REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
joellemurphey
52 views
144 slides
Nov 02, 2022
Slide 1 of 144
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
About This Presentation
REVIEW FINAL STUDY GUIDE
Question 1
A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.
Answer
A.
microcomputer
B.
midrange computer
C.
mainframe
D.
supercomputer
E.
laptop computer
2 points
Question 2
The advantag...
REVIEW FINAL STUDY GUIDE
Question 1
A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.
Answer
A.
microcomputer
B.
midrange computer
C.
mainframe
D.
supercomputer
E.
laptop computer
2 points
Question 2
The advantages of server virtualization include all of the following except:
Answer
A.
organization uses more servers to respond to quickly changing demands
B.
increased organizational agility
C.
focus of IT department shifts to services rather than supporting the technology
D.
cost savings
E.
reduced number of employees
2 points
Question 3
The _____ of computers used integrated circuits for storing and processing information.
Answer
A.
fifth generation
B.
second generation
C.
third generation
D.
first generation
E.
fourth generation
2 points
Question 4
_____ applies the unused processing resources of many geographically dispersed computers in a network to form a virtual supercomputer.
Answer
A.
A server farm
B.
The Internet
C.
Grid computing
D.
Utility computing
E.
Virtualization
2 points
Question 5
The _____ of computers used massively parallel processing to process information.
Answer
A.
fifth generation
B.
third generation
C.
first generation
D.
fourth generation
E.
second generation
2 points
Question 6
The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called:
Answer
A.
read-only memory
B.
cache memory
C.
registers
D.
flash memory
E.
random access memory
2 points
Question 7
The main types of primary storage are:
Answer
A.
register
B.
random access memory
C.
cache memory
D.
read-only memory
E.
all of the above
2 points
Question 8
Increased microprocessor complexity comes from which of the following?
Answer
A.
decreasing line width
B.
increasing transistor miniaturization
C.
using new materials for the chip that increase conductivity
D.
putting more transistors on the chip
E.
all of the above
2 points
Question 9
A(n) _____ offers you the option of shopping online with a disposable credit card number.
Answer
A.
credit card
B.
bank card
C.
driver's license
D.
debit card
E.
virtual credit card
2 points
Question 10
Software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings is best described as a(n) _____.
Answer
A.
anti-malware package
B.
anti-spyware package
C.
proactive monitoring package
D.
content-filtering package
E.
personal firewall
2 points
Question 11
Personal firewalls perform all of the following functions except:
Answer
A.
They should block outbound connections that you do not initiate.
B.
They should seek out the origin of malware in an attempt to block it in the future.
C.
They should make your computer invi ...
Size: 503.17 KB
Language: en
Added: Nov 02, 2022
Slides: 144 pages
Slide Content
REVIEW FINAL STUDY GUIDE
Question 1
A _____ is used in large enterprises for extensive computing
applications that are accessed by thousands of concurrent users.
Answer
A.
microcomputer
B.
midrange computer
C.
mainframe
D.
supercomputer
E.
laptop computer
2 points
Question 2
The advantages of server virtualization include all of the
following except:
Answer
A.
organization uses more servers to respond to quickly changing
demands
B.
increased organizational agility
C.
focus of IT department shifts to services rather than supporting
the technology
D.
cost savings
E.
reduced number of employees
2 points
Question 3
The _____ of computers used integrated circuits for storing and
processing information.
Answer
A.
fifth generation
B.
second generation
C.
third generation
D.
first generation
E.
fourth generation
2 points
Question 4
_____ applies the unused processing resources of many
geographically dispersed computers in a network to form a
virtual supercomputer.
Answer
A.
A server farm
B.
The Internet
C.
Grid computing
D.
Utility computing
E.
Virtualization
2 points
Question 5
The _____ of computers used massively parallel processing to
process information.
Answer
A.
fifth generation
B.
third generation
C.
first generation
D.
fourth generation
E.
second generation
2 points
Question 6
The type of primary storage where certain critical instructions
are safeguarded because the storage is nonvolatile and the
instructions can be read only by the computer and not changed
by the user is called:
Answer
A.
read-only memory
B.
cache memory
C.
registers
D.
flash memory
E.
random access memory
2 points
Question 7
The main types of primary storage are:
Answer
A.
register
B.
random access memory
C.
cache memory
D.
read-only memory
E.
all of the above
2 points
Question 8
Increased microprocessor complexity comes from which of the
following?
Answer
A.
decreasing line width
B.
increasing transistor miniaturization
C.
using new materials for the chip that increase conductivity
D.
putting more transistors on the chip
E.
all of the above
2 points
Question 9
A(n) _____ offers you the option of shopping online with a
disposable credit card number.
Answer
A.
credit card
B.
bank card
C.
driver's license
D.
debit card
E.
virtual credit card
2 points
Question 10
Software installed on your computer that controls
communications to and from your computer by permitting or
denying communications based on your security settings is best
described as a(n) _____.
Answer
A.
anti-malware package
B.
anti-spyware package
C.
proactive monitoring package
D.
content-filtering package
E.
personal firewall
2 points
Question 11
Personal firewalls perform all of the following functions except:
Answer
A.
They should block outbound connections that you do not
initiate.
B.
They should seek out the origin of malware in an attempt to
block it in the future.
C.
They should make your computer invisible.
D.
They should tell you when a program or connection is
attempting to do something that you do not want.
E.
They should alert you to suspicious behavior.
2 points
Question 12
_____ software logs keystrokes, e-mails, applications, windows,
Web sites, Internet connection, passwords, chat conversations,
Web cams, and screenshots.
Answer
A.
Monitoring
B.
Content filtering
C.
Anti-malware
D.
Anti-spyware
E.
Firewall
2 points
Question 13
It is important to have proactive intrusion detection and
prevention software on your computer for all of the following
reasons except:
Answer
A.
because anti-malware software is reactive
B.
to help decrease your vulnerability to zero-day attacks
C.
because you have to update malware signatures on a regular
basis with anti-malware software
D.
to help decrease your vulnerability to distributed denial-of-
service attacks
E.
None of these
2 points
Question 14
Which of the following attacks is the one most closely
associated with downloading and installing patches
immediately?
Answer
A.
Zero day attacks
B.
Worms
C.
Distributed denial-of-service
D.
Viruses
E.
Denial of service
2 points
Question 15
A(n) _____ either originates on, or is sent to, a different Web
site than the one you are currently viewing.
Answer
A.
tracking cookie
B.
monitoring cookie
C.
first-party cookie
D.
second-party cookie
E.
third-party cookie
2 points
Question 16
The cable medium with the highest bandwidth is:
Answer
A.
copper cable
B.
twisted-pair wire
C.
fiber optic cable
D.
coaxial cable
E.
cellular radio
2 points
Question 17
A type of processing that links two or more computers in an
arrangement in which some machines provide computing
services for user computers is best described as :
Answer
A.
peer-to-peer
B.
open systems
C.
client/server
D.
centralized
E.
mainframe-centric
2 points
Question 18
By using an ISDN service, an organization will be able to
transmit _____ data than if it used a T1 carrier.
Answer
A.
more streaming video
B.
less
C.
more voice
D.
the same amount of
E.
more
2 points
Question 19
A(n) _____ connects similar networks.
Answer
A.
router
B.
bridge
C.
network interface card
D.
gateway
E.
file server
2 points
Question 20
Which of the following enables users to send data across
sometimes unreliable networks?
Answer
A.
Integrated services digital network
B.
TCP/IP
C.
Protocols
D.
Digital subscriber line
E.
Ethernet
2 points
Question 21
In order to ensure that computers developed by different
manufacturers can communicate, _____ have been developed.
Answer
A.
client/server architectures
B.
application software packages
C.
WANs
D.
protocols
E.
developmental architectures
2 points
Question 22
A(n) _____ allows a device to physically connect to a local area
network's communications medium.
Answer
A.
gateway
B.
communications channel
C.
file server
D.
network operating system
E.
network interface card
2 points
Question 23
_____ signals convey information in wave form, where _____
signals convey information in digital, binary form.
Answer
A.
Digital, packet
B.
Analog, packet
C.
Packet, analog
D.
Analog, digital
E.
Digital, analog
2 points
Question 24
Which of the following is a digital transmission system that
defines circuits which operates at different rates, all of which
are multiples of the basic 64 Kbps used to transport a single
voice call?
Answer
A.
Asynchronous transfer mode
B.
Digital subscriber line
C.
T-carrier system
D.
Synchronous optical network
E.
ISDN
2 points
Question 25
Firms are recentralizing their applications to mainframes for all
the following reasons except:
Answer
A.
to support the large number of transactions caused by electronic
commerce
B.
to reduce the total cost of ownership of distributed systems
C.
to more adequately support end-user computing
D.
to improve system performance
E.
none of the above
2 points
Question 26
BitTorrent uses a process called _____, which eliminates file-
sharing bottlenecks by having everyone share little pieces of a
file at the same time.
Answer
A.
torrents
B.
collaboration
C.
packet switching
D.
swarming
E.
leeching
2 points
Question 27
A(n) _____ connects two or more devices in a limited
geographical area.
Answer
A.
value added network
B.
enterprise network
C.
personal area network
D.
wide area network
E.
local area network
2 points
Question 28
The main system control program is the _____.
Answer
A.
security monitor
B.
operating system
C.
cache software
D.
multithread register
E.
virtual memory
2 points
Question 29
Which of the following is not offered by enterprise operating
systems?
Answer
A.
support for the greatest number of users
B.
most functionality
C.
same functionality as desktop operating systems
D.
most sophisticated interface
2 points
Question 30
Which of the following is not offered by desktop operating
systems?
Answer
A.
most sophisticated interface
B.
same functionality as mobile operating systems
C.
most functionality
D.
support for the fewest number of users
2 points
Question 31
The _____ is a global wide-area network that connects
approximately one million organizational computer networks.
Answer
A.
World Wide Web
B.
global network
C.
Internet
D.
intranet
E.
extranet
2 points
Question 32
A(n) _____ connects parts of the intranets of different
organizations and allows secure communications among
business partners.
Answer
A.
World Wide Web
B.
global network
C.
extranet
D.
intranet
E.
Internet
2 points
Question 33
Internet service providers connect to one another through
_____.
Answer
A.
network connection points
B.
network access points
C.
internet connection points
D.
an extranet
E.
common carrier connection points
2 points
Question 34
The _____ is measured in megahertz or gigahertz.
Answer
A.
word length
B.
line width
C.
clock speed
D.
bandwidth
E.
bus width
2 points
Question 35
Today, software comprises a larger percentage of the cost of
modern computer systems than it did in the early 1950s for
which of the following reasons?
Answer
A.
hardware costs have decreased
B.
hardware performance has increased
C.
software has become increasingly complex
D.
building software applications remains slow, complex, and
error-prone
E.
all of the above
2 points
Question 36
Which of the following is not a characteristic of today's typical
software?
Answer
A.
an art as well as a science
B.
full of errors
C.
expensive
D.
poorly designed
E.
efficient
2 points
Question 37
Which programming language consists entirely of 0's and 1's?
Answer
A.
non-procedural language
B.
assembly language
C.
visual programming language
D.
machine language
E.
procedural language
2 points
Question 38
A(n) _____ connects dissimilar networks.
Answer
A.
bridge
B.
network interface card
C.
router
D.
gateway
E.
file server
2 points
Question 39
Each site on the Internet gets an assigned address, which is a(n)
_____.
Answer
A.
World Wide Web address
B.
TCP address
C.
URL address
D.
ISO/OSI identifier
E.
IP address
2 points
Question 40
Consider this domain name, www.business.gsu.edu. The “edu”
is the:
Answer
A.
web site locator
B.
address of the Webmaster
C.
name of the computer
D.
top-level domain
E.
URL
2 points
Question 41
Consider this domain name, www.business.gsu.edu. The “gsu”
is the:
Answer
A.
URL
B.
name of the organization
C.
address of the Webmaster
D.
name of the specific computer
E.
top-level domain
2 points
Question 42
In order to protect their software from illegal distribution,
vendors often rely on _____.
Answer
A.
requires more risk because all features and performance are not
known
B.
may not match an organization's current work processes and
data
C.
is more flexible in making modifications
D.
is rarely tested prior to release
2 points
Question 44
_____ are programs that protect a computer system from
unauthorized use, fraud, and destruction.
Answer
A.
System performance monitors
B.
General application software
C.
System utilities
D.
System security monitors
E.
Personal application software
2 points
Question 45
Unlike the hardwired computers of the 1950s, modern software
uses the _____, where computer programs are executed in the
computer's CPU.
Answer
A.
stored program concept
B.
plug and play
C.
multiprogramming
D.
multithreading
E.
multitasking
2 points
Question 46
One of the primary advantages of an object is that it contains
_____.
Answer
A.
reusable data
B.
messages
C.
reusable code
D.
embedded graphics
E.
no errors
2 points
Question 47
Over the past twenty years, hardware costs have _____, while
software costs have _____.
Answer
A.
decreased, increased
B.
increased, remained level
C.
increased, increased
D.
decreased, decreased
E.
increased, decreased
2 points
Question 48
_____ means that several parts of the same application can work
simultaneously.
Answer
A.
Time-sharing
B.
Scalability
C.
Multithreading
D.
Multitasking
E.
Multiprocessing
2 points
Question 49
In _____, tasks are performed by computers physically removed
from the user and accessed over a network, particularly the
Internet.
Answer
A.
cloud computing
B.
virtualization
C.
edge computing
D.
extranets
E.
intranets
2 points
Question 50
Which of the following is not a characteristic of secondary
storage?
Answer
A.
nonvolatile
B.
more cost effective than primary storage
C.
slower than primary storage
D.
can utilize only chips as its medium
E.
none of the above
2 points
Question 51
An assigned address that uniquely identifies a computer on the
Internet
Answer
A.
Domain name
B.
MAC address
C.
IP address
D.
Serial Number
2 points
Question 52
A(n) __________ is a private network that uses TCP/IP
protocols
Answer
A.
Token Ring
B.
PBX
C.
intranet
D.
Ethernet
2 points
Question 53
A web site on the internet is likely to be secure if the
Answer
A.
the url has the prefix https://
B.
the url has the prefix http://
C.
your browser gives you no warning signs and your protection
software gives no warnings
D.
the website assures you it is safe and easy!
2 points
Question 54
A new computer with the latest operating system that is up to
date, running an up to date browser, with an active and running
virus scan and protection software is immune to any virus or
malware attack, only out of date software is vulnerable.
Answer True
False
2 points
Question 1
1.
Which of the following statements is not correct?
Answer
A.
To succeed in today's environment, it is often necessary to
change business models and strategies.
B.
IT enables organizations to survive in the face of business
pressures.
C.
IT requires small investments over a long period of time.
D.
Organizations can leverage their platforms to develop Web-
based applications, products, and services.
2 points
Question 2
1.
_____ relates to any computer-based tool that people use to
work with information and to support the information
processing needs of the organization.
Answer
A.
A Computer-Based Information System
B.
Information technology architecture
C.
Information technology infrastructure
D.
Information technology
E.
An information system
2 points
Question 3
1.
The list of all your purchases from Amazon (books bought,
price paid, dates) would be considered to be:
Answer
A.
knowledge
B.
data
C.
information
D.
wisdom
E.
experience
2 points
Question 4
1.
An organization's information technology architecture:
Answer
A.
provides a guide for current operations.
B.
provides a blueprint for future directions.
C.
integrates the information requirements of the organization and
all users.
D.
is analogous to the architecture of a house.
E.
all of the above
2 points
Question 5
1.
_____ is the integration of economic, social, cultural, and
ecological facets of life, enabled by information technologies.
Answer
A.
Business environment
B.
Nationalization
C.
Regionalization
D.
Globalization
2 points
Question 6
1.
The global, Web-based platform enables individuals to do which
of the following?
Answer
A.
connect, compute, communicate, collaborate, and compete
everywhere and all the time
B.
access information, services, and entertainment
C.
exchange knowledge
D.
produce and sell goods and services
E.
all of the above
2 points
Question 7
1.
The consequences of uploading include all of the following
except:
Answer
A.
shift toward a static, passive approach to media
B.
growth of blogs and Wikis
C.
increased collaboration over the Web
D.
growth of the open-source software movement
2 points
Question 8
1.
_____ involves taking a specific function that your company
was doing itself, having another company perform that same
function for you, and then integrating their work back into your
operation.
Answer
A.
Insourcing
B.
Informing
C.
Offshoring
D.
Outsourcing
E.
Uploading
2 points
Question 9
1.
In general, labor costs are _____ in developed countries than in
developing countries.
Answer
A.
about the same
B.
decreasing slower
C.
higher
D.
decreasing faster
E.
lower
2 points
Question 10
1.
Today's customers have which of the following characteristics?
Answer
A.
less knowledge about products
B.
less sophistication
C.
difficulty in finding information about products
D.
higher expectations
E.
difficulty in comparing prices
2 points
Question 11
1.
When identical items are produced in large quantities, it is
called:
Answer
A.
mass customization.
B.
customer focus.
C.
continuous improvement.
D.
strategic systems.
E.
mass production.
2 points
Question 12
1.
Which of the following is not a fact about IT careers?
Answer
A.
MIS majors usually receive high starting salaries.
B.
The four-fastest growing U.S. jobs that require college degrees
from 2002 through 2012 are IT-related.
C.
There are no computing jobs.
D.
Highly-skilled IT jobs will typically not be offshored.
2 points
Question 13
1.
The fact that you practice continuous computing means all of
the following except:
Answer
A.
You can pull information about almost everything from
anywhere all the time.
B.
Your daily routines are the same as students 20 years ago, but
you can do your tasks much more quickly and with less effort.
C.
You can push your ideas to the Web.
D.
You are surrounded by a movable information network.
2 points
Question 14
1.
Which of the following statements about information systems is
not correct?
Answer
A.
Managing information systems is difficult.
B.
Information systems are based on the needs of employees.
C.
Any information system can be strategic.
D.
Information systems tend to follow the structure of the
organization.
E.
Information systems are concentrated in the IS Department.
2 points
Question 15
1.
A collection of related files, tables, and so on that stores data
and the associations among them is _____.
Answer
A.
a database
B.
procedures
C.
software
D.
hardware
E.
a network
2 points
Question 16
1.
Which of the following is not a major capability of information
systems?
Answer
A.
increase the effectiveness and efficiency of people working in
groups
B.
perform high-speed, high-volume numerical computations
C.
automate semiautomatic business processes
D.
store large amounts of information in a very large space
E.
provide fast, accurate communications among organizations
2 points
Question 17
1.
_____ systems are designed to correct a lack of communications
among _____.
Answer
A.
Transaction processing systems, functional area information
systems
B.
Functional area information systems, enterprise resource
planning systems
C.
Enterprise resource planning systems, functional area
information systems
D.
Dashboards, office automation systems
E.
Office automation systems, expert systems
2 points
Question 18
1.
When your purchases are swiped over the bar-code reader at the
point-of-sale terminals at Wal-Mart, a _____ records the data.
Answer
A.
functional area information system
B.
transaction processing system
C.
office automation system
D.
dashboard
E.
enterprise resource planning system
2 points
Question 19
1.
Supply chain systems are which type of information system?
Answer
A.
end-user computing systems
B.
individual information systems
C.
enterprisewide information systems
D.
departmental information systems
E.
interorganizational information systems
2 points
Question 20
1.
_____ attempt to duplicate the work of human experts by
applying reasoning capabilities.
Answer
A.
Dashboards
B.
Decision support systems
C.
Functional area information systems
D.
Expert systems
E.
Business intelligence systems
2 points
Question 21
1.
Competitive advantage for an organization manifests as all of
the following except:
Answer
A.
Lower costs
B.
Increased profits
C.
Higher quality
D.
Increased speed
E.
Increased time to market
2 points
Question 22
1.
The Internet has had which of the following impacts on the way
you purchase your textbooks?
Answer
A.
The Internet provides you with less information.
B.
The Internet increases your switching costs.
C.
The Internet decreases your bargaining power.
D.
The Internet gives you fewer choices.
E.
The Internet increases your bargaining power.
2 points
Question 23
1.
Porter's competitive forces model helps organizations identify
_____, where his value chain model helps organizations identify
specific _____.
Answer
A.
activities, general strategies
B.
activities, competitive opportunities
C.
primary activities, support activities
D.
competitive opportunities, activities
E.
general strategies, activities
2 points
Question 24
1.
If there are _____ substitutes for an organization's products or
services, then the threat of substitutes is _____.
Answer
A.
many, few
B.
many, high
C.
few, few
D.
few, negligible
E.
few, high
2 points
Question 25
1.
Wal-Mart's automatic replenishment system, which enables the
company to reduce inventory storage requirements, is an
example of which strategy for competitive advantage?
Answer
A.
operational effectiveness
B.
differentiation
C.
customer-orientation
D.
innovation
E.
cost leadership
2 points
Question 26
1.
The introduction of ATM machines by Citibank was a classic
example of which strategy for competitive advantage?
Answer
A.
operational effectiveness
B.
innovation
C.
differentiation
D.
cost leadership
E.
customer-orientation
2 points
Question 27
1.
When Amazon welcomes you by name back to its Web site on
your second visit, this is an example of which strategy for
competitive advantage?
Answer
A.
operational effectiveness
B.
innovation
C.
cost leadership
D.
differentiation
E.
customer orientation
2 points
Question 28
1.
Which of the following is a traditional, major IS function?
Answer
A.
Managing systems development
B.
Incorporating the Internet and electronic commerce into the
business
C.
Partnering with the firm's executives
D.
Managing outsourcing
E.
Educating non-IS managers about IT
2 points
Question 29
1.
Which of the following is the most important issue raised by the
numerous security breaches at NASA?
Answer
A.
Is it possible to secure NASA's information assets?
B.
Is NASA spending too little money on its defenses against
cyberespionage?
C.
Is it possible to secure the Internet?
D.
Should NASA even be connected to the Internet?
E.
Should NASA be required to detail its problems with
cyberespionage to the taxpayers?
2 points
Question 30
1.
What is _____ is not necessarily _____.
Answer
A.
Unethical, legal
B.
Ethical, illegal
C.
Illegal, unethical
D.
Ethical, legal
E.
Unethical, illegal
2 points
Question 31
1.
Which of the following statements is correct?
Answer
A.
It is difficult to determine and enforce privacy regulations.
B.
The Internet has increased individuals' privacy.
C.
An individual's right to privacy supersedes the needs of society.
D.
An individual's right to privacy is absolute.
E.
Advances in information technologies have not affected
individual privacy.
2 points
Question 32
1.
Which of the following statements is not correct?
Answer
A.
The large majority of organizations monitor employee Internet
usage.
B.
Employees have limited protection against surveillance by
employers.
C.
As with normal first-class mail, employers cannot read
employee e-mail.
D.
The large majority of organizations use URL filtering.
E.
Employees should be aware that surveillance is legal.
2 points
Question 33
1.
The computing skills necessary to be a hacker are decreasing
for which of the following reasons?
Answer
A.
Almost anyone can buy or access a computer today.
B.
Cybercrime is much more lucrative than regular white-collar
crime.
C.
Computer attack programs, called scripts, are available for
download from the Internet.
D.
More information systems and computer science departments
are teaching courses on hacking so that their graduates can
recognize attacks on information assets.
E.
International organized crime is training hackers.
2 points
Question 34
1.
The most overlooked people in information security are:
Answer
A.
consultants and temporary hires.
B.
executives and executive secretaries.
C.
janitors and guards.
D.
contract laborers and executive assistants.
E.
secretaries and consultants.
2 points
Question 35
1.
_____ occurs when attackers seek to learn who knows whom in
an organization and how.
Answer
A.
Spear fishing
B.
Phishing
C.
Reverse social engineering
D.
Social data mining
E.
Social engineering
2 points
Question 36
1.
A(n) _____ is a document that grants the holder exclusive rights
on an invention for 20 years.
Answer
A.
trade secret
B.
copyright
C.
private property notice
D.
knowledge base
E.
patent
2 points
Question 37
1.
An organization's e-mail policy has the least impact on which of
the following software attacks?
Answer
A.
phishing
B.
virus
C.
spear phishing
D.
worm
E.
zero-day
2 points
Question 38
1.
_____ are software programs that hide in other computer
programs and reveal their designed behavior only when they are
activated.
Answer
A.
Trojan horses
B.
Back doors
C.
Viruses
D.
Alien software
E.
Worms
2 points
Question 39
1.
_____ is the process in which an organization assesses the value
of each asset being protected, estimates the probability that
each asset might be compromised, and compares the probable
costs of each being compromised with the costs of protecting it.
Answer
A.
Risk mitigation
B.
Risk transference
C.
Risk management
D.
Risk acceptance
E.
Risk analysis
2 points
Question 40
1.
In _____, the organization takes concrete actions against risks.
Answer
A.
risk management
B.
risk transference
C.
risk analysis
D.
risk acceptance
E.
risk mitigation
2 points
Question 41
1.
Biometrics are an example of:
Answer
A.
something the user wants.
B.
something the user does.
C.
something the user knows.
D.
something the user has.
E.
something the user is.
2 points
Question 42
1.
In a process called _____, a company allows nothing to run
unless it is approved, where in a process called _____, the
company allows everything to run unless it is not approved.
Answer
A.
whitelisting, blacklisting
B.
encryption, whitelisting
C.
whitelisting, encryption
D.
encryption, blacklisting
E.
blacklisting, whitelisting
2 points
Question 43
1.
_____ issues involve who may obtain information and how
much they should pay for this information.
Answer
A.
Accessibility
B.
Accuracy
C.
Privacy
D.
Transferability
E.
Property
2 points
Question 44
1.
Your _____ is the collection of traceable data that is captured
when you use various information technologies such as credit
cards or the Internet.
Answer
A.
data profile
B.
database record
C.
data shadow
D.
database element
E.
database file
2 points
Question 45
1.
Over time, your data shadow _____.
Answer
A.
stays approximately the same size
B.
does not affect your privacy
C.
decreases in size
D.
increases your privacy
E.
increases in size
2 points
Question 46
1.
The end result of the Data Life Cycle is the generation of
_____.
Answer
A.
decisions
B.
information
C.
data
D.
knowledge
E.
wisdom
2 points
Question 47
1.
_____ occurs when the same data are stored in many places.
Answer
A.
Data isolation
B.
Data redundancy
C.
Data consistency
D.
Application/Data dependence
E.
Data integrity
2 points
Question 48
1.
_____ occurs when various copies of the data agree.
Answer
A.
Application/Data dependence
B.
Data redundancy
C.
Data consistency
D.
Data isolation
E.
Data integrity
2 points
Question 49
1.
In the data hierarchy, the smallest element is the _____.
Answer
A.
file
B.
byte
C.
character
D.
bit
E.
record
2 points
Question 50
1.
A(n) _____ is a logical grouping of related fields.
Answer
A.
database
B.
field
C.
record
D.
byte
E.
file
2 points
Question 51
1.
A(n) _____ represents a single character, such as a letter,
number, or symbol.
Answer
A.
field
B.
file
C.
database
D.
byte
E.
record
2 points
Question 52
1.
In a database, the primary key field is used to _____.
Answer
A.
identify duplicated data
B.
specify an entity
C.
create linked lists
D.
uniquely identify a record
E.
uniquely identify an attribute
2 points
Question 53
1.
A standardized language used to manipulate data is _____.
Answer
A.
Oracle
B.
structured query language
C.
query-by-example language
D.
MS-Access
E.
data manipulation language
2 points
Question 54
1.
The process of moving data from various sources into the data
warehouse is called:
Answer
A.
online analytical processing.
B.
uploading.
C.
extracting, transforming, and loading.
D.
master data management.
E.
online transaction processing.
2 points
Question 55
1.
_____ is a formal approach to managing data consistently across
an entire organization.
Answer
A.
Data warehousing
B.
Data governance
C.
Enterprise information management
D.
Database management
E.
Data mart
2 points
Question 56
1.
The most important benefit of knowledge management systems
is:
Answer
A.
retention of scarce knowledge if employees retire.
B.
they make best practices available to employees.
C.
improved morale.
D.
more efficient product development.
E.
improved customer service.
2 points
Question 1
1.
_____ are a payment mechanism similar to regular bank checks
but transmitted electronically, with a signature in digital form.
Answer
A.
Electronic credit cards
B.
Electronic debit cards
C.
Electronic wallet
D.
Electronic cash
E.
Electronic checks
2 points
Question 2
1.
Users typically have little interaction with _____, which
provide information that users receive passively.
Answer
A.
Web 2.0 sites
B.
Web 3.0 sites
C.
Wikis
D.
Web 1.0 sites
E.
affinity portals
2 points
Question 3
1.
_____ refers to the practice of registering or using domain
names for the purpose of profiting from the goodwill or
trademark belonging to someone else.
Answer
A.
Domain masquerading
B.
Domain fraud
C.
Cybersquatting
D.
Domain spoofing
E.
Domain tasting
2 points
Question 4
1.
Which of the following is not an inhibitor of faster Wi-Fi
expansion?
Answer
A.
Users cannot roam from hotspot to hotspot if the hotspots use
different Wi-Fi network services.
B.
The growth of Wi-Max
C.
Wi-Fi services may not survive in the face of free hotspot
access.
D.
Unless the service is free, users have to log on to separate
accounts for each hotspot.
E.
There is a lack of security.
2 points
Question 5
1.
_____ means that virtually every object has processing power
with wind or wireless connections to a network.
Answer
A.
Wireless computing
B.
Pervasive computing
C.
Continuous computing
D.
Fixed computing
E.
Mobile computing
2 points
Question 6
1.
UPS has all of the following IT initiatives underway except:
Answer
A.
development of live chat capability
B.
development of translation software for Eastern European
languages
C.
a system to improve the quality of international documentation
on packages
D.
development of a system to enhance managerial decision
making
E.
the UPS Worldport
2 points
Question 7
1.
Based on the RFID discussion in Chapter 7, what would be the
best use of RFID in a business?
Answer
A.
Personnel tracking
B.
Decreasing network costs
C.
Supply chain management
D.
Transaction processing
E.
Enabling communications with customers
2 points
Question 8
1.
The drawbacks of ERP systems include all of the following
except:
Answer
A.
they are complex
B.
they are expensive
C.
they consist of modules
D.
they are time-consuming to implement
E.
companies may need to change existing business processes to fit
the software
2 points
Question 9
1.
Which of the following is not a function of functional area
information systems?
Answer
A.
providing information to managers in the functional areas
B.
providing data from business events to the corporate database
C.
providing analysis capabilities to middle level managers and
staff
D.
supporting the managerial tasks of planning, organizing, and
controlling operations
E.
providing information mainly in the form of reports
2 points
Question 10
1.
_____ are the most successful solutions or problem-solving
methods for achieving a business objective.
Answer
A.
Business processes
B.
Business functions
C.
Best practices
D.
Optimal strategies
E.
Enterprise solutions
2 points
Question 11
Of the following, which is the major problem with smart
phones?
Answer
A.
Their browsers are not fully functional.
B.
They can be used to compromise security.
C.
They are too expensive.
D.
Their screens are too small.
E.
They are too slow.
2 points
Question 12
1.
When interest is credited to your savings account at your bank,
it is called a:
Answer
A.
calculation
B.
transaction
C.
process
D.
function
E.
decision
2 points
Question 13
1.
Which best describes the NoFly list at the Transportation
Security Agency?
Answer
A.
Summary report
B.
Detailed report
C.
Exception report
D.
Ad hoc report
E.
Routine report
2 points
Question 14
1.
Organizational transactions are typically _____ volume, _____,
and therefore _____ to computerize.
Answer
A.
high, repetitive, easy
B.
low, repetitive, difficult
C.
low, different, easy
D.
high, different, difficult
E.
high, different, easy
2 points
Question 15
1.
_____ Web sites allow users to upload their content to the Web,
in the form of text, voice, images, and videos.
Answer
A.
Aggregators
B.
Really simple syndication
C.
Mashups
D.
Social networking
E.
Affinity portals
2 points
Question 16
1.
A(n) _____ is automatically launched by some trigger and
appears behind the active window.
Answer
A.
keyword banner
B.
text box
C.
pop-up ad
D.
random banner
E.
pop-under ad
2 points
Question 17
1.
Electronic commerce provides opportunities for companies to
do all of the following except:
Answer
A.
adopt new business models
B.
put rich information on their Web sites
C.
expand their reach
D.
increase market share
E.
expand at relatively high cost
2 points
Question 18
1.
Unlike _____ sites, _____ sites are not so much online places to
visit, as they are services to get something done, usually with
other people.
Answer
A.
commercial portals, affinity portals
B.
Web 1.0, Web 2.0
C.
affinity portals, commercial portals
D.
Web 2.0, Web 1.0
E.
Web 1.0, Wikis
2 points
Question 19
1.
A process that enables users to create a personal Web site
containing his or her thoughts, feelings, and opinions is called
_____.
Answer
A.
tagging
B.
blogging
C.
A Wiki
D.
really simple syndication
E.
AJAX
2 points
Question 20
1.
Which of the following is not a disadvantage of telecommuting
for employees?
Answer
A.
lower pay (in some cases)
B.
no workplace visibility
C.
possible loss of fringe benefits
D.
decreased feelings of isolation
E.
slower promotions
2 points
Question 21
1.
A(n) _____ is a Web site that takes content from other Web
sites and puts it together to create a new type of content.
Answer
A.
aggregator
B.
social network
C.
really simple syndication
D.
corporate portal
E.
mashup
2 points
Question 22
1.
_____ are software mechanisms that provide security measures
and convenience for electronic commerce purchasing.
Answer
A.
Person-to-person payments
B.
Purchasing cards
C.
Smart cards
D.
Digital wallets
E.
Electronic checks
2 points
Question 23
1.
In the _____ B2B application, the orders of many buyers are
aggregated so that they total to a large volume, in order to merit
more seller attention.
Answer
A.
group purchasing
B.
electronic exchange
C.
buy-side
D.
sell-side
E.
auctions
2 points
Question 24
1.
Which type of electronic commerce is the largest by volume?
Answer
A.
business-to-employee
B.
consumer-to-consumer
C.
business-to-business
D.
business-to-consumer
E.
none of the above
2 points
Question 25
1.
The most fundamental information systems in an organization
are:
Answer
A.
decision support systems
B.
office automation systems
C.
business intelligence systems
D.
functional area information systems
E.
transaction processing systems
2 points
Question 26
1.
The development of mobile commerce is driven by all of the
following factors except:
Answer
A.
bandwidth improvement
B.
the cell phone culture
C.
increasing prices
D.
no need for a PC
E.
widespread availability of mobile devices
2 points
Question 27
1.
_____ refers to online word-of-mouth marketing.
Answer
A.
Permission marketing
B.
Direct mail
C.
Personalized marketing
D.
Viral marketing
E.
One-to-one marketing
2 points
Question 28
1.
Which of the following statements concerning Wikis is not
correct?
Answer
A.
Organizations are using Wikis for knowledge management.
B.
There are documented examples of biased content on Wikis.
C.
Organizations are using Wikis for project management.
D.
Users should always question the authenticity of the content.
E.
Users should accept the authenticity of the content.
2 points
Question 29
1.
_____ integrate the planning, management, and use of all of an
organization's resources, and are designed to tightly integrate
the functional areas of the organization.
Answer
A.
Supply chain management systems
B.
Enterprise resource planning systems
C.
Transaction processing systems
D.
Corporate extranets
E.
Functional area information systems
2 points
Question 30
1.
_____ collect data from many points over an extended space.
Answer
A.
Wi-Fi networks
B.
Wi-Max networks
C.
Wireless sensor networks
D.
Ultra-wideband networks
E.
Bluetooth networks
2 points
Question 31
1.
Parking meters that you can pay via your mobile telephone are
an example of:
Answer
A.
wireless electronic payment
B.
money transfer
C.
mobile banking
D.
wireless wallet
E.
brokerage service
2 points
Question 32
1.
_____ are interorganizational ERP systems that provide Web-
enabled links between an organization's key business systems
and its customers, suppliers, business partners, and others.
Answer
A.
ERP II systems
B.
Transaction processing systems
C.
Office automation systems
D.
Supply chain management systems
E.
Functional area information systems
2 points
Question 33
1.
_____ enable two individuals to transfer funds without using a
credit card.
Answer
A.
Purchasing cards
B.
Person-to-person payments
C.
Electronic checks
D.
Stored-value money cards
E.
Smart cards
2 points
Question 34
1.
_____ refer(s) to the wireless communication of location-based
information and control messages to and from vehicles and
other mobile assets.
Answer
A.
RFID
B.
Pervasive services
C.
Wi-Fi
D.
Location-based services
E.
Telematics
2 points
Question 35
1.
Which of the following technologies would be most suited for
project management?
Answer
A.
Tagging
B.
Blogs
C.
AJAX
D.
Wikis
E.
Really simple syndication feeds
2 points
Question 36
1.
Individuals are finding it convenient and productive to use
wireless devices for which of the following reasons?
Answer
A.
To make use of time that was formerly wasted
B.
To become more efficient
C.
Work locations are more flexible
D.
To be able to allocate working time around personal and
professional obligations
E.
All of the above
2 points
Question 37
1.
Skype is an example of:
Answer
A.
Voice over IP
B.
Videoconference
C.
Telepresence
D.
Teleconference
E.
Plain old telephone service
2 points
Question 38
1.
The problems with the Census Bureau's failed attempt to
implement wireless technology in time for the 2010 census
included all of the following except:
Answer
A.
poor contract estimates
B.
poor communication between the Census Bureau and Harris
Corporation
C.
poor communication between census takers and citizens
D.
poor executive governance
E.
poor program management
2 points
Question 39
1.
The greatest problem with GEO satellites is which of the
following?
Answer
A.
Relative speed with respect to a point on the earth's surface
B.
Size of footprint
C.
Propagation delay
D.
Orbital life
E.
Expense
2 points
Question 40
1.
Which of the following is not an electronic commerce
application?
Answer
A.
home banking
B.
evaluating an employee
C.
buying real estate
D.
buying stocks
E.
conducting an auction
2 points
Question 41
1.
This type of e-commerce is known as e-tailing.
Answer
A.
consumer-to-business
B.
intrabusiness
C.
business-to-business
D.
business-to-consumer
E.
collaborative commerce
2 points
Question 42
1.
Cyberbanking offers all of the following advantages except:
Answer
A.
The chance of recruiting remote customers.
B.
It saves time for customers.
C.
It is convenient for customers.
D.
It includes inexpensive transactions for the bank.
E.
It is more expensive for the customer.
2 points
Question 43
1.
To effectively manage by exception (i.e., use exception
reports), the company must first create:
Answer
A.
performance standards
B.
best practices
C.
user information requirements
D.
a database
E.
employee evaluation guides
2 points
Question 44
1.
Google is developing and deploying applications in which
network application?
Answer
A.
Discovery
B.
Communications
C.
Collaboration
D.
Web services
E.
All of the above
2 points
Question 45
1.
The major problem with generating advertising revenue on
Facebook is:
Answer
A.
not enough members of various Facebook groups to make
advertising worthwhile for the company
B.
user resistance
C.
it is too costly to produce the ads
D.
it is too costly to develop the additional IT infrastructure to
display the ads on the Web site
E.
the inability to product target ads for each different group on
Facebook
2 points
Question 46
1.
_____ portals coordinate content within relatively narrow
organizational and partners' communities.
Answer
A.
Personal
B.
Corporate
C.
Publishing
D.
Affinity
E.
Commercial
2 points
Question 47
1.
Enterprise resource planning systems are very _____ software
products, meaning that companies typically have to change their
_____ to accommodate how the software functions.
Answer
A.
structured, accounting processes
B.
structured, business processes
C.
unstructured, business processes
D.
structured, reporting relationships
E.
unstructured, inventory control
2 points
Question 48
1.
Sense networks track users by all of the following except:
Answer
A.
GPS
B.
traffic cameras
C.
cell towers
D.
Wi-Fi networks
E.
None of the above
2 points
Question 49
1.
The characteristics of ERP systems include all of the following
except:
Answer
A.
typically fitting an organization's existing business processes
B.
providing information necessary to control the business
processes of the organization
C.
integrating the planning, management, and use of all resources
of the organization
D.
including a set of interdependent software modules
E.
they are expensive and time-consuming
2 points
Question 50
1.
Networks enable which of the following applications?
Answer
A.
Discovery
B.
Communications
C.
Collaboration
D.
Web services
E.
All of the above
2 points
Question 51
1.
Fundamental points about network computing in organizations
include all of the following except:
Answer
A.
Networks have had limited impact on organizational
productivity.
B.
Computer data exchange provides significant advantages to
organizations.
C.
Computers constantly exchange data.
D.
Networks can be of any size, from small to enormous.
E.
Networks support new ways of doing business.
2 points
Question 52
1.
In _____, direct and indirect materials in one industry are
purchased on an as-needed basis.
Answer
A.
buy-side marketplaces
B.
horizontal exchanges
C.
sell-side marketplaces
D.
vertical exchanges
E.
functional exchanges
2 points
Question 53
1.
Data that have been processed by the organization's _____ are
inputs into the organization's database.
Answer
A.
transaction processing systems
B.
functional area information systems
C.
digital dashboards
D.
decision support systems
E.
office automation systems
2 points
Question 54
1.
Which of the following statements about Wi-Fi is not correct?
Answer
A.
Wi-Fi is expensive to set up.
B.
Wi-Fi requires encryption for secure transmissions.
C.
Many companies offer free Wi-Fi access in their stores.
D.
Laptop PC scans contain chips that can send and receive Wi-Fi
signals.
E.
Wi-Fi provides simple Internet access.
2 points
Question 55
1.
With _____, every call opened up a dedicated circuit for the
duration of the call.
Answer
A.
teleconference
B.
voice over IP
C.
internet relay chat
D.
chat rooms
E.
plain old telephone service
2 points
Question 56
1.
Which of the following is not a strategy that Digicel uses in
developing countries to start and grow its mobile telephone
business?
Answer
A.
offer large discounts for mobile service
B.
make contributions to the election campaigns of politicians
C.
have polite, knowledgeable staff in the store
D.
have clean stores
E.
spend large amounts of money on the network
Bottom of Form
Question 1
1.
Unlike _____ sites, _____ sites are not so much online places to
visit, as they are services to get something done, usually with
other people.
Answer
A.
affinity portals, commercial portals
B.
commercial portals, affinity portals
C.
Web 1.0, Web 2.0
D.
Web 2.0, Web 1.0
E.
Web 1.0, Wikis
1 points
Question 2
1.
_____ portals coordinate content within relatively narrow
organizational and partners' communities.
Answer
A.
Commercial
B.
Affinity
C.
Personal
D.
Publishing
E.
Corporate
1 points
Question 3
1.
_____ Web sites allow users to upload their content to the Web,
in the form of text, voice, images, and videos.
Answer
A.
Social networking
B.
Affinity portals
C.
Really simple syndication
D.
Mashups
E.
Aggregators
1 points
Question 4
1.
A process that enables users to create a personal Web site
containing his or her thoughts, feelings, and opinions is called
_____.
Answer
A.
tagging
B.
AJAX
C.
blogging
D.
A Wiki
E.
really simple syndication
1 points
Question 5
1.
Which of the following is not a disadvantage of telecommuting
for employees?
Answer
A.
possible loss of fringe benefits
B.
decreased feelings of isolation
C.
slower promotions
D.
no workplace visibility
E.
lower pay (in some cases)
1 points
Question 6
1.
Which of the following technologies would be most suited for
project management?
Answer
A.
Really simple syndication feeds
B.
Blogs
C.
Wikis
D.
Tagging
E.
AJAX
1 points
Question 7
1.
Google is developing and deploying applications in which
network application?
Answer
A.
Discovery
B.
Communications
C.
Collaboration
D.
Web services
E.
All of the above
1 points
Question 8
1.
Users typically have little interaction with _____, which
provide information that users receive passively.
Answer
A.
affinity portals
B.
Web 3.0 sites
C.
Wikis
D.
Web 1.0 sites
E.
Web 2.0 sites
1 points
Question 9
1.
With _____, every call opened up a dedicated circuit for the
duration of the call.
Answer
A.
internet relay chat
B.
plain old telephone service
C.
voice over IP
D.
chat rooms
E.
teleconference
1 points
Question 10
1.
A(n) _____ is a Web site that takes content from other Web
sites and puts it together to create a new type of content.
Answer
A.
corporate portal
B.
aggregator
C.
mashup
D.
really simple syndication
E.
social network
1 points
Question 11
1.
Fundamental points about network computing in organizations
include all of the following except:
Answer
A.
Networks can be of any size, from small to enormous.
B.
Computers constantly exchange data.
C.
Networks have had limited impact on organizational
productivity.
D.
Computer data exchange provides significant advantages to
organizations.
E.
Networks support new ways of doing business.
1 points
Question 1
1.
_____ enable two individuals to transfer funds without using a
credit card.
Answer
A.
Stored-value money cards
B.
Electronic checks
C.
Smart cards
D.
Person-to-person payments
E.
Purchasing cards
1 points
Question 2
1.
In the _____ B2B application, the orders of many buyers are
aggregated so that they total to a large volume, in order to merit
more seller attention.
Answer
A.
group purchasing
B.
sell-side
C.
buy-side
D.
auctions
E.
electronic exchange
1 points
Question 3
1.
This type of e-commerce is known as e-tailing.
Answer
A.
collaborative commerce
B.
intrabusiness
C.
consumer-to-business
D.
business-to-consumer
E.
business-to-business
1 points
Question 4
1.
A(n) _____ is automatically launched by some trigger and
appears behind the active window.
Answer
A.
random banner
B.
text box
C.
keyword banner
D.
pop-under ad
E.
pop-up ad
1 points
Question 5
1.
The major problem with generating advertising revenue on
Facebook is:
Answer
A.
it is too costly to produce the ads
B.
not enough members of various Facebook groups to make
advertising worthwhile for the company
C.
it is too costly to develop the additional IT infrastructure to
display the ads on the Web site
D.
user resistance
E.
the inability to product target ads for each different group on
Facebook
1 points
Question 6
1.
In _____, direct and indirect materials in one industry are
purchased on an as-needed basis.
Answer
A.
vertical exchanges
B.
buy-side marketplaces
C.
horizontal exchanges
D.
sell-side marketplaces
E.
functional exchanges
1 points
Question 7
1.
_____ refers to the practice of registering or using domain
names for the purpose of profiting from the goodwill or
trademark belonging to someone else.
Answer
A.
Domain spoofing
B.
Cybersquatting
C.
Domain tasting
D.
Domain fraud
E.
Domain masquerading
1 points
Question 8
1.
_____ are a payment mechanism similar to regular bank checks
but transmitted electronically, with a signature in digital form.
Answer
A.
Electronic credit cards
B.
Electronic wallet
C.
Electronic checks
D.
Electronic cash
E.
Electronic debit cards
1 points
Question 9
1.
_____ are software mechanisms that provide security measures
and convenience for electronic commerce purchasing.
Answer
A.
Smart cards
B.
Person-to-person payments
C.
Digital wallets
D.
Electronic checks
E.
Purchasing cards
1 points
Question 10
1.
Which type of electronic commerce is the largest by volume?
Answer
A.
business-to-employee
B.
consumer-to-consumer
C.
business-to-business
D.
business-to-consumer
E.
none of the above
1 points
Question 11
1.
_____ refers to online word-of-mouth marketing.
Answer
A.
Personalized marketing
B.
Direct mail
C.
One-to-one marketing
D.
Viral marketing
E.
Permission marketing
Bottom of Form
Question 1
1.
Based on the RFID discussion in Chapter 7, what would be the
best use of RFID in a business?
Answer
A.
Transaction processing
B.
Decreasing network costs
C.
Supply chain management
D.
Enabling communications with customers
E.
Personnel tracking
1 points
Question 2
1.
Which of the following is not an inhibitor of faster Wi-Fi
expansion?
Answer
A.
There is a lack of security.
B.
Users cannot roam from hotspot to hotspot if the hotspots use
different Wi-Fi network services.
C.
Unless the service is free, users have to log on to separate
accounts for each hotspot.
D.
Wi-Fi services may not survive in the face of free hotspot
access.
E.
The growth of Wi-Max
1 points
Question 3
1.
Which of the following is not a strategy that Digicel uses in
developing countries to start and grow its mobile telephone
business?
Answer
A.
spend large amounts of money on the network
B.
have clean stores
C.
have polite, knowledgeable staff in the store
D.
offer large discounts for mobile service
E.
make contributions to the election campaigns of politicians
1 points
Question 4
1.
Parking meters that you can pay via your mobile telephone are
an example of:
Answer
A.
money transfer
B.
wireless wallet
C.
brokerage service
D.
mobile banking
E.
wireless electronic payment
1 points
Question 5
1.
Individuals are finding it convenient and productive to use
wireless devices for which of the following reasons?
Answer
A.
To make use of time that was formerly wasted
B.
To become more efficient
C.
Work locations are more flexible
D.
To be able to allocate working time around personal and
professional obligations
E.
All of the above
1 points
Question 6
1.
_____ refer(s) to the wireless communication of location-based
information and control messages to and from vehicles and
other mobile assets.
Answer
A.
Pervasive services
B.
Telematics
C.
RFID
D.
Wi-Fi
E.
Location-based services
1 points
Question 7
1.
_____ means that virtually every object has processing power
with wind or wireless connections to a network.
Answer
A.
Pervasive computing
B.
Mobile computing
C.
Wireless computing
D.
Fixed computing
E.
Continuous computing
1 points
Question 8
1.
The problems with the Census Bureau's failed attempt to
implement wireless technology in time for the 2010 census
included all of the following except:
Answer
A.
poor communication between census takers and citizens
B.
poor communication between the Census Bureau and Harris
Corporation
C.
poor program management
D.
poor contract estimates
E.
poor executive governance
1 points
Question 9
1.
Of the following, which is the major problem with smart
phones?
Answer
A.
Their browsers are not fully functional.
B.
Their screens are too small.
C.
They can be used to compromise security.
D.
They are too expensive.
E.
They are too slow.
1 points
Question 10
1.
Sense networks track users by all of the following except:
Answer
A.
GPS
B.
traffic cameras
C.
cell towers
D.
Wi-Fi networks
E.
None of the above
1 points
Question 11
1.
_____ collect data from many points over an extended space.
Answer
A.
Ultra-wideband networks
B.
Bluetooth networks
C.
Wi-Fi networks
D.
Wi-Max networks
E.
Wireless sensor networks
Bottom of Form
Question 1
1.
The most fundamental information systems in an organization
are:
Answer
A.
decision support systems
B.
business intelligence systems
C.
transaction processing systems
D.
office automation systems
E.
functional area information systems
1 points
Question 2
1.
Organizational transactions are typically _____ volume, _____,
and therefore _____ to computerize.
Answer
A.
high, repetitive, easy
B.
high, different, easy
C.
high, different, difficult
D.
low, repetitive, difficult
E.
low, different, easy
1 points
Question 3
1.
Enterprise resource planning systems are very _____ software
products, meaning that companies typically have to change their
_____ to accommodate how the software functions.
Answer
A.
structured, reporting relationships
B.
structured, business processes
C.
unstructured, business processes
D.
unstructured, inventory control
E.
structured, accounting processes
1 points
Question 4
1.
_____ are the most successful solutions or problem-solving
methods for achieving a business objective.
Answer
A.
Business processes
B.
Business functions
C.
Best practices
D.
Enterprise solutions
E.
Optimal strategies
1 points
Question 5
1.
_____ integrate the planning, management, and use of all of an
organization's resources, and are designed to tightly integrate
the functional areas of the organization.
Answer
A.
Corporate extranets
B.
Functional area information systems
C.
Supply chain management systems
D.
Enterprise resource planning systems
E.
Transaction processing systems
1 points
Question 6
1.
UPS has all of the following IT initiatives underway except:
Answer
A.
development of translation software for Eastern European
languages
B.
a system to improve the quality of international documentation
on packages
C.
development of live chat capability
D.
the UPS Worldport
E.
development of a system to enhance managerial decision
making
1 points
Question 7
1.
The characteristics of ERP systems include all of the following
except:
Answer
A.
typically fitting an organization's existing business processes
B.
including a set of interdependent software modules
C.
they are expensive and time-consuming
D.
providing information necessary to control the business
processes of the organization
E.
integrating the planning, management, and use of all resources
of the organization
1 points
Question 8
1.
_____ are interorganizational ERP systems that provide Web-
enabled links between an organization's key business systems
and its customers, suppliers, business partners, and others.
Answer
A.
Office automation systems
B.
Supply chain management systems
C.
ERP II systems
D.
Functional area information systems
E.
Transaction processing systems
1 points
Question 9
1.
The drawbacks of ERP systems include all of the following
except:
Answer
A.
they are complex
B.
they are expensive
C.
they consist of modules
D.
companies may need to change existing business processes to fit
the software
E.
they are time-consuming to implement
1 points
Question 10
1.
Which best describes the NoFly list at the Transportation
Security Agency?
Answer
A.
Exception report
B.
Detailed report
C.
Summary report
D.
Ad hoc report
E.
Routine report
1 points
Question 11
1.
Data that have been processed by the organization's _____ are
inputs into the organization's database.
Answer
A.
office automation systems
B.
transaction processing systems
C.
decision support systems
D.
functional area information systems
E.
digital dashboards
Bottom of Form
Question 1
1.
Which of the following is the most important enabler of the
360-degree view of the customer across an organization?
Answer
A.
the organization's collaborative CRM systems
B.
the organization's CRM systems
C.
the organization's data warehouse
D.
the organization's analytical CRM systems
E.
the organization's database
1 points
Question 2
1.
A check-in kiosk at the airport would be what type of CRM
application?
Answer
A.
Sales
B.
Outbound telesales
C.
Inbound telesales
D.
Customer facing
E.
Customer touching
1 points
Question 3
1.
At Amazon, _____ occur(s) only when customers deal with
Amazon employees.
Answer
A.
customer transactions
B.
customer experience
C.
customer relationship
D.
customer service
E.
customer satisfaction
1 points
Question 4
1.
The complete data on a customer is called:
Answer
A.
a consolidated customer map
B.
a record
C.
a profile
D.
a file
E.
a 360-degree view
1 points
Question 5
1.
The benefits from Subway's new loyalty card program include
all of the following except:
Answer
A.
the ability to target customer behavior
B.
the ability to reward customer behavior
C.
the ability to reduce Subway transaction costs
D.
allowing Subway managers to analyze customer behavior in
individual stores
E.
the ability to analyze customer behavior in different
geographical regions
1 points
Question 6
1.
AT&T sells telephone services that include local and long-
distance service, voice mail service, caller ID, and digital
subscriber line access to the Internet. This is a form of:
Answer
A.
customer intimacy
B.
up-selling
C.
cross-selling
D.
bundling
E.
customer relationship management
1 points
Question 7
1.
In Amazon's _____ process, merchants send their products to
Amazon's warehouses, and Amazon does the rest.
Answer
A.
fulfillment
B.
search
C.
advertising
D.
shopping
E.
web services
1 points
Question 8
1.
The benefits of open-source CRM include all of the following
except:
Answer
A.
it is easy to customize
B.
it has more functionality than in-house CRM systems
C.
it has extensive support information available
D.
updates and error fixes occur rapidly
E.
it is favorably priced
1 points
Question 9
1.
In improving its relationship with its customers, Amazon's
ultimate goal is which of the following?
Answer
A.
to gain more control over the shopping experience
B.
to make better decisions
C.
to reduce transaction costs
D.
to improve customer satisfaction
E.
to make its Web site more functional
1 points
Question 10
1.
Subway's new loyalty card program was difficult for the
company's IT department to implement. Which of the following
is the main reason for this difficulty?
Answer
A.
The program provided too much data for the IT department to
handle.
B.
Subway stores are owned by franchisees.
C.
The program included too many Subway stores.
D.
The program was too expensive for the IT department budget.
E.
Subway store owners refused to adopt the new program.
1 points
Question 11
1.
You are in the market for a small economy car. The salesperson
has you drive the economy car, and then hands you the keys to a
mid-size car of the same brand for you to drive. The salesperson
is engaged in:
Answer
A.
bundling
B.
cross-selling
C.
customer relationship management
D.
up-selling
E.
customer intimacy
Bottom of Form
Question 1
1.
_____ are the physical products, raw materials, and supplies
that flow along a supply chain.
Answer
A.
Reverse flows
B.
Reverse logistics
C.
Information flows
D.
Material flows
E.
Financial flows
1 points
Question 2
1.
The business model of large automobile manufacturers would be
best known as which of the following?
Answer
A.
Pull model
B.
Inventory model
C.
Supply chain model
D.
Vertical integration model
E.
Push model
1 points
Question 3
1.
The _____ is known as make-to-order.
Answer
A.
inventory model
B.
push model
C.
vertical integration model
D.
pull model
E.
supply chain model
1 points
Question 4
1.
In the _____ process, individual OfficeMax stores purchase
goods in minimum quantities, which were determined by the
supplier's minimum-order quantities rather than the store's
needs.
Answer
A.
direct-to-inventory environment
B.
direct-to-stock environment
C.
direct-to-forecast environment
D.
direct-to-store environment
E.
direct-to-warehouse environment
1 points
Question 5
1.
Returned products, recycled products, and disposal of materials
or products are called:
Answer
A.
financial flows
B.
reverse flows
C.
information flows
D.
returns
E.
material flows
1 points
Question 6
1.
_____ is the ability for all organizations in a supply chain to
access or view relevant data on purchased materials as these
materials move through their suppliers' production processes
and transportation networks to their receiving docks.
Answer
A.
Supply chain intelligence
B.
Supply chain visibility
C.
Horizontal integration
D.
Vertical integration
E.
Supply chain integration
1 points
Question 7
1.
The bullwhip effect comes from which of the following?
Answer
A.
poor demand forecast
B.
price fluctuations
C.
order batching
D.
rationing within the supply chain
E.
all of the above
1 points
Question 8
1.
A company's suppliers, suppliers' suppliers, and the processes
for managing them is the:
Answer
A.
suppliers' chain
B.
entire supply chain
C.
external supply chain
D.
downstream portion of the supply chain
E.
upstream portion of the supply chain
1 points
Question 9
1.
A company's organization and processes for distributing and
delivering products to its final customers is the:
Answer
A.
downstream portion of the supply chain
B.
suppliers' chain
C.
entire supply chain
D.
external supply chain
E.
upstream portion of the supply chain
1 points
Question 10
1.
_____ portals automate the business processes involved in
selling products from a single supplier to multiple buyers.
Answer
A.
Corporate
B.
Intranet
C.
Affiliate
D.
Procurement
E.
Distribution
1 points
Question 11
1.
Distribution or dispersal takes place in which segment of the
supply chain?
Answer
A.
upstream
B.
internal
C.
downstream
D.
external
E.
none of the above
Bottom of Form
Question 1
1.
Which of the following is not a characteristic of DSS?
Answer
A.
usually utilize quantitative models
B.
easy to use and construct
C.
support only lower and middle-level managers
D.
support all phases of the decision making process
E.
adaptable to changing conditions
1 points
Question 2
1.
The benefits that Sears gained from its geographical
information system included all of the following except:
Answer
A.
Reduced average travel time per service call
B.
Improved productivity of technicians
C.
Increase customer retention
D.
Enabled Sears to increase the number of dispatchers for better
control of technicians' service calls
E.
Increased size of district territories
1 points
Question 3
1.
Credit card companies would most likely use which of the
following to check for fraudulent credit card use?
Answer
A.
Multidimensional data analysis
B.
Neural networks
C.
Data mining
D.
Structured query language
E.
Expert systems
1 points
Question 4
1.
Annual evaluation of employees best fits which type of
decision?
Answer
A.
structured
B.
confrontational
C.
semistructured
D.
wisdom
E.
unstructured
1 points
Question 5
1.
Blue Mountain Resorts implemented a business intelligence
system for all of the following reasons except:
Answer
A.
the old system was not automated
B.
the resort was purchased b another company and it had to
upgrade its system
C.
the resort wanted to use the new system to attract more guests
D.
old system could not handle all the resort's data input
E.
no one in the resort's IT department was responsible for
maintaining the old information system
1 points
Question 6
1.
The most distinguishing characteristic of geographical
information systems is:
Answer
A.
every record or digital object is visible to the user
B.
every record or digital object must be accessed by programmers
C.
every record or digital object has a unique identifier
D.
every record or digital object has an identified geographical
location
E.
every record or digital object is encrypted
1 points
Question 7
1.
Which of the following are not provided by digital dashboards?
Answer
A.
exception reporting
B.
transaction processing
C.
key performance indicators
D.
status access
E.
drill down
1 points
Question 8
1.
Which of the following is not a benefit of expert systems?
Answer
A.
capture and dissemination of scarce expertise
B.
works with incomplete, uncertain information
C.
reliability
D.
increased decision-making time
E.
increased output and productivity
1 points
Question 9
1.
Decisions today are becoming _____ complex, due to _____
uncertainty in the decision environment.
Answer
A.
about the same, decreased
B.
less, decreased
C.
more, increased
D.
less, increased
E.
more, decreased
1 points
Question 10
1.
Virtual reality systems accomplish which one of the following?
Answer
A.
Provide engineers, designers, and factory managers with precise
control over industrial design and manufacturing
B.
Provide an important source of expertise for organizations
C.
Provide drug designers, architects, engineers, and medical
workers with precise, photorealistic simulations of objects and
environments
D.
Help organizations process vast amounts of transactional data
E.
Allow groups to work together on documents
1 points
Question 11
1.
Which of the following is not a characteristic of unstructured
decisions?
Answer
A.
complex
B.
first three phases of the decision making process occur in no
particular sequence