COMM 226 Flashcards
What is reasoning?
a) The ability to make and manipulate models.
b) A physical object that can be manipulated.
c) A set of numbers arranged in a sequence.
d) A method of encrypting data.
Correct Answer: a
Abstract
- What term describes the factors that make it difficult for a new business to begin operating in an industry?
A) Market Saturation
B) Barriers to Entry
C) Competitive Advantage
D) Strategic Alliance
Answer: B) Barriers to Entry
- Which ethical principle, developed by Immanuel Kant, states that one should behave only in a way that one would want the behavior to become a universal law?
A) Utilitarianism
B) Social Contract Theory
C) Categorical Imperative
D) Ethical Relativism
Categorical imperative.
- What is the name of the model proposed by Michael Porter that assesses industry characteristics and profitability using five competitive forces?
A) SWOT Analysis
B) PESTEL Framework
C) Value Chain Model
D) Five Forces Model
Five forces model.
- In business processes, what term describes interactions across value chains that are important sources of efficiencies and are supported by information systems?
A) Linkages
B) Core Processes
C) Supply Chains
D) Data Flows
Linkages.
- What type of information system helps businesses achieve their goals and objectives?
A) Enterprise Resource Planning (ERP)
B) Transaction Processing System (TPS)
C) Management Information Systems (MIS)
D) Customer Relationship Management (CRM)
Management information systems (MIS).
- In Porter’s value chain model, which activities create direct value for a company?
A) Support Activities
B) Primary Activities
C) Competitive Activities
D) Secondary Activities
Primary activities.
In the Five Forces Model, what term describes a competing product that performs the same or similar function as an industry’s product by another means?
A) Alternative Good
B) Disruptive Innovation
C) Complementary Product
D) Substitute
Substitute.
- In Porter’s value chain model, what term describes the activities that contribute indirectly to value creation, such as procurement, technology, human resources, and infrastructure?
A) Support Activities
B) Value Drivers
C) Ancillary Services
D) Operational Components
Support activities.
[. ]
What term describes the mental process of making one or more models of the components of a system and connecting inputs and outputs into a sensible whole?
A) Logical Processing
B) Computational Thinking
C) Systems Thinking
D) Abstract Reasoning
Systems thinking.
[. ]
What is the standard set of terms and graphical notations for documenting business processes?
a) Business Process Model and Notation (BPMN)
b) Unified Modeling Language (UML)
c) Entity-Relationship Diagram (ERD)
Business Process Model and Notation (BPMN) standard.
[. ]
What type of process has a fluid and dynamic structure, contrasting with structured processes?
a) Dynamic processes
b) Structured processes
c) Sequential processes
d) Static processes
Dynamic processes.
[. ]
Which of the following describes the five fundamental components of an information system—computer hardware, software, data, procedures, and people?
a) Five-component framework
b) Information Technology Infrastructure
c) Information System Architecture
d) System Development Life Cycle
Five-component framework.
[. ]
What is a group of components that interact to produce information?
a) Information system (IS)
b) Data repository
c) Network
d) Database
Information system (IS).
[. ]
What term refers to clearly defining what users of an information system can do and under what conditions?
a) Prescriptive procedures
b) User roles
c) Access controls
d) Security policies
Prescriptive procedures.
What is a collection of records, usually implemented as a database?
a) Repository
b) Archive
c) Data store
d) Data warehouse
Repository.
In a BPMN diagram, what long column contains all the activities for a particular role?
a) Swimlane
b) Process flow
c) Activity path
d) Workstream
Swimlane.
Which ethics theory determines the morality of an act based on its outcome, specifically maximizing happiness and reducing suffering?
a) Utilitarianism
b) Deontology
c) Virtue ethics
d) Ethical relativism
Utilitarianism.
What principle states that the average cost of production decreases as the size of the operation increases?
a) Economies of scale
b) Marginal cost
c) Market saturation
d) Law of diminishing returns
Economies of scale.
[. ]
Which cloud service model involves hosting a bare server computer or disk drive?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
Infrastructure as a service (IaaS).
[. ]
What enables cloud-hosting vendors to provide processing capabilities in flexible yet standardized ways?
a) Internet protocols and standards
b) Cloud computing architecture
c) Data exchange protocols
d) Distributed processing
Internet protocols and standards.
[. ]
What term refers to a private internet used exclusively within an organization?
a) Intranet
b) Extranet
c) Virtual private network (VPN)
d) Public network
Intranet.
[. ]
What are agreements that specify how data will move among Tier 1 network providers?
a) Peering
b) Service Level Agreements (SLAs)
c) Data protocols
d) Interconnection agreements
Peering.
[. ]
Which category of cloud hosting involves vendors providing hosted computers, an operating system, and possibly a DBMS?
a) Platform as a Service (PaaS)
b) Software as a Service (SaaS)
c) Infrastructure as a Service (IaaS)
d) Function as a Service (FaaS)
Platform as a service (PaaS).
[. ]
The use of standard protocols to publish a menu of services that an application provides, the structure of data that it expects to receive, the structure of data that it will produce, and the ways in which services can be requested.
Service-oriented architecture (SOA).
Which category of cloud hosting involves vendors providing hosted computers, an operating system, and possibly a DBMS?
a) Platform as a Service (PaaS)
b) Software as a Service (SaaS)
c) Infrastructure as a Service (IaaS)
d) Function as a Service (FaaS)
Software as a service (SaaS).
[. ]
What is the architecture used by most e-commerce server applications, consisting of three different tiers?
a) Three-tier architecture
b) Client-server architecture
c) Peer-to-peer architecture
d) Microservices architecturefrom browsers. Web servers also process application programs. The third tier is the database tier, which runs the DBMS that processes the database
Three-tier architecture.
What type of network connects computers located at different geographic locations?
a) Wide area network (WAN)
b) Local area network (LAN)
c) Metropolitan area network (MAN)
d) Personal area network (PAN)
Wide area network (WAN).
[. ]
What term refers to a variable that provides properties for an HTML tag or characteristics of an entity?
a) Attribute
b) Element
c) Class
d) Property
Attribute.
Which language defines the structure and layout of Web page content?
a) HTML (Hypertext Markup Language)
b) CSS (Cascading Style Sheets)
c) JavaScript
d) XML (Extensible Markup Language)other purposes
html (Hypertext Markup Language).
[. ]
What protocol is used between browsers and Web servers?
a) HTTP (Hypertext Transport Protocol)
b) HTTPS (Hypertext Transport Protocol Secure)
c) FTP (File Transfer Protocol)
d) SMTP (Simple Mail Transfer Protocol)
http (Hypertext Transport Protocol).
[. ]
What cloud hosting model involves hosting a bare server computer or disk drive?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
Infrastructure as a service (IaaS).
[. ]
What protocol architecture has four layers and forms the basis for the TCP/IP–OSI architecture used by the Internet?
a) TCP/IP (Transmission Control Protocol/Internet) Protocol architecture
b) OSI (Open Systems Interconnection) model
c) HTTP (Hypertext Transport Protocol) architecture
d) IP (Internet Protocol) architecture
TCP/IP (Transmission Control Protocol/Internet) Protocol architecture.
[. ]
What is a character of data, or an 8-bit chunk?
a) Byte(s)
b) Bit(s)
c) Word(s)
d) Packet(s)
Byte(s).
[. ]
What lines on an entity-relationship diagram indicate a 1:N relationship between two entities?
a) Crow’s feet
b) Straight lines
c) Dotted lines
d) Arrows
Crow’s feet.
[. ]
What is the management, development, operation, and maintenance of the database to achieve the organization’s objectives, often performed by a Database Administrator (DBA)?
a) Database administration (DBA)
b) Database management
c) Database design
d) Data governance
Database administration (DBA).
[. ]
What applications, having the standard five components, make database data more accessible and useful by employing forms, formatted reports, queries, and application programs?
a) Database application system
b) Web application system
c) Data warehousing system
d) Business intelligence system
Database application system.
[. ]
What product processes large organizational and workgroup databases, supporting many users and database applications, and operates 24/7?
a) Enterprise DBMS
b) Personal DBMS
c) Distributed DBMS
d) Cloud-based DBMS
Enterprise DBMS.
[. ]
In the E-R data model, what represents something that users want to track, which can be a physical object or a logical construct or transaction?
a) Entity
b) Attribute
c) Relationship
d) Cardinality
Entity.
[. ]
What term refers to the minimum number of entities that must be involved in a relationship?
a) Minimum cardinality
b) Maximum cardinality
c) Optionality
d) Entity constraint
Minimum cardinality.
[. ]
What is a column or group of columns used to represent relationships, where values of the foreign key match values of the primary key in a different table?
a) Foreign keys
b) Primary keys
c) Indexes
d) Constraints
Foreign keys.
[. ]
What term refers to a column or group of columns that identifies a unique row in a table, also referred to as a Primary Key, or a number used to encrypt data?
a) Key
b) Identifier
c) Index
d) Constraint
Key.
[. ]
What type of relationship involves two entity types where an instance of one type can relate to many instances of the second type, and vice versa (e.g., the relationship between Student and Class)?
a) Many-to-many (N:M) relationship
b) One-to-many (1:N) relationship
c) One-to-one (1:1) relationship
d) Hierarchical relationship
Many-to-many (N:M) relationship.
[. ]
What is a request for data from a database?
a) Query
b) Transaction
c) Report
d) Data request
Query.
[. ]
What is the international standard language for processing database data?
a) Structured Query Language (SQL)
b) Hypertext Markup Language (HTML)
c) JavaScript
d) Python
Structured Query Language (SQL).
What type of software enables an IS to mimic or simulate human intelligence?
a) Artificial intelligence (AI)
b) Machine learning (ML)
c) Natural language processing (NLP)
d) Robotics
Artificial intelligence (AI).
[. ]
What is a system that takes unstructured data, applies AI, and creates a database from it?
a) Autonomous database
b) Relational database
c) Data warehouse
d) Cloud-based database
Autonomous database.
[. ]
What term refers to a sophisticated, possibly long-running computer hack that is perpetrated on applications, systems, and services, many of which require no human input?
a) Advanced Persistent Threat (APT)
b) Denial-of-Service (DoS) attack
c) Phishing attack
d) Ransomware
Advanced Persistent Threat (APT).
[. ]
What is an encryption method where different keys are used to encode and decode the message, with one key encoding and the other decoding?
a) Asymmetric encryption
b) Symmetric encryption
c) Hashing
d) RSA encryption
Asymmetric encryption.
[. ]
What term refers to a type of attack where harmless messages are sent to the user’s device?
a) Bluejacking
b) Bluesnarfing
c) Spoofing
d) Phishing
Bluejacking.
[. ]
What term refers to a type of attack where data is stolen from the user’s device?
a) Bluesnarfing
b) Bluejacking
c) Spoofing
d) Phishing
Bluesnarfing.
[. ]
What is a pseudo acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart,” which is used to determine if the user is a human or a computer program?
a) CAPTCHA
b) CAPTCHA2
c) Turing test
d) ReCAPTCHA
CAPTCHA.
[. ]
What technique is used to compromise database data by injecting Web page scripting into the server?
a) Cross-site scripting (XSS)
b) SQL injection
c) Man-in-the-middle attack
d) Phishing
Cross-site scripting (XSS).
[. ]
Which regulation governs the business use of personal data in the EU?
a) General Data Protection Regulation (GDPR)
b) California Consumer Privacy Act (CCPA)
c) Data Protection Act (DPA)
d) Health Insurance Portability and Accountability Act (HIPAA)
General Data Protection Regulation (GDPR).
[. ]
What technique for obtaining unauthorized data uses pretexting via e-mail, where the attacker pretends to be a legitimate company?
a) Phishing
b) Spear-phishing
c) Vishing
d) Baiting
Phishing.
[. ]
What is the special version of asymmetric encryption, where each site has a public key for encoding messages and a private key for decoding them?
a) Public key/private key
b) Symmetric encryption
c) RSA encryption
d) Diffie-Hellman encryption
Public key/private key.
[. ]
What term refers to a systematic evaluation of security by assessing how well security safeguards conform to established criteria?
a) Security audit
b) Risk assessment
c) Vulnerability scan
d) Penetration test
Security audit.
[. ]
What is the encryption method where the same key is used to encode and decode the message?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Public-key infrastructure
Symmetric encryption.
[. ]
What is the secure version of HTTP?
a) HTTPS
b) HTTP/2
c) HTTP Secure
d) SSL
https.
[. ]
What term describes a situation where a limited resource greatly reduces the output of an integrated series of activities or processes?
a) Bottleneck
b) Constraint
c) Limitation
d) Backlog
Bottleneck.
[. ]
What term refers to processes that receive, store, and disseminate product input?
a) Inbound logistics processes
b) Outbound logistics processes
c) Manufacturing processes
d) Support processes
Inbound logistics processes.
[. ]
What term describes information systems that work in isolation from one another, often referred to as islands of automation?
a) Information silo
b) Data lake
c) Information warehouse
d) Legacy system
Information silo.
[. ]
In process improvement, what are the measures selected by managers to assess process performance called?
a) Key performance indicators (KPIs)
b) Success metrics
c) Operational metrics
d) Performance benchmarks
Key performance indicators (KPIs).
[. ]
What term refers to quantities that are assigned to attributes, which help assess the achievement of process objectives, and can be summed, averaged, or otherwise processed?
a) Measure(s)
b) Metric(s)
c) KPI(s)
Measure(s).
[. ]
What term is also called measures or KPIs, and refers to quantities that help assess the achievement of process objectives?
a) Metrics
b) Measures
c) Attributes
d) Indicators
Metrics.
What term refers to data that describes data?
a) Metadata
b) Data dictionary
c) Data set
d) Schema
Metadata.
[. ]
What is a data store that contains data produced and consumed by operational processes?
a) Operational database
b) Data warehouse
c) Data lake
d) Archive database
Operational database.
[. ]
What type of diagram suggests improvements to a current process?
a) Ought-to-be diagram
b) As-is diagram
c) Process flow diagram
d) Fishbone diagram
Ought-to-be diagram.
[. ]
What term refers to processes that collect, store, and distribute products to buyers?
a) Outbound logistics processes
b) Inbound logistics processes
c) Manufacturing processes
d) Support processes
Outbound logistics processes.
[. ]
What is a popular strategy for process improvement that seeks to improve process outputs by removing causes of defects and minimizing variability?
a) Six Sigma
b) Lean manufacturing
c) Total Quality Management (TQM)
d) Agile methodology
Six Sigma.
[. ]
What term refers to the time an activity is idle in a process?
a) Slack
b) Downtime
c) Delay
d) Wait time
Slack.
[. ]
What type of information system supports operational decision-making?
a) Transaction processing system (TPS)
b) Decision support system (DSS)
c) Executive information system (EIS)
d) Knowledge management system (KMS)
Transaction processing system (TPS)
[. ]
What is a structure or description that specifies the raw materials, quantities, and subassemblies needed to create a product?
a) Bill of material (BOM)
b) Inventory list
c) Product specification
d) Assembly plan
Bill of material (BOM).
[. ]
What process refers to adapting ERP software to conform to customer requirements without changing program code?
a) Configuration
b) Customization
c) Integration
d) Implementation
Configuration.
[. ]
What term refers to easy-to-read, concise, up-to-the-minute displays of process KPIs?
a) Dashboard
b) Control panel
c) Performance chart
d) Data visualization
Dashboard
[. ]
What type of system is an integrated software suite that manages a company’s core business processes, such as finance, HR, manufacturing, and supply chain, using a central database?
a) ERP (Enterprise Resource Planning)
b) CRM (Customer Relationship Management)
c) SCM (Supply Chain Management)
d) HRIS (Human Resource Information System)
ERP (Enterprise Resource Planning)
[. ]
What term refers to a reoccurring activity designed to improve the IT system or improve functionality in an ERP system?
a) ERP upgrade
b) ERP customization
c) ERP implementation
d) ERP integration
ERP upgrade.
[. ]
What type of test evaluates if the system, as it is configured for the company, meets the company’s requirements and behaves as desired?
a) Functional test
b) Integration test
c) User acceptance test (UAT)
d) Performance test
Functional test.
[. ]
What term refers to a study that highlights the differences between the business requirements that emerge from strategic planning and the capabilities of the ERP system?
a) Gap analysis
b) SWOT analysis
c) Cost-benefit analysis
d) Feasibility study
Gap analysis.
[. ]
What is a manufacturing information system that schedules equipment and facilities and provides financial tracking of activities?
a) Manufacturing resource planning (MRPII)
b) Enterprise resource planning (ERP)
c) Material requirements planning (MRP)
d) Computer-aided design (CAD)
Manufacturing resource planning (MRPII).
[. ]
What type of software is used to efficiently manage inventory, production, and labor?
a) Material requirements planning (MRP)
b) Manufacturing resource planning (MRPII)
c) Enterprise resource planning (ERP)
d) Supply chain management (SCM)
Material requirements planning (MRP).
[. ]
What is one of the best-known versions of SAP, and was the first truly integrated system that could support most of an organization’s major operational processes?
a) R/3
b) S/4HANA
c) ECC
d) SAP Business One
R/3.
[. ]
What term describes the phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier?
a) Bullwhip effect
b) Demand variability
c) Supply chain distortion
d) Order fluctuation
Bullwhip effect.
[. ]
What term refers to selling a product or system for less than its true price?
a) Buy-in
b) Discounting
c) Underpricing
d) Bargain pricing
Buy-in.
[. ]
What is an internal company document that issues a request for a purchase and is used in the purchase order once accepted?
a) Purchase requisition (PR)
b) Purchase order
c) Invoice
d) Delivery note
Purchase requisition (PR).
[. ]
What is the activity within the procurement process that ensures the data on the invoice matches the data on the purchase order and the goods receipt?
a) Two-way match
b) Three-way match
c) Four-way match
d) Payment processing
Three-way match.
[. ]
What type of information systems support processes and activities that span two or more independent organizations?
a) Transactional IS
b) Interorganizational IS
c) Organizational IS
d) Functional IS
Interorganizational IS.
[. ]
What is the emergent classification of content structure based on the processing of many user tags?
a) Taxonomy
b) Ontology
c) Folksonomy
d) Metadata
Folksonomy.
[. ]
What is the investment in social relations with the expectation of future returns in the marketplace?
a) Intellectual capital
b) Financial capital
c) Social capital
d) Human capital
Social capital.
[. ]
What type of communication occurs when all members of a work team meet at the same time, such as face-to-face meetings or conference calls?
a) Synchronous communication
b) Asynchronous communication
c) Nonverbal communication
d) Collaborative communication
Synchronous communication.
[. ]
What type of communication occurs when all members of a work team do not meet at the same time, such as when working in different time zones or shifts?
a) Synchronous communication
b) Asynchronous communication
c) Interpersonal communication
d) Mass communication
Asynchronous communication.
[. ]
What analysis technique, also called split testing, involves creating two identical webpages with slight design changes to determine the better conversion rate?
a) A/B testing
b) Focus testing
c) Regression analysis
d) Multivariate testing
A/B testing.
[. ]
What type of information system supports acquiring, analyzing, and publishing data analytics activities?
a) Transactional IS
b) Decision Support System (DSS)
c) Analytics IS
d) Customer Relationship Management (CRM)
Analytics IS.
[. ]
What is a measure of website traffic that involves the ratio of customers who eventually purchased divided by the number who visited?
a) Bounce rate
b) Traffic volume
c) Conversion rate
d) Retention rate
Conversion rate.
[. ]
A patent will only be granted if the invention or process meets certain conditions set by which organization?
a) Canadian Patent Office (CPO)
b) Canadian Intellectual Property Office (CIPO)
c) World Intellectual Property Organization (WIPO)
d) United States Patent and Trademark Office (USPTO)
Canadian Intellectual Property Office (CIPO):
[. ]
Which nonprofit organization provides legal tools for artists and authors to license their work with fewer restrictions than traditional copyright?
a) Creative Commons
b) Copyright Office
c) Intellectual Property Organization
d) Arts Council
Creative Commons:
[. ]
What term refers to an idea, invention, or process that is assigned to designated owners by law?
a) Trade secret
b) Intellectual Property (IP)
c) Patent
d) Trademark
Intellectual Property (IP)
[. ]
What network type has no server between two nodes, where each node acts as both a server and a client?
a) Client-server network
b) Peer-to-Peer Network (P2P)
c) Hybrid network
d) Cloud network
Peer-to-Peer Network (P2P)
What term is categorized by the three V’s: Volume (size), Variety (number of data types), and Velocity (processing speed), and is created every time you perform an internet search, shop online, or post a video?
a) Data analytics
b) Big data
c) Cloud computing
d) Data mining
Big data
What set of databases is designed to support decision making in an organization and structured for fast online queries and exploration?
a) Data warehouse
b) Data mart
c) Operational database
d) Data lake
Data Warehouse:
1) Which activity of the value chain includes ordering and receiving raw materials for manufacturing?
A) operations/manufacturing
B) inbound logistics
C) outbound logistics
D) marketing
E) service
b
2) The basic premise of Moore’s law is
A) IT makes people more efficient.
B) the density of transistors on a computer chip doubles roughly every 20 months.
C) people tend to want more information than they need.
D) IT makes people more productive.
E) computer memory is getting bigger.
b
3) Which of the following is an example of an output device?
A) A mouse
B) A set of headphones
C) A scanner
D) A computer keyboard
E) A microphone
b
4) As predicted by Moore’s Law, the capacity of storage devices is ________ as the costs ________.
A) decreasing; decrease
B) increasing; increase
C) decreasing; stay the same
D) increasing; stay the same
E increasing; decrease
e
5) What is an Information System?
a). An information system is a group of components that interact to produce information.
b). Computer hardware and software.
c.) Software development process.
d.) A framework describing human computer interaction.
e.) An information gathering application.
a
6) Which of the following is an example of an operating system?
A) Glass Fish
B) Java
C) Unix
D) Boot Camp
E) VMware Fusion
c
7) Volatile memory means that
A) such devices are fragile.
B) such devices are susceptible to electromagnetic interference.
C) these devices maintain their contents as soon as the content is added to them.
D) the contents are lost once power is off.
E) these devices are cheaper than non-volatile memory.
d
8) Which of the following are/is (a) function(s) of COBIT?
A) help organizations get the best from their IT investments.
B) enforce the law on corporate IT governance.
C) lobbying on behalf of the IT industry.
D) draft legislation
E) both A and C.
a
9) Governance is important to ________.
A) ensure that an organization’s internal processes can’t be verified.
B) ensure that an organization produces good results while working to avoid bad results.
C) develop reporting structures and review processes
D) develop inconsistent management policies.
E) maintain the benefits of an organization’s IT investments.
b
10) Porter originally developed the five forces model to determine ________.
A) the reason why certain industries collapse
B) the means by which to improve industrial viability
C) the nature of competitive industrial environments
D) the potential profitability of an industry
E) None of the above
d
11) Which of the following is an example of a competitive strategy employed by a firm?
A) increasing the price of its product when raw material prices increase
B) launching a unique product targeted at a section of consumers
C) advertising its products nationwide like its competitor organizations
D) laying off staff in order to cut down costs during a recession period
E) None of the above
b
12) Which of the following is a process implementation principle of competitive advantage?
A) establishing alliances
B) enhancing a product
C) differentiating a product
D) creating a new product
E) None of the above
b
13) Each stage of the value chain not only adds value to the product but also ________.
A) devalues the final product
B) accumulates costs
C) attracts buyers
D) attracts competitors
E) None of the abo
b
14) ________ are commonplace, routine, everyday business processes.
A) Managerial processes
B) Strategic processes
C) Operational processes
D) Transformational processes
E) None of the above
c
15) Students and classes have a ____ relationship.
A) one-to-one
B) one-to-many
C) many-to-one
D) many-to-many
E) zero to many
d
16) A(n) ________ organizes, plans, and leads the team that implements the ERP solution.
A) project analyst
B) systems analyst
C) project manager
D) business manager
E) None of the above
c
17) In an ideal world, the information systems that a company uses would support the ________ of the
company
a) strategy
b) information technology
c) business ethics
d) data collection
e) online transaction processing
a
18) Which of the following is true about strategic processes?
A) They are broad in scope and impact most of the firm.
B) They rely more on computerized actors compared to other types of processes.
C) They are concerned primarily with the use of resources.
D) They are facilitated mainly by management information systems.
E) None of the above
a
19) ________ refers to a condition that exists when data are isolated in separated information systems
or when data are duplicated in various places.
A) Information silos
B) Data warehousing
C) Encapsulation
D) Metadata publishing
E) None of the above
a
20) An ERP module is a(n) ________.
A) inherent process in an ERP system
B) distinct and logical grouping of processes
C) collection of interconnected and interdependent programs
D) preconfiguration platform devised for a particular industry
E) None of the above
b
21) Which of the following challenges of implementing an ERP system is people-related?
A) the approval of customer credit
B) the failure to specify objectives for new processes
C) the structure of the bill of material
D) the order size
E) None of the above
b
22) The customization of ERP software to meet different customer requirements without changing the
program code is called ________.
A) process blueprinting
B) automation
C) configuration
D) modularity
E) None of the above
c
23) A(n) ________ connects computers that reside in a single geographic location.
A) DSL
B) LAN
C) ADSL
D) WAN
E) P2P
b
24) A software consulting firm sends a formal document to its supplier, requesting for the delivery of 50
desktop computers. This is an example of a(n) ________.
A) purchase order
B) bill of materials
C) receipt bill
D) itemized bill
E) None of the above
a
25) To run a program or process data, a computer first transfers the program or data from the disk to the
________.
A) main memory
B) cache
C) display
D) scanner
E) printer
a
26) Which of the following represents a data hierarchy from largest to smallest?
A) field, record, file, database
B) record, field, file, database
C) record, field, database, file
D) database, file, record, field
E) byte, attribute, table, database
d
27) The internet uses:
A) TCP/IP suite of packet switching protocols
B) Number of routers connecting points throughout a worldwide backbone
C) Proprietary set of rules
D) A and B
E) B and C
d
28) A(n) _____ is a device with the sole purpose of accepting packets and determining the best way to
send them to the destination computer.
A) hub
B) bridge
C) switch
D) router
E) mainframe
d
29 A _____ is placed in a computer to provide the physical connection between the computer and a
local network.
A) switch
B) hub
C) network interface card
D) cable
E) router
c
31) Which of the following is true of social networking problems?
A) If the problematic content represents reasonable criticism of the organization’s products, the best
response is to delete it.
B) Inappropriate contributions that contain obscene or otherwise inappropriate content should be
ignored indefinitely.
C) It is unnecessary to communicate the criticism to the product development team.
D) Responses are best reserved for when the problematic content has caused the organization to do
something positive as a result.
E) None of the above
d
32) Which of the following is true of systems analysts?
A) They are active mainly during the system conversion phase of the systems development process.
B) They integrate the work of programmers, testers, and users.
C) They focus on information systems development and lack knowledge on process design.
D) They work primarily with business processes.
E) None of the above
b
33) Which of the following is true of systems development?
A) System requirements cannot be collected if systems are developed before business processes.
B) Some aspects of business processes are unlikely to be considered when the system is constructed
first.
C) Organizations will lose focus on building hardware and software if information systems are built first.
D) Organizations will lose focus on data procedures and training if information systems are developed
first.
E) None of the above
b
34)
Information systems ethics is about
a. people involved in the system.
b. money involved in the system.
c. software involved in the system.
d. hardware involved in the system.
e. PIPEDA.
a
- In an ideal world, the information systems that a company uses would support the ________ of the
company
A). strategy
B) information technology
C) business ethics
D) data collection
E) online transaction processing
a
- Most jobs in the ICT industry require a mix of ________________ and technical skills.
A). selling
B) programming
C) financial
D) legal
E) interpersonal
b
- The IT structure is like a
A) city building.
B) city plan.
C) enterprise project.
D) enterprise design.
E) governmental design.
b
- Which of the following is true regarding an incident-response plan?
A) The plan should require minimal training on the part of employees.
B) The plan should provide decentralized reporting of all security incidents.
C) The plan should be simple enough to ensure a fast response with limited practice.
D) The plan should identify critical personnel and their off-hours contact information.
E) None of the above
d
- Which of the following is a valid difference between a password and user name?
A) A user name identifies the user whereas a password authenticates the user.
B) A user name is more complex compared to a password.
C) A user name is a primary authentication measure whereas a password is a secondary authentication
measure.
D) A password is used to encode information whereas a user name is used to decode information.
E) None of the above
a
40) Which of the following is NOT an element of computer security?
A) System owners should not have computer security responsibilities outside their own organizations.
B) Computer security responsibilities and accountability should be made explicit.
C) Computer security should be periodically reassessed.
D) Computer security is constrained by societal factors.
E) None of the above
a
- A group of intruders accessed RK Bank’s IP address and accepted payments on the bank’s behalf.
This attack is an example of ________.
A) denial-of-service
B) sniffing
C) spyware
D) spoofing
E) None of the above
d
- A malicious hacker flooded an online retailer’s server with millions of bogus service requests. Due to
this, the Web site’s server was overloaded and the site was unable to service legitimate customer
requests. This attack is an example of which of the following security threats?
A) denial-of-service
B) sniffing
C) spoofing
D) phishing
E) None of the above
a
- Which of the following is an example of transactional data?
A) Trend projection
B) Sales projection
C) Purchasing stock
D) Forecast
E) All of the above
c
44). A(n) ____’s main function is to help you understand the complexities of the real-world environment.
A) constraint
B) entity
C) model
D) database
E) data warehouse
c
45) What must a printer or a laptop have to connect to a wireless LAN? **
A) WNIC
B) UTP
C) VPN
D) POP
E) FTP
d
46). When breaking an M:N relationship into two 1:M relationships, an associative table is required. The
associative table includes—as foreign keys—at least the ____ keys of the tables that are to be linked.
A) Composite
B) Super
C) Primary
D) Unique
E) None of the above
c
47). A(n) ____________________ is a specific request issued to the DBMS for data manipulation.
A) Query
B) Workgroup database
C) Enterprise database
D) Distributed database
E) None of the above
a
48) Which approach views an organization as a series of activities, each of which adds value to the
product or service for each customer?
A. Low cost strategy
B. Business process
C. Value chain
D. First-mover advantage
E. None of the above
c
49) Which of the following describes systems analysts?
A) They work primarily with business processes.
B) They focus on information systems development and lack knowledge on process design.
C) They are active mainly during the system conversion phase of the systems development process.
D) They integrate the work of programmers, testers, and users.
E) None of the above
d
50) ________ is the first activity in the SDLC process.
A) training
B) designing system components
C) determining requirements
D) developing technical safeguards
E) defining the system
e
51) The classical process used to develop information systems is known as the ________ approach.
A) rapid application development (RAD)
B) component-oriented design (COD)
C) extreme programming (XP)
D) object-oriented design (OOD)
E) systems development life cycle (SDLC)
e
52) Which of the following refers to the process of moving the business activity from an old information
system to a new system?
A) Parallel installation
B) Test plan
C) System conversion
D) System definition
E) Installation of Applications
c
53) Which of the following systematically limit(s) the actions and behaviors of employees, processes,
and organizational systems to safeguard assets and to achieve objectives?
A) Augmented reality
B) Collaborative systems
C) Internal controls
D) Augmented reality and Internal Controls
E) None of the above
c
54). A(n) ____ represents a particular type of object in the real world.
A) attribute
B) entity
C) relationship
D) constraint
E.) index
b
55) ______________ technology allows manufacturers to attach tags with antennas and computer
chips.
a) DSL
b) RFID
c) Satellite
d) Smart card
e) None of the above
b
56) What includes a variety of threats such as viruses, worms, and Trojan horses?
A) Malware
B) Hoaxes
C) Spoofing
D) Sniffer
E) Spyware
a
57). What is encryption?
A) Occurs when an organization uses software that filters content to prevent the transmission of
unauthorized information
B) Scrambles information into an alternative form that requires a key to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and
entering the network
D) A form of unsolicited email
B) Software that Scrambles information
b
58) ________ is/are (a) technical safeguard against security threats.
A) Virtual Private Network
B) Passwords
C) Compliance
D) Backup and recovery
E) The cookie-set
a
59) When bogus requests flood a Web server, which of the following occurs?
A) Smurf attacks
B) Hacking attacks
C) Phishing attacks
D) Spoofing attacks
E) DOS attacks
e
60) What is a device that is around the same size as a credit card, containing embedded technologies
that can store information and small amounts of software to perform some limited processing?
A) Token
B) Password
C) Smart card
D) Biometrics
E) RFID
c
61) Social Networking sites usually generate revenue through
A) Advertising.
B) Private investment.
C) Government subsidies
D)They do not generate revenue.
E) Subscription fees
a
62) The price and power of computer chips is expected to ________ over the next ten years.
A) Stay about the same.
B) Grow more dramatically.
C) Shrink.
D) Depend on the economic trends.
E) Obey Moore’s Law
e
63) The physical assembly of a notebook computer is regarded as:
A) a support activity in a value chain.
B) a production activity in a value chain.
C) a value adding activity in a value chain.
D) a secondary activity in a value chain.
E) a primary activity in a value chain.
e
64) A value chain (is)
A) describes total amount of money spent on making a product.
B) describes how a product moves through a distribution channel.
C) a group of activities that improve the efficiency of a good or service.
D) a group of activities that improve the effectiveness of a good or service.
E) describes the transactions that occur between the vendor and the consumer.
d
65) The best example of suppliers’ bargaining power is
A) The customer’s flexibility to switch suppliers at any time.
B) The ability of a dominant microprocessor manufacturer to set industry standards and charge premium
prices.
C) The ability to negotiate better terms with a commodity producer after a competitive bidding process.
D) The ability of a customer to shop around for suppliers.
E) The inability for a customer to terminate a supply contract.
b
66) Which of the following is an example of a support activity in Porter’s value chain model?
A) Customer service
B) Production
C) Raw materials acquisition
D) Human Resource benefits management
E) Sales
d
67) Cloud computing can be more efficient because ________.
A) it uses several computers to address a single problem.
B) it adds to the ability to store data.
C) customers only pay for what they use, and updates are done automatically.
D) it is resident on your computer.
E) all of the above.
c
68) CRM can be delivered over the Internet by using:
A) grid computing.
B) thick clients.
D) server farms.
E) cloud computing.
E) thin clients.
d
69) Keyboards, pointing devices (such as a Wii remote, mouse, or touchpad), scanners, and digital
cameras are examples of:
A) Input devices
B) Output devices
C) Processing devices
D) Storage devices
E) None of the above
a
70) What can a manufacturer use to keep track of all its shipments to suppliers, retailers, and
customers?
A) additive manufacturing
B) RFID
C) augmented reality
D) roll up technology
E) None of the above
b
71) Which of the following is an internal company document that issues an order for a purchase?
A) bill of materials
B) purchase requisition
C) purchase order
D) internal invoice
E) None of the above
b
72) Finished goods inventory contains ________.
A) items returned by customers due to quality issues
B) items used as inputs in the firm’s manufacturing process
C) items placed in storage for future use by the company
D) items awaiting delivery to customers
d
73) Product components and other goods that are ________ are stored in raw materials inventory.
A) Finished
B) procured from suppliers
C) used in external firms’ production processes
D) Procured from suppliers and used in external firm’s production processes
E) None of the above
b
74) Who does a purchase order request an action from?
A) the retailer
B) the customer
C) the internal consultant
D) the supplier
E) None of the above
d
75) A(n) ________ is a written document that requests the delivery of a specified quantity of a product
or service in return for payment.
A) receipt bill
B) purchase order
C) itemized bill
D) bill of materials
E) None of the above
b
76) Which of the following is the process of obtaining the goods and services needed by an
organization.?
A) Procurement
B) Lead generation
C) Fabrication
D) Outbound logistics
E) None of the above
a
77) Which of the following understands the technical aspects of ERP and helps plan, configure, and
implement an ERP system for company use?
A) project manager
B) systems analyst
C) systems developer
D) trainer
E) None of the above
b
78) Which of the following is true of entities?
A) Entities can only represent a logical construct or transaction, not a physical object.
B) Entities have attributes that describe characteristics of the entity.
C) The relationships between entities are known as attributes.
D) An identifier’s value is associated with every entity in the data model.
E) None of the above
b
79) The ________ is a highly popular technique for creating a data model where the developers
describe the content of a database by defining the things that will be stored in the database and the
relationships among those entities.
A) UML model
B) object-role model
C) data integrity model
D) E-R data model
E) None of the above
e
80) Which of the following is true of a data model?
A) It is an attribute whose value is associated with only one entity instance.
B) It is created after the database is designed.
C) It is a logical representation of the structure of the data.
D) It does not describe the relationships among data.
E) None of the above
c
81) Which of the following are used to read, insert, modify, and delete data?
A) Query forms
B) Data access programs
C) Markup language codes
D) Data entry forms
E) None of above
d
82) Query forms are used to ________.
A) locate something in the database
B) modify data
C) track data
D) show data in a structured context
E) None of the above
a
83) Which of the following shows data in a structured context in a typical database application?
A) a query form
B) an application
C) a report
D) an entry form
E) None of the above
c
84) Which of the following is a column or group of columns that identifies a unique row in a table?
A) a field
B) a file
C) a record
D) a key
E) None of the above
d
85) A(n) ________ provides reliable internet transport.
A) FTP
B) HTTP
C) TCP
D) DSL
E) None of the above
c
86) Which of the following is a major risk associated with user-generated content?
A) The company might unknowingly infringe upon copyright laws.
B) The company’s digital content creation costs might increase.
C) The company’s communication might not reach the intended audience.
D) The company might receive unfavorable customer reviews.
E) None of the above
d
87) Which of the following is a requirement of social media?
A) that it relies on product licenses to generate revenue
B) that it depends on user-generated content
C) that it requires users to create personal accounts
D) all of the other options are required
E) None of the above
b
88) Social media is ________.
A) a metaphor for the Internet, which makes software and data services available from any location at
any time.
B) the integration of an organization’s principal processes.
C) the use of information technology to support the sharing of content among networks of users.
D) the applications and platforms on the Web.
E) None of the above
c
89) What does the returns management process in a supply chain manage?
A) financial returns from sales and other sources
B) returns of faulty inputs used in the production process
C) returns of faulty products for businesses
D) relationships with internal suppliers
E) None of the above
c
90) What effect occurs when companies order more supplies than are needed due to a sudden change
in demand?
A) roll up
B) just-in-time
C) bullwhip
D) Doppler
E) None of the above
c