If your great with computer or MIS this is the assignment for you. There’s around 200 multiple questions, need correct answers to help study for test. Can’t find alot of the answers. With the ones already answered please, please double check them for me.
REVIEW FINAL STUDY GUIDE
Question 1
A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.
Answer
A. |
microcomputer |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
B. |
midrange computer |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
C. |
mainframe |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
D. |
supercomputer |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
E. |
laptop computer |
2 points
Question 2
The advantages of server
virtualization
include all of the following except:
Answer
organization uses more servers to respond to quickly changing demands |
increased organizational agility |
focus of IT department shifts to services rather than supporting the technology |
cost savings |
reduced number of employees |
2 points
Question 3
The _____ of computers used integrated circuits for storing and
process
ing
information
.
Answer
fifth generation |
|
second generation |
|
third generation |
|
first generation |
|
fourth generation |
2 points
Question 4
_____ applies the unused processing resources of many geographically dispersed computers in
a network
to form a virtual supercomputer.
Answer
A server farm |
The Internet |
Grid computing |
Utility computing |
Virtualization |
2 points
Question 5
The _____ of computers used massively parallel processing to process information.
Answer
2 points
Question 6
The type of primary storage where certain critical instructions are safeguarded because the storage is
nonvolatile
and the instructions can be read only by the computer and not changed by the user is called:
Answer
read-only memory |
|
cache memory |
|
register s |
|
flash memory |
|
random access memory |
2 points
Question 7
The main types of primary storage are:
Answer
register | |||||
all of the above |
2 points
Question 8
Increased microprocessor
complex
ity comes from which of the following?
Answer
decreasing line width |
increasing transistor miniaturization |
using new materials for the chip that increase conductivity |
putting more transistors on the chip |
2 points
Question 9
A(n) _____ offers you the option of
shopping
online with a disposable
credit card
number.
Answer
credit card |
bank card |
driver’s license |
de bit card |
virtual credit card |
2 points
Question 10
Software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings is best described as a(n) _____.
Answer
anti-malware package |
anti-spyware package |
proactive monitoring package |
content-filtering package |
personal firewall |
2 points
Question 11
Personal
firewalls perform all of the following
function
s except:
Answer
They should block outbound connections that you do not initiate. |
They should seek out the origin of malware in an attempt to block it in the future. |
They should make your computer invisible. |
They should tell you when a program or connection is attempting to do something that you do not want. |
They should alert you to suspicious behavior. |
2 points
Question 12
_____
software
logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.
Answer
Monitoring |
Content filtering |
Anti-malware |
Anti-spyware |
Firewall |
2 points
Question 13
It is important to have proactive intrusion detection and prevention software on your computer for all of the following reasons except:
Answer
because anti-malware software is reactive |
to help decrease your vulnerability to zero-day attacks |
because you have to update malware signatures on a regular basis with anti-malware software |
to help decrease your vulnerability to distributed denial-of-service attacks |
None of these |
2 points
Question 14
Which of the following attacks is the one most closely associated with downloading and installing patches immediately?
Answer
Zero day attacks |
|
Worms |
|
Distributed denial-of-service |
|
Viruses |
|
Denial of service |
2 points
Question 15
A(n) _____ either originates on, or is sent to, a different Web site than the one you are currently viewing.
Answer
tracking cookie |
monitoring cookie |
first-party cookie |
second-party cookie |
third-party cookie |
2 points
Question 16
The cable medium with the highest
bandwidth
is:
Answer
copper cable |
twisted-pair wire |
fiber optic cable |
coaxial cable |
cellular radio |
2 points
Question 17
A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as :
Answer
peer-to-peer |
open systems |
client/server |
centralized |
mainframe-centric |
2 points
Question 18
By using an
ISDN
service, an organization will be able to transmit _____
data
than if it used a T1 carrier.
Answer
more streaming video |
less |
more voice |
the same amount of |
more |
2 points
Question 19
A(n) _____ connects similar networks.
Answer
router |
||
bridge |
||
network interface card |
||
gateway |
||
file server |
2 points
Question 20
Which of the following enables users to send data across sometimes unreliable networks?
Answer
Integrated services digital network |
|
TCP/IP |
|
Protocols |
|
Digital subscriber line |
|
Ethernet |
2 points
Question 21
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.
Answer
client/server architectures |
application software packages |
WANs |
protocols |
developmental architectures |
2 points
Question 22
A(n) _____ allows a device to physically connect to a
local area network
‘s communications medium.
Answer
communications channel |
network operating system |
2 points
Question 23
_____ signals convey information in wave form, where _____ signals convey information in digital, binary form.
Answer
Digital, packet |
Analog, packet |
Packet, analog |
Analog, digital |
Digital, analog |
2 points
Question 24
Which of the following is a digital transmission system that defines circuits which operates at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call?
Answer
Asynchronous transfer mode |
T-carrier system |
Synchronous optical network |
ISDN |
2 points
Question 25
Firms are recentralizing their applications to mainframes for all the following reasons except:
Answer
to support the large number of transaction s caused by electronic commerce |
||||
to reduce the total cost of ownership of distributed systems |
||||
to more adequately support end-user computing |
||||
to improve system performance |
||||
none of the above |
2 points
Question 26
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of
a file
at the same time.
Answer
torrents |
collaboration |
packet switching |
swarming |
leeching |
2 points
Question 27
A(n) _____ connects two or more devices in a limited geographical area.
Answer
value added network |
enterprise network |
personal area network |
wide area network |
local area network |
2 points
Question 28
The main system control program is the _____.
Answer
security monitor |
operating system |
cache software |
multithread register |
virtual memory |
2 points
Question 29
Which of the following is not offered by enterprise operating systems?
Answer
support for the greatest number of users |
|
most functionality |
|
same functionality as desktop operating systems |
|
most sophisticated interface |
2 points
Question 30
Which of the following is not offered by desktop operating systems?
Answer
same functionality as mobile operating systems |
support for the fewest number of users |
2 points
Question 31
The _____ is a global wide-area network that connects approximately one million organizational computer networks.
Answer
World Wide Web |
||
global network |
||
Internet | ||
intranet |
||
extranet |
2 points
Question 32
A(n) _____ connects parts of the
intranets
of different organizations and allows secure communications among business partners.
Answer
2 points
Question 33
Internet service providers connect to one another through _____.
Answer
network connection points |
network access points |
internet connection points |
an extranet |
common carrier connection points |
2 points
Question 34
The _____ is measured in megahertz or gigahertz.
Answer
word length |
line width |
clock speed |
bandwidth |
bus width |
2 points
Question 35
Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s for which of the following reasons?
Answer
hardware costs have decreased |
hardware performance has increased |
software has become increasingly complex |
building software applications remains slow, complex, and error-prone |
2 points
Question 36
Which of the following is not a
character
istic of today’s typical software?
Answer
an art as well as a science |
full of errors |
expensive |
poorly designed |
efficient |
2 points
Question 37
Which programming language consists entirely of 0’s and 1’s?
Answer
non- procedural language |
assembly language |
visual programming language |
machine language |
procedural language |
2 points
Question 38
A(n) _____ connects dissimilar networks.
Answer
2 points
Question 39
Each site on the Internet gets an assigned address, which is a(n) _____.
Answer
World Wide Web address |
|
TCP address |
|
URL address |
|
ISO/OSI identifier |
|
IP address |
2 points
Question 40
Consider this domain name,
www.business.gsu.edu
. The “edu” is the:
Answer
web site locator |
|
address of the Webmaster |
|
name of the computer |
|
top-level domain |
|
URL |
2 points
Question 41
Consider this domain name,
www.business.gsu.edu
. The “gsu” is the:
Answer
name of the organization |
name of the specific computer |
2 points
Question 42
In order to protect their software from illegal distribution, vendors often rely on _____.
Answer
Internet-based distribution methods |
private security agents |
encryption |
software licensing |
2 points
Question 43
Off-the-shelf software _____.
Answer
requires more risk because all features and performance are not known |
may not match an organization’s current work processes and data |
is more flexible in making modifications |
is rarely tested prior to release |
2 points
Question 44
_____ are programs that protect a computer system from unauthorized use, fraud, and destruction.
Answer
System performance monitors |
General application software |
System utilities |
System security monitors |
Personal application software |
2 points
Question 45
Unlike the hardwired computers of the 1950s, modern software uses the _____, where computer programs are executed in the computer’s CPU.
Answer
stored program concept |
plug and play |
multiprogramming |
multithreading |
multitasking |
2 points
Question 46
One of the primary advantages of an object is that it contains _____.
Answer
reusable data |
messages |
reusable code |
embedded graphics |
no errors |
2 points
Question 47
Over the past twenty years, hardware costs have _____, while software costs have _____.
Answer
decreased, increased |
increased, remained level |
increased, increased |
decreased, decreased |
increased, decreased |
2 points
Question 48
_____ means that several parts of the same application can work simultaneously.
Answer
Time-sharing |
Scalability |
Multithreading |
Multitasking |
Multiprocessing |
2 points
Question 49
In _____, tasks are performed by computers physically removed from the user and accessed over a network, particularly the Internet.
Answer
cloud computing |
virtualization |
edge computing |
extranets |
intranets |
2 points
Question 50
Which of the following is not a characteristic of secondary storage?
Answer
nonvolatile |
more cost effective than primary storage |
s lower than primary storage |
can utilize only chips as its medium |
2 points
Question 51
An assigned address that uniquely identifies a computer on the Internet
Answer
Domain name |
MAC address |
Serial Number |
2 points
Question 52
A(n) __________ is a private network that uses TCP/IP protocols
Answer
Token Ring |
PBX |
2 points
Question 53
A web site on the internet is likely to be secure if the
Answer
the url has the prefix https:// |
the url has the prefix http:// |
your browser gives you no warning signs and your protection software gives no warnings |
the website assures you it is safe and easy! |
2 points
Question 54
A new computer with the latest operating system that is up to date, running an up to date browser, with an active and running
virus
scan and protection software is immune to any virus or malware attack, only out of date software is vulnerable.
Answer True
False
2 points
Question 1
1.
Which of the following statements is
not
correct?
Answer
To succeed in today’s environment, it is often necessary to change business models and strategies. |
IT enables organizations to survive in the face of business pressures. |
IT requires small investments over a long period of time. |
Organizations can leverage their platforms to develop Web-based applications, products, and services. |
2 points
Question 2
1.
_____ relates to any computer-based tool that people use to work with information and to support the information processing needs of the organization.
Answer
A Computer-Based Information System |
Information technology architecture |
Information technology infrastructure |
Information technology |
An information system |
2 points
Question 3
1.
The list of all your purchases from Amazon (books bought, price paid, dates) would be considered to be:
Answer
knowledge |
||
data | ||
information | ||
wisdom |
||
experience |
2 points
Question 4
1.
An organization’s information technology architecture:
Answer
provides a guide for current operations. |
provides a blueprint for future directions. |
integrates the information requirements of the organization and all users. |
is analogous to the architecture of a house. |
2 points
Question 5
1.
_____ is the integration of economic, social, cultural, and ecological facets of life, enabled by information technologies.
Answer
Business environment |
Nationalization |
Regionalization |
Globalization |
2 points
Question 6
1.
The global, Web-based platform enables individuals to do which of the following?
Answer
connect, compute, communicate, collaborate, and compete everywhere and all the time |
access information, services, and entertainment |
exchange knowledge |
produce and sell goods and services |
2 points
Question 7
1.
The consequences of uploading include all of the following
except
:
Answer
shift toward a static, passive approach to media |
growth of blogs and Wikis |
increased collaboration over the Web |
growth of the open-source software movement |
2 points
Question 8
1.
_____ involves taking a specific function that your company was doing itself, having another company perform that same function for you, and then integrating their work back into your operation.
Answer
Insourcing |
Informing |
Offshoring |
Outsourcing |
Uploading |
2 points
Question 9
1.
In general, labor costs are _____ in developed countries than in developing countries.
Answer
about the same |
decreasing slower |
higher |
decreasing faster |
lower |
2 points
Question 10
1.
Today’s customers have which of the following characteristics?
Answer
less knowledge about products |
less sophistication |
difficulty in finding information about products |
higher expectations |
difficulty in comparing prices |
2 points
Question 11
1.
When identical items are produced in large quantities, it is called:
Answer
mass customization. |
customer focus. |
continuous improvement. |
strategic systems. |
mass production. |
2 points
Question 12
1.
Which of the following is
not
a fact about IT careers?
Answer
MIS majors usually receive high starting salaries. |
The four-fastest growing U.S. jobs that require college degrees from 2002 through 2012 are IT-related. |
There are no computing jobs. |
Highly-skilled IT jobs will typically not be offshored. |
2 points
Question 13
1.
The fact that you practice continuous computing means all of the following
except
:
Answer
You can pull information about almost everything from anywhere all the time. |
Your daily routines are the same as students 20 years ago, but you can do your tasks much more quickly and with less effort. |
You can push your ideas to the Web. |
You are surrounded by a movable information network. |
2 points
Question 14
1.
Which of the following statements about information systems is not correct?
Answer
Managing information systems is difficult. |
Information systems are based on the needs of employees. |
Any information system can be strategic. |
Information systems tend to follow the structure of the organization. |
Information systems are concentrated in the IS Department. |
2 points
Question 15
1.
A collection of related files, tables, and so on that stores data and the associations among them is _____.
Answer
a database |
|
procedures |
|
software | |
hardware | |
a network |
2 points
Question 16
1.
Which of the following is not a major capability of information systems?
Answer
increase the effectiveness and efficiency of people working in groups |
perform high-speed, high-volume numerical computations |
automate semiautomatic business processes |
store large amounts of information in a very large space |
provide fast, accurate communications among organizations |
2 points
Question 17
1.
_____ systems are designed to correct a lack of communications among _____.
Answer
Transaction processing systems, functional area information system s |
Functional area information systems , enterprise resource planning system s |
Enterprise resource planning systems , functional area information systems |
Dashboards , office automation system s |
Office automation systems , expert systems |
2 points
Question 18
1.
When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____
record
s the data.
Answer
functional area information system |
transaction processing system |
office automation system |
dashboard |
enterprise resource planning system |
2 points
Question 19
1.
Supply chain systems are which type of information system?
Answer
end-user computing systems |
individual information systems |
enterprisewide information systems |
departmental information systems |
interorganizational information systems |
2 points
Question 20
1.
_____ attempt to duplicate the work of human experts by applying reasoning capabilities.
Answer
Dashboards | ||||
Decision support systems |
||||
Functional area information systems | ||||
Expert systems |
||||
Business intelligence systems |
2 points
Question 21
1.
Competitive advantage for an organization manifests as all of the following except:
Answer
Lower costs |
Increased profits |
Higher quality |
Increased speed |
Increased time to market |
2 points
Question 22
1.
The Internet has had which of the following impacts on the way you purchase your textbooks?
Answer
The Internet provides you with less information. |
The Internet increases your switching costs. |
The Internet decreases your bargaining power. |
The Internet gives you fewer choices. |
The Internet increases your bargaining power. |
2 points
Question 23
1.
Porter’s competitive forces model helps organizations identify _____, where his value chain model helps organizations identify specific _____.
Answer
activities, general strategies |
activities, competitive opportunities |
primary activities, support activities |
competitive opportunities, activities |
general strategies, activities |
2 points
Question 24
1.
If there are _____ substitutes for an organization’s products or services, then the threat of substitutes is _____.
Answer
many, few |
many, high |
few, few |
few, negligible |
few, high |
2 points
Question 25
1.
Wal-Mart’s automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?
Answer
operational effectiveness |
||
differentiation |
||
customer-orientation |
||
innovation |
||
cost leadership |
2 points
Question 26
1.
The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?
Answer
2 points
Question 27
1.
When Amazon welcomes you by name back to its Web site on your second visit, this is an example of which strategy for competitive advantage?
Answer
customer orientation |
2 points
Question 28
1.
Which of the following is a traditional, major IS function?
Answer
Managing systems development |
Incorporating the Internet and electronic commerce into the business |
Partnering with the firm’s executives |
Managing outsourcing |
Educating non-IS managers about IT |
2 points
Question 29
1.
Which of the following is the most important issue raised by the numerous security breaches at NASA?
Answer
Is it possible to secure NASA’s information assets? |
Is NASA spending too little money on its defenses against cyberespionage? |
Is it possible to secure the Internet? |
Should NASA even be connected to the Internet? |
Should NASA be required to detail its problems with cyberespionage to the taxpayers? |
2 points
Question 30
1.
What is _____ is not necessarily _____.
Answer
Unethical, legal |
Ethical, illegal |
Illegal, unethical |
Ethical, legal |
Unethical, illegal |
2 points
Question 31
1.
Which of the following statements is correct?
Answer
It is difficult to determine and enforce privacy regulations. |
The Internet has increased individuals’ privacy. |
An individual’s right to privacy supersedes the needs of society. |
An individual’s right to privacy is absolute. |
Advances in information technologies have not affected individual privacy. |
2 points
Question 32
1.
Which of the following statements is not correct?
Answer
The large majority of organizations monitor employee Internet usage. |
Employees have limited protection against surveillance by employers. |
As with normal first-class mail, employers cannot read employee e-mail. |
The large majority of organizations use URL filtering. |
Employees should be aware that surveillance is legal. |
2 points
Question 33
1.
The computing skills necessary to be a hacker are decreasing for which of the following reasons?
Answer
Almost anyone can buy or access a computer today. |
Cybercrime is much more lucrative than regular white-collar crime. |
Computer attack programs, called scripts, are available for download from the Internet. |
More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets. |
International organized crime is training hackers. |
2 points
Question 34
1.
The most overlooked people in information security are:
Answer
consultants and temporary hires. |
executives and executive secretaries. |
janitors and guards. |
contract laborers and executive assistants. |
secretaries and consultants. |
2 points
Question 35
1.
_____ occurs when attackers seek to learn who knows whom in an organization and how.
Answer
Spear fishing |
Phishing |
Reverse social engineering |
Social data mining |
Social engineering |
2 points
Question 36
1.
A(n) _____ is a document that grants the holder exclusive rights on an invention for 20 years.
Answer
trade secret |
copyright |
private property notice |
knowledge base |
patent |
2 points
Question 37
1.
An organization’s e-mail policy has the least impact on which of the following software attacks?
Answer
phishing |
virus |
spear phishing |
worm |
zero-day |
2 points
Question 38
1.
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
Answer
Trojan horses |
Back doors |
Alien software |
2 points
Question 39
1.
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.
Answer
Risk mitigation |
Risk transference |
Risk management |
Risk acceptance |
Risk analysis |
2 points
Question 40
1.
In _____, the organization takes concrete actions against risks.
Answer
risk management |
risk transference |
risk analysis |
risk acceptance |
risk mitigation |
2 points
Question 41
1.
Biometrics are an example of:
Answer
something the user wants. |
something the user does. |
something the user knows. |
something the user has. |
something the user is. |
2 points
Question 42
1.
In a process called _____, a company allows nothing to run unless it is approved, where in a process called _____, the company allows everything to run unless it is not approved.
Answer
whitelisting, blacklisting |
encryption, whitelisting |
whitelisting, encryption |
encryption, blacklisting |
blacklisting, whitelisting |
2 points
Question 43
1.
_____ issues involve who may obtain information and how much they should pay for this information.
Answer
Accessibility |
Accuracy |
Privacy |
Transferability |
Property |
2 points
Question 44
1.
Your _____ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet.
Answer
dat a profile |
database record |
data shadow |
database element |
database file |
2 points
Question 45
1.
Over time, your data shadow _____.
Answer
stays approximately the same size |
does not affect your privacy |
decreases in size |
increases your privacy |
increases in size |
2 points
Question 46
1.
The end result of the Data Life Cycle is the generation of _____.
Answer
decision s |
2 points
Question 47
1.
_____ occurs when the same data are stored in many places.
Answer
Data isolation |
|
Data redundancy |
|
Data consistency |
|
Application/Data dependence |
|
Data integrity |
2 points
Question 48
1.
_____ occurs when various copies of the data agree.
Answer
2 points
Question 49
1.
In the data hierarchy, the smallest element is the _____.
Answer
file | ||
byte |
||
character | ||
bit | ||
record |
2 points
Question 50
1.
A(n) _____ is a logical grouping of related
field
s.
Answer
database | |
field | |
2 points
Question 51
1.
A(n) _____ represents a single character, such as a letter, number, or symbol.
Answer
2 points
Question 52
1.
In
a database
, the primary key field is used to _____.
Answer
identify duplicated data |
specify an entity |
create linked lists |
uniquely identify a record |
uniquely identify an attribute |
2 points
Question 53
1.
A standardized language used to manipulate data is _____.
Answer
Oracle |
structured query language |
query-by-example language |
MS-Access |
data manipulation language |
2 points
Question 54
1.
The process of moving data from various sources into the data warehouse is called:
Answer
online analytical processing. |
uploading. |
extracting, transforming, and loading. |
master data management. |
online transaction processing. |
2 points
Question 55
1.
_____ is a formal approach to managing data consistently across an entire organization.
Answer
Data warehousing |
Data governance |
Enterprise information management |
Database management |
Data mart |
2 points
Question 56
1.
The most important benefit of knowledge management systems is:
Answer
retention of scarce knowledge if employees retire. |
they make best practices available to employees. |
improved morale. |
more efficient product development. |
improved customer service . |
2 points
Question 1
1.
_____ are a payment mechanism similar to regular bank checks but transmitted electronically, with a signature in digital form.
Answer
Electronic credit cards |
|||||
Electronic debit cards |
|||||
Electronic wallet |
|||||
Electronic cash |
|||||
Electronic checks |
2 points
Question 2
1.
Users typically have little interaction with _____, which provide information that users receive passively.
Answer
Web 2.0 sites |
|||
Web 3.0 sites |
|||
Wikis | |||
Web 1.0 sites |
|||
affinity portals |
2 points
Question 3
1.
_____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else.
Answer
Domain masquerading |
|
Domain fraud |
|
Cybersquatting |
|
Domain spoofing |
|
Domain tasting |
2 points
Question 4
1.
Which of the following is not an inhibitor of faster
Wi-Fi
expansion?
Answer
Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. |
|
The growth of Wi-Max |
|
Wi-Fi services may not survive in the face of free hotspot access. |
|
Unless the service is free, users have to log on to separate accounts for each hotspot. |
|
There is a lack of security. |
2 points
Question 5
1.
_____ means that virtually every object has processing power with wind or wireless connections to a network.
Answer
Wireless computing |
|
Pervasive computing |
|
Continuous computing |
|
Fixed computing |
|
Mobile computing |
2 points
Question 6
1.
UPS has all of the following IT initiatives underway except:
Answer
development of live chat capability |
|
development of translation software for Eastern European languages |
|
a system to improve the quality of international documentation on packages |
|
development of a system to enhance managerial decision making |
|
the UPS Worldport |
2 points
Question 7
1.
Based on the
RFID
discussion in Chapter 7, what would be the best use of RFID in a business?
Answer
Personnel tracking |
|
Decreasing network costs |
|
Supply chain management |
|
Transaction processing | |
Enabling communications with customers |
2 points
Question 8
1.
The drawbacks of ERP systems include all of the following except:
Answer
they are complex |
|
they are expensive |
|
they consist of modules |
|
they are time-consuming to implement |
|
companies may need to change existing business processes to fit the software |
2 points
Question 9
1.
Which of the following is not a function of functional area information systems?
Answer
providing information to managers in the functional areas |
providing data from business events to the corporate database |
providing analysis capabilities to middle level managers and staff |
supporting the managerial tasks of planning, organizing, and controlling operations |
providing information mainly in the form of reports |
2 points
Question 10
1.
_____ are the most successful solutions or problem-solving methods for achieving a business objective.
Answer
Business processes |
|
Business functions |
|
Best practices |
|
Optimal strategies |
|
Enterprise solutions |
2 points
Question 11
Of the following, which is the major problem with smart phones?
Answer
Their browsers are not fully functional. |
|
They can be used to compromise security. |
|
They are too expensive. |
|
Their screens are too small. |
|
They are too slow. |
2 points
Question 12
1.
When interest is credited to your savings account at your bank, it is called a:
Answer
calculation |
transaction |
process |
function |
decision |
2 points
Question 13
1.
Which best describes the NoFly list at the Transportation Security Agency?
Answer
Summary report |
|
Detailed report |
|
Exception report |
|
Ad hoc report |
|
Routine report |
2 points
Question 14
1.
Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.
Answer
high, repetitive, easy |
|
low, repetitive, difficult |
|
low, different, easy |
|
high, different, difficult |
|
high, different, easy |
2 points
Question 15
1.
_____ Web sites allow users to upload their content to the Web, in the form of text, voice, images, and videos.
Answer
Aggregators |
|
Really simple syndication |
|
Mashups |
|
Social networking |
|
Affinity portals |
2 points
Question 16
1.
A(n) _____ is automatically launched by some trigger and appears behind the active window.
Answer
keyword banner |
|
text box |
|
pop-up ad |
|
random banner |
|
pop-under ad |
2 points
Question 17
1.
Electronic commerce provides opportunities for companies to do all of the following except:
Answer
adopt new business models |
put rich information on their Web sites |
expand their reach |
increase market share |
expand at relatively high cost |
2 points
Question 18
1.
Unlike _____ sites, _____ sites are not so much online places to visit, as they are services to get something done, usually with other people.
Answer
commercial portals, affinity portals |
|
Web 1.0, Web 2.0 |
|
affinity portals, commercial portals |
|
Web 2.0, Web 1.0 |
|
Web 1.0, Wikis |
2 points
Question 19
1.
A process that enables users to create a personal Web site containing his or her thoughts, feelings, and opinions is called _____.
Answer
tagging |
|||
blogging |
|||
A Wiki |
|||
really simple syndication |
|||
AJAX |
2 points
Question 20
1.
Which of the following is not a disadvantage of telecommuting for employees?
Answer
lower pay (in some cases) |
|
no workplace visibility |
|
possible loss of fringe benefits |
|
decreased feelings of isolation |
|
slower promotions |
2 points
Question 21
1.
A(n) _____ is a Web site that takes content from other Web sites and puts it together to create a new type of content.
Answer
aggregator |
|
social network |
|
corporate portal |
|
mashup |
2 points
Question 22
1.
_____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.
Answer
Person-to-person payments |
|||
Purchasing cards |
|||
Smart cards |
|||
Digital wallets |
2 points
Question 23
1.
In the _____ B2B application, the orders of many buyers are aggregated so that they total to a large volume, in order to merit more seller attention.
Answer
group purchasing |
|
electronic exchange |
|
buy-side |
|
sell-side |
|
auctions |
2 points
Question 24
1.
Which type of electronic commerce is the largest by volume?
Answer
business-to-employee |
|||
consumer-to-consumer |
|||
business-to-business |
|||
business-to-consumer |
2 points
Question 25
1.
The most fundamental information systems in an organization are:
Answer
decision support systems |
|||
office automation systems |
|||
business intelligence systems |
|||
functional area information systems | |||
transaction processing systems |
2 points
Question 26
1.
The development of mobile commerce is driven by all of the following factors except:
Answer
bandwidth improvement |
the cell phone culture |
increasing prices |
no need for a PC |
widespread availability of mobile devices |
2 points
Question 27
1.
_____ refers to online word-of-mouth marketing.
Answer
Permission marketing |
|
Direct mail |
|
Personalized marketing |
|
Viral marketing |
|
One-to-one marketing |
2 points
Question 28
1.
Which of the following statements concerning Wikis is not correct?
Answer
Organizations are using Wikis for knowledge management. |
There are documented examples of biased content on Wikis. |
Organizations are using Wikis for project management. |
Users should always question the authenticity of the content. |
Users should accept the authenticity of the content. |
2 points
Question 29
1.
_____ integrate the planning, management, and use of all of an organization’s resources, and are designed to tightly integrate the functional areas of the organization.
Answer
Supply chain management systems |
|||
Enterprise resource planning systems | |||
Transaction processing systems |
|||
Corporate extranets |
|||
2 points
Question 30
1.
_____ collect data from many points over an extended space.
Answer
Wi-Fi networks |
|||
Wi-Max networks |
|||
Wireless sensor networks |
|||
Ultra-wideband networks |
|||
Bluetooth networks |
2 points
Question 31
1.
Parking meters that you can pay via your mobile telephone are an example of:
Answer
wireless electronic payment |
|
money transfer |
|
mobile banking |
|
wireless wallet |
|
brokerage service |
2 points
Question 32
1.
_____ are interorganizational ERP systems that provide Web-enabled links between an organization’s key business systems and its customers, suppliers, business partners, and others.
Answer
ERP II systems |
|
Office automation systems | |
2 points
Question 33
1.
_____ enable two individuals to transfer funds without using a credit card.
Answer
Stored-value money cards |
|
2 points
Question 34
1.
_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.
Answer
RFID | |
Pervasive services |
|
Wi-Fi | |
Location-based services |
|
Telematics |
2 points
Question 35
1.
Which of the following technologies would be most suited for project management?
Answer
Tagging |
|
Blogs |
|
Really simple syndication feeds |
2 points
Question 36
1.
Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?
Answer
To make use of time that was formerly wasted |
||||
To become more efficient |
||||
Work locations are more flexible |
||||
To be able to allocate working time around personal and professional obligations |
||||
All of the above |
2 points
Question 37
1.
Skype is an example of:
Answer
Voice over IP |
Videoconference |
Telepresence |
Teleconference |
Plain old telephone service |
2 points
Question 38
1.
The problems with the Census Bureau’s failed attempt to implement wireless technology in time for the 2010 census included all of the following except:
Answer
poor contract estimates |
|
poor communication between the Census Bureau and Harris Corporation |
|
poor communication between census takers and citizens |
|
poor executive governance |
|
poor program management |
2 points
Question 39
1.
The greatest problem with GEO satellites is which of the following?
Answer
Relative speed with respect to a point on the earth’s surface |
Size of footprint |
Propagation delay |
Orbital life |
Expense |
2 points
Question 40
1.
Which of the following is not an electronic commerce application?
Answer
home banking |
evaluating an employee |
buying real estate |
buying stocks |
conducting an auction |
2 points
Question 41
1.
This type of e-commerce is known as e-tailing.
Answer
consumer-to-business |
|
intrabusiness |
|
collaborative commerce |
2 points
Question 42
1.
Cyberbanking offers all of the following advantages except:
Answer
The chance of recruiting remote customers. |
It saves time for customers. |
It is convenient for customers. |
It includes inexpensive transactions for the bank. |
It is more expensive for the customer. |
2 points
Question 43
1.
To effectively manage by exception (i.e., use exception reports), the company must first create:
Answer
performance standards |
best practices |
user information requirements |
employee evaluation guides |
2 points
Question 44
1.
Google is developing and deploying applications in which network application?
Answer
Discovery |
||
Communications |
||
Collaboration |
||
Web services |
2 points
Question 45
1.
The major problem with generating
advertising
revenue on Facebook is:
Answer
not enough members of various Facebook groups to make advertising worthwhile for the company |
|
user resistance |
|
it is too costly to produce the ads |
|
it is too costly to develop the additional IT infrastructure to display the ads on the Web site |
|
the inability to product target ads for each different group on Facebook |
2 points
Question 46
1.
_____ portals coordinate content within relatively narrow organizational and partners’ communities.
Answer
Personal | ||
Corporate | ||
Publishing |
||
Affinity | ||
Commercial |
2 points
Question 47
1.
Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions.
Answer
structured, accounting processes |
|
structured, business processes |
|
unstructured , business processes |
|
structured, reporting relationships |
|
unstructured, inventory control |
2 points
Question 48
1.
Sense networks track users by all of the following except:
Answer
GPS |
|
traffic cameras |
|
cell towers |
|
None of the above |
2 points
Question 49
1.
The characteristics of ERP systems include all of the following except:
Answer
typically fitting an organization’s existing business processes |
|
providing information necessary to control the business processes of the organization |
|
integrating the planning, management, and use of all resources of the organization |
|
including a set of interdependent software modules |
|
they are expensive and time-consuming |
2 points
Question 50
1.
Networks enable which of the following applications?
Answer
A.
Discovery
B.
Communications
C.
Collaboration
D.
Web services
E.
All of the above
2 points
Question 51
1.
Fundamental points about network computing in organizations include all of the following except:
Answer
Networks have had limited impact on organizational productivity. |
|
Computer data exchange provides significant advantages to organizations. |
|
Computers constantly exchange data. |
|
Networks can be of any size, from small to enormous. |
|
Networks support new ways of doing business. |
2 points
Question 52
1.
In _____, direct and indirect materials in one industry are purchased on an as-needed basis.
Answer
buy-side marketplaces |
|
horizontal exchanges |
|
sell-side marketplaces |
|
vertical exchanges |
|
functional exchanges |
2 points
Question 53
1.
Data that have been processed by the organization’s _____ are inputs into
the organization’s database
.
Answer
digital dashboards |
|
2 points
Question 54
1.
Which of the following statements about Wi-Fi is not correct?
Answer
Wi-Fi is expensive to set up. |
Wi-Fi requires encryption for secure transmissions. |
Many companies offer free Wi-Fi access in their stores. |
Laptop PC scans contain chips that can send and receive Wi-Fi signals. |
Wi-Fi provides simple Internet access. |
2 points
Question 55
1.
With _____, every call opened up a dedicated circuit for the duration of the call.
Answer
teleconference |
|
voice over IP |
|
internet relay chat |
|
chat rooms |
|
plain old telephone service |
2 points
Question 56
1.
Which of the following is not a strategy that Digicel uses in developing countries to start and grow its mobile telephone business?
Answer
offer large discounts for mobile service |
|
make contributions to the election campaigns of politicians |
|
have polite, knowledgeable staff in the store |
|
have clean stores |
|
spend large amounts of money on the network |
Bottom of Form
Question 1
1.
Unlike _____ sites, _____ sites are not so much online places to visit, as they are services to get something done, usually with other people.
Answer
1 points
Question 2
1.
_____ portals coordinate content within relatively narrow organizational and partners’ communities.
Answer
1 points
Question 3
1.
_____ Web sites allow users to upload their content to the Web, in the form of text, voice, images, and videos.
Answer
1 points
Question 4
1.
A process that enables users to create a personal Web site containing his or her thoughts, feelings, and opinions is called _____.
Answer
1 points
Question 5
1.
Which of the following is not a disadvantage of telecommuting for employees?
Answer
1 points
Question 6
1.
Which of the following technologies would be most suited for project management?
Answer
1 points
Question 7
1.
Google is developing and deploying applications in which network application?
Answer
A.
Discovery
B.
Communications
C.
Collaboration
D.
Web services
E.
All of the above
1 points
Question 8
1.
Users typically have little interaction with _____, which provide information that users receive passively.
Answer
1 points
Question 9
1.
With _____, every call opened up a dedicated circuit for the duration of the call.
Answer
1 points
Question 10
1.
A(n) _____ is a Web site that takes content from other Web sites and puts it together to create a new type of content.
Answer
1 points
Question 11
1.
Fundamental points about network computing in organizations include all of the following except:
Answer
1 points
Question 1
1.
_____ enable two individuals to transfer funds without using a credit card.
Answer
1 points
Question 2
1.
In the _____ B2B application, the orders of many buyers are aggregated so that they total to a large volume, in order to merit more seller attention.
Answer
1 points
Question 3
1.
This type of e-commerce is known as e-tailing.
Answer
1 points
Question 4
1.
A(n) _____ is automatically launched by some trigger and appears behind the active window.
Answer
1 points
Question 5
1.
The major problem with generating advertising revenue on Facebook is:
Answer
1 points
Question 6
1.
In _____, direct and indirect materials in one industry are purchased on an as-needed basis.
Answer
1 points
Question 7
1.
_____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else.
Answer
1 points
Question 8
1.
_____ are a payment mechanism similar to regular bank checks but transmitted electronically, with a signature in digital form.
Answer
1 points
Question 9
1.
_____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.
Answer
1 points
Question 10
1.
Which type of electronic commerce is the largest by volume?
Answer
A.
business-to-employee
B.
consumer-to-consumer
C.
business-to-business
D.
business-to-consumer
E.
none of the above
1 points
Question 11
1.
_____ refers to online word-of-mouth marketing.
Answer
Bottom of Form
Question 1
1.
Based on the RFID discussion in Chapter 7, what would be the best use of RFID in a business?
Answer
1 points
Question 2
1.
Which of the following is not an inhibitor of faster Wi-Fi expansion?
Answer
1 points
Question 3
1.
Which of the following is not a strategy that Digicel uses in developing countries to start and grow its mobile telephone business?
Answer
1 points
Question 4
1.
Parking meters that you can pay via your mobile telephone are an example of:
Answer
1 points
Question 5
1.
Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?
Answer
A.
To make use of time that was formerly wasted
B.
To become more efficient
C.
Work locations are more flexible
D.
To be able to allocate working time around personal and professional obligations
E.
All of the above
1 points
Question 6
1.
_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.
Answer
1 points
Question 7
1.
_____ means that virtually every object has processing power with wind or wireless connections to a network.
Answer
1 points
Question 8
1.
The problems with the Census Bureau’s failed attempt to implement wireless technology in time for the 2010 census included all of the following except:
Answer
1 points
Question 9
1.
Of the following, which is the major problem with smart phones?
Answer
1 points
Question 10
1.
Sense networks track users by all of the following except:
Answer
A.
GPS
B.
traffic cameras
C.
cell towers
D.
Wi-Fi networks
E.
None of the above
1 points
Question 11
1.
_____ collect data from many points over an extended space.
Answer
Bottom of Form
Question 1
1.
The most fundamental information systems in an organization are:
Answer
1 points
Question 2
1.
Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.
Answer
1 points
Question 3
1.
Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions.
Answer
1 points
Question 4
1.
_____ are the most successful solutions or problem-solving methods for achieving a business objective.
Answer
1 points
Question 5
1.
_____ integrate the planning, management, and use of all of an organization’s resources, and are designed to tightly integrate the functional areas of the organization.
Answer
1 points
Question 6
1.
UPS has all of the following IT initiatives underway except:
Answer
1 points
Question 7
1.
The characteristics of ERP systems include all of the following except:
Answer
1 points
Question 8
1.
_____ are interorganizational ERP systems that provide Web-enabled links between an organization’s key business systems and its customers, suppliers, business partners, and others.
Answer
1 points
Question 9
1.
The drawbacks of ERP systems include all of the following except:
Answer
1 points
Question 10
1.
Which best describes the NoFly list at the Transportation Security Agency?
Answer
1 points
Question 11
1.
Data that have been processed by the organization’s _____ are inputs into the organization’s database.
Answer
Bottom of Form
Question 1
1.
Which of the following is the most important enabler of the 360-degree view of the customer across an organization?
Answer
the organization’s collaborative CRM systems |
the organization’s CRM systems |
the organization’s data warehouse |
the organization’s analytical CRM systems |
the organization’s database |
1 points
Question 2
1.
A check-in kiosk at the airport would be what type of CRM application?
Answer
Sales |
Outbound telesales |
Inbound telesales |
Customer facing |
Customer touching |
1 points
Question 3
1.
At Amazon, _____ occur(s) only when customers deal with Amazon employees.
Answer
customer transactions |
customer experience |
customer relationship |
customer service |
customer satisfaction |
1 points
Question 4
1.
The complete data on a customer is called:
Answer
a consolidated customer map |
a record |
a profile |
a file |
a 360-degree view |
1 points
Question 5
1.
The benefits from Subway’s new loyalty card program include all of the following except:
Answer
the ability to target customer behavior |
the ability to reward customer behavior |
the ability to reduce Subway transaction costs |
allowing Subway managers to analyze customer behavior in individual stores |
the ability to analyze customer behavior in different geographical regions |
1 points
Question 6
1.
AT&T sells telephone services that include local and long-distance service, voice mail service, caller ID, and digital subscriber line access to the Internet. This is a form of:
Answer
customer intimacy |
|
up-selling |
|
cross-selling |
|
bundling |
|
customer relationship management |
1 points
Question 7
1.
In Amazon’s _____ process, merchants send their products to Amazon’s warehouses, and Amazon does the rest.
Answer
fulfillment |
search |
advertising |
shopping |
web services |
1 points
Question 8
1.
The benefits of open-source CRM include all of the following except:
Answer
it is easy to customize |
it has more functionality than in-house CRM systems |
it has extensive support information available |
updates and error fixes occur rapidly |
it is favorably priced |
1 points
Question 9
1.
In improving its relationship with its customers, Amazon’s ultimate goal is which of the following?
Answer
to gain more control over the shopping experience |
to make better decisions |
to reduce transaction costs |
to improve customer satisfaction |
to make its Web site more functional |
1 points
Question 10
1.
Subway’s new loyalty card program was difficult for the company’s IT department to implement. Which of the following is the main reason for this difficulty?
Answer
The program provided too much data for the IT department to handle. |
Subway stores are owned by franchisees. |
The program included too many Subway stores. |
The program was too expensive for the IT department budget. |
Subway store owners refused to adopt the new program. |
1 points
Question 11
1.
You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-size car of the same brand for you to drive. The salesperson is engaged in:
Answer
Bottom of Form
Question 1
1.
_____ are the physical products, raw materials, and supplies that flow along a supply chain.
Answer
Reverse flows |
Reverse logistics |
Information flows |
Material flows |
Financial flows |
1 points
Question 2
1.
The business model of large automobile manufacturers would be best known as which of the following?
Answer
Pull model |
Inventory model |
Supply chain model |
Vertical integration model |
Push model |
1 points
Question 3
1.
The _____ is known as make-to-order.
Answer
inventory model |
push model |
vertical integration model |
pull model |
supply chain model |
1 points
Question 4
1.
In the _____ process, individual OfficeMax stores purchase goods in minimum quantities, which were determined by the supplier’s minimum-order quantities rather than the store’s needs.
Answer
direct-to-inventory environment |
direct-to-stock environment |
direct-to-forecast environment |
direct-to-store environment |
direct-to-warehouse environment |
1 points
Question 5
1.
Returned products, recycled products, and disposal of materials or products are called:
Answer
financial flows |
reverse flows |
information flows |
returns |
material flows |
1 points
Question 6
1.
_____ is the ability for all organizations in a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers’ production processes and transportation networks to their receiving docks.
Answer
Supply chain intelligence |
Supply chain visibility |
Horizontal integration |
Vertical integration |
Supply chain integration |
1 points
Question 7
1.
The bullwhip effect comes from which of the following?
Answer
poor demand forecast |
price fluctuations |
order batching |
rationing within the supply chain |
1 points
Question 8
1.
A company’s suppliers, suppliers’ suppliers, and the processes for managing them is the:
Answer
suppliers’ chain |
|
entire supply chain |
|
external supply chain |
|
downstream portion of the supply chain |
|
upstream portion of the supply chain |
1 points
Question 9
1.
A company’s organization and processes for distributing and delivering products to its final customers is the:
Answer
1 points
Question 10
1.
_____ portals automate the business processes involved in selling products from a single supplier to multiple buyers.
Answer
Intranet |
Affiliate |
Procurement |
Distribution |
1 points
Question 11
1.
Distribution or dispersal takes place in which segment of the supply chain?
Answer
upstream |
internal |
downstream |
external |
Bottom of Form
Question 1
1.
Which of the following is not a characteristic of DSS?
Answer
usually utilize quantitative models |
easy to use and construct |
support only lower and middle-level managers |
support all phases of the decision making process |
adaptable to changing conditions |
1 points
Question 2
1.
The benefits that Sears gained from its geographical information system included all of the following except:
Answer
Reduced average travel time per service call |
Improved productivity of technicians |
Increase customer retention |
Enabled Sears to increase the number of dispatchers for better control of technicians’ service calls |
Increased size of district territories |
1 points
Question 3
1.
Credit card companies would most likely use which of the following to check for fraudulent credit card use?
Answer
Multidimensional data analysis |
Neural networks |
Data mining |
Structured query language |
1 points
Question 4
1.
Annual evaluation of employees best fits which type of decision?
Answer
structured |
confrontational |
semistructured |
unstructured |
1 points
Question 5
1.
Blue Mountain Resorts implemented a business intelligence system for all of the following reasons except:
Answer
the old system was not automated |
the resort was purchased b another company and it had to upgrade its system |
the resort wanted to use the new system to attract more guests |
old system could not handle all the resort’s data input |
no one in the resort’s IT department was responsible for maintaining the old information system |
1 points
Question 6
1.
The most distinguishing characteristic of geographical information systems is:
Answer
every record or digital object is visible to the user |
every record or digital object must be accessed by programmers |
every record or digital object has a unique identifier |
every record or digital object has an identified geographical location |
every record or digital object is encrypted |
1 points
Question 7
1.
Which of the following are not provided by digital dashboards?
Answer
exception reporting |
transaction processing |
key performance indicators |
status access |
drill down |
1 points
Question 8
1.
Which of the following is not a benefit of expert systems?
Answer
capture and dissemination of scarce expertise |
works with incomplete, uncertain information |
reliability |
increased decision-making time |
increased output and productivity |
1 points
Question 9
1.
Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment.
Answer
about the same, decreased |
less, decreased |
more, increased |
less, increased |
more, decreased |
1 points
Question 10
1.
Virtual reality systems accomplish which one of the following?
Answer
Provide engineers, designers, and factory managers with precise control over industrial design and manufacturing |
Provide an important source of expertise for organizations |
Provide drug designers, architects, engineers, and medical workers with precise, photorealistic simulations of objects and environments |
Help organizations process vast amounts of transactional data |
Allow groups to work together on documents |
1 points
Question 11
1.
Which of the following is not a characteristic of unstructured decisions?
Answer
complex |
first three phases of the decision making process occur in no particular sequence |
standard solutions exist |
fuzzy and unclear |
human intuition involved |
Bottom of Form