Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

MIS 850 Try Questions-1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 60

MIS PRACTICAL TEST

1. Which of the following objectives best describes the business strategy behind the technologies
implemented by the San Francisco Giants, as discussed in the Chapter case?
Ans_ Competitive advantage

2. The Mandarin Oriental Hotel’s use of computer systems to keep track of guests’ preferences is an
example of
Ans_ Customer and Supplier intimacy

3. Oder data baseball tickets and barcode data are examples of


Ans_ Raw Input

4. Which of the following is not one of the current changes taking place in information systems
technology?
Ans_ Growth in the PC platform

5. An example of a business using information systems to create new products and services is
Ans_ Apple Inc.’s iPod

6. An example of raw data from a national chain of automobile stores would be


Ans_ 1 Toyota RAV4 sold March 3,2013, in Louisville, Kentucky.

7. Which of the following would not be used as an input for an information system?
Ans_ Digital dashboard

8. Psychologists study information systems with an eye to understanding


Ans_ How human decision makers perceive and use formal information

9. Output
Ans_ Transfer processed information to the people who will use it or to the activities for which will be
used

10. An example of social complementary assert is


Ans_ Technology and service firms in adjacent markets

11. An example of an organizational complementary asset is


Ans_ Using the appropriate business model

12. In a hierarchical organization, the upper levels consist of


Ans_ Managerial, professional, and technical employees
13. Which of the following would not be a complementary asset for a solar panel manufacturer?
Ans_ Centralized hierarchical decision making

14. Which of the following choices may lead to competitive advantage?


1 new product, services and business models; 2 charging less for superior products; 3 responding to
customers in real time?
Ans_ 1 and 3

15. Disciplines that contribute to the technical approach to information systems are
Ans_ Operation research, management science, and computer science

16. All of the following are advantages, for a firm, of cloud computing except
Ans_ Ability to improve communication
1
17. Which of the following best describes the primary reasons for implementing a new information system
from a business perspective?
Ans_ The system will create new value fir the firm, beyond its costs.

18. A firm that must invest in new information systems capabilities in order to comply with federal
legislation can be said to be investing to achieve which business objective?
Ans_ Survival

19. The six important business objectives of information technology are new products, services, and
business models; customer and supplier intimacy; survival; competitive advantage; operational
excellence; and
Ans_ Improved decision making

20. Verizon corporation use of a web-based digital dashboard to provide managers with precise real-time
information illustrates which business objective?
Ans_ Improved decision making

21. Maintaining the organization’s financial records is a central purpose of which main business function?
Ans_ Finance and accounting

22. Thomas Friedman’s declaration that the world was now Flat meant that
Ans_ The internet has reduced the economic advantages of developed countries

23. The fundamental set of assumptions, values, and ways of doing things that has been accepted by most
of a company’s members is called its
Ans_ Culture
24. The temp agency that you own is having serious difficulties placing temps because few of them are
familiar with internet research investing in training software to enhance your worker’s skills is an
example of using technology to achieve which business objective?
Ans_ survival

25. Which of the following is not one of the primary environmental actors with an organization and its
information systems?
Ans_ sales force

26. The three activities in an information system that produce the information organizations use to control
operations are
Ans Input, processing and output

27. A corporation that funds a political action committee, which in tum promotes and funds a political
candidate who agrees with the values of that corporation, could be seen as investing in which main
category of complementary assets?
Ans_ Social

28. The discipline that focuses on mathematical techniques for optimizing parameters of organizations,
such as transportation and inventory control, is
Ans_ Operations research

29. An example of a business information systems for customer and supplier intimacy is
Ans The Mandarin Oriental hotel’s customer-preference tracking system

30. Which of the following are key corporate assets?

2
Ans_ Intellectual property, core competencies, and financial and human assets

31. The three principal levels within business organization hierarchy are
Ans_ Senior management, Middle management, and operational management

32. Which of the following statements best describes organizational culture?


Ans_ It is a set of assumptions and values accepted by most members

33. In a business hierarchy, the level that is responsible for monitoring the daily activities of the business
is
Ans_ Operational Management

34. Which of the following constitutes an organizational element in the UPS tracking system described in
the chapter?
Ans_ The specification of procedures for identifying packages with sender and recipient information
35. Engineers, scientists, or architects, who design new products or services for a firm, belong to which
level of a business hierarchy?
Ans_ Knowledge workers

36. Converting raw data into a more meaning form is called


Ans_ A processing

37. Networking and telecommunications technologies, along with computer hardware, software, data
management technology, and the people required to run and manage them, constitute an organization’s
Ans_ IT infrastructure

38. An example of a business using information systems to attain operational excellence is


Ans_ Wal-Mart’s Retail Link System

39. Which main business function is responsible for maintaining employee records?
Ans_ Human resources

40. The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of
information systems to achieve business objective?
Ans_ Survival
41. Data management technology consists of the
Ans_ software governing the organization of data on physical storage media

42. The use of information systems because of necessity describes the business objective of
Ans_ A survival

43. Which field of study focuses on both a behavioural and technical understanding of information
systems?
Ans_ Management information systems

44. Sociologists study information systems with an eye to understanding


Ans_ how systems affect individuals, groups and organizations

45. Apple computer dominates the online legal music sales industry primarily because of a failure of
recording label companies to
Ans_ adopt a new business model

3
46. The field that deals with behavioural issues as well as technical issues surrounding the development,
use, and impact of information systems used by managers and employees in the firm is called
Ans_ management information systems
47. A managerial element in the UPS tracking system described in the chapter is
Ans_ the decision to use automation

48. From a business perspective, raw data is transformed systematically during various stages,
transforming it into valuable information, in a process called
Ans_ the information value chain

49. Which of the following roles in a firm would be least affected by using mobile devise to access firm
information systems?
Ans_ Production workers

50. The average number of tickets sold daily online is an example of


Ans_ meaningful information

51. An______ is typically a major source of data for other systems


Ans_ Transaction processing system

52. All of the following are reasons for the increased business focus on collaboration and teamwork,
except for
Ans the need for more efficient work hierarchies

53. Which type of system would you use to forecast the return on investment if you used new suppliers
with better delivery track records?
Ans_ DSS

54. Which of the following is not a business benefit of collaboration?


Ans_ Improve compliance with government regulations

55. FWO’s use of SharePoint for project management is an example of using information systems to
archive which business objective?
Ans_ Improved decision making

56. To consolidate the relevant knowledge and experience in the firm and make it available to improve
business process and management decision making, you would use a(n)
Ans_ KMS

57. A(n)____ social networking tool creates business value by connecting the members of an organization
through profiles, updates, and notifications that are tailored to internal
Ans_ Enterprise

58. ____ systems are especially suited to situations in which the production for arriving at a solution may
not be fully defined in advance
Ans_ Decision-support
59. If your main supplier was late in delivering goods, which type of system would you use to update your
production schedule?
Ans_ TPS

60. Which of the following tools would you use to evaluate and choose a collaboration tool for your
organization?
Ans_ the time/space collaboration and social tool matrix

4
61. A(n)____ system collects data from various key processes and stores the data in a single
comprehensive data repository, usable by other parts of the business
Ans_ Enterprise

62. The term ‘management information systems’ designates a specific category of information system
serving
Ans_ middle management functions

63. Using ____ to enable government relationships with citizens, businesses, and other arms of
government is called e-government
Ans_ the internet and networking technologies

64. You manage the IT department at small start-up internet advertiser. You need to set up an inexpensive
system that allows customers to see real-time statistics such as views and clicks-through about their
current banner ads. Which type of system will most efficiently provide a solution?
Ans_ Extranet

65. Which of the following systems would you expect to deliver integrated business content through a web
portal interface?
Ans_ Executive support systems

66. The four major enterprise applications are


Ans_ Enterprise systems, SCMs, CRMs, and KMSs

67. All the following statements regarding IBM Notes are true except which one?
Ans_ it begun as an e-mail and messaging client

68. You have been hired by a non-profit agency to implement a system to handle their donations. The
system must be able to handle and record telephone, SMS, and internet donations, provide up-to-the-
minute reports, and create highly customizable mailing lists. In addition, events fundraisers need to be
able to quickly access a donor’s information and history. Which of the following systems will best
meet these needs?
Ans_ TPS with MIS capabilities

69. An information systems manager


Ans_ manages data entry staff

70. _____ systems also known as enterprise systems


Ans_ Enterprise resource planning

71. In ____ digital technology and the internet are used to execute the major business processes in the
enterprise
Ans_ e-business

72. Which level of the organization are ESS specially designed to serve?
Ans_ Senior Management

73. Which of the following systems is designed to support organization –wide process and integration?
Ans_ Enterprise applications

74. An example of a cross-functional business process is

5
Ans_ Creating new product

75. To forecast trends in your supplier’s industry that could affect your firm over the next five years, you
would use(n)
Ans_ ESS

76. To monitor the status of internal operations and the firm’s relation with the environment managers
need____ systems
Ans_ transaction processing

77. You have been hired by Inspiration Inc, to help improve their margin. Inspiration Inc. is a business
communications consultancy that services many clients in different industries throughout the United
States.
The end products of the company are customized recommendations for the best use of a client’s
existing media. The company has approximately 100 consultants, all of whom are located in their
central headquarters in Chicago. What system do you recommend to improve the company’s business
processes and increase their margin?
Ans_ Extranet, to enable quick collaboration over the internet, minimize the time spent
communicating with the client, and minimize the amount of paperwork needed

78. The principal liaison between the information systems groups and the resr of the organization is a(n)
Ans_ Systems analyst

79. Which type of system integrates supplier manufacturer distributor and customer logistics processes?
Ans_ Supply-chain management system

80. The____ helps design programs and systems to system to find new sources of knowledge or to make
better use of existing knowledge in organizational and management processes
Ans_ CKO

81. You would use a(n)_____ in order to determine which of your suppliers has the best and worst records
for keeping to your production schedule?
Ans_ MIS

82. Using the Internet to buy or sell goods is called


Ans_ e-commence

83. Executive support systems are information systems that support the
Ans_ long-range planning activities of senior management

84. Non-typical business problems with causes and effects that are rapidly changing are typically handled
by which type of the information system?
Ans_ DSS

85. The ____ function is responsible for identifying customers


Ans_ Sales and Marketing

86. ____ allows you to communicate with avatars using text messaging
Ans_ A virtual world

87. A relocation control system that reports summaries on the total moving, house hunting and home
financing costs for employees in all company divisions would fall into the category of
Ans_ Management information systems

6
88. Which of the following types of system helps coordinate the flow of information between the firm and
its suppliers and customers?
Ans_ Extranet

89. _____ is a collaboration tool that supports remote (different place) synchronous (same time)
collaboration
Ans_ Video conferencing

90. Which of the following statements about collaboration is not true?


Ans_ Successful collaboration can be achieved through regardless of the organization’s culture or
structure

91. To manage relationships with your customers, you would use a(n)____system.
Ans_ CRM

92. _____ enable management to make better decision regarding and scheduling sourcing production, and
destruction.
Ans_ SCMs

93. A___ is a senior manager who oversees the use of it in the firm.
Ans_ CIO

94. A business process in the ____ function is producing bills of material.


Ans_ manufacturing and production

95. Which of the following is the greatest obstacle in enabling collaboration between employees at
different distant corporate locations?
Ans_ Time zones

96. Which of the following is a firm’s CPO responsible for?


Ans_ ensuring that the company complies with existing data privacy laws

97. Which of the following is a highly structured decision?


Ans_ Granting credit to a customer

98. Which of the following is not one of the four main classifications for collaboration tools identified by
the space/time matrix?
Ans_ Remote/Colocated

99. Which of the following decision requires knowledge based on collaboration and interaction?
Ans_ Should we work with outside vendors on new products and services?

100. What is the most important function of an enterprise application?


Ans_ Enabling business functions and departments to share information

101. A firm can exercise greater control over its suppliers by having
Ans_ more suppliers

102. A virtual company


Ans_ use networks to link people assets and ideas
103. The value chain model

7
Ans_ Highlights specific activities in the business where competitive strategies can best be applied

104. An organization is a
Ans_ A, B, and C

105. Walmart’s continuous replenishment system allows it to


Ans_ Achieve low-cost leadership

106. How are information systems used at the industry level to achieve strategic advantage?
Ans_ By building industry-wide, it-support consortia and symposia

107. Which model is used to describe the interaction of external forces that affect an organization’s
strategy and ability to compete?
Ans_ competitive forces model

108. All of the following are IT-enabled products and services providing competitive advantage
except
Ans_ Walmart’s RetailLink system

109. The more any given resource is applied to production, the lower the marginal gain in output,
until appoint is reach where the additional inputs produce no additional output. This is referred to as
Ans_ The law of diminishing returns

110. Which of the following best illustrates the use of information systems to focus on market
niche?
Ans_ A department store creating specialized products for preferred customers

111. All of the following are competitive forces except


Ans_ External environment

112. Business process are collections of


Ans_ Routines

113. Which of the following industries has a low barrier to entry?


Ans_ Restaurant

114. How does the technical view of organization fall short of understanding the full impacts of
information systems in a firm?
Ans_ It sees the inputs and outputs, labor and capital as being infinitely malleable
115. The interaction between information systems and organizations is influenced
Ans_ By the development of new information technologies

116. What are the most successful solutions or methods for achieving a business objective?
Ans_ Best practices

117. The divergent viewpoints about how resources, reward and punishments should be distributed
and the struggles resulting from these difference are known as
Ans_ Politics

118. The internet raises the bargaining power of customers by


Ans_ Making information available to everyone

119. A competitive force challenging the publishing industry is

8
Ans_ Substitute products or services

120. Nike’s forays into information technology represent an effort to


Ans_ achieve product differentiation

121. A(n)____ is an activity at which a firm excels as a world-class leader


Ans_ core competency

122. Sociotechnical changes affecting a firm adopting new information systems requiring
organization change can be considered
Ans_ Strategic transitions

123. _____ is a competitive strategy for brand loyalty by developing new and unique products and
services that are not easily duplicated by competitors
Ans_ Product differentiation

124. When two organizations pool markets and expertise that result in lower costs and generate
profits, it is referred to as creating
Ans_ Synergies

125. Networks economics


Ans_ Sees the cost of adding new members as inconsequential

126. The ability to offer individually tailored products or services using the same production
resources as bulk production is known as
Ans_ Mass customization

127. Along with capital, ____ is the primary production input that the organization uses to create
products and services
Ans_ labour

128. A collection of independent firms that use information technology to coordinate their chains to
produce a product or service for a market collectively is called
Ans_ Value web

129. An example of synergy in business is


Ans_ Bank of America acquiring Countrywide Financial to reach a large pool of new customers
130. Which of the following represent the primary activities of a firm?
Ans_ inbound logistics, operation, outbound logistics, sales and marketing and service

131. An organization is seen as a means by which primary production factors are transformed into
outputs consumed by the environment according to be the____ definition of organizations
Ans_ Microeconomic

132. According to agency theory, the firm is viewed as a(n)


Ans_ ‘nexus of contracts’ among self-interest individual

133. A substitute product of most concern for cable TV distributor is


Ans_ Satellite TV

134. Which of the following is one of the support activities in a firm’s value chain?
Ans_ Technology

9
135. A(n)___ is a collection of independent firms that use information technology to coordinate
their value chains to collectively produce a product or service for a market
Ans_ Value web

136. The parts of an organization’s infrastructure, human resources, technology, and procurement
that make the delivery of the firm’s products or services possible are known as ___ activities
Ans_ Support

137. When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred
to as
Ans_ Transaction costs

138. Why does Amazon.com need to worry about competitors in online shopping?
Ans_ Internet technologies are universal, and therefore usable by all companies
139. According to research on organizational resistance, the four components that must be changed
in an organization in order to successfully implement a new information system are
Ans_ Task, technology, people, and structure

140. All of the following statements are true about information technology’s impact on business
firms except
Ans_ it helps firms lower the cost of the market participation

141. in environmental scanning a firm may use information systems to


Ans_ Identify external events that may affect it

142. An example of a divisionalized bureaucracy is a


Ans_ Fortune 500firm

143. The expenses incurred by a customer or company in lost time and resources when changing
from one supplier or system to competing supplier or system to a competing supplier or system are
known as
Ans_ Switching costs

144. ___ technologies radically change the business landscape and environment
Ans_ Disruptive

145. All of the following industries have been disrupted by the internet except
Ans_ Clothing

146. As discussed in the chapter opening case, which of the four generic strategies did T.J. Maxx
employ to combat the competition offered by Target Kohls, Walmart, Macy’s and pure online stores
like Rue LaLa and Gilt Groupe?
Ans_ Market niche focus

147. An activity business perform to measure and compare business process to similar processes of
the other companies within their industry is
Ans_ Benchmarking

148. How do information systems enhance core competencies?


Ans_ By encourage the sharing of knowledge across business units

149. Amazon’s use of the internet as platform to sell books more efficiently than traditional
bookstores illustrates a use of information services for

10
Ans_ Low-cost leadership

150. ____ means that you accept the potential costs and obligations for the decision you make
Ans_ Responsibility

151. ____ is a societal practice of having laws that are known and understood, along with the ability
to appeal to higher authorities to ensure that laws are applied correctly
Ans_ Due process

152. Privacy protection in the United States is ___ in Europe


Ans_ Much less stringent than

153. ____ is a new data analysis technology that finds hidden connections between data in disparate
sources
Ans_ NORA

154. The central business activities of ChoicePoint raise which of the moral dimensions?
Ans_ Information rights and obligations

155. A peer at work takes small amounts of office suppliers for her own use at home, saying that
this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the
loss would no longer be minimal. Your rationale expresses which historical ethical principle
Ans_ Kant’s Categorical Imperative

156. As per the ___, if an action cannot be taken repeatedly, it is not right to take at all
Ans_ slippery-slope rule

157. Look and feel copyright infringement lawsuit are concerned with
Ans_ the distinction between an idea and its expression

158. Which of the following is the primary reason that the practice of spamming has grown
exponentially?
Ans_ It is very inexpensive and can reach so many people

159. As discussed in the chapter, all of the following are steps in the process for analysing an ethical
issue except
Ans_ Assigning Responsibility

160. Re-designing and automating business process can be seen as a double- edged sword because
Ans_ Increase in efficiency may be accompanied by job losses

161. ___ are not held liable for the messages they transmit
Ans_ Regulated common carriers

162. Which of the following describes Immanuel Kant’s Categorical Imperative?


Ans_ if an action is not right for everyone to take, it is not right for anyone to take

163. Spamming raises the moral dimension of


Ans_ quality of life

164. The strength of patent protection is that it


Ans_ Grants a monopoly on underlying concepts and ideas

11
165. Which of the following best describes the effects that new information technology has on
society?
Ans_ it has a ripple effect, raising new ethical, social and political issues

166. A man steals from a grocery store in order to feed his starving family. Which of the following
best expresses the Utilitarian Principle in evaluating this situation?
Ans_ His action is acceptable, because the higher social value is the survival of the family
167. U.S. businesses are allowed to use personal data from data from EU country if they
Ans_ Develop equivalent privacy protection policies

168. ___ prohibits an organization from any personal information unless the individual specifically
takes action to approve information collection and use
Ans_ The opt-in model

169. Which of the following U.S. laws gives patients medical records and the right to authorize how
this information can be used or disclosed?
Ans_ HIPAA

170. Which of the following is not one of the current key technology trends that raises ethical
issues?
Ans_ Increase in multimedia quality
171. Cookies created during Website visits are stored
Ans_ On the user’s computer

172. The Federal Trade Commission FIP principle of Notice/Awareness states that
Ans_ Web sites must disclose their information practices before collecting data

173. Which of the following ailments is caused by tens of thousands of repetitions under low-impact
loads?
Ans_ RSI
174. __ Enables advertisers to display more relevant ads based on users’ search and browser history
Ans_ Behavioural targeting

175. __ restricts the information that the U.S. federal government can collect about an individual
and regulates what it can do with the information
Ans_ The Privacy Act of 1974

176. When a software product is considered ___it becomes difficult to hold software producers
liable for flaws in the product
Ans_ Similar to books

177. ___ Protects the creators of intellectual property from having work copied by others
Ans_ Copyright law

178. In the ___ model of informed consent, personal information can be collected until the
consumer specifically requests that his or her data not collected
Ans_ Opt-Out

179. ____ is a feature of social institutions that means mechanisms are in place to determine
responsibility for an action.
Ans_ Accountability

12
180. Which of the following is not one of the types of information gathered by Web site tracking
tools?
Ans_ Birthplace

181. Companies can’t realistically create error-free software because


Ans_ It is too expensive to create perfect software

182. The ethical ‘no free lunch’ rule states that


Ans_ everything is owned by someone else, and that the creator wants compensation for this work

183. The___ bought copyright law to the internet age by outlawing the circumvention of
technology-based protections of copyrighted materials
Ans_ Digital Millennium Copyright Act

184. Which of the following best describes intellectually property?


Ans_ Intangible property created by individuals or corporations

185. The limitation of trade secret protection for software is that it is difficult to prevent the ideas in
the work from falling into the public domain when
Ans_ the software is widely distributed

186. In the information age, the obligation that individuals and organization have regarding the
preservation of existing values and institutions fall within the moral dimension of
Ans_ Quality of life

187. One of the drawbacks of patent protection is


Ans_ the years of waiting to receive it

188. The extreme difference among different social groups regarding their access to computers and
the internet is called the ___ divide
Ans_ Digital

189. The U.S. CAN-SPAM Act of 2003


Ans_ Requires spammers to identify themselves

190. Which of the following best describes the basis for the FIP principles?
Ans_ The mutuality of interest between the record holder and the individual

191. The ___ framework developed by U.S. Department Commerce allows U.S business to legally
use personal data from country
Ans_ Safe-harbour

192. Taking the action that produces the least harm best describe the
Ans_ Risk Aversion Principle

193. The most common reason business systems fail is


Ans_ Data quality

194. Which of the following best describes how new information system result in legal gray areas?
Ans_ They result in new situations that are not covered by old laws

195. In 2010, the FTC added all of the following recommendations to its privacy guidelines except
Ans_ Firms should limit the length of time that any personal data is stored to six months or less

13
CHAPTER 5

196. _____ are computer consisting of a circuit board with processors, memory and network
connections that are stored in racks
Ans_ Blade servers

197. Interpretations of Moore’s law assert that


Ans_ computing power double

198. Which of the following is not one of the main six factors to consider when evaluating how
much your firm should spend on IT infrastructure?
Ans_ your firm’s organizational culture

199. Sets of loosely coupled software components that exchange information with each other using
standard Web communication standards and languages are referred to as
Ans_ Web services

200. The development of TCP/IP occurred during the ____ era


Ans_ Enterprise computing

201. Today’s nanotechnology-produced computer transistors are roughly equivalent in size to


Ans_ A virus

202. Running a Java program on computer requires


Ans_ A java Virtual Machine to be installed on the computer

203. Which of the following is not one of the current software platform trends?
Ans_ Multicore processors

204. The process of presenting a set of computing resources (such as computer power or data
storage)
So that they can all be accessed in ways that are not restricted by physical configuration or geographic
location is called
Ans_ Cloud computing

205. ____ provides a standard format for data exchange, enabling Web services to pass data from
one process to another
Ans_ XML

206. A(n)___ server is used to communicate between a web server and an organization’s back-end
systems
Ans_ Application server

207. ___uses individual atoms and molecules to create computer chips and other devices thinner
than a human hair
Ans_ Nanotechnology

208. Which of the following is not an IT infrastructure service component?


14
Ans_ Operation system software

209. The introduction of the minicomputer


Ans_ Allowed computers to be customized to specific needs of departments or business units
210. The market place for computer hardware
Ans_ Has become increasingly concentrated in top firms

211. A recent addition to the mobile digital platform is


Ans_ Wearable computing devices

212. All of the following are cloud computing services except


Ans_ virtualization as a service

213. The multitasking, multi-user, operating system develop by Bell laboratories that operates on a
wide variety of computing platforms is
Ans_ Unix

214. Hardware and software acquisition costs account for about __ percent of TCO
Ans_ 20

215. The ability to be in many different states at once, dramatically increasing processing power, is
a hallmark of
Ans_ Quantum computing

216. Specifications that establish the compatibility of products and the ability to communicate in a
network are called
Ans_ Technology standards

217. ____states that the value or power of a network grows exponentially as a function of the
number of network members
Ans_ Metcalfe’s Law

218. A formal contract between customers and their service providers that outlines the specific
responsibilities of the service provider and to the customer is called a(n)
Ans_ SLA

219. SaaS refers to


Ans_ Hosting and managing access to software application delivered over the internet to clients on a
subscription basis
220. ___ are created by combining and customizing components from different online software
applications
Ans_ Mushups

221. A software tool with a graphical user interface for displaying Web pages for accessing the Web
and other Internet resources is called a Web
Ans_ Browser

222. The network standard for connecting desktop computers into local area networks that enabled
the widespread adoption of client/server computing and local area networks and further stimulated the
adoption of personal computers is
Ans_ Ethernet

223. What is the foundation technology for Web Services?

15
Ans_ XML

224. ___ takes place when s firm contracts custom software development or maintenance of existing
legacy programs to outside firms
Ans_ Outsourcing

225. Which type of computing refers to firms purchasing computing power from remote providers
and paying only for the computing power they use?
Ans_ On-demand

226. The practice of contracting custom software development to an outside firm is commonly
referred to as
Ans_ Outsourcing

227. Which type of software is created and updated by worldwide community of programmes and
available for free?
Ans_ Open source

228. Which model can be used to analyse the direct and indirect costs to help firms determine cost
of specific implementations
Ans_ Total cost of ownership

229. Which of the following is not one of the NIST defined characteristics of cloud computing?
Ans_ Reduced elasticity

230. A(n) ____ is an integrated circuit to which two or more processors have been attached for
enhanced performance and reduced power consumption
Ans_ Multicore processor
231. A set of self-contained services that communicate with each other to create a working software
application is called
Ans_ SOA

232. Which of the following factors does not help explain why computing resources today are ever
more available than in previous decades?
Ans_ widespread rejection of technology standards

233. ____ surfaces allow users to gesture on a screen with fingers to execute commands.
Ans_ Multitouch

234. At what percent of capacity do not most servers operate?


Ans_ 15-20%

235. Which of the following statements about Linux is not true?


Ans_ It has gamered 20 percent of the operating system market

236. Which type of infrastructure service provide voice and video connectivity to employees,
customers and suppliers?
Ans_ Telecommunication

237. Prewritten, commercially available sets of software programs that eliminate the need for a firm
to write its own software programs for certain functions, are referred to as
Ans_ Software packages

16
238. Legacy systems are still used because they
Ans_ Are too expensive to redesign

CHAPTER 6

239. Data mining is a tool for allowing users to


Ans_ Find hidden relationship in data

240. In a relation database, a record is referred to in technical terms as a(n)


Ans_ Tuple

241. The organization’s rules for sharing, disseminating, acquiring, standardizing, classifying, and
inventory information is called a(n)
Ans_ Information policy

242. A field identified in a table as holding the unique identifier of the table’s records is called the
Ans_ Primary key
243. The tool that enables users to view the same data in different ways using multiple dimensions
is
Ans_ OLAP

244. The logical view of a database


Ans_ Allows the creation of supplementary reports

245. Microsoft SQL Server is a(n)


Ans_ DBMS for midrange computers

246. A(n)____ is an example of non-digital data storage that is comparable to a database


Ans_ Library card catalog

247. A(n)____is a characteristic or quality that describes a database entity


Ans_ Attribute

248. The relationship between entities and attributes is best illustrated by


Ans_ The entity Customer with the attribute Purchase

249. The process of streamlining data to minimize redundancy and awkward many-to-many
relationships is called
Ans_ normalization

250. The special organizational function whose responsibility include physical database design and
maintenance is a called
Ans_ Database administration

251. When the same attribute in related data files has different values, this is called data
Ans_ inconsistency

17
252. You work for a retail clothing chain whose primary outlets are in shopping malls, and you are
conducting an analysis of your customers and their preferences. You wish to find out if there are any
particular activities that your customers engage in, or the types of purchase made in made the month
before or after purchasing select items from your store. To do this, you will want to use data mining
software that is capable of
Ans_ Identifying sequences

253. OLAP is tool for enabling


Ans_ Users to obtain online Answers to ad-hoc questions in a rapid amount of time

254. The project operation


Ans_ Creates a subset consisting of columns in a table

255. In terms of data relationships, associations refer to


Ans_ occurrences linked to a single event

256. A schematic of the entire database that describes the relationships in a database is called a(n)
Ans_ Entity-relationship diagram

257. Data___ occurs when the same data is duplicate in multiple files of a database
Ans_ Redundancy

258. The data dictionary serves as an important tool by


Ans_ creating an invthe data elements contained in the database

259. A(n)___ organizes data in two –dimensional tables


Ans_ relational DBMS

260. An automated or manual file that stores information about data elements and data
characteristics such as usage, physical representation, ownership, authorization and security is the
Ans_ Data dictionary

261. You are creating a database to store temperature and wind data from national airport locations.
Which of the following fields is the most likely candidate to use as the basis for a primary key in the
Airport table?
Ans_ Airport code

262. The specialized language programmers use to add and change data in the database is called
Ans_ A data manipulation language

263. Big data does not refer to


Ans_ Datasets with fewer than a billion records

264. All of the following are technologies used to analyse and manage big data except
Ans_ Cloud computing

265. Which of the following technologies would you use to analyse the social media data collected
by a major online retailer?
Ans_ Hadoop

266. ____ tools are used to analyse unstructured data sets, such as e-mail, memos, survey responses
etc., to discover patterns and relationships

18
Ans_ Text mining

267. In place of application server software to allow a web server to communicate with a back-end
database, you can use
Ans_ CGI

268. A field identified in a record as holding the unique identifier for that record is called the
Ans_ Key Field

269. The select operation


Ans_ Creates a subset consisting of all records of all records in the file that meet stated criteria

270. A one-to-many relationship between two entities is symbolized in a diagram by a line that ends
with
Ans_ A crow’s foot topped by a short mark

271. Which common database challenge is illustrated by a person receiving multiple copies of an
L.L. Bean catalog, each addressed to a slightly different variation of his or her full name?
Ans_ Data inconsistency

272. Which of the following features enables a DBMS to reduce data redundancy and
inconsistency?
Ans_ Minimizes isolated files with repeated data

273. The traditional file environment does not typically have a problem with
Ans_ Program-data independence

274. Which of the following is not a method for performing a data quality audit?
Ans_ Surveying data definition and query files

275. A DBMS makes the


Ans_ Physical database available for different logical views

276. Which of the following is not a DBMS for midrange computers?


Ans_ Microsoft Access

277. The most prominent data manipulation language today is


Ans_ SQL
278. In a table for customers, the information about a single customer would reside in single
Ans_ Row

CHAPTER 7

279. ____ monetizes the value of the data stored by search engines
Ans_ Search engine marketing

280. The most appropriate wireless networking standards for creating PAns is
Ans_ Bluetooth

281. The WiMax standard can transmit up to a distance of approximately


Ans_ 30 miles

19
282. ____ integrate disparate channels for voice communications, data communications, instant
messaging, e-mail, and electronic conferencing into a single experience
Ans_ United communications

283. A(n)____ is a commercial organization with permanent connection to the internet that sells
temporary connections to rental subscribers
Ans_ ISP

284. Which digital cellular standard is used widely throughout the world except the United States?
Ans_ GSM

285. T1 lines
Ans_ are high-speed, leased data lines providing guaranteed service levels

286. _____ combine the functionality of cell phone with the computing of a laptop
Ans_ Smartphones

287. Which of the following is not a characteristic of packet switching?


Ans_ Packet switching requires point-to-point circuits

288. Instant messaging is a type of ___ service.


Ans_ Chat

289. The child domain of the root is the


Ans_ Top-level domain

290. All of the following are physical components of an RFID system except
Ans_ Barcode
291. Which process is used to protect transmitted data in VPN?
Ans_ Tunnelling

292. A network that spans a city and sometimes its major suburbs as well is called a
Ans_ MAN

293. 4G networks use which standards?


Ans_ LTE and PAN

294. What services converts IP addresses into more recognizable alphanumeric name?
Ans_ DNS

295. Web browser software requests web pages from the internet using which protocol?
Ans_ HTTP

296. One or more access points positioned on a ceiling wall or the strategic spot in a public place to
provide maximum wireless coverage for a specific area are referred to as
Ans_ Hotspots

297. Which type of network treats all processors equally and allows peripheral devices to be shared
without going to a separate server?
Ans_ Peer-Peer

20
298. The backbone networks of the internet are typically owned by long-distance telephone
companies called
Ans_ Network service providers

299. The telephone system is an example of a ___ network


Ans_ Circuit-Switched

300. The method of slicing digital messages into parcels transmitting then along different
communication paths and reassembling them at their destination is called
Ans_ Packet Switching

301. The process of employing techniques to help a web site achieve a higher ranking with the
major search engines is called
Ans_ SEO

302. The most common web server today is


Ans_ Apache HTTP Server

303. IPv6is being developed in order to


Ans_ Create more IP addresses

304. The device that acts as a connection point between computers and can filter and forward data to
a specifies destination is called a(n)
Ans_ Switch

305. In TCP/IP, IP is responsible for


Ans_ A disassembling and re assembling of packets during transmission

306. The concept of a future Web in which it is commonplace for everyday objects to be connected,
controlled or monitored over internet is called
Ans. The Internet of things

307. In a telecommunication network architecture, a protocol is


Ans_ A standard set of rules and procedures for control of communications in network

308. What technology allows people to have content pulled from Web sites and fed automatically to
their computers?
Ans_ HTTP

309. Which signal types are represented by a continuous waveform?


Ans_ Analog

310. Which of the following is not one the top five search engines?
Ans_ Facebook

311. To use the analog telephone system for sending digital data, you must also use
Ans_ A modem

312. A network that covers entire geographical region is most commonly referred to as a(n)
Ans_ Wide area network

313. ‘Predictive search’ in Google’s search engine


Ans_ Predicts what you are looking for as you enter words into the query box

21
314. Which of the following is the first generation of cellular systems suitable for watching videos?
Ans_ 4G

315. The total amount of digital information that can be transmitted through any telecommunication
through any telecommunications medium is measured in
Ans_ bps

CHAPTER 8

316. ___ refers to all of the methods policies and organizational procedures that ensure the safety of
the organization’s assets, the accuracy and reliability of its accounting records, and operational
adherence to management standards
Ans_ Controls

317. Statements ranking information risks and identify security goals are included in a(n)
Ans_ Security policy

318. The Internet poses specific security problems because


Ans_ It was designed to be easily accessible

319. Using numerous computers to inundate and overwhelm the network from numerous launch
points is called a(n)___ attack.
Ans_ DDos

320. Biometric authentication


Ans_ Can use a person’s voice as unique, measurable trait

321. Rigorous password systems


Ans_ May hinder employee productivity

322. Client software in a client/server environment is specifically vulnerable to


Ans_ Unauthorized access

323. Analysis of an information system that rates the likelihood of a security incident occurring and
its cost is included in a(n)
Ans_ Risk assessment

324. A salesperson clicks repeatedly on the online ads of a competitor’s in order to drive the
competitor’s advertising costs up. This is an example of
Ans_ Click Fraud

325. Which of the following is type of ambient data?


Ans_ A file deleted from a hard disk

326. Which of the following specifications replaces WEP with a strong security standard that
features changing encryption keys?
Ans_ WPA2

327. Large amount of data stored in electronic form are___ than the same data in manual form.
Ans_ Vulnerable to many more kinds of threats

22
328. Which of the following is not an example of a computer used as a target of crime?
Ans_ Illegally accessing stored electronic communication

329. Which of the following statements about the internet security is not true?
Ans_ VoIP is more secure than the switched voice network

330. Pharming involves


Ans_ Redirecting users to a fraudulent website even when the user has typed in the correct address in
the Web browser

331. A digital certificate system


Ans_ Uses third-party CAs to validate a user’s identity

332. Which of the following is a virus that uses flaws in windows software to take over a computer
remotely?
Ans_ Conficker

333. Most antivirus software is effective against


Ans_ only those viruses already known when the software in written

334. Social networking site have become a new conduit for malware because
Ans_ They allow users to post software code

335. The Gramm-Leach-Bliley Act


Ans_ Requires financial institutions to ensure the security of customer data

336. The Sarbanes-Oxley Act


Ans_ imposes responsibility on companies and management to safeguard the accuracy of financial
information

337. Comprehensive security management products, with tools for firewalls, VPNs, intrusion
detection systems, and more, are called___ systems.
Ans_ UTM

338. Application controls


Ans_ Can be classified as input controls, processing controls, and output controls

339. Computer forensics tasks include all of the following except


Ans_ Collecting physical evidence on the computer

340. ___ use scanning software to look for known problems such as bad passwords, the removal
important files, security attacks in progress, and system administration errors
Ans_ Intrusion detection systems

341. A firewall allows the organization to


Ans_ Enforce a security policy on data exchange its network and internet

342. In which method of encryption is a single encryption key sent to the both sender and receiver
share the same key?
Ans_ Symmetric key encryption

343. The most common type of electronic evidence is


Ans_ E-mail

23
344. The international defacement or destruction of a Web site called
Ans_ Cyber vandalism

345. You have been hired as a security consultant for law firm. Which of the following constitutes
the greatest source for network security breaches to the firm?
Ans_ Employees

346. ____ identify the access points in a Wi-Fi network


Ans_ SSIDs

347. ____ is malware that hijacks a user’s computer and demands payment in return for giving back
access.
Ans_ Ransomware

348. Evil twins are


Ans_ Bogus wireless network access points that look legitimate to users

349. The communication lines in client/server environment are specifically vulnerable to


Ans_ Tapping

350. All of the following are types of information systems general control except
Ans_ Application controls

CHAPTER 9

351. Which of the following is not true about enterprise systems?


Ans_ Enterprise software is expressly built to allow companies to mimic their business practices

352. Supply chain complexity and scale increases when firms


Ans_ Develop products and services that coordinate with many firms and suppliers

353. From your reading of the chapter’s opening case, ACH food Companies implemented in order
to achieve which of the following business objectives?
Ans_ Operation excellence

354. Enterprise software is built around thousands of predefined business processes that reflect
Ans_ Best practices

355. A scheduling system for minimizing inventory by having components arrive exactly at the
moment they are needed and finished goods shipped as soon as they leave the assembly line best
describes a ____ strategy
Ans_ Just-in-time

356. A company’s organizations and processes for distributing and delivering products to the final
customers is the
Ans_ Downstream portion of the supply chain

357. Supply chain ___ systems manage the flow of products through distribution centres and
warehouses to ensure that products are delivered to the right locations in the most efficient manner
Ans_ execution

24
358. A network of organization and business processes for procuring raw materials, transforming
these materials into intermediate and finished products, and distributing the finished products to
customer is called a
Ans_ Supply chain

359. Which of the following is not an example of next-generation enterprise applications?


Ans_ solutions incorporating SCM

360. Which of the following is an important capability for sales processes that is found in most
major CRM software products?
Ans_ Lead management

361. Concurrent supply chains are made possible by which technology?


Ans_ The internet

362. A ____ is a method of interaction with a customer, such as telephone or customer service desk
Ans_ Touch point

363. Components or parts of finished products are referred to as


Ans_ Intermediate products
364. Which of the following statements about enterprise application is not true?
Ans_ Enterprise applications are best implemented when few changes in business processes are
required.

365. Customer relationship management applications dealing with the analysis of customer data to
provide information for improving business performance best describes ___ applications
Ans_ Analytical CRM

366. The bullwhip effect is countered by


Ans_ Reducing information uncertainty

367. Customer service modules in CRM system provide tools for


Ans_ assigning and managing customer service requests

368. _____modules deal with issues such as setting objectives, employee performance management,
and performance-based compensation.
Ans_ ERM

369. You have been asked to implement enterprise software for manufacturer of kitchen appliances.
What is the first step you should take?
Ans_ Select the functions of the system you wish to use

370. A build-to-order supply-chain model is also called a ___ model


Ans_ Demand-driven

371. A distortion of information about the demand for a product as it passes from one entity to next
across the supply chain is called the __ effect
Ans_ Bullwhip

372. Which of the following traditional solutions manufacturers to deal with uncertainties in the
supply chain?
Ans_ Safety stock

25
373. When tailoring a particular aspect of a system to the way a company does business, enterprise
software can provide the company with
Ans_ Configuration tables

374. Which of the following would not be considered a contact point?


Ans_ Intranet

375. In order to achieve maximum benefit an enterprise software package, a business


Ans_ Changes the way it works to match the software’s business processes
376. The total time it takes to complete a business process, from start to finish is called its___ time
Ans_ Cycle

377. The business value of an effective supply chain management system includes all the following
except
Ans_ improved deliver service

378. Enterprise application vendors have created ___ to make their own customer relationship
management supply chain management, and enterprise systems work together with each other
Ans_ e-business suits

379. A company having difficulty with timely delivery of parts to is manufacturing plants should
implement a supply chain __ system
Ans_ Execution

380. A suite of integrated software modules for finance and accounting human resources
manufacturing and processes best describes
Ans_ ERP systems

381. Analysing customer buying patterns is an example of


Ans_ Analytical CRM

382. Enterprise application vendors are now including ____ features such as tools for data
visualization flexible reporting and ad hoc analysis as part of the application.
Ans_ Business Intelligence

CHAPTER 10

383. ___ uses the community provider internet business model


Ans_ Twitter

384. Which of the following best illustrates the affiliate revenue model?
Ans_ Epinions receives a fees after steering a customer to a participating Web site where he or she
makes a purchase

385. The effort required to locate a suitable product is called


Ans_ Search tool

386. Varying a product’s price according to the supply situation of the seller is called ___pricing
Ans_ Dynamic

26
387. The lowered cost of information storage and processing and communications along with the
improvement of data quality has resulted in which unique quality of E-commence?
Ans_ Information density
388. What is the primary benefit to consumers of disintermediation?
Ans_ Lower Costs

389. The interest enables __ market by leveraging the fact that there is always some demand
however small for a product
Ans_ Long-Tail

390. A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is
called a(n)
Ans_ Exchange

391. ____ describes the concept that a large group of people is better making good decisions than a
single person
Ans_ The wisdom of crowds

392. EDI is
Ans_ The exchange between two organizations of standard transactions through a network
393. All of the following are activities related to establishing a Web presence except for
Ans_ Newsletters

394. Which of the following internet business models does Amazon.com use?
Ans_ e-tailer

395. Net marketplaces


Ans_ Are industry owned or operate as independent intermediaries between buyers and sellers

396. Exposing an individual to ads that are chosen and based on the recorded and analysed online
behaviour of the individual is referred to as
Ans_ Behavioural targeting

397. A secure Web site that links a large firm to is suppliers and other key business partners is
called a(n)
Ans_ A private industrial network

398. In which of the following internet business models does a merchant create an online digital
environment that enables people with like interests to share information?
Ans_ Community provider

399. A new mobile app you are developing allows users to find friends who are logged in and
within a 10-mile radius. This would be categorized as a___ service
Ans_ Geoinformation

400. Digital goods are goods that are


Ans_ Delivered digitally

401. Which of the following social commence features allows social networks sites to gather and
distribute to others information about which products a user likes and dislikes
Ans_ Network notification

27
402. Which of the following marketing formats is scale oriented, rather than branding oriented or a
mix?
Ans_ Search engine

403. Selling the same goods to different targeted groups at different prices is called
Ans_ Price discrimination

404. A marketplace extended beyond traditional boundaries and removed from a temporal and
geographic location is called a(n)
Ans_ Marketspace

405. Compared to digital markets, traditional markets have


Ans_ Higher transaction costs

406. Geoadvertising sends ads to users based on their


Ans_ GPS locations

407. The act engaging consumers in a dialog that dynamically adjusts the experience to the
individual describe which dimension of e-commerce technology?
Ans_ Interactivity

408. Content providers use___ systems to process large amounts of very small monetary
trAnsactions cost-effectively
Ans_ micropayment

409. Market creators


Ans_ Provide a digital environment where buyers and sellers can establish prices for products
410. The integration of video audio and text marketing messages into single marketing messaging
and consumer experience which dimension of e-commerce technology?
Ans_ Richness

411. ___ refers to business selling goods and services electronically to individuals
Ans_ B2C e-commerce

412. Information__ exists when one party in transaction has more information that is important for
the transaction than the other party
Ans_ Asymmetry

CHAPTER 11

413. ____ knowledge exists informal documents as well as in formal rules that organization derive
by observing experts and their decision making behaviours
Ans_ Semi- structured

414. Which of the following would not be classified as a knowledge work system?
Ans_ expert system

415. _____ is the study of how computer programs can improve their performance without explicit
programming
Ans_ machine learning

28
416. Which of the following would not be considered semi structured knowledge?
Ans_ Request for proposals

417. Technology that consists of computer-based systems that attempt to emulate human behaviour
is called
Ans_ Al technology

418. In this technique descriptions of pasts experiences of human specialists are stored in a database
for later retrieval when the user encounters a situation with similar characteristics
Ans_ CBR

419. Which of the following is type of intelligent technique?


Ans_ Case –based reasoning

420. A(n)____ is a scheme for classifying information and knowledge in such a way it can be easily
accessed
Ans_ Taxonomy

421. A(n)___ is a type of intelligent technique that finds patterns and relationships in massive data
sets too large for human to analyse
Ans_ Neutral network

422. You are advising a multimedia company on the type of knowledge management system to help
them achieve digital video and sound clips. Which of the following will suit their needs?
Ans_ Digital asset management system

423. Which of the following does not describe the dimension of knowledge in a frim?
Ans_ It is subject to the laws of diminishing returns

424. Virtually all expert systems deal with problems of


Ans_ Logic and control

425. You are an automotive engineer working on an application that will automatically parallel park
a car. The intelligent technique you may find most useful is
Ans_ Fuzzy logic

426. Fuzzy logic is a type of


Ans_ Intelligent technique

427. Which of the following is not used to capture tacit knowledge?


Ans_ Neutral network

428. Changing organizational behaviour by sensing and responding to new experience and
knowledge is called
Ans_ Organizational learning

429. What is meant by the statement ‘knowledge is sticky’


Ans_ Knowledge is hard to move

430. Backward chaining is


Ans_ a strategy for searching the rule base in an expert system that begins with a hypothesis

431. Most knowledge workers require specialized knowledge work systems but they also rely on

29
Ans_ Office systems

432. Tolls for the management delivery tracking and assessment of various types of employee
learning best describes a(n)
Ans_ learning management system

433. Software programs that work without direct human intervention to carry out specific tasks for
individual users, business processes, or software application are called
Ans_ Intelligent Agents

434. The model of human knowledge used by expert systems is referred to as


Ans_ The knowledge base

435. Forward chaining is


Ans_ a strategy for searching the rule base in an expert system that begins with information entered by
the user

436. Aplle’s Siri application is an example of


Ans_ Intelligent agents

437. Which of the following are the three major types of knowledge management systems?
Ans_ Enterprise-wide knowledge management systems knowledge work systems and intelligent
techniques

438. Hardware and software that attempt to emulate the processing pattern of the biological brain is
best describe
Ans_ A neural network

439. A MOOC is
Ans _ type of online course

440. Which of the following describes a difference between neural networks and genetics
algorithms?
Ans_ Neural networks are programmed to learn

CHAPTER 12

441. The concept of management ___ describes situations in which managers act on preconceived
notions that reject information that does not conform to their prior conceptions
Ans_ Filters

442. The decisions involved in creating and producing a corporate intranet can be classified as ___
decisions
Ans_ Semi structured

443. Decisions regarding managing and monitoring day-to-day business activities are referred to as
___ intelligence
Ans_ Operational

30
444. An information system which combines data from internal TPS with information from
financial systems and external sources to deliver reports such as profit-loss statements and impact
analysis is an example of
Ans_ ESS

445. The dimension of ____ in formation quality describes whether data is available when needed
Ans_ Timeliness

446. Checking store inventory is an example of a(n)___ decision


Ans_ structured

447. GDSS
Ans_ Implement structured methods for organizing and evaluating ideas

448. Behavioural models of management sees managers as being___ than does classical model
Ans_ More informal

449. The leading methodology for understanding the really important information needed by a
firm’s executives is called the __ method
Ans_ Balanced scorecard

450. Which of the following is not an example of a BI predefined production report?


Ans_ revenue forecasts

451. If you can follow a definite procedure to make a business decision, you are making a(n)____
decision
Ans_ Structured

452. Mintzberg outlined three categories of managerial role


Ans_ Interpersonal, informational and decisional

453. Which of the following describes how the Simon framework of decision-making in high-
velocity decision environments?
Ans_ All four steps of the process are handled by software algorithms; humans are eliminated from
the decision because they are too slow

454. The role of entrepreneur falls into which of Mintzberg’s managerial classifications?
Ans_ Decisional

455. An essential component in the ability of GDSS to contribute to a collaborative environment is


Ans_ the guarantee of user anonymity

456. Which of the following statements best describes the business value of improved decision
making?
Ans_ Improved decision making results in a large monetary value for the firm as numerous small daily
decision affecting efficiency. Production costs and more add up to large annual values
457. Which of the following is not one of the six main elements in the business intelligence
environment discussed in this chapter?
Ans_ Organizational environment

458. Which of the following are most likely to rely primarily on production reports for their
decision-making needs?
Ans_ Operational supervisors

31
459. As discussed in the chapter text, three main reasons that investments in information technology
do not always produce positive results are
Ans_ Information quality, organizational culture and Management filters
460. Which quality dimension of information is concerned that the data values of an information
source fall within a define range?
Ans_ Validity

461. Predictive analysis is used for all of the following except


Ans_ Determining the best routes for product delivery

462. GDSS
Ans_ Enables increasing a meeting size without reducing productivity

463. A(n)_____ is a BI feature that presents users with an easy-to-understand visual display of
performance information
Ans_ Dashboard

464. Which of the following is not one of the five classical functions of managers?
Ans_ Leading

465. The ___ phase of decision making finds or recognizes a problem, need or opportunity
Ans_ Intelligence

466. The management methodology of using a firm’s strategy to generate operations targets for the
business and measuring progress toward then using the firms enterprise is called
Ans_ BPM

CHAPTER 13

467. Which conversion process introduces the system first to a limited portion of the organisations?
Ans_ The pilot study strategy

468. Groups of objects are assembled into software components for common function’s, which can
be combined into large-scale business applications in which type of software?
Ans_ component-based development

469. In the direct cutover conversion strategy, the new system


Ans_ Replaces the old one at an appointed time

470. Systems design


Ans_ Show how the new system will fulfil the information requirements

471. Object-oriented development could potentially reduce the time and cost of writing software
because
Ans_ Objects are reusable

472. What is ‘responsive design’ for mobile applications?


Ans_ A design that responds to the user’s digital device and screen

473. The idea that the achievement of quality control is an end in itself describes a main concept of

32
Ans_ TQM

474. An entire information system is broken down into its subsystems by using
Ans_ High-level data flow diagrams

475. To understand and define the contents of data flows and data store, system builders use
Ans_ A data dictionary

476. Which of the following is not a tool provided by Business process management software?
Ans_ Capture and identify information system requirements for a new system

477. System testing


Ans_ Tests the functioning of the system as a whole in order to determine if discrete modules will
function together as planned

478. The oldest method for building information system is


Ans_ The systems development lifecycle

479. In object-oriented development


Ans_ Processing logics resides within objects

480. A native mobile app is


Ans_ A standalone application that doesn’t use a browser

481. Which process develops a detailed description of the functions that a new information must
perform?
Ans_ A requirement analysis

482. In what stage of systems development are design specifications created?


Ans_ Systems design

483. What is the purpose of responsive web design?


Ans_ it allows one Web site to serve different platforms, such as tablets PCs and mobile phones

484. A system building approach in which the system is developed as successive versions each
version reflecting requirements more accurately is described to be
Ans_ Iterative

485. When systems are created rapidly, without a formal development methodology
Ans_ Testing and documentation may be inadequate

486. Organizational software packages often include ___ features that allows the software to be
modified to meet organizational requirements
Ans_ Customization

487. ____ provides a detailed statement of the information needs that a new system must satisfy:
identifies who needs what information and when, where and how the information is needed
Ans_ Information requirements

488. What is the greatest barrier to successful business process change?


Ans_ Organizational change

33
489. In which type of systems building are the development stages organized so that tasks in one
stage are completed before the task in the next stage begin?
Ans_ Traditional

490. A bank has reworked its mortgage application process so that several steps are handled by
computer software and some steps are combined to reduce bottlenecks in processing. The goal is to
gradually improve its efficiency over time. This is an example of
Ans_ Rationalization of procedures

CHAPTER 14

491. As discussed in the chapter, which of the following is not one of the immediate consequences
of inadequate software project management?
Ans_ Customer loyalty

492. At the top of the management structure for information systems projects in a large company is
Ans_ The corporate strategic planning group

493. The principal capital budgeting models for evaluating information technology projects are the
payback method, the accounting rate of return on investment (ROI) the net present value and the
Ans_ Internal rate of return

494. Which method would you use to develop risk profiles for a firm’s information projects and
assets?
Ans_ Portfolio analysis

495. In using a portfolio analysis to determine which IT projects to pursue, you would
Ans_ Balanced high-risk, high reward projects with lower-risk projects

496. Which type of tool helps projects managers identify bottlenecks in project development?
Ans_ Formal planning and control tools

497. Which of the following is a limitation of using a financial approach to evaluate information
systems?
Ans_ Inability to assess costs form from organizational disruption

498. Which of the following statistics from studies on failed projects is not true?
Ans_ the average cost overrun of IT projects is 20 percent

499. The most widely used projects management software today is


Ans_ Microsoft project

500. The project ricks will rise if the project team and the IS staff lack
Ans_ The required technical expertise

501. Which of the following is not a responsibility of effective change management?


Ans_ Integrating legacy systems

502. In sociotechnical design


Ans_ Separate sets of technical and social design solutions are developed and compared

34
503. You are using a capital budgeting method to assess the worth of your company’s new
information system. Which of the following costa would you include in measuring the cash outflow?
Ans_ Both B and C >>>b] hardware and software expenditures c] labour expenditures

504. Which of the following is not an organizational factor in systems planning and
implementation?
Ans_ User interface

505. Which of the following is not one the five main variables affecting project success?
Ans_ Vendors

506. On average, private sector IT projects underestimated budget and delivery time of systems by
__ percent
Ans_ 50

507. Inter integration tools


Ans_ enable a project to have sufficient technical support for project management and development

508. Which of the following project management variables indicates how well the project satisfies
management objectives?
Ans_ Quality
509. The ___ is directly responsible for the individual systems project
Ans_ Project team

510. Which of the following tools is not one you would use to control risk factors in an information
systems project?
Ans_ real options pricing models

511. All of the following are intangible benefits of information systems except
Ans_ Reduced workforce

512. According to your reading of the chapter, change management is a process that
Ans_ Should be addressed before a project is developed

513. The criteria used for evaluation in a scoring model are usually determined by
Ans_ Lengthy discussions among the decision- making group

CHAPTER 15

514. Effective networked systems must have a


Ans_ A, B AND C

515. In terms of global business strategy and structure, a multinational company will use a policy of
Ans_ Dispersed production and marketing, with centralized accounting and strategic management

516. In terms of business strategy and structure, a multinational strategy


Ans_ Concentrates financial management and control out of a central home base while decentralizing
production sales and marketing operations to units in other countries

35
517. Which of the following is not one of the principal management challenges in developing global
systems?
Ans_ Defining an acceptable test plan

518. VPNs
Ans_ Are expensive to develop and maintain

519. Which of the following is not of the main benefits to implementing global systems?
Ans_ Reduced hardware costs

520. Which systems are worth sharing on a transactional basis, from a cost and feasibility point of
view?
Ans_ Only systems that support functions that are absolutely critical to the organization

521. In networked systems


Ans_ Systems development and operations occur in an integrated and coordinated fashion across all
units

522. In a multinational business strategy, the ____ business function is decentralized, dispersed to
foreign units
Ans_ Production
523. Multinational companies tend to dominantly have ___ systems
Ans_ decentralized

524. German companies


Ans_ Do not recognize the profit until the project is completely finish and they have been paid

525. What is the thing you should considered when thinking about building an international
information system?
Ans_ Consider the global environment where your business will operate and identify the business
drivers for your firm and industry

526. The way to identify process is to conduct a


Ans_ Business process analysis

527. International information systems refer to


Ans_ the basic information systems required by organizations to coordinate worldwide trade and other
activities

528. Based on your reading of the chapter, why should companies avoid creating an all-
encompassing new global system when moving toward global operations?
Ans_ opposition is strengthened because of requirements for huge resources

529. In order to define centers of excellence in global firm, you would first need to identify
Ans_ Core business processes

530. Most large companies with overseas operation have inherited


Ans_ Batch-oriented reporting based at the home office for overseas business

531. Which of the following is not one of the primary types of firm strategy discussed in the
chapter?
Ans_ International exporter

36
532. A company that controls finances in the home country and decentralizes production, sales and
marketing operation to other countries is using a __ strategy.

533. Transborder data flow refers to


Ans_ The movement of information across international boundaries

534. Which of the following is not a business driver of global business?


Ans_ Growth of international systems

CHAPTER 3

535. Under Mintzberg’s classification of organizational structure, the knowledge-based organization


where goods and services depend on the expertise and knowledge of professionals falls under the
category of
Ans_ Professional bureaucracies

536. Which of the following is not major feature of organizations that impacts the use of
information systems?
Ans_ Agency costs

537. Walmart’s attempts to increase its online presence is an example of a firm information systems
to
Ans_ Achieve low-cost leadership

538. All of the following are considered disruptive technologies except


Ans_ instant messaging

539. You are consulting for a cosmetics distributor who is interested in determining the benefits it
could achieve from implementing new information systems. What will you advise as the first step?
Ans_ Perform a strategic system analysis

540. Mintzberg classifies a large bureaucracy existing in a slow changing environment that products
standard product and is dominated by centralized management as a___ bureaucracy.
Ans_ ad hoc

541. Firms use a ___ strategy to provide a specialized product or service for a narrow target market
better than competitors
Ans_ Product differentiation

542. An example of a keystone firm within business ecosystem is


Ans_ Apple and software application writers in the mobile platform ecosystem

543. The four major competitive strategies are


Ans_ low-cost leadership, product differentiation, focus on market niche, and customer and supplier
intimacy

544. The ___ model highlights the primary or support activities that add a margin of value to a
firm’s products or services where information systems can best be applied to achieve a competitive
advantage
Ans_ Value chain

37
545. A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force
Ans_ New market entrants

CHAPTER 4

546. Key difference between software and books include all of the following except
Ans_ Software products are more easily compared to each other than books

547. The moral dimension of ____ can be described as the obligation that individual and
organizations have concerning rights to intellectual property

548. CVS refers to


Ans_ Eyestrain to related to computer displayed screen use

549. Unlike regular browser cookies, flash cookies


Ans_ Cannot be easily detected or deleted

550. The Oneline Privacy Alliance


Ans_ Encourages self-regulation to develop a set of privacy guidelines for its members

551. Which legal mechanism grants the owner excusive ownership of idea behind an invention for
20 years?
Ans_ Patent

552. ___ is the use of computer to assemble data from different sources to create electronic dossiers
of detailed information about individuals
Ans_ Profiling

553. Which of the following is a primary drawback to the ‘do anything anywhere’ computing
environment?
Ans_ It blurs the traditional boundaries between work and family time

CHAPTER 5

554. Which of the following is a leading networking hardware provider?


Ans_ Cisco

555. Which of the following refers to the ability of a computer, product or system to expand to serve
a larger number of user without breaking down?
Ans_ Scalability

556. The __ PC, becoming the standard PC in the Personal Computer Era. Uses the windows
operating system software on computer with an intel microprocessor
Ans_ Wintel

557. In a multi-tiered network


Ans_ The work of the entire network is balance over several level of servers

558. As referred to in the text, legacy system are

38
Ans_ Traditional mainframe-based business information systems

559. Which of the following is the most popular mobile operating system?
Ans_ Android

560. How would you determine the market demand for your firm’s IT services?
Ans_ Hold focus groups assess your services

561. All of the following are current hardware platform trends except
Ans_ Unix

562. Which of the following is not an example of the emerging mobile platform?
Ans_ CRM

563. A client computer networked to sever computer, with processing split between the two types of
machines is called a(n)
Ans_ Two-tiered client/server architecture

564. ____ unleash powerful economies of scale and result in price declines in manufactured
computer products.
Ans_ Technology standards

565. Place the following eras of IT infrastructure evolution in order, from earliest to most recent. 1.
Cloud computing Era 2. Client/Server; 3. Enterprise Era 4. Personal Computer and 5. Mainframe and
Minicomputer
Ans_ 5,4,2,3,1

566. The phenomenon of employees using their own devise in the workplace is known as
Ans_ BYOD

567. Software that manages the resources of the computer is called


Ans_ Operating System Software

568. A SAN is a___ network


Ans_ Storage area

569. ____ allows a single computing resource, such as server, to appear to the user as multiple
logical resources
Ans_ Virtualization
570. Linux is
Ans_ An example of open source software

571. You work for a national car rental agency and want to determine what characteristics are
shared among your most loyal customers. To do this, you will want to use data mining software that is
capable of
Ans_ Classification

CHAPTER 6

572. Detecting and correcting data in a database of file that are incorrect incomplete, improperly
formatted or redundant is called

39
Ans_ Data normalization

573. A data warehouse is composed of


Ans_ Historic and current internal data

574. The join operation


Ans_ Combines relational table to provide the user with more information than is otherwise available

575. A household appliances manufacturing has hired you to help analyse their social media dataset
to determine which of their refrigerators are seen as the most reliable. Which of the following tools
would you use to analyse this data?
Ans_ Sentiment analysis software

576. DBMSs typically include report-generating tools in order to


Ans_ Display data in an easier-to-read format

577. In a relational database, the three basic operations used to develop useful sets of data are
Ans_ Select, project and join

578. Which of the following is not one of the techniques used in Web mining?
Ans_ Server mining

579. Data cleAnsing not only corrects errors but also


Ans_ Enforces consistency among different sets of data

580. ___ creates confusion that hampers the creation of information systems that integrate data from
different sources
Ans_ Data redundancy

CHAPTER 7

581. Bandwidth is the


Ans_ Difference between the highest and lowest frequencies that can be accommodated on a single
channel

582. The Internet is based on which three key technologies?


Ans_ Client/Server computing, Packet switching and the development of communications standards
for linking networks and computer

583. Which organization helps define the overall structure of the internet?
Ans_ IAB

584. Which type of network is used to connect digital devices within a half-mile or 500-meters
radius?
Ans_ LAN

585. A(n)___ is a device that forwards packets of data through different networks ensuring that the
data gets the right address.
Ans_ Router

586. A(n)___ is software for locating and managing stored Web pages

40
Ans_ Web server

587. The 802.11 set of standards is known as


Ans_ Wi-Fi

588. Which of the following statements is not true about search engines?
Ans_ There are hundreds of search engines vying for user attention, with no clear leader having yet
emerged.

589. A(n)____ signal is a discrete, binary waveform that transmits data coded into two discrete
states such as 1-bits and 0-bits.
Ans_ Digital

590. Which of the following statements about RFID is not true?


Ans_ RFIDs require line-of-sight contact to be read

591. Bluetooth can be used to link up to____ devices within a 10-meter area using low-power,
radio-based communication
Ans_ Eight

592. Digital subscriber lines


Ans_ Operate over existing telephone lines to carry voice, data and video

593. What are four layers of the TCP/IP reference model?


Ans_ application, transport, internet and network interface

594. Web sites that enable users to share information, collaborate and create new services and
content are called ___ sites
Ans_ Second generation

595. In the domain name ‘http://books.azimuth-interactive.com’, which element is the second-level


domain?
Ans_ azimuth-interactive

596. Together, a protocol prefix, a domain name, a directory path and a document name are called
a(n)
Ans_ uniform resource locator

597. Based on your reading of the examples in the chapter, what would be the best use of RFID for
a business?
Ans_ Managing the supply chain

CHAPTER 8

598. A Trojan horse


Ans_ is software that appears to be benign but does something other than expected

599. A foreign country attempting to access government network I order to disable a national power
grid would be an example of
Ans_ cyberwarfare

41
600. Currently, the protocols used for secure information transfer over the internet are
Ans_ SSL, TLS, and S-HTTP

601. How do software vendors correct flaws in their software after it has been distributed
Ans_ They issue patches

602. In controlling network traffic to minimize slow-downs a technology called ___ is used to
examine data files and sort low-priority data from high-priority data
Ans_ Deep-packet inspection

603. An authentication system in which a user must provide two types of identification such as a
bank card and pin is called
Ans_ Two-factor authentication

604. Your company, an online discount stationers, has calculated that a loss of internet connectivity
for 3 hours results in a potential loss of $2000 to $3000 and that there is a 50% chance of this
occurring each year. What is the annual expect loss from this exposure?
Ans_ $1,250

605. ____ is a crime in which an imposter obtains key pieces of personal information to impersonate
someone else
Ans_ Identity theft

606. The HIPAA Act of 1996


Ans_ outlines medical security and privacy rules

607. Hackers create a botnet by


Ans_ Causing others people’s computers to become ‘zombie’ PC following a master computer

608. A practice in which eavesdroppers drive by building or park outside and try to intercept
wireless network traffic is referred to as
Ans_ War driving

609. For 100-percent availability, online transaction processing requires


Ans_ Fault-tolerant computer systems

610. ____ controls ensure that valuable business data files on either disk or tape are not subject to
unauthorized access, change or destruction while they are in use or in storage
Ans_ Dta security

611. In a client/server environment corporate servers are specifically vulnerable to


Ans_ malware

612. An authentication token is a(n)


Ans_ Gadget that display passcodes

613. Which of the following is not an example of a computer used as an instrument crime?
Ans_ Breaching the confidentiality of protected computerized data

CHAPTER 9

42
614. Supply chain software can be classified as either supply chain __ systems or supply chain __
systems
Ans_ Planning; execution

615. Which metric is based on the relationship between the revenue produced by specific customer
that expenses incurred in acquiring and servicing that customer and the expected life of the
relationship between the customer and the company?
Ans_ Customer lifetime value

616. Systems that enable a firm to generate demand forecasts for a product and to develop sourcing
and manufacturing plans that product best describes supply chain___ systems
Ans_ Planning

617. Which of the following is not one of the four type of customers described in the case study on
Graybar?
Ans_ Service-drain customers

618. If manufacturers had perfect information they could implement a


Ans_ Just-in-time strategy

619. ____ CRM includes customer-facing applications such as tools for sales force automation call
centre and customer service support and marketing automation
Ans_ Operational

620. SFA modules in CRM systems would provide tools for


Ans_ Managing sales prospects and contact information

621. Which supply chain planning function determines how much product is needed to satisfy all
customer demands?
Ans_ Demand planning

622. ____ modules in CRM systems help sales staff increase their productivity by focusing sales
efforts on the most profitable customers those who are good candidates for sales and services
Ans_ SFA

623. ___ modules use many of the same data, tools and systems as CRM to enhance collaboration
between a company and its selling partners
Ans_ PRM

624. A supply chain driven by actual customer orders or purchase follows a ___ model
Ans_ Pull-based

625. Capabilities of supply chain execution systems would not include


Ans_ identifying the optimal trans
626. Why is overstocking warehouses not an effective solution for a problem of low availability?
Ans_ It increases inventory costs

627. All of the following service capabilities would be found in major CRM products except
Ans_ Order management

628. CRM systems helps business obtain which business objective?


Ans_ Customer and supplier intimacy

43
CHAPTER 10
629. Transaction brokers
Ans_ save users money and time by processing online sales transactions
630. ___ is a peer-to-peer market in which participants bet on the outcomes of current events,
business or socials trends
Ans_ A prediction market

631. eBay is an example of


Ans_ C2C e-commerce

632. based on your reading of the chapter, e-commerce is


Ans_ Still in a revolutionary phase

633. Recent developments in e-commerce include all of the following except


Ans_ Internet-based models of computing, such as smartphones apps

634. Which of the following is a milestone for the web Site development phase of building an e-
commence presence?
Ans_ Web site plan

635. What standards are referred to when discussing universal standards as a unique feature of e-
commerce?
Ans_ Common spoken and written language

636. Compared to traditional goods digital goods have


Ans_ Greater pricing flexibility

637. What is the difference between personalization and customization as applied to e-commerce
technologies?
Ans_ Personalization refers to adjusting marketing messages for a consumer customization refers to
adjusting a product or service based on user’s preferences

638. What events marked the beginning of e-commence?


Ans_ The first paid advertisements placed on a Web site

639. The process of sourcing goods and materials negotiating with suppliers paying for goods and
making delivering arrangements is called
Ans_ Procurement

640. All of the following are unique features of e-commerce technology except
Ans_ Universality

641. In the ___ revenue models, a firm offers some services for free but charges a subscription fee
for premium services
Ans_ Free/freemium

642. In planning a robust e-commerce presence, you will want to consider the blog platform as part
of your __ presence
Ans_ Social media
44
CHAPTER 11

643. Genetic algorithms


Ans_ develop solutions to particular problems using fitness, crossover, and mutation

644. What is the first value-adding step in the knowledge business value chain?
Ans_ Data and information acquisition

645. About ___ percent of the United States GDP is produced by the knowledge and information
sectors
Ans_ 45

646. Which type of intelligent agent models the behaviour of consumers, stock markets and more by
seeing them as autonomous agents that follow relatively simple rules for interaction?
Ans_ Agent-based modelling

647. Which of the following is not a typical componenet or capability of an enterprise content
management system?
Ans_ KWS

648. What types of intelligent technique help Procter & Gamble determine the most efficient
methods for their trucks to deliver goods?
Ans_ Intelligent agents

649. In content management once a taxonomy is developed documents must then be ___ with the
proper classification
Ans_ Tagged

650. Which of the following statements about 3d printing is not true?


Ans_ It is only usable to make prototypes

651. Informal social networks of professionals and employees within and outside the firm who have
similar work-related activities and interests are called communities of
Ans_ Practice

652. Expertise of organizational members that has not been formally documented best describes
Ans_ Tacit knowledge

653. The last step in the knowledge management value chain is


Ans_ Apply

654. Specialized systems built for engineers, scientist and knowledge workers charged with
discovering and creating new knowledge for a company are called
Ans_ KWS

655. Which of the following statements is not an accurate descriptions of the importance of
knowledge to a firm?
Ans_ Knowledge is unconditional

45
CHAPTER 12

656. Which of the following is not one of the Simon’s four stages of decision making?
Ans_ Analysis

657. A drawback to high-velocity automated decision-making systems is they are unable to


Ans_ Control themselves and respond to new environments

658. Which of the following types of systems would be used to present senior marketing executives
with in-depth information customer retention, satisfaction and quality performance?
Ans_ ESS

659. ____ are visual tools for presenting performance a data in a BI system
Ans_ Dashboards and scorecards

660. The role of liaison falls into which of Mintzberg’s managerial classifications?
Ans_ Interpersonal

661. ESS
Ans_ Have the ability to drilldown into lower levels of detail

662. Which type of decision is calculating gross pay for hourly workers?
Ans_ Structured

663. Which of the following systems support a manager’s role as leader of an organization?
Ans_ Telepresence systems

664. Which type of information systems uses data visualization technology to analyse and display
data for planning and decision making in the form of digitized maps?
Ans_ GIS

665. Which of the following is not one of the five observed ways in which managerial behaviour
differs from the classical description of managers?
Ans_ Mangers prefers regular, written reports on firm activities

666. When there is no well-understood or agreed-on procedure for making a decision, it is said to be
Ans_ Unstructured

667. A pivot table is a(n)


Ans_ Spreadsheet tool that displays two or more dimensions of data in convenient format

CHAPTER 13

668. In order, what are the first steps in BPM?


Ans_ 1. identifying processes for change, 2. Analysing existing processes, 3. Designing the new
process

46
669. As a technical project manager you have decided to propose implementing a prototyping
methodology for a small Web-based design project. What is the order of steps you will follow in this
project?
Ans_ Identify user requirements develop the prototype, use the prototype, revise and enhance the
prototype

670. Changes in the hardware, software documentation or production to a production system to


correct errors meet new requirements, or improve processing efficiencies are termed
Ans_ Maintenance

671. During the ____ stage of system development system specification that were prepared during
the design stage are trAnslated into software coded
Ans_ Programming
672. Compared to use of proprietary components, Web services promise to be less expensive and
less difficult to implement because of
Ans_ their ability to enable communication among different systems using universal standards

673. An upscale organic foods grocery chain is implementing an information system that will enable
it add same-day home delivery of groceries to its customers. This is an example of
Ans_ Paradigm shift

674. The process of creating workable information systems in very short period of time is called
Ans_ RAD

675. Categories of tools for BPM include all of the following except
Ans_ Tools to test the security of business processes

676. Which type of systems development is characterized by significantly up the design and the
generation of information requirements and involving users at an intense level?
Ans_ JAD

677. ____ Is the process of changing from the old system to the new system
Ans_ Conversion

678. End user development


Ans_ Allows ends users to easily access data, create reports and develop simple applications

CHAPTER 14

679. The ___ consists of systems analysts, specialists from the relevant end-user business areas,
application programmes and perhaps database specialists
Ans_ Project Team

680. The central method used in a portfolio analysis is to


Ans_ Inventory all of the organization’s information systems projects and assets

681. Which of the following statement best describes that effect that project structure has on overall
project risks?
Ans_ Projects with relatively undefined goals are more likely to be subjected to users changing
requirements and to run a high risk of not satisfying project goals

47
682. An example of using an external integration tool would be to
Ans_ Include user representatives as active members of the project team
683. External integration tools
Ans_ Consists of ways to link the work of the implementation team with users at all organization
levels

684. You have been hired by a pharmaceutical company to evaluate its inventory of systems and IT
projects which types of projects would be best avoided?
Ans_ All high-risk. Low-benefit projects

685. Which of the following is not one of the activities of the systems analyst?
Ans_ Formulation of capital budgeting models

686. Which of the following is not a tangible benefit of information systems?


Ans_ Improved resource control

687. A road map indicating the direction of systems development rationale the current systems new
developments to consider the management strategy the implementation plan and the budget is called
a(n)
Ans_ Information system plan

688. Users prefer systems that


Ans_ Are oriented to facilitating organizational tasks and solving business problems

CHAPTER 15

689. A critical necessity for ensuring the integration of local system into a global system is
Ans_ Adherence to data and technical standards

690. Software localization is the process of


Ans_ Converting software to operate in a second language and with local conventions

691. Domestic exporters typically have highly ___ systems


Ans_ Centralized

692. The network systems structure is the most visible in ___ services
Ans_ Financial

693. In decentralized systems


Ans_ Each foreign unit designs its own unique solution and systems

694. In term of global business strategy, the governance of __- firms has been likened to a federal
structure-strong central management of decision making, but considerable dispersal of power and
financial resources
Ans_ Transnational

695. In co-optation
Ans_ Opponents to a planned global system are brought into the process of designing and
implementing the solution

696. Which of the following is not the main organizational issues facing who are seeking to
globalize?

48
Ans_ defining the global environment

697. A force in the environments to which businesses must respond and that influences the direction
of the business is called a business
Ans_ Driver

698. Global coordination of all of the major business functions permits the location of business
activity according to
Ans_ Comparative advantage

CHAPTER 7

699. Which type of network would be most appropriate for business that comprised three employees
and a manager located in the same office space, whose primary need is to share document?
Ans_ Peer-to-Peer network

700. VPN
Ans_ Is an encrypted private network configured within a public network

701. A(n)___ is a box consisting of a radio receiver/transmitter and antennas that links to a wired
network, router, or hob
Ans_ Access point

702. Which protocol is the internet based on?


Ans_ TCP/IP

703. Shopping bots use ___ software for searching the internet
Ans_ Intelligent agent

CHAPTER 8

704. Tricking employees to reveal their passwords by pretending to be a legitimate member of


company is called
Ans_ Social engineering

705. Electronic data are more susceptible to destruction, fraud, error and misuse because
information systems concentrate data in computer file that
Ans_ May be accessible by anyone who has access to the same network

706. __ is malware that logs and transmits everything a user types


Ans_ A keylogger

707. ___ refers to policies procedures and technical measures used to prevent unauthorized access
alteration theft or physical damage to information systems
Ans_ Security

708. Small firms may outsource some or many security functions to


Ans_ MSSPs

CHAPTER 9

49
709. Operational CRM applications include tools for
Ans_ Saleforce automation

710. The measurement of the number of customers who stop using or purchasing products or
services from a company is called
Ans_ Chun rate

711. Next-generation enterprise suites use ___ and SOA to link systems of customers and suppliers
Ans_ Web services

712. As they move through the supply chain __ are transformed into finished products and shipped
to retailers and customers
Ans_ Raw materials

713. Customer relationship management systems typically provide software and online tool for
sales, customer service and
Ans_ Marketing

714. A company’s suppliers, supplier’s suppliers and the processes for managing relationships with
them is the
Ans_ Upstream portion of the supply chain

715. Selling a customer with a checking account a home improvement loan ia an example
Ans_ Cross-Selling

716. Market modules in CRM system s would provide tools for


Ans_ Identifying profitable and unprofitable customers

CHAPTER 10

717. Reducing the business process layers in a distribution channel is called


Ans_ Disintermediation

718. Caompared to traditional good, digital good incur


Ans_ Lower distribution costs

719. Which of the following is a marketing format that uses banner ads and pop-ups with interactive
features?
Ans_ Display ads

720. Which of the following statements about m-commerce is not true?


Ans_ In 2014, the main areas of growth are in online banking and location-based services

721. Which of the following best illustrates the sales revenue model?
Ans_ Apple accepts micropayments for single music track downloads

50
722. Netflix’s public announcement of reward for technology solution to it movie recommendation
is an example of
Ans_ Crowdsourcing

723. Which of the following best describes the digital social graph?
Ans_ A mapping of all online social relationships

724. Which of the following is not one of four types of presence to be considered when building an
E-commerce presence?
Ans_ Corporate

725. Experts systems are expensive and time consuming to maintain because
Ans_ their rule must be reprogrammed every time there is a change in the environment which in turn
may change the applicable rules

726. The terms used in a fuzzy logic system to describe imprecise states or conditions are referred to
as
Ans_ membership functions

727. Expert systems


Ans_ Work in very limited domains

728. Which of the following systems digitizes and tags documents according to a coherent
framework?
Ans_ Document management

CHAPTER 11

729. _____ seeks to enhance human perception by combining a live direct view of the physical
world with computer-generated images
Ans_ AR

730. CAD workstations


Ans_ Provide engineers, designers and factory managers with precise control over industrial sign and
manufacturing

731. To automate routine tasks to help firms for and filter information for use in electronic
commerce and supply chain management a firm would most likely use
Ans_ Intelligent agents

CHAPTER 12

732. A well-designed ESS will management to


Ans_ Track the activities of competitors

733. A(n)___ report is produced when a user enters various values in a pivot table to filter data
Ans_ Parameterized

734. The dimension of ___ describes whether the structure of data is consistent within an
information source
Ans_ Integrity

51
735. Which of the following are most likely to reply primarily on the drill-down functionality of BI
for their decision-making needs?
Ans_ Middle managers

736. The decision to approve a capital budget is an example of a(n)___ decision


Ans_ Unstructured

737. Which of the following statements best describes the term business intelligence?
Ans_ the infrastructure for collecting and managing business data

738. Measure defined by management and used to internally evaluate the success of a firm’s
financial business process, customer and learning and growth are called
Ans_ KPIs

CHAPTER 13

739. With a mobile Web app


Ans_ Users access mobile Web apps through their mobile device’s Web browser

740. Unit testing


Ans_ Tests each program separately

741. ___ development focuses on rapid delivery of working software by breaking a large project
into a series of small sub-projects that the completed in short periods of time using iteration and
continuous feedback
Ans_ Agile

742. You are an IT project manager for an advertising firm. The firm wishes to create an online tool
that will be used to survey focus group reactions to products in development. The most important
consideration for the firm is being able to offer
The tool as soon as possible as new corporate service. However, you know that many of the senior
managers that are business owners of this project have difficulty in understanding technical or
software development issues and are likely to change their requirements during the course of
development. What development method would be most successful for this project?
Ans_ Prototyping

743. ___ describe the transformation occurring within the lowest level of the data flow diagrams
Ans_ Process specifications

744. A(n)__is the model or blueprint for an information system and consists of all the specifications
that will deliver that functions identified during systems analysis
Ans_ System design document

CHAPTER 14

745. The organizational activities working towards the adoption, management and routinization of a
new information system are called
Ans_ Implementation

52
746. To best evaluate, from a financial standpoint, an IT investment whose benefits established in
advance you would use
Ans_ The real option pricing model

747. All of the following are indications of a failed information systems project except
Ans_ Employees require training to properly use the system

748. You have been hired to implement an enterprise system that will automate much of the billing
and accounting work for a state wide HVAC services company; which of the following would you
prepare to describe how the new system will affect a firm’s structure and operations?
Ans_ Organisational impact analysis

749. An example of using an integration tool would be to


Ans_ Hold frequent project team meetings

750. Which of the following projects is the riskest?


Ans_ A project that managers are concerned will affect their roles and job descriptions

751. Which of the following is not one of the principal problems of international networks?
Ans_ Network standards

752. From your reading of the chapter case, which of the following best describes the challenge
Unilever was facing as a global company?
Ans_ Too many systems in too many data centres, making it difficult to process transactions in timely
fashion

753. The chapter outlines four steps in developing an effective global system solution. Which of the
following is not one these steps?
Ans_ Identify out-dated legacy systems to be replaced

754. Software localization is important for global systems because


Ans_ Productivity of employees rises when systems use their local languages

755. In duplicated systems


Ans_ development occurs at the home base and operations are handed over to autonomous units in
foreign locations

756. The major dimensions of international systems architecture include each of the following
except
Ans_ Transborder data flows

757. From your reading of the Scott’s Miracle-Gro case study the company implemented SAP and
JDA enterprise and supply chain planning systems to solve what problems?
Ans_ Coordination issues caused by the merge of Scott’s and Miracle-Gro

758. Supply chain planning system perform all the following functions except
Ans_ Track the physical status of goods

759. Using social networking tools to converse with customer is called


Ans_ Social CRM

760. Walmart’s continuous replenishment system is an example of a ___ model


Ans_ Pull-based

53
761. ____ systems are based on a suite of software models used to support business activities across
the firm
Ans_ Enterprise

762. Goods that area involved in the actual production process are referred to as
Ans_ Direct goods

763. Which of the following best illustrates the transaction free revenue model?
Ans_ eBay receives a small fee from a seller if seller is successful in selling an item

764. Information density refers to the


Ans_ Total amount and quantity of information available to all market participants

765. The flows of events or transaction captured by an organization system describes


Ans_ Data

766. Systems that integrate different type of techniques such as genetics algorithms fuzzy logic
neural networks and expert’s systems into a single application are called ___ systems
Ans_ Hybrid AI

767. An inference engine is


Ans_ A strategy used to search through the rule base in an expert system by forward chaining or
backward chaining

768. Your company wants to develop intelligent techniques to create a ‘smart’ oven that can
perfectly cook basic foodstuff, such as roasts and bread using sensors and minimal input from the user.
The system would know the difference between rare medium rare, medium, and well done roasts. The
category of intelligent technique that would describe this system is
Ans_ Fuzzy logic

769. Investment workstations


Ans_ Are used in the financial sector to analyse trading situations and manage the investment process
770. Which type of decision is deciding whether to introduce a new product line?
Ans_ Unstructured

771. Which of the following is not one of the six main analytic functionalities of BI systems for
helping decision makers understand information and take action?
Ans_ Business case archives

772. All of the following managerial roles can be supported by information systems except
Ans_ Entrepreneur

773. A(n)____ facilitates the solution to unstructured problems by a set of decision makers working
together as a group
Ans_ GDSS

774. In automation
Ans_ Employees are enabled to perform their tasks more efficiently

775. Which of the following is not a top priority in mobile application development?
Ans_ Designing for keyboard data entry

54
776. The entire system-building effort is driven by
Ans_ User information requirements

777. In an object-oriented development framework for a university, how would the classes Degree
Mathematics and physics be related?
Ans_ Degree is a superclass to Mathematics and Physics

778. In working with ROPMS (real option models) and options valuation, a call option is a(n)
Ans_ Right to purchase or sell an asset at later date at a fixed price

779. One example of an implementation problem is


Ans_ Inadequate user training

780. Which of the following types of projects is most likely to fail?


Ans_ a business process redesign project that restructures workflow and responsibilities

781. Formal planning and control tools


Ans_ Enable a project manager to properly document and monitor project plans

782. Franchise companies have typically had __ systems


Ans_ Duplicated

783. In developing countries, use of the internet is limited by all the flowing except
Ans_ Use of mobile telephones

784. Which of the following is not one of the system configurations used by global firms?
Ans_ networked

785. Virtual reality systems


Ans_ Provide architects, engineers and medical workers with precise, photorealistic simulations of
objects

786. Which of the following statement best describes the relationship between collaboration and
knowledge management?
Ans_ knowledge is useful only when shared with others
787. The set of business processes, culture, and behaviour required to obtain value from investment
in information systems is one type of
Ans_ Organizational and management capital

788. MIS typically produce


Ans_ Fixed, regularly scheduled reports based on data extracted from the organization’s TPs
789. When managers represent their company in the outside world and perform symbolic duties,
they are acting in their
Ans_ Interpersonal role

790. Which of the following BI tools or abilities have been driving the movement toward ‘smart
cities?’
Ans_ big data analytics

791. What is the primary driving factor in firms to select domestic outsourcing firms to build system
solutions?
Ans_ to take advantage of technical skills the firm does not have

55
792. _____ provide(s) a methodology and tools for dealing with the organization’s ongoing need to
revise and optimize its numerous business processes
Ans_ Business process management

793. A software package evaluation process is often based on a series of questions sent to vendors,
called a(n)
Ans_ Request for proposal

794. Which method is used to assign weights to various features of a system?


Ans_ Scoring model

795. The _____ reviews and approve plans for system in all divisions
Ans_ IS steering committee

796. The worth of systems from a financial perspective essentially revolves around the issues of
Ans_ Return on invested capital.

797. Which type of systems are widely used by manufacturing and distribution firms to connect to
suppliers on a global basis?
Ans_ EDI systems

798. General cultural factors driving global business are


Ans_ Global communication and transportation technologies, a global knowledge, and global social
norms.

799. Which of the following in not of the main four dimensions of knowledge described in the
chapter?
Ans_ Knowledge is timeless

800. _______ often are designed and optimized for the specific tasks to be performed.
Ans_ Knowledge work stations

801. BI that is designed to determine the most likely effects of changes in the business environment
is called
Ans_ Predictive analytics

802. Which of the following companies is not one of the top five producers of business intelligence
and analytics products?
Ans_ Sun

803. A systems analysis includes a(n) ______ that is used to determine whether the solution is
achievable, from a financial, technical and organisational standpoint.
Ans_ Feasibility study

804. The primary tools for representing a systems’ component processes and the flow of data
between them is the
Ans_ Dataflow diagram

805. To Review a project’s tasks and their interrelationships, you would use a
Ans_ PERT chart

56
806. The central method used in a scoring model is to
Ans_ Perform a weighted comparison of the criteria used to evaluate a system

807. Which of the following is not an important technology issued to consider when developing an
international information system?
Ans- Deciding how mobile computing will fit into your international system

808. In centralised systems


Ans_ Systems development and operations occur totally at the domestic home base?

809. Which of the following techniques is used for knowledge discovery?


Ans_ Data mining

810. According to Mintzberg, managers in their informational role act as


Ans_ Nerve centres of the organization.

811. High-velocity decision making systems are growing rapidly for decisions classed as
Ans_ Highly structured

812. A(n) ______ is an organizational change that involves rethinking the nature of the business of
the business and the nature of the organisation itself.
Ans_ Paradigm shift

813. ROPMs (real options pricing models) valued information systems similar to stock options, in
that
Ans_Intial expenditures on IT projects are seen as creating the right to pursue and obtain benefits from
the system at a later date.

814. As a firm moves from local options systems to regional and global systems
Ans_ Agency costs increase.

815. An information system for a building company that tracks construction costs for various
projects across the United States would be categorized as a type of
Ans_ MIS

816. To show each level of a systems’ its relationship to other levels, and its place in the overall
design structure, structured methodologies use
Ans_ Structure Charts

817. Which type of planning tools shows each task as a horizontal bar whose length is proportional
to the time required to complete it?
Ans_ Gantt chart

818. Which of the following is not an important factor when implementing a global information
system solution?
Ans_ Understanding if your computer system can operate in a global environment

819. Business processes are analysed, simplified, and redesigned in


Ans_ Business process redesign

820. A global firm can develop transnational centres of excellence as an effective technique to
Ans_ Effectively identify global business processes

57
821. The four kinds of structural organisational changed enabled by IT, in order form least to most
risky, are
Ans_ automation, rationalization, redesigned and paradigm shift

822. Japanese consumers who only want to purchase products made in Japan are an example of
Ans_ Cultural particularism

823. Acceptance testing


Ans_ Provides the final certification that the system is ready to be used in a production setting.

824. Which of the following is not a specific challenge to global business systems?
Ans_ Cultural expectations

825. CASE Tools automate


Ans_ User interfaces.

826. Transnational companies have tended to use a(n) ______ system configuration.
Ans_ Networked

827. In a parallel conversion strategy, the new system


Ans_ And the old are run in parallel

828. In terms of global business strategy and structure, a franchise company will use a policy of
Ans_ Dispersed production, marketing and human resources, with centralized strategic management
and finance/accounting.

829. In the traditional systems development lifecycle, end users


Ans_ Are limited to providing information requirements and reviewing the technical staff’s work.

830. To avoid the cost and uncertainty of moving information across national boundaries, most
multinational firms
Ans_ Develop separate systems within each country.

831. Object-oriented modelling is based on the concepts of


Ans_ Class and inheritance.

832. Most companies pursuing a global strategy begin as


Ans_ Domestic exporters

833. Transferring data from a legacy system to the new system would be defined by which category
of system design specifications?
Ans_ Conversion

834. Global markets, production, and administration create the conditions for.
Ans_ Global economies of scale

835. All of the following present challenges to developing global business systems except
Ans_ Production costs

836. When developing a global system, bringing the opposition of local groups into the process of
designing and implementing the solution without giving up control over the direction and nature of the
change is called
Ans_ Cooptation

58
837. In relation to global systems building, the Internet
Ans_ Has reduced networking problems.

838. TrAnsnational firms have


Ans_ No single national headquarters but many regional headquarters and perhaps a world
headquarters.

839. Making judgments and taking action on the basis of narrow or personal characteristics is
referred to as
Ans_ Particularism

840. Of the following, which is one of the central principles recommended in this chapter for a firm
organizing itself for international business?
Ans_ Organize value-adding activities along lines of comparative advantage.

841. What are the main changes taking place in organisational use of information systems? Which
of these do you think is having the greatest impact on businesses?
Ans_ True

842. Apex Vacuum, a family-owned manufacturer of budget vacuums, has grown exponentially
over the last few years. However, the company is having difficulty preparing for future growth. The
only information system used at Apex is an antiquated accounting system. The company has one
manufacturing plant located in ArkAnsas, and three warehouses, in Arkansas, Delaware, and
California. The Apex sales force is national, and Apex purchases about a third of its vacuum parts and
materials from a single oversea supplier. You have been hired to recommend the information systems
Apex should implement in order to maintain their competitive edge. However, there is not enough
money for a full-blown, cross-functional enterprise application, and you will need to limit the first step
to a single functional area or constituency. What will you choose, and why?
Ans_ True

843. You are advising the owner of Smalltown Computer, a new local computer repair store that
also builds custom computers to order. What competitive strategies could Smalltown Computer exert?
Which ones will it have difficulty exercising?
Ans_ True

844. Describe how a cookie works.


Ans_ True

845. Distinguish between cloud computing, green computing and quantum computing.
Ans_ True

846. List and describe three main capabilities or tools of a DBMS.


Ans_ True

847. How are RFID systems used in inventory control and supply chain management?
Ans_ True

848. How is the security of a firm’s information system and data affected by its people, organization
and technology? Is the contribution of one of these dimensions any more important than the other?
Why?
Ans_ True

59
849. Identify two supply chain models. Which is better?
Ans_ True

850. What is the most profound way in which e-commerce and the Internet have changed the
relationship between companies and their customers? Support your Answer.
Ans_ True

60

You might also like