Study Guide

If your great with computer or MIS this is the assignment for you. There’s around 200 multiple questions, need correct answers to help study for test. Can’t find alot of the answers. With the ones already answered please, please double check them for me.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

REVIEW FINAL STUDY GUIDE

Question 1

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.

Answer

A.

microcomputer

B.

midrange computer

C.

mainframe

D.

supercomputer

E.

laptop computer

2 points  

Question 2

The advantages of server

virtualization

include all of the following except:

Answer

A.

B.

C.

D.

E.

organization uses

more

servers to respond to quickly changing demands

increased organizational agility

focus of IT department shifts to services rather than supporting the technology

cost savings

reduced number of employees

2 points  

Question 3

The _____ of computers used integrated circuits for storing and

process

ing

information

.

Answer

A.

B.

C.

D.

E.

fifth generation

second generation

third generation

first generation

fourth generation

2 points  

Question 4

_____ applies the unused processing resources of many geographically dispersed computers in

a network

to form a virtual supercomputer.

Answer

A.

B.

C.

D.

E.

A server farm

The

Internet

Grid computing

Utility computing

Virtualization

2 points  

Question 5

The _____ of computers used massively parallel processing to process information.

Answer

A.

fifth generation

B.

third generation

C.

first generation

D.

fourth generation

E.

second generation

2 points  

Question 6

The type of primary storage where certain critical instructions are safeguarded because the storage is

nonvolatile

and the instructions can be read only by the computer and not changed by the user is called:

Answer

A.

B.

C.

D.

E.

read-only memory

cache memory

register

s

flash memory

random access memory

2 points  

Question 7

The main types of primary storage are:

Answer

A.

B.

random access memory

C.

cache memory

D.

read-only memory

E.

register

all of the above

2 points  

Question 8

Increased microprocessor

complex

ity comes from which of the following?

Answer

A.

B.

C.

D.

E.

all of the above

decreasing

line width

increasing transistor miniaturization

using new materials for the chip that increase conductivity

putting more transistors on the chip

2 points  

Question 9

A(n) _____ offers you the option of

shopping

online with a disposable

credit card

number.

Answer

A.

B.

C.

D.

E.

credit card

bank card

driver’s license

de

bit

card

virtual credit card

2 points  

Question 10

Software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings is best described as a(n) _____.

Answer

A.

B.

C.

D.

E.

anti-malware package

anti-spyware package

proactive monitoring package

content-filtering package

personal firewall

2 points  

Question 11

Personal

firewalls perform all of the following

function

s except:

Answer

A.

B.

C.

D.

E.

They should block outbound connections that you do not initiate.

They should seek out the origin of malware in an attempt to block it in the future.

They should make your computer invisible.

They should tell you when a program or connection is attempting to do something that you do not want.

They should alert you to suspicious behavior.

2 points  

Question 12

_____

software

logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.

Answer

A.

B.

C.

D.

E.

Monitoring

Content filtering

Anti-malware

Anti-spyware

Firewall

2 points  

Question 13

It is important to have proactive intrusion detection and prevention software on your computer for all of the following reasons except:

Answer

A.

B.

C.

D.

E.

because anti-malware software is reactive

to help decrease your vulnerability to

zero-day

attacks

because you have to update malware signatures on a regular basis with anti-malware software

to help decrease your vulnerability to distributed denial-of-service attacks

None of these

2 points  

Question 14

Which of the following attacks is the one most closely associated with downloading and installing patches immediately?

Answer

A.

B.

C.

D.

E.

Zero day attacks

Worms

Distributed denial-of-service

Viruses

Denial of service

2 points  

Question 15

A(n) _____ either originates on, or is sent to, a different Web site than the one you are currently viewing.

Answer

A.

B.

C.

D.

E.

tracking cookie

monitoring cookie

first-party cookie

second-party cookie

third-party cookie

2 points  

Question 16

The cable medium with the highest

bandwidth

is:

Answer

A.

B.

C.

D.

E.

copper cable

twisted-pair wire

fiber optic cable

coaxial cable

cellular radio

2 points  

Question 17

A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as :

Answer

A.

B.

C.

D.

E.

peer-to-peer

open systems

client/server

centralized

mainframe-centric

2 points  

Question 18

By using an

ISDN

service, an organization will be able to transmit _____

data

than if it used a T1 carrier.

Answer

A.

B.

C.

D.

E.

more streaming video

less

more voice

the same amount of

more

2 points  

Question 19

A(n) _____ connects similar networks.

Answer

A.

B.

C.

D.

E.

router

bridge

network interface card

gateway

file

server

2 points  

Question 20

Which of the following enables users to send data across sometimes unreliable networks?

Answer

A.

B.

C.

D.

E.

Integrated services digital network

TCP/IP

Protocols

Digital subscriber line

Ethernet

2 points  

Question 21

In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.

Answer

A.

B.

C.

D.

E.

client/server architectures

application software packages

WANs

protocols

developmental architectures

2 points  

Question 22

A(n) _____ allows a device to physically connect to a

local area network

‘s communications medium.

Answer

A.

gateway

B.

C.

file server

D.

E.

network interface card

communications channel

network

operating system

2 points  

Question 23

_____ signals convey information in wave form, where _____ signals convey information in digital, binary form.

Answer

A.

B.

C.

D.

E.

Digital, packet

Analog, packet

Packet, analog

Analog, digital

Digital, analog

2 points  

Question 24

Which of the following is a digital transmission system that defines circuits which operates at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call?

Answer

A.

B.

Digital subscriber line

C.

D.

E.

Asynchronous transfer mode

T-carrier system

Synchronous optical network

ISDN

2 points  

Question 25

Firms are recentralizing their applications to mainframes for all the following reasons except:

Answer

A.

B.

C.

D.

E.

to support the large number of

transaction

s caused by electronic commerce

to reduce the total cost of ownership of distributed systems

to more adequately support end-user computing

to improve system performance

none of the above

2 points  

Question 26

BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of

a file

at the same time.

Answer

A.

B.

C.

D.

E.

torrents

collaboration

packet switching

swarming

leeching

2 points  

Question 27

A(n) _____ connects two or more devices in a limited geographical area.

Answer

A.

B.

C.

D.

E.

value added network

enterprise network

personal area network

wide area network

local area network

2 points  

Question 28

The main system control program is the _____.

Answer

A.

B.

C.

D.

E.

security monitor

operating system

cache software

multithread register

virtual memory

2 points  

Question 29

Which of the following is not offered by enterprise operating systems?

Answer

A.

B.

C.

D.

support for the greatest number of users

most functionality

same functionality as desktop operating systems

most sophisticated interface

2 points  

Question 30

Which of the following is not offered by desktop operating systems?

Answer

A.

most sophisticated interface

B.

C.

most functionality

D.

same functionality as mobile operating systems

support for the fewest number of users

2 points  

Question 31

The _____ is a global wide-area network that connects approximately one million organizational computer networks.

Answer

A.

B.

C.

D.

E.

World Wide Web

global network

Internet

intranet

extranet

2 points  

Question 32

A(n) _____ connects parts of the

intranets

of different organizations and allows secure communications among business partners.

Answer

A.

World Wide Web

B.

global network

C.

extranet

D.

intranet

E.

Internet

2 points  

Question 33

Internet service providers connect to one another through _____.

Answer

A.

B.

C.

D.

E.

network connection points

network access points

internet connection points

an extranet

common carrier connection points

2 points  

Question 34

The _____ is measured in megahertz or gigahertz.

Answer

A.

B.

C.

D.

E.

word length

line width

clock speed

bandwidth

bus width

2 points  

Question 35

Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s for which of the following reasons?

Answer

A.

B.

C.

D.

E.

all of the above

hardware

costs have decreased

hardware performance has increased

software has become increasingly complex

building software applications remains slow, complex, and error-prone

2 points  

Question 36

Which of the following is not a

character

istic of today’s typical software?

Answer

A.

B.

C.

D.

E.

an art as well as a science

full of errors

expensive

poorly designed

efficient

2 points  

Question 37

Which programming language consists entirely of 0’s and 1’s?

Answer

A.

B.

C.

D.

E.

non-

procedural language

assembly language

visual programming language

machine language

procedural language

2 points  

Question 38

A(n) _____ connects dissimilar networks.

Answer

A.

bridge

B.

network interface card

C.

router

D.

gateway

E.

file server

2 points  

Question 39

Each site on the Internet gets an assigned address, which is a(n) _____.

Answer

A.

B.

C.

D.

E.

World Wide Web address

TCP address

URL

address

ISO/OSI identifier

IP address

2 points  

Question 40

Consider this domain name,

www.business.gsu.edu

. The “edu” is the:

Answer

A.

B.

C.

D.

E.

web site locator

address of the Webmaster

name of the computer

top-level domain

URL

2 points  

Question 41

Consider this domain name,
www.business.gsu.edu
. The “gsu” is the:

Answer

A.

URL

B.

C.

address of the Webmaster

D.

E.

top-level domain

name of the organization

name of the specific computer

2 points  

Question 42

In order to protect their software from illegal distribution, vendors often rely on _____.

Answer

A.

B.

C.

D.

Internet-based distribution methods

private security agents

encryption

software licensing

2 points  

Question 43

Off-the-shelf software _____.

Answer

A.

B.

C.

D.

requires more risk because all features and performance are not known

may not match an organization’s current work processes and data

is more flexible in making modifications

is rarely tested prior to release

2 points  

Question 44

_____ are programs that protect a computer system from unauthorized use, fraud, and destruction.

Answer

A.

B.

C.

D.

E.

System performance monitors

General application software

System utilities

System security monitors

Personal application software

2 points  

Question 45

Unlike the hardwired computers of the 1950s, modern software uses the _____, where computer programs are executed in the computer’s CPU.

Answer

A.

B.

C.

D.

E.

stored program concept

plug and play

multiprogramming

multithreading

multitasking

2 points  

Question 46

One of the primary advantages of an object is that it contains _____.

Answer

A.

B.

C.

D.

E.

reusable data

messages

reusable code

embedded graphics

no errors

2 points  

Question 47

Over the past twenty years, hardware costs have _____, while software costs have _____.

Answer

A.

B.

C.

D.

E.

decreased, increased

increased, remained level

increased, increased

decreased, decreased

increased, decreased

2 points  

Question 48

_____ means that several parts of the same application can work simultaneously.

Answer

A.

B.

C.

D.

E.

Time-sharing

Scalability

Multithreading

Multitasking

Multiprocessing

2 points  

Question 49

In _____, tasks are performed by computers physically removed from the user and accessed over a network, particularly the Internet.

Answer

A.

B.

C.

D.

E.

cloud computing

virtualization

edge computing

extranets

intranets

2 points  

Question 50

Which of the following is not a characteristic of secondary storage?

Answer

A.

B.

C.

D.

E.

none of the above

nonvolatile

more cost effective than primary storage

s

lower

than primary storage

can utilize only chips as its medium

2 points  

Question 51

An assigned address that uniquely identifies a computer on the Internet

Answer

A.

B.

C.

IP address

D.

Domain name

MAC address

Serial Number

2 points  

Question 52

A(n) __________ is a private network that uses TCP/IP protocols

Answer

A.

B.

C.

intranet

D.

Ethernet

Token Ring

PBX

2 points  

Question 53

A web site on the internet is likely to be secure if the

Answer

A.

B.

C.

D.

the url has the prefix https://

the url has the prefix http://

your browser gives you no warning signs and your protection software gives no warnings

the website assures you it is safe and easy!

2 points  

Question 54

A new computer with the latest operating system that is up to date, running an up to date browser, with an active and running

virus

scan and protection software is immune to any virus or malware attack, only out of date software is vulnerable.

Answer True
False

2 points  
Question 1

1.  

Which of the following statements is
not
correct?

Answer

A.

B.

C.

D.

To succeed in today’s environment, it is often necessary to change business models and strategies.

IT enables organizations to survive in the face of business pressures.

IT requires small investments over a long period of time.

Organizations can leverage their platforms to develop Web-based applications, products, and services.

2 points  
Question 2
1.  

_____ relates to any computer-based tool that people use to work with information and to support the information processing needs of the organization.

Answer

A.

B.

C.

D.

E.

A Computer-Based Information System

Information technology

architecture

Information technology infrastructure

Information technology

An information system

2 points  
Question 3
1.  

The list of all your purchases from Amazon (books bought, price paid, dates) would be considered to be:

Answer

A.

B.

C.

D.

E.

knowledge

data
information

wisdom

experience

2 points  
Question 4
1.  

An organization’s information technology architecture:

Answer

A.

B.

C.

D.

E.

all of the above

provides a guide for current operations.

provides a blueprint for future directions.

integrates the information requirements of the organization and all users.

is analogous to the architecture of a house.

2 points  
Question 5
1.  

_____ is the integration of economic, social, cultural, and ecological facets of life, enabled by information technologies.

Answer

A.

B.

C.

D.

Business environment

Nationalization

Regionalization

Globalization

2 points  
Question 6
1.  

The global, Web-based platform enables individuals to do which of the following?

Answer

A.

B.

C.

D.

E.

all of the above

connect, compute, communicate, collaborate, and compete everywhere and all the time

access information, services, and entertainment

exchange knowledge

produce and sell goods and services

2 points  
Question 7
1.  

The consequences of uploading include all of the following
except
:

Answer

A.

B.

C.

D.

shift toward a static, passive approach to media

growth of blogs and

Wikis

increased collaboration over the Web

growth of the open-source software movement

2 points  
Question 8
1.  

_____ involves taking a specific function that your company was doing itself, having another company perform that same function for you, and then integrating their work back into your operation.

Answer

A.

B.

C.

D.

E.

Insourcing

Informing

Offshoring

Outsourcing

Uploading

2 points  
Question 9
1.  

In general, labor costs are _____ in developed countries than in developing countries.

Answer

A.

B.

C.

D.

E.

about the same

decreasing slower

higher

decreasing faster

lower

2 points  
Question 10
1.  

Today’s customers have which of the following characteristics?

Answer

A.

B.

C.

D.

E.

less knowledge about products

less sophistication

difficulty in finding information about products

higher expectations

difficulty in comparing prices

2 points  
Question 11
1.  

When identical items are produced in large quantities, it is called:

Answer

A.

B.

C.

D.

E.

mass customization.

customer focus.

continuous improvement.

strategic systems.

mass production.

2 points  
Question 12
1.  

Which of the following is
not
a fact about IT careers?

Answer

A.

B.

C.

D.

MIS majors usually receive high starting salaries.

The four-fastest growing U.S. jobs that require college degrees from 2002 through 2012 are IT-related.

There are no computing jobs.

Highly-skilled IT jobs will typically not be offshored.

2 points  
Question 13
1.  

The fact that you practice continuous computing means all of the following
except
:

Answer

A.

B.

C.

D.

You can pull information about almost everything from anywhere all the time.

Your daily routines are the same as students 20 years ago, but you can do your tasks much more quickly and with less effort.

You can push your ideas to the Web.

You are surrounded by a movable information network.

2 points  
Question 14
1.  

Which of the following statements about information systems is not correct?

Answer

A.

B.

C.

D.

E.

Managing information systems is difficult.

Information systems are based on the needs of employees.

Any information system can be strategic.

Information systems tend to follow the structure of the organization.

Information systems are concentrated in the IS Department.

2 points  
Question 15
1.  

A collection of related files, tables, and so on that stores data and the associations among them is _____.

Answer

A.

B.

C.

D.

E.

a

database

procedures

software
hardware
a network

2 points  
Question 16
1.  

Which of the following is not a major capability of information systems?

Answer

A.

B.

C.

D.

E.

increase the effectiveness and efficiency of people working in groups

perform high-speed, high-volume numerical computations

automate semiautomatic business processes

store large amounts of information in a very large space

provide fast, accurate communications among organizations

2 points  
Question 17
1.  

_____ systems are designed to correct a lack of communications among _____.

Answer

A.

B.

C.

D.

E.

Transaction processing

systems,

functional area information system

s

Functional area information systems

,

enterprise resource planning system

s

Enterprise resource planning systems

,

functional area information systems

Dashboards

,

office automation system

s

Office automation systems

, expert systems

2 points  
Question 18
1.  

When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____

record

s the data.

Answer

A.

B.

C.

D.

E.

functional area information system

transaction processing

system

office automation system

dashboard

enterprise resource planning system

2 points  
Question 19
1.  

Supply chain systems are which type of information system?

Answer

A.

B.

C.

D.

E.

end-user computing systems

individual information systems

enterprisewide information systems

departmental information systems

interorganizational information systems

2 points  
Question 20
1.  

_____ attempt to duplicate the work of human experts by applying reasoning capabilities.

Answer

A.

B.

C.

D.

E.

Dashboards

Decision support systems

Functional area information systems

Expert systems

Business intelligence systems

2 points  
Question 21
1.  

Competitive advantage for an organization manifests as all of the following except:

Answer

A.

B.

C.

D.

E.

Lower costs

Increased profits

Higher quality

Increased speed

Increased time to market

2 points  
Question 22
1.  

The Internet has had which of the following impacts on the way you purchase your textbooks?

Answer

A.

B.

C.

D.

E.

The Internet provides you with less information.

The Internet increases your switching costs.

The Internet decreases your bargaining power.

The Internet gives you fewer choices.

The Internet increases your bargaining power.

2 points  
Question 23
1.  

Porter’s competitive forces model helps organizations identify _____, where his value chain model helps organizations identify specific _____.

Answer

A.

B.

C.

D.

E.

activities, general strategies

activities, competitive opportunities

primary activities, support activities

competitive opportunities, activities

general strategies, activities

2 points  
Question 24
1.  

If there are _____ substitutes for an organization’s products or services, then the threat of substitutes is _____.

Answer

A.

B.

C.

D.

E.

many, few

many, high

few, few

few, negligible

few, high

2 points  
Question 25
1.  

Wal-Mart’s automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?

Answer

A.

B.

C.

D.

E.

operational effectiveness

differentiation

customer-orientation

innovation

cost leadership

2 points  
Question 26
1.  

The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?

Answer

A.

operational effectiveness

B.

innovation

C.

differentiation

D.

cost leadership

E.

customer-orientation

2 points  
Question 27
1.  

When Amazon welcomes you by name back to its Web site on your second visit, this is an example of which strategy for competitive advantage?

Answer

A.

operational effectiveness

B.

innovation

C.

cost leadership

D.

differentiation

E.

customer orientation

2 points  
Question 28
1.  

Which of the following is a traditional, major IS function?

Answer

A.

B.

C.

D.

E.

Managing systems development

Incorporating the Internet and electronic commerce into the business

Partnering with the firm’s executives

Managing outsourcing

Educating non-IS managers about IT

2 points  
Question 29
1.  

Which of the following is the most important issue raised by the numerous security breaches at NASA?

Answer

A.

B.

C.

D.

E.

Is it possible to secure NASA’s information assets?

Is NASA spending too little money on its defenses against cyberespionage?

Is it possible to secure the Internet?

Should NASA even be connected to the Internet?

Should NASA be required to detail its problems with cyberespionage to the taxpayers?

2 points  
Question 30
1.  

What is _____ is not necessarily _____.

Answer

A.

B.

C.

D.

E.

Unethical, legal

Ethical, illegal

Illegal, unethical

Ethical, legal

Unethical, illegal

2 points  
Question 31
1.  

Which of the following statements is correct?

Answer

A.

B.

C.

D.

E.

It is difficult to determine and enforce privacy regulations.

The Internet has increased individuals’ privacy.

An individual’s right to privacy supersedes the needs of society.

An individual’s right to privacy is absolute.

Advances in information technologies have not affected individual privacy.

2 points  
Question 32
1.  

Which of the following statements is not correct?

Answer

A.

B.

C.

D.

E.

The large majority of organizations monitor employee Internet usage.

Employees have limited protection against surveillance by employers.

As with normal first-class mail, employers cannot read employee e-mail.

The large majority of organizations use URL filtering.

Employees should be aware that surveillance is legal.

2 points  
Question 33
1.  

The computing skills necessary to be a hacker are decreasing for which of the following reasons?

Answer

A.

B.

C.

D.

E.

Almost anyone can buy or access a computer today.

Cybercrime is much more lucrative than regular white-collar crime.

Computer attack programs, called scripts, are available for download from the Internet.

More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets.

International organized crime is training hackers.

2 points  
Question 34
1.  

The most overlooked people in information security are:

Answer

A.

B.

C.

D.

E.

consultants and temporary hires.

executives and executive secretaries.

janitors and guards.

contract laborers and executive assistants.

secretaries and consultants.

2 points  
Question 35
1.  

_____ occurs when attackers seek to learn who knows whom in an organization and how.

Answer

A.

B.

C.

D.

E.

Spear fishing

Phishing

Reverse social engineering

Social data mining

Social engineering

2 points  
Question 36
1.  

A(n) _____ is a document that grants the holder exclusive rights on an invention for 20 years.

Answer

A.

B.

C.

D.

E.

trade secret

copyright

private property notice

knowledge base

patent

2 points  
Question 37
1.  

An organization’s e-mail policy has the least impact on which of the following software attacks?

Answer

A.

B.

C.

D.

E.

phishing

virus

spear phishing

worm

zero-day

2 points  
Question 38
1.  

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

Answer

A.

B.

C.

Viruses

D.

E.

Worms

Trojan horses

Back doors

Alien software

2 points  
Question 39
1.  

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.

Answer

A.

B.

C.

D.

E.

Risk mitigation

Risk transference

Risk management

Risk acceptance

Risk analysis

2 points  
Question 40
1.  

In _____, the organization takes concrete actions against risks.

Answer

A.

B.

C.

D.

E.

risk management

risk transference

risk analysis

risk acceptance

risk mitigation

2 points  
Question 41
1.  

Biometrics are an example of:

Answer

A.

B.

C.

D.

E.

something the user wants.

something the user does.

something the user knows.

something the user has.

something the user is.

2 points  
Question 42
1.  

In a process called _____, a company allows nothing to run unless it is approved, where in a process called _____, the company allows everything to run unless it is not approved.

Answer

A.

B.

C.

D.

E.

whitelisting, blacklisting

encryption, whitelisting

whitelisting, encryption

encryption, blacklisting

blacklisting, whitelisting

2 points  
Question 43
1.  

_____ issues involve who may obtain information and how much they should pay for this information.

Answer

A.

B.

C.

D.

E.

Accessibility

Accuracy

Privacy

Transferability

Property

2 points  
Question 44
1.  

Your _____ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet.

Answer

A.

B.

C.

D.

E.

dat

a profile

database record

data shadow

database element

database file

2 points  
Question 45
1.  

Over time, your data shadow _____.

Answer

A.

B.

C.

D.

E.

stays approximately the same size

does not affect your privacy

decreases in size

increases your privacy

increases in size

2 points  
Question 46
1.  

The end result of the Data Life Cycle is the generation of _____.

Answer

A.

B.

information

C.

data

D.

knowledge

E.

wisdom

decision

s

2 points  
Question 47
1.  

_____ occurs when the same data are stored in many places.

Answer

A.

B.

C.

D.

E.

Data isolation

Data redundancy

Data consistency

Application/Data dependence

Data integrity

2 points  
Question 48
1.  

_____ occurs when various copies of the data agree.

Answer

A.

Application/Data dependence

B.

Data redundancy

C.

Data consistency

D.

Data isolation

E.

Data integrity

2 points  
Question 49
1.  

In the data hierarchy, the smallest element is the _____.

Answer

A.

B.

C.

D.

E.

file

byte

character
bit
record

2 points  
Question 50
1.  

A(n) _____ is a logical grouping of related

field

s.

Answer

A.

B.

C.

record

D.

byte

E.

file

database
field

2 points  
Question 51
1.  

A(n) _____ represents a single character, such as a letter, number, or symbol.

Answer

A.

field

B.

file

C.

database

D.

byte

E.

record

2 points  
Question 52
1.  

In

a database

, the primary key field is used to _____.

Answer

A.

B.

C.

D.

E.

identify duplicated data

specify an entity

create linked lists

uniquely identify

a record

uniquely identify an attribute

2 points  
Question 53
1.  

A standardized language used to manipulate data is _____.

Answer

A.

B.

C.

D.

E.

Oracle

structured

query language

query-by-example language

MS-Access

data manipulation language

2 points  
Question 54
1.  

The process of moving data from various sources into the data warehouse is called:

Answer

A.

B.

C.

D.

E.

online analytical processing.

uploading.

extracting, transforming, and loading.

master data management.

online transaction processing.

2 points  

Question 55

1.  

_____ is a formal approach to managing data consistently across an entire organization.

Answer

A.

B.

C.

D.

E.

Data warehousing

Data governance

Enterprise information management

Database management

Data mart

2 points  

Question 56

1.  

The most important benefit of knowledge management systems is:

Answer

A.

B.

C.

D.

E.

retention of scarce knowledge if employees retire.

they make

best practices

available to employees.

improved morale.

more efficient product development.

improved

customer service

.

2 points  
Question 1
1.  

_____ are a payment mechanism similar to regular bank checks but transmitted electronically, with a signature in digital form.

Answer

A.

B.

C.

D.

E.

Electronic credit cards

Electronic debit cards

Electronic wallet

Electronic cash

Electronic checks

2 points  
Question 2
1.  

Users typically have little interaction with _____, which provide information that users receive passively.

Answer

A.

B.

C.

D.

E.

Web 2.0 sites

Web 3.0 sites

Wikis

Web 1.0 sites

affinity portals

2 points  
Question 3
1.  

_____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else.

Answer

A.

B.

C.

D.

E.

Domain masquerading

Domain fraud

Cybersquatting

Domain spoofing

Domain tasting

2 points  
Question 4
1.  

Which of the following is not an inhibitor of faster

Wi-Fi

expansion?

Answer

A.

B.

C.

D.

E.

Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services.

The growth of Wi-Max

Wi-Fi services may not survive in the face of free hotspot access.

Unless the service is free, users have to log on to separate accounts for each hotspot.

There is a lack of security.

2 points  
Question 5
1.  

_____ means that virtually every object has processing power with wind or wireless connections to a network.

Answer

A.

B.

C.

D.

E.

Wireless computing

Pervasive computing

Continuous computing

Fixed computing

Mobile computing

2 points  
Question 6
1.  

UPS has all of the following IT initiatives underway except:

Answer

A.

B.

C.

D.

E.

development of live chat capability

development of translation software for Eastern European languages

a system to improve the quality of international documentation on packages

development of a system to enhance managerial decision making

the UPS Worldport

2 points  
Question 7
1.  

Based on the

RFID

discussion in Chapter 7, what would be the best use of RFID in a business?

Answer

A.

B.

C.

D.

E.

Personnel tracking

Decreasing network costs

Supply chain management

Transaction processing

Enabling communications with customers

2 points  
Question 8
1.  

The drawbacks of ERP systems include all of the following except:

Answer

A.

B.

C.

D.

E.

they are complex

they are expensive

they consist of modules

they are time-consuming to implement

companies may need to change existing business processes to fit the software

2 points  
Question 9
1.  

Which of the following is not a function of functional area information systems?

Answer

A.

B.

C.

D.

E.

providing information to managers in the functional areas

providing data from business events to the corporate database

providing analysis capabilities to middle level managers and staff

supporting the managerial tasks of planning, organizing, and controlling operations

providing information mainly in the form of reports

2 points  
Question 10
1.  

_____ are the most successful solutions or problem-solving methods for achieving a business objective.

Answer

A.

B.

C.

D.

E.

Business processes

Business functions

Best practices

Optimal strategies

Enterprise solutions

2 points  
Question 11

Of the following, which is the major problem with smart phones?

Answer

A.

B.

C.

D.

E.

Their browsers are not fully functional.

They can be used to compromise security.

They are too expensive.

Their screens are too small.

They are too slow.

2 points  
Question 12
1.  

When interest is credited to your savings account at your bank, it is called a:

Answer

A.

B.

C.

D.

E.

calculation

transaction
process
function
decision

2 points  
Question 13
1.  

Which best describes the NoFly list at the Transportation Security Agency?

Answer

A.

B.

C.

D.

E.

Summary report

Detailed report

Exception report

Ad hoc report

Routine report

2 points  
Question 14
1.  

Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.

Answer

A.

B.

C.

D.

E.

high, repetitive, easy

low, repetitive, difficult

low, different, easy

high, different, difficult

high, different, easy

2 points  
Question 15
1.  

_____ Web sites allow users to upload their content to the Web, in the form of text, voice, images, and videos.

Answer

A.

B.

C.

D.

E.

Aggregators

Really simple syndication

Mashups

Social networking

Affinity

portals

2 points  
Question 16
1.  

A(n) _____ is automatically launched by some trigger and appears behind the active window.

Answer

A.

B.

C.

D.

E.

keyword banner

text box

pop-up ad

random banner

pop-under ad

2 points  
Question 17
1.  

Electronic commerce provides opportunities for companies to do all of the following except:

Answer

A.

B.

C.

D.

E.

adopt new business models

put rich information on their Web sites

expand their reach

increase market share

expand at relatively high cost

2 points  
Question 18
1.  

Unlike _____ sites, _____ sites are not so much online places to visit, as they are services to get something done, usually with other people.

Answer

A.

B.

C.

D.

E.

commercial portals, affinity portals

Web 1.0, Web 2.0

affinity portals, commercial portals

Web 2.0, Web 1.0

Web 1.0, Wikis

2 points  
Question 19
1.  

A process that enables users to create a personal Web site containing his or her thoughts, feelings, and opinions is called _____.

Answer

A.

B.

C.

D.

E.

tagging

blogging

A Wiki

really simple syndication

AJAX

2 points  
Question 20
1.  

Which of the following is not a disadvantage of telecommuting for employees?

Answer

A.

B.

C.

D.

E.

lower pay (in some cases)

no workplace visibility

possible loss of fringe benefits

decreased feelings of isolation

slower promotions

2 points  
Question 21
1.  

A(n) _____ is a Web site that takes content from other Web sites and puts it together to create a new type of content.

Answer

A.

B.

C.

really simple syndication

D.

E.

aggregator

social network

corporate portal

mashup

2 points  
Question 22
1.  

_____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.

Answer

A.

B.

C.

D.

E.

Electronic checks

Person-to-person payments

Purchasing cards

Smart cards

Digital wallets

2 points  
Question 23
1.  

In the _____ B2B application, the orders of many buyers are aggregated so that they total to a large volume, in order to merit more seller attention.

Answer

A.

B.

C.

D.

E.

group purchasing

electronic exchange

buy-side

sell-side

auctions

2 points  
Question 24
1.  

Which type of electronic commerce is the largest by volume?

Answer

A.

B.

C.

D.

E.

none of the above

business-to-employee

consumer-to-consumer

business-to-business

business-to-consumer

2 points  
Question 25
1.  

The most fundamental information systems in an organization are:

Answer

A.

B.

C.

D.

E.

decision support systems

office automation systems

business intelligence systems

functional area information systems

transaction processing systems

2 points  
Question 26
1.  

The development of mobile commerce is driven by all of the following factors except:

Answer

A.

B.

C.

D.

E.

bandwidth improvement

the cell phone culture

increasing prices

no need for a PC

widespread availability of mobile devices

2 points  
Question 27
1.  

_____ refers to online word-of-mouth marketing.

Answer

A.

B.

C.

D.

E.

Permission marketing

Direct mail

Personalized marketing

Viral marketing

One-to-one marketing

2 points  
Question 28
1.  

Which of the following statements concerning Wikis is not correct?

Answer

A.

B.

C.

D.

E.

Organizations are using Wikis for knowledge management.

There are documented examples of biased content on Wikis.

Organizations are using Wikis for project management.

Users should always question the authenticity of the content.

Users should accept the authenticity of the content.

2 points  
Question 29
1.  

_____ integrate the planning, management, and use of all of an organization’s resources, and are designed to tightly integrate the functional areas of the organization.

Answer

A.

B.

C.

D.

E.

Functional area information systems

Supply chain management systems

Enterprise resource planning systems

Transaction processing systems

Corporate

extranets

2 points  
Question 30
1.  

_____ collect data from many points over an extended space.

Answer

A.

B.

C.

D.

E.

Wi-Fi networks

Wi-Max networks

Wireless sensor networks

Ultra-wideband networks

Bluetooth networks

2 points  
Question 31
1.  

Parking meters that you can pay via your mobile telephone are an example of:

Answer

A.

B.

C.

D.

E.

wireless electronic payment

money transfer

mobile banking

wireless wallet

brokerage service

2 points  
Question 32
1.  

_____ are interorganizational ERP systems that provide Web-enabled links between an organization’s key business systems and its customers, suppliers, business partners, and others.

Answer

A.

B.

Transaction processing systems

C.

D.

Supply chain management systems

E.

Functional area information systems

ERP II systems

Office automation systems

2 points  
Question 33
1.  

_____ enable two individuals to transfer funds without using a credit card.

Answer

A.

Purchasing cards

B.

Person-to-person payments

C.

Electronic checks

D.

E.

Smart cards

Stored-value money cards

2 points  
Question 34
1.  

_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.

Answer

A.

B.

C.

D.

E.

RFID

Pervasive services

Wi-Fi

Location-based services

Telematics

2 points  
Question 35
1.  

Which of the following technologies would be most suited for project management?

Answer

A.

B.

C.

AJAX

D.

Wikis

E.

Tagging

Blogs

Really simple syndication feeds

2 points  
Question 36
1.  

Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?

Answer

A.

B.

C.

D.

E.

To make use of time that was formerly wasted

To become more efficient

Work locations are more flexible

To be able to allocate working time around personal and professional obligations

All of the above

2 points  
Question 37
1.  

Skype is an example of:

Answer

A.

B.

C.

D.

E.

Voice over IP

Videoconference

Telepresence

Teleconference

Plain old telephone service

2 points  
Question 38
1.  

The problems with the Census Bureau’s failed attempt to implement wireless technology in time for the 2010 census included all of the following except:

Answer

A.

B.

C.

D.

E.

poor contract estimates

poor communication between the Census Bureau and Harris Corporation

poor communication between census takers and citizens

poor executive governance

poor program management

2 points  
Question 39
1.  

The greatest problem with GEO satellites is which of the following?

Answer

A.

B.

C.

D.

E.

Relative speed with respect to a point on the earth’s surface

Size of footprint

Propagation delay

Orbital life

Expense

2 points  
Question 40
1.  

Which of the following is not an electronic commerce application?

Answer

A.

B.

C.

D.

E.

home banking

evaluating an employee

buying real estate

buying stocks

conducting an auction

2 points  
Question 41
1.  

This type of e-commerce is known as e-tailing.

Answer

A.

B.

C.

business-to-business

D.

business-to-consumer

E.

consumer-to-business

intrabusiness

collaborative commerce

2 points  
Question 42
1.  

Cyberbanking offers all of the following advantages except:

Answer

A.

B.

C.

D.

E.

The chance of recruiting remote customers.

It saves time for customers.

It is convenient for customers.

It includes inexpensive transactions for the bank.

It is more expensive for the customer.

2 points  
Question 43
1.  

To effectively manage by exception (i.e., use exception reports), the company must first create:

Answer

A.

B.

C.

D.

a database

E.

performance standards

best practices

user information requirements

employee evaluation guides

2 points  
Question 44
1.  

Google is developing and deploying applications in which network application?

Answer

A.

B.

C.

D.

E.

All of the above

Discovery

Communications

Collaboration

Web services

2 points  
Question 45
1.  

The major problem with generating

advertising

revenue on Facebook is:

Answer

A.

B.

C.

D.

E.

not enough members of various Facebook groups to make advertising worthwhile for the company

user resistance

it is too costly to produce the ads

it is too costly to develop the additional IT infrastructure to display the ads on the Web site

the inability to product target ads for each different group on Facebook

2 points  
Question 46
1.  

_____ portals coordinate content within relatively narrow organizational and partners’ communities.

Answer

A.

B.

C.

D.

E.

Personal
Corporate

Publishing

Affinity

Commercial

2 points  
Question 47
1.  

Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions.

Answer

A.

B.

C.

D.

E.

structured, accounting processes

structured, business processes

unstructured

, business processes

structured, reporting relationships

unstructured, inventory control

2 points  
Question 48
1.  

Sense networks track users by all of the following except:

Answer

A.

B.

C.

D.

Wi-Fi networks

E.

GPS

traffic cameras

cell towers

None of the above

2 points  
Question 49
1.  

The characteristics of ERP systems include all of the following except:

Answer

A.

B.

C.

D.

E.

typically fitting an organization’s existing business processes

providing information necessary to control the business processes of the organization

integrating the planning, management, and use of all resources of the organization

including a set of interdependent software modules

they are expensive and time-consuming

2 points  
Question 50
1.  

Networks enable which of the following applications?

Answer

A.

Discovery

B.

Communications

C.

Collaboration

D.

Web services

E.

All of the above

2 points  
Question 51
1.  

Fundamental points about network computing in organizations include all of the following except:

Answer

A.

B.

C.

D.

E.

Networks have had limited impact on organizational productivity.

Computer data exchange provides significant advantages to organizations.

Computers constantly exchange data.

Networks can be of any size, from small to enormous.

Networks support new ways of doing business.

2 points  
Question 52
1.  

In _____, direct and indirect materials in one industry are purchased on an as-needed basis.

Answer

A.

B.

C.

D.

E.

buy-side marketplaces

horizontal exchanges

sell-side marketplaces

vertical exchanges

functional exchanges

2 points  
Question 53
1.  

Data that have been processed by the organization’s _____ are inputs into

the organization’s database

.

Answer

A.

transaction processing systems

B.

functional area information systems

C.

D.

decision support systems

E.

office automation systems

digital dashboards

2 points  
Question 54
1.  

Which of the following statements about Wi-Fi is not correct?

Answer

A.

B.

C.

D.

E.

Wi-Fi is expensive to set up.

Wi-Fi requires encryption for secure transmissions.

Many companies offer free Wi-Fi access in their stores.

Laptop PC scans contain chips that can send and receive Wi-Fi signals.

Wi-Fi provides simple Internet access.

2 points  
Question 55
1.  

With _____, every call opened up a dedicated circuit for the duration of the call.

Answer

A.

B.

C.

D.

E.

teleconference

voice over IP

internet relay chat

chat rooms

plain old telephone service

2 points  
Question 56
1.  

Which of the following is not a strategy that Digicel uses in developing countries to start and grow its mobile telephone business?

Answer

A.

B.

C.

D.

E.

offer large discounts for mobile service

make contributions to the election campaigns of politicians

have polite, knowledgeable staff in the store

have clean stores

spend large amounts of money on the network

Bottom of Form

Question 1
1.  
Unlike _____ sites, _____ sites are not so much online places to visit, as they are services to get something done, usually with other people.
Answer

A.

affinity portals, commercial portals

B.

commercial portals, affinity portals

C.

Web 1.0, Web 2.0

D.

Web 2.0, Web 1.0

E.

Web 1.0, Wikis

1 points  

Question 2
1.  
_____ portals coordinate content within relatively narrow organizational and partners’ communities.
Answer

A.

Commercial

B.

Affinity

C.

Personal

D.

Publishing

E.

Corporate

1 points  
Question 3
1.  
_____ Web sites allow users to upload their content to the Web, in the form of text, voice, images, and videos.
Answer

A.

Social networking

B.

Affinity portals

C.

Really simple syndication

D.

Mashups

E.

Aggregators

1 points  
Question 4
1.  
A process that enables users to create a personal Web site containing his or her thoughts, feelings, and opinions is called _____.
Answer

A.

tagging

B.

AJAX

C.

blogging

D.

A Wiki

E.

really simple syndication

1 points  
Question 5
1.  
Which of the following is not a disadvantage of telecommuting for employees?
Answer

A.

possible loss of fringe benefits

B.

decreased feelings of isolation

C.

slower promotions

D.

no workplace visibility

E.

lower pay (in some cases)

1 points  
Question 6
1.  
Which of the following technologies would be most suited for project management?
Answer

A.

Really simple syndication feeds

B.

Blogs

C.

Wikis

D.

Tagging

E.

AJAX

1 points  
Question 7
1.  
Google is developing and deploying applications in which network application?
Answer

A.

Discovery

B.

Communications

C.

Collaboration

D.

Web services

E.

All of the above

1 points  
Question 8
1.  
Users typically have little interaction with _____, which provide information that users receive passively.
Answer

A.

affinity portals

B.

Web 3.0 sites

C.

Wikis

D.

Web 1.0 sites

E.

Web 2.0 sites

1 points  
Question 9
1.  
With _____, every call opened up a dedicated circuit for the duration of the call.
Answer

A.

internet relay chat

B.

plain old telephone service

C.

voice over IP

D.

chat rooms

E.

teleconference

1 points  
Question 10
1.  
A(n) _____ is a Web site that takes content from other Web sites and puts it together to create a new type of content.
Answer

A.

corporate portal

B.

aggregator

C.

mashup

D.

really simple syndication

E.

social network

1 points  
Question 11
1.  
Fundamental points about network computing in organizations include all of the following except:
Answer

A.

Networks can be of any size, from small to enormous.

B.

Computers constantly exchange data.

C.

Networks have had limited impact on organizational productivity.

D.

Computer data exchange provides significant advantages to organizations.

E.

Networks support new ways of doing business.

1 points  
Question 1
1.  
_____ enable two individuals to transfer funds without using a credit card.
Answer

A.

Stored-value money cards

B.

Electronic checks

C.

Smart cards

D.

Person-to-person payments

E.

Purchasing cards

1 points  
Question 2
1.  
In the _____ B2B application, the orders of many buyers are aggregated so that they total to a large volume, in order to merit more seller attention.
Answer

A.

group purchasing

B.

sell-side

C.

buy-side

D.

auctions

E.

electronic exchange

1 points  
Question 3
1.  
This type of e-commerce is known as e-tailing.
Answer

A.

collaborative commerce

B.

intrabusiness

C.

consumer-to-business

D.

business-to-consumer

E.

business-to-business

1 points  
Question 4
1.  
A(n) _____ is automatically launched by some trigger and appears behind the active window.
Answer

A.

random banner

B.

text box

C.

keyword banner

D.

pop-under ad

E.

pop-up ad

1 points  
Question 5
1.  
The major problem with generating advertising revenue on Facebook is:
Answer

A.

it is too costly to produce the ads

B.

not enough members of various Facebook groups to make advertising worthwhile for the company

C.

it is too costly to develop the additional IT infrastructure to display the ads on the Web site

D.

user resistance

E.

the inability to product target ads for each different group on Facebook

1 points  
Question 6
1.  
In _____, direct and indirect materials in one industry are purchased on an as-needed basis.
Answer

A.

vertical exchanges

B.

buy-side marketplaces

C.

horizontal exchanges

D.

sell-side marketplaces

E.

functional exchanges

1 points  
Question 7
1.  
_____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else.
Answer

A.

Domain spoofing

B.

Cybersquatting

C.

Domain tasting

D.

Domain fraud

E.

Domain masquerading

1 points  
Question 8
1.  
_____ are a payment mechanism similar to regular bank checks but transmitted electronically, with a signature in digital form.
Answer

A.

Electronic credit cards

B.

Electronic wallet

C.

Electronic checks

D.

Electronic cash

E.

Electronic debit cards

1 points  
Question 9
1.  
_____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.
Answer

A.

Smart cards

B.

Person-to-person payments

C.

Digital wallets

D.

Electronic checks

E.

Purchasing cards

1 points  
Question 10
1.  
Which type of electronic commerce is the largest by volume?
Answer

A.

business-to-employee

B.

consumer-to-consumer

C.

business-to-business

D.

business-to-consumer

E.

none of the above

1 points  
Question 11
1.  
_____ refers to online word-of-mouth marketing.
Answer

A.

Personalized marketing

B.

Direct mail

C.

One-to-one marketing

D.

Viral marketing

E.

Permission marketing

Bottom of Form

Question 1
1.  
Based on the RFID discussion in Chapter 7, what would be the best use of RFID in a business?
Answer

A.

Transaction processing

B.

Decreasing network costs

C.

Supply chain management

D.

Enabling communications with customers

E.

Personnel tracking

1 points  
Question 2
1.  
Which of the following is not an inhibitor of faster Wi-Fi expansion?
Answer

A.

There is a lack of security.

B.

Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services.

C.

Unless the service is free, users have to log on to separate accounts for each hotspot.

D.

Wi-Fi services may not survive in the face of free hotspot access.

E.

The growth of Wi-Max

1 points  
Question 3
1.  
Which of the following is not a strategy that Digicel uses in developing countries to start and grow its mobile telephone business?
Answer

A.

spend large amounts of money on the network

B.

have clean stores

C.

have polite, knowledgeable staff in the store

D.

offer large discounts for mobile service

E.

make contributions to the election campaigns of politicians

1 points  
Question 4
1.  
Parking meters that you can pay via your mobile telephone are an example of:
Answer

A.

money transfer

B.

wireless wallet

C.

brokerage service

D.

mobile banking

E.

wireless electronic payment

1 points  
Question 5
1.  
Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?
Answer

A.

To make use of time that was formerly wasted

B.

To become more efficient

C.

Work locations are more flexible

D.

To be able to allocate working time around personal and professional obligations

E.

All of the above

1 points  
Question 6
1.  
_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.
Answer

A.

Pervasive services

B.

Telematics

C.

RFID

D.

Wi-Fi

E.

Location-based services

1 points  
Question 7
1.  
_____ means that virtually every object has processing power with wind or wireless connections to a network.
Answer

A.

Pervasive computing

B.

Mobile computing

C.

Wireless computing

D.

Fixed computing

E.

Continuous computing

1 points  
Question 8
1.  
The problems with the Census Bureau’s failed attempt to implement wireless technology in time for the 2010 census included all of the following except:
Answer

A.

poor communication between census takers and citizens

B.

poor communication between the Census Bureau and Harris Corporation

C.

poor program management

D.

poor contract estimates

E.

poor executive governance

1 points  
Question 9
1.  
Of the following, which is the major problem with smart phones?
Answer

A.

Their browsers are not fully functional.

B.

Their screens are too small.

C.

They can be used to compromise security.

D.

They are too expensive.

E.

They are too slow.

1 points  
Question 10
1.  
Sense networks track users by all of the following except:
Answer

A.

GPS

B.

traffic cameras

C.

cell towers

D.

Wi-Fi networks

E.

None of the above

1 points  
Question 11
1.  
_____ collect data from many points over an extended space.
Answer

A.

Ultra-wideband networks

B.

Bluetooth networks

C.

Wi-Fi networks

D.

Wi-Max networks

E.

Wireless sensor networks

Bottom of Form

Question 1
1.  
The most fundamental information systems in an organization are:
Answer

A.

decision support systems

B.

business intelligence systems

C.

transaction processing systems

D.

office automation systems

E.

functional area information systems

1 points  
Question 2
1.  
Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.
Answer

A.

high, repetitive, easy

B.

high, different, easy

C.

high, different, difficult

D.

low, repetitive, difficult

E.

low, different, easy

1 points  
Question 3
1.  
Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions.
Answer

A.

structured, reporting relationships

B.

structured, business processes

C.

unstructured, business processes

D.

unstructured, inventory control

E.

structured, accounting processes

1 points  
Question 4
1.  
_____ are the most successful solutions or problem-solving methods for achieving a business objective.
Answer

A.

Business processes

B.

Business functions

C.

Best practices

D.

Enterprise solutions

E.

Optimal strategies

1 points  
Question 5
1.  
_____ integrate the planning, management, and use of all of an organization’s resources, and are designed to tightly integrate the functional areas of the organization.
Answer

A.

Corporate extranets

B.

Functional area information systems

C.

Supply chain management systems

D.

Enterprise resource planning systems

E.

Transaction processing systems

1 points  
Question 6
1.  
UPS has all of the following IT initiatives underway except:
Answer

A.

development of translation software for Eastern European languages

B.

a system to improve the quality of international documentation on packages

C.

development of live chat capability

D.

the UPS Worldport

E.

development of a system to enhance managerial decision making

1 points  
Question 7
1.  
The characteristics of ERP systems include all of the following except:
Answer

A.

typically fitting an organization’s existing business processes

B.

including a set of interdependent software modules

C.

they are expensive and time-consuming

D.

providing information necessary to control the business processes of the organization

E.

integrating the planning, management, and use of all resources of the organization

1 points  
Question 8
1.  
_____ are interorganizational ERP systems that provide Web-enabled links between an organization’s key business systems and its customers, suppliers, business partners, and others.
Answer

A.

Office automation systems

B.

Supply chain management systems

C.

ERP II systems

D.

Functional area information systems

E.

Transaction processing systems

1 points  
Question 9
1.  
The drawbacks of ERP systems include all of the following except:
Answer

A.

they are complex

B.

they are expensive

C.

they consist of modules

D.

companies may need to change existing business processes to fit the software

E.

they are time-consuming to implement

1 points  
Question 10
1.  
Which best describes the NoFly list at the Transportation Security Agency?
Answer

A.

Exception report

B.

Detailed report

C.

Summary report

D.

Ad hoc report

E.

Routine report

1 points  
Question 11
1.  
Data that have been processed by the organization’s _____ are inputs into the organization’s database.
Answer

A.

office automation systems

B.

transaction processing systems

C.

decision support systems

D.

functional area information systems

E.

digital dashboards

Bottom of Form

Question 1
1.  

Which of the following is the most important enabler of the 360-degree view of the customer across an organization?

Answer

A.

B.

C.

D.

E.

the organization’s collaborative CRM systems

the organization’s CRM systems

the organization’s data warehouse

the organization’s analytical CRM systems

the organization’s database

1 points  
Question 2
1.  

A check-in kiosk at the airport would be what type of CRM application?

Answer

A.

B.

C.

D.

E.

Sales

Outbound telesales

Inbound telesales

Customer facing

Customer touching

1 points  
Question 3
1.  

At Amazon, _____ occur(s) only when customers deal with Amazon employees.

Answer

A.

B.

C.

D.

E.

customer transactions

customer experience

customer relationship

customer service

customer satisfaction

1 points  
Question 4
1.  

The complete data on a customer is called:

Answer

A.

B.

C.

D.

E.

a consolidated customer map

a record
a profile
a file

a 360-degree view

1 points  
Question 5
1.  

The benefits from Subway’s new loyalty card program include all of the following except:

Answer

A.

B.

C.

D.

E.

the ability to target customer behavior

the ability to reward customer behavior

the ability to reduce Subway transaction costs

allowing Subway managers to analyze customer behavior in individual stores

the ability to analyze customer behavior in different geographical regions

1 points  
Question 6
1.  

AT&T sells telephone services that include local and long-distance service, voice mail service, caller ID, and digital subscriber line access to the Internet. This is a form of:

Answer

A.

B.

C.

D.

E.

customer intimacy

up-selling

cross-selling

bundling

customer relationship management

1 points  
Question 7
1.  

In Amazon’s _____ process, merchants send their products to Amazon’s warehouses, and Amazon does the rest.

Answer

A.

B.

C.

D.

E.

fulfillment

search

advertising
shopping

web services

1 points  
Question 8
1.  

The benefits of open-source CRM include all of the following except:

Answer

A.

B.

C.

D.

E.

it is easy to customize

it has more functionality than in-house CRM systems

it has extensive support information available

updates and error fixes occur rapidly

it is favorably priced

1 points  
Question 9
1.  

In improving its relationship with its customers, Amazon’s ultimate goal is which of the following?

Answer

A.

B.

C.

D.

E.

to gain more control over the shopping experience

to make better decisions

to reduce transaction costs

to improve customer satisfaction

to make its Web site more functional

1 points  
Question 10
1.  

Subway’s new loyalty card program was difficult for the company’s IT department to implement. Which of the following is the main reason for this difficulty?

Answer

A.

B.

C.

D.

E.

The program provided too much data for the IT department to handle.

Subway stores are owned by franchisees.

The program included too many Subway stores.

The program was too expensive for the IT department budget.

Subway store owners refused to adopt the new program.

1 points  
Question 11
1.  

You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-size car of the same brand for you to drive. The salesperson is engaged in:

Answer

A.

bundling

B.

cross-selling

C.

customer relationship management

D.

up-selling

E.

customer intimacy

Bottom of Form

Question 1
1.  

_____ are the physical products, raw materials, and supplies that flow along a supply chain.

Answer

A.

B.

C.

D.

E.

Reverse flows

Reverse logistics

Information flows

Material flows

Financial flows

1 points  
Question 2
1.  

The business model of large automobile manufacturers would be best known as which of the following?

Answer

A.

B.

C.

D.

E.

Pull model

Inventory model

Supply chain model

Vertical integration

model

Push model

1 points  
Question 3
1.  

The _____ is known as make-to-order.

Answer

A.

B.

C.

D.

E.

inventory model

push model

vertical integration model

pull model

supply chain model

1 points  
Question 4
1.  

In the _____ process, individual OfficeMax stores purchase goods in minimum quantities, which were determined by the supplier’s minimum-order quantities rather than the store’s needs.

Answer

A.

B.

C.

D.

E.

direct-to-inventory environment

direct-to-stock environment

direct-to-forecast environment

direct-to-store environment

direct-to-warehouse environment

1 points  
Question 5
1.  

Returned products, recycled products, and disposal of materials or products are called:

Answer

A.

B.

C.

D.

E.

financial flows

reverse flows

information flows

returns

material flows

1 points  
Question 6
1.  

_____ is the ability for all organizations in a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers’ production processes and transportation networks to their receiving docks.

Answer

A.

B.

C.

D.

E.

Supply chain intelligence

Supply chain visibility

Horizontal integration

Vertical integration

Supply chain integration

1 points  
Question 7
1.  

The bullwhip effect comes from which of the following?

Answer

A.

B.

C.

D.

E.

all of the above

poor demand forecast

price fluctuations

order batching

rationing within the supply chain

1 points  
Question 8
1.  

A company’s suppliers, suppliers’ suppliers, and the processes for managing them is the:

Answer

A.

B.

C.

D.

E.

suppliers’ chain

entire supply chain

external

supply chain

downstream

portion of the supply chain

upstream

portion of the supply chain

1 points  
Question 9
1.  

A company’s organization and processes for distributing and delivering products to its final customers is the:

Answer

A.

downstream portion of the supply chain

B.

suppliers’ chain

C.

entire supply chain

D.

external supply chain

E.

upstream portion of the supply chain

1 points  
Question 10
1.  

_____ portals automate the business processes involved in selling products from a single supplier to multiple buyers.

Answer

A.

Corporate

B.

C.

D.

E.

Intranet

Affiliate

Procurement

Distribution

1 points  
Question 11
1.  

Distribution or dispersal takes place in which segment of the supply chain?

Answer

A.

B.

C.

D.

E.

none of the above

upstream

internal

downstream
external

Bottom of Form

Question 1
1.  

Which of the following is not a characteristic of DSS?

Answer

A.

B.

C.

D.

E.

usually utilize quantitative models

easy to use and construct

support only lower and middle-level managers

support all phases of the decision making process

adaptable to changing conditions

1 points  
Question 2
1.  

The benefits that Sears gained from its geographical information system included all of the following except:

Answer

A.

B.

C.

D.

E.

Reduced average travel time per service call

Improved productivity of technicians

Increase customer retention

Enabled Sears to increase the number of dispatchers for better control of technicians’ service calls

Increased size of district territories

1 points  
Question 3
1.  

Credit card companies would most likely use which of the following to check for fraudulent credit card use?

Answer

A.

B.

C.

D.

E.

Expert systems

Multidimensional data analysis

Neural networks

Data mining

Structured query language

1 points  
Question 4
1.  

Annual evaluation of employees best fits which type of decision?

Answer

A.

B.

C.

D.

wisdom

E.

structured

confrontational

semistructured

unstructured

1 points  
Question 5
1.  

Blue Mountain Resorts implemented a business intelligence system for all of the following reasons except:

Answer

A.

B.

C.

D.

E.

the old system was not automated

the resort was purchased b another company and it had to upgrade its system

the resort wanted to use the new system to attract more guests

old system could not handle all the resort’s data input

no one in the resort’s IT department was responsible for maintaining the old information system

1 points  
Question 6
1.  

The most distinguishing characteristic of geographical information systems is:

Answer

A.

B.

C.

D.

E.

every record or digital object is visible to the user

every record or digital object must be accessed by programmers

every record or digital object has a unique identifier

every record or digital object has an identified geographical location

every record or digital object is encrypted

1 points  
Question 7
1.  

Which of the following are not provided by digital dashboards?

Answer

A.

B.

C.

D.

E.

exception reporting

transaction processing

key performance indicators

status access

drill down

1 points  
Question 8
1.  

Which of the following is not a benefit of expert systems?

Answer

A.

B.

C.

D.

E.

capture and dissemination of scarce expertise

works with incomplete, uncertain information

reliability

increased decision-making time

increased output and productivity

1 points  
Question 9
1.  

Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment.

Answer

A.

B.

C.

D.

E.

about the same, decreased

less, decreased

more, increased

less, increased

more, decreased

1 points  
Question 10
1.  

Virtual reality systems accomplish which one of the following?

Answer

A.

B.

C.

D.

E.

Provide engineers, designers, and factory managers with precise control over industrial design and manufacturing

Provide an important source of expertise for organizations

Provide drug designers, architects, engineers, and medical workers with precise, photorealistic simulations of objects and environments

Help organizations process vast amounts of transactional data

Allow groups to work together on documents

1 points  
Question 11
1.  

Which of the following is not a characteristic of unstructured decisions?

Answer

A.

B.

C.

D.

E.

complex

first three phases of the decision making process occur in no particular sequence

standard solutions exist

fuzzy and unclear

human intuition involved

Bottom of Form

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER