31) Which of the following is not an advantage of radio? |
d) Radio waves do not create electrical interference problems. |
32) The main problem with radio transmission is which of the following? |
b) When you travel too far from the source, the signal fades. |
33) The most common wireless technology for TV and DVD remote control devices is _______. |
e) Infrared |
34) _____ is a wireless standard that enables temporary, short-range connection between mobile devices. |
a) Bluetooth |
35) Which of the following is the most appropriate wireless networking standard for creating personal area networks? |
d) Bluetooth |
36) Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? |
c) Ultra-wideband |
37) _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. |
a) Near-field communications |
38) Which of the following statements about Wi-Fi is not correct? |
e) Wi-Fi is expensive to set up. |
39) Which of the following is not inhibiting faster Wi-Fi expansion? |
c) The growth of WiMAX |
40) A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. |
b) Hotspot |
41) Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. |
d) 802.11g |
42) _____ networks use multiple Wi-Fi access points to create a wide area network. |
a) Mesh |
43) _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. |
b) Cell phones |
44) The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. |
e) WiMAX |
45) The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. |
a) Mobility, broad reach |
46) With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices. |
d) B and C |
47) With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. |
e) Localization of products and services |
48) The development of mobile commerce is driven by all of the following factors except: a) The widespread availability of mobile devices. |
c) Increasing prices. |
49) Which of the following is not a mobile application in financial services? |
a) Transaction processing systems |
50) Parking meters that you can pay via your mobile telephone are an example of _________. a) Mobile banking |
b) Wireless electronic payment |
51) If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a) Wireless money transfer |
e) Wireless electronic payment system |
52) Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. |
d) Location-based advertising |
53) _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. |
b) Telematics |
54) Sense networks track users via all of the following technologies except _______. |
b) Traffic cameras |
55) _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. |
a) Telemetry |
56) The generic term for technologies that use radio waves to automatically identify individual items is __________. |
d) Radio-frequency identification |
57) Which of the following is not a limitation of barcodes? |
c) They identify the manufacturer, product, and item. |
58) The major problem with RFID has been _______. |
a) Expense |
59) What would be the best use of RFID in a business? a) Transaction processing |
b) Supply chain management |
60) _____ networks collect data from many points over an extended space. a) Bluetooth |
c) Wireless sensor |
61) Which of the following can be used for reading utility meters without a person having to get out of a truck? |
b) ZigBee |
62) The act of locating wireless local area networks while moving around a city is called ____. |
b) War driving |
63) A(n) _____ allows unauthorized entry into a wireless network. |
e) Rogue access point |
64) _____ refers to efforts by unauthorized users to access data traveling over wireless networks. |
c) Eavesdropping |
65) In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. |
a) RF jamming |
Refer to IT’s About Business 8.6 – BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans. |
False |
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. |
b) Evil twin |
MIS Chapter 5-8
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price