Exam Flashcards

1
Q
Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers?
A) Networking
B) Telephone
C) VOIP
D) Telecommunications
E) Data management
A

D) Telecommunications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is not an IT infrastructure service component?
A) Operating system software
B) Computing platforms to provide a coherent digital environment
C) Physical facilities management to manage the facilities housing physical components
D) IT management services to plan and develop the infrastructure and provide project management
E) IT education services that provide training to employees

A

A) Operating system software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Specifications that establish the compatibility of products and the ability to communicate in a network are called:
A) network standards.
B) telecommunications standards.
C) technology standards.
D) Internet standards.
E) compatibility standards.
A

C) technology standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is a leading networking hardware provider?
A) Dell
B) Intel
C) Seagate
D) IBM
E) Cisco
A

E) Cisco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Software that manages the resources of the computer is called:
A) operating system software.
B) application software.
C) data management software.
D) network software.
E) web services software.
A

A) operating system software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A SAN is a \_\_\_\_\_\_\_\_ network.
A) server area
B) storage area
C) scalable architecture
D) service-oriented architecture
E) software arrangement
A

B) storage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an example of a legacy system?
A) Transaction processing system running on a mainframe.
B) Scalable grid computing system
C) Web services running on a cloud computing platform
D) MDM software
E) Quantum computing system

A

A) Transaction processing system running on a mainframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is not an example of a wearable computing device?
A) Smartwatch
B) Smart glasses
C) Smartphones
D) Activity trackers
E) Smart ID badges
A

C) Smartphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A(n)\_\_\_\_\_\_\_\_ server is used to communicate between a web server and an organization's back-end systems.
A) public server 
B) private server
C) legacy server 
D) application server
E) blade server
A

D) application server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
\_\_\_\_\_\_\_\_ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks. 
A) Mainframes
B) Rack servers
C) Cloud servers
D) Hybrid servers
E) Blade servers
A

E) Blade servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Client/server computing is a primary example of centralized processing.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In N-tier computing, significant parts of website content, logic, and processing are performed by different servers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application server software is responsible for locating and managing stored web pages.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IT infrastructure consists of only those physical computing devices required to operate the enterprise.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An application server may reside on the same computer as a web server or on its own dedicated computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The operating system is used to manage the computer’s activities.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SANs maintain a series of servers and provide fee-paying subscribers with space to maintain their websites.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.
A) 5, 2, 3, 4, 1
B) 5, 4, 2, 3, 1 
C) 4, 5, 2, 3, 1 
D) 5, 4, 2, 1, 3 
E) 4, 5, 3, 2, 1
A

B) 5, 4, 2, 3, 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The introduction of the minicomputer:
A) allowed computers to be customized to the specific needs of departments or business units.
B) strengthened centralized computing.
C) offered new, powerful machines at higher prices than mainframes.
D) represented the rise of Microsoft.
E) was dominated by IBM.

A

A) allowed computers to be customized to the specific needs of departments or business units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A client computer networked to a server computer, with processing split between the two types of computers, is called a(n):
A) service-oriented architecture.
B) on-demand architecture.
C) multi-tiered client/server architecture.
D) two-tiered client/server architecture.
E) divided architecture.

A

D) two-tiered client/server architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a multi-tiered network:
A) the work of the entire network is centralized.
B) the work of the entire network is balanced over several levels of servers.
C) processing is split between clients and servers.
D) processing is handled by multiple, geographically-remote clients.
E) processing is located in the cloud.

A

B) the work of the entire network is balanced over several levels of servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Interpretations of Moore’s law assert that:
A) computing power will eventually level off.
B) transistors decrease in size 50% every two years.
C) data storage costs decrease by 50% every 18 months.
D) PCs decrease in market share by 9% every 5 years.
E) computing power doubles every 18 months.

A

E) computing power doubles every 18 months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Today's nanotechnology-produced computer transistors are roughly equivalent in size to:
A) the width of a fingernail.
B) a human hair.
C) a virus.
D) an atom.
E) a grain of sand.
A

C) a virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
ZipRealty, which combines Google Maps with real estate data, is an example of:
A) cloud computing.
B) SOA.
C) a widget.
D) a mashup.
E) a web service.
A

D) a mashup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Which of the following is a multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms? 
A) Unix
B) Linux
C) OS X
D) COBOL
E) DOS
A

A) Unix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers? 
A) TCP/IP
B) COBOL
C) Ethernet
D) ASCII
E) Linux
A

C) Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The development of TCP/IP occurred during the ________ era.
A) cloud and mobile computing
B) general-purpose mainframe and minicomputer
C) client/server era
D) personal computer
E) enterprise computing

A

E) enterprise computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Which of the following became the standard PC in the Personal Computer Era?
A) Wintel PC
B) DOS PC
C) MITS PC
D) Altair
E) Apple II
A

A) Wintel PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
\_\_\_\_\_\_\_\_ uses individual atoms and molecules to create computer chips and other devices.
A) Virtualization
B) Nanotechnology 
C) Quantum computing
D) A minicomputer
E) On-demand computing
A

B) Nanotechnology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
\_\_\_\_\_\_\_\_ states that the value or power of a network grows exponentially as a function of the number of network members.
A) Metcalfe's Law 
B) Moore's Law
C) Law of scalability
D) Law of outsourcing
E) Law of networks
A

A) Metcalfe’s Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
\_\_\_\_\_\_\_\_ interfaces allow users to employ one or more fingers to manipulate objects on a screen without a mouse or keyboard.
A) Hypertouch 
B) Nanotech 
C) Multitouch
D) Linux 
E) Scalable
A

C) Multitouch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Which of the following is not an example of the mobile digital platform?
A) Tablets
B) Kindle
C) Cell phones
D) CRM
E) Apps
A

D) CRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
All of the following are current hardware platform trends except:
A) green computing.
B) virtualization.
C) cloud computing.
D) Unix.
E) quantum computing.
A

D) Unix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of:
A) co-location.
B) edge computing.
C) grid computing.
D) utility computing.
E) quantum computing.
A

E) quantum computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which of the following is a recent addition to the mobile digital platform?
A) Quantum computing devices
B) Wearable computing devices
C) Cloud computing devices
D) Grid computing devices
E) Green computing devices
A

B) Wearable computing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
At what percent of capacity do most servers operate?
A) 100%
B) 80-90% 
C) approximately 70 percent
D) 40-50%
E) 15-20%
A

E) 15-20%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources? 
A) Cloud computing
B) Autonomic computing
C) Virtualization
D) Multicore processing
E) Ubiquitous computing
A

C) Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?
A) On-demand
B) Grid
C) Edge
D) Autonomic
E) Quantum
A

A) On-demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
All of the following are cloud computing services except:
A) infrastructure as a service.
B) platform as a service.
C) software as a service.
D) on-demand computing.
E) virtualization as a service.
A

E) virtualization as a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
Firms that allow employees to use their own devices are embracing which of the following? 
A) Wearable computing
B) Mobile consolidation
C) Cloud computing
D) BYOD
E) Self computing
A

D) BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The marketplace for computer hardware:
A) has become increasingly concentrated in top firms.
B) has expanded to include a wide variety of start-up and mobile-computing firms.
C) has moved significantly to Asian firms.
D) has been decimated by mobile and cloud computing.
E) has begun moving away from blade servers.

A

A) has become increasingly concentrated in top firms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
Which of the following is the most popular mobile operating system?
A) Linux
B) Android
C) Chrome OS
D) iOS
E) Unix
A

B) Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
Which of the following is not one of the NIST defined characteristics of cloud computing?
A) Ubiquitous network access 
B) Location-independent resource pooling
C) On-demand self service
D) Measured service
E) Reduced elasticity
A

E) Reduced elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
Which of the following is not an example of the consumerization of IT?
A) Google Apps
B) Dropbox 
C) Facebook
D) Gmail
E) Amazon Web Services
A

E) Amazon Web Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
A(n) \_\_\_\_\_\_\_\_ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.
A) multicore processor 
B) legacy processor 
C) scalable processor
D) aggregate circuit
E) green circuit
A

A) multicore processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

In green computing, reducing computer power consumption is a top priority.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Quantum computing is implemented primarily with enterprise or ISP servers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
Which type of software is created and updated by a worldwide community of programmers and available for free?
A) Software packages
B) Mashups
C Outsourced
D) Open source
E) Closed source
A

D) Open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following is not one of the current software platform trends?
A) Web services and service-oriented architecture
B) Open-source software
C) HTML5
D) Software outsourcing
E) Multicore processors

A

E) Multicore processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Linux is:
A) primarily concerned with the tasks of end users.
B) designed for specific machines and specific microprocessors.
C) an example of open-source software.
D) especially useful for processing numeric data.
E) poorly suited to power fast computers.

A

C) an example of open-source software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following statements about Linux is not true?
A) It plays a major role in the back office running local area networks.
B) It is available in free versions downloadable from the Internet.
C) It has garnered 20 percent of the server operating system market.
D) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices.
E) Linux works on all the major hardware platforms.

A

C) It has garnered 20 percent of the server operating system market.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Running a Java program on a computer requires:
A) a Java Virtual Machine to be installed on that computer.
B) a Java Virtual Machine to be installed on the server hosting the Java applet.
C) a miniature program to be downloaded to the user’s computer.
D) no specialized software, as Java is platform-independent.
E) the Mozilla Firefox browser and no other browsers.

A

A) a Java Virtual Machine to be installed on that computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web:
A) service.
B) client.
C) browser.
D) app.
E) beacon.
A

C) browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as:
A) web services.
B) EAI software.
C) SOA.
D) SOAP.
E) SaaS.
A

A) web services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
Which of the following is the foundation technology for web services?
A) XML
B) HTML
C) SOAP
D) UDDI
E) SCSI
A

A) XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
Which of the following refers to a set of self-contained services that communicate with each other to create a working software application?
A) Web services
B) EAI software
C) SOA
D) SOAP
E) Prepackaged software
A

C) SOA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:
A) software packages.
B) mashups.
C) outsourced software.
D) open-source software.
E) service level agreements.
A

A) software packages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
\_\_\_\_\_\_\_\_ are created by combining and customizing components from different online software applications.
A) Apps
B) Web browsers
C) SaaS
D) Web services
E) Mashups
A

E) Mashups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
The practice of contracting custom software development to an outside firm is commonly referred to as:
A) outsourcing.
B) scaling.
C) service-oriented architecture.
D) application integration.
E) utility computing.
A

A) outsourcing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n): 
A) SOA.
B) SLA.
C) TCO.
D) RFQ.
E) SaaS.
A

B) SLA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

SaaS refers to:
A) supplying online access over networks to storage devices and storage area network technology.
B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet.
C) self-contained services that communicate with each other to create a working software application.
D) easy-to-use software tools for displaying Web pages.
E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

A

E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
\_\_\_\_\_\_\_\_ provides a standard format for data exchange, enabling web services to pass data from one process to another.
A) HTML 
B) HTML5
C) Java
D) Chrome OS
E) XML
A

E) XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?
A) Capacity planning
B) Cloud computing
C) Green computing
D) Utility computing
E) On-demand computing
A

C) Green computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

It is much easier to eliminate a cloud service than to remove functionality from a company’s core internal systems.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Hypertext markup language specifies how text, graphics, video, and sound are placed on a web page.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A service-oriented architecture is set of self-contained services that communicate with each other to create a working software application.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which of the following factors does not help explain why computing resources today are even more available than in previous decades?
A) Network economics
B) Law of mass digital storage
C) Moore’s law
D) Declining communications costs and the Internet
E) Widespread rejection of technology standards

A

E) Widespread rejection of technology standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?
A) Modality
B) Scalability
C) Expandability
D) Disintermediation
E) Customizability
A

B) Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q
Hardware and software acquisition costs account for about \_\_\_\_\_\_\_\_ percent of TCO. 
A) 20
B) 40
C) 50
D) 75
E) 90
A

A) 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
A) Supply and demand
B) Return on investment
C) Breakeven point
D) Cost-benefit analysis
E) Total cost of ownership
A

E) Total cost of ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

How would you determine the market demand for your firm’s IT services?
A) Perform a TCO analysis.
B) Benchmark your services.
C) Hold focus groups to assess your services.
D) Analyze sales returns on key investments.
E) Perform a stress test.

A

C) Hold focus groups to assess your services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?
A) Your firm’s business strategy
B) The IT investments made by competitor firms
C) Market demand for your firm’s services
D) Your firm’s organizational culture
E) Information technology assessment

A

D) Your firm’s organizational culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

TCO refers to the original cost of purchased technology: both hardware and software.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

In financial services firms, investments in IT infrastructure represent more than half of all capital invested.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Microsoft is the market leader in client/server networking.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Cloud computing is the fastest growing form of computing.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Exponential growth in the number of transistors and the power of processors is expected to consider for the foreseeable future.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Quantum computing is not yet available to the general public.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which of the following best illustrates the relationship between entities and attributes? A) The entity CUSTOMER with the attribute PRODUCT
B) The entity CUSTOMER with the attribute PURCHASE
C) The entity PRODUCT with the attribute PURCHASE
D) The entity PRODUCT with the attribute CUSTOMER
E) The entity PURCHASE with the attribute CUSTOMER

A

B) The entity CUSTOMER with the attribute PURCHASE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

All of the following are issues with the traditional file environment except:
A) data inconsistency.
B) inability to develop specialized applications for functional areas.
C) lack of flexibility in creating ad-hoc reports.
D) poor security.
E) data sharing.

A

B) inability to develop specialized applications for functional areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q
A characteristic or quality that describes a particular database entity is called a(n):
A) field
B) tuple
C) key field
D) attribute
E) relationship
A

D) attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

A ________ is an example of pre-digital data storage that is comparable to a database.
A) library card catalog
B) cash register receipt
C) doctor’s office invoice
D) list of sales totals on a spreadsheet
E) schedule of due dates on a project outline

A

A) library card catalog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q
\_\_\_\_\_\_\_\_ creates confusion that hampers the creation of information systems that integrate data from different sources.
A) Batch processing
B) Data redundancy
C) Data independence
D) Online processing
E) Data quality
A

B) Data redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q
Data \_\_\_\_\_\_\_\_ occurs when the same data is duplicated in multiple files of a database. 
A) redundancy
B) repetition
C) independence
D) partitions
E) discrepancy
A

A) redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q
Which of the following occurs when the same attribute in related data files has different values?
A) Data redundancy
B) Data duplication
C) Data dependence
D) Data discrepancy
E) Data inconsistency
A

E) Data inconsistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q
Which of the following is a grouping of characters into a word, a group of words, or a complete number?
A) File
B) Table
C) Entity
D) Field
E) Tuple
A

D) Field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

A record is a characteristic or quality used to describe a particular entity.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q
The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems
A) Program-data dependence
B) Lack of flexibility
C) Poor security
D) Lack of data sharing
E) Data redundancy
A

B) Lack of flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Which of the following enables a DBMS to reduce data redundancy and inconsistency?
A) Ability to enforce referential integrity
B) Ability to couple program and data
C) Use of a data dictionary
D) Ability to create two-dimensional tables
E) Ability to minimize isolated files with repeated data

A

E) Ability to minimize isolated files with repeated data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A DBMS makes the:
A) physical database available for different logical views.
B) relational database available for different logical views.
C) physical database available for different analytic views.
D) relational database available for different analytic views.
E) logical database available for different analytic views.

A

A) physical database available for different logical views.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

The logical view of a database:
A) displays the organization and structure of data on the physical storage media.
B) includes a digital dashboard.
C) allows the creation of supplementary reports.
D) enables users to manipulate the logical structure of the database.
E) presents data as they would be perceived by end users.

A

E) presents data as they would be perceived by end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q
Which of the following is a DBMS for desktop computers?
A) DB2
B) Oracle Database
C) Microsoft SQL Server
D) Microsoft Access
E) Microsoft Exchange
A

D) Microsoft Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q
A(n) \_\_\_\_\_\_\_\_ organizes data in two-dimensional tables.
A) non-relational DBMS
B) mobile DBMS
C) relational DBMS
D) hierarchical DBMS
E) object-oriented DBMS
A

C) relational DBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q
Microsoft SQL Server is a(n):
A) DBMS for both desktops and mobile devices.
B) Internet DBMS.
C) desktop relational DBMS.
D) DBMS for midrange computers.
E) DBMS for mobile devices.
A

D) DBMS for midrange computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q
In a table for customers, the information about a single customer resides in a single:
A) field.
B) row.
C) column.
D) table.
E) entity.
A

B) row.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q
In a relational database, a record is referred to in technical terms as a(n):
A) tuple.
B) table.
C) entity.
D) field.
E) key.
A

A) tuple.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q
A field identified in a table as holding the unique identifier of the table's records is called the:
A) primary key.
B) key field.
C) primary field.
D) unique ID.
E) primary entity.
A

A) primary key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q
A field identified in a record as holding the unique identifier for that record is called the:
A) primary key.
B) key field.
C) primary field.
D) unique ID.
E) key attribute.
A

B) key field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q
In a relational database, the three basic operations used to develop useful sets of data are:
A) select, project, and where.
B) select, join, and where.
C) select, project, and join.
D) where, from, and join.
E) where, find, and select.
A

C) select, project, and join.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

The select operation:
A) combines relational tables to provide the user with more information than is otherwise available.
B) creates a subset consisting of columns in a table.
C) identifies the table from which the columns will be selected.
D) creates a subset consisting of all records in the file that meet stated criteria.
E) creates a subset consisting of rows in a table.

A

D) creates a subset consisting of all records in the file that meet stated criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

The join operation:
A) combines relational tables to provide the user with more information than is otherwise available.
B) identifies the table from which the columns will be selected.
C) creates a subset consisting of columns in a table.
D) organizes elements into segments.
E) creates a subset consisting of rows in a table.

A

A) combines relational tables to provide the user with more information than is otherwise available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

A) combines relational tables to provide the user with more information than is otherwise available.
B) creates a subset consisting of columns in a table.
C) organizes elements into segments.
D) identifies the table from which the columns will be selected.
E) creates a subset consisting of rows in a table.

A

B) creates a subset consisting of columns in a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Microsoft Access’s data dictionary displays all of the following information about a filed except the:
A) size of the field
B) format of the field.
C) description of the field.
D) type of the field.
E) the organization within the organization that is responsible for maintain the data.

A

E) the organization within the organization that is responsible for maintain the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q
Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?
A) Data dictionary
B) Data definition diagram
C) Entity-relationship diagram
D) Relationship dictionary
E) Data table.
A

A) Data dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q
Which of the following is a specialized language that programmers use to add and change data in the database? 
A) Data access language.
B) Data manipulation language.
C) Structured query language.
D) Data definition language.
E) DBMS.
A

B) Data manipulation language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q
Which of the following is the most prominent data manipulation language today?
A) Access
B) DB2
C) SQL
D) Crystal Reports
E) NoSQL
A

C) SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

DBMSs typically include report-generating tools in order to:
A) retrieve and display data.
B) display data in an easier-to-read format.
C) display data in graphs.
D) perform predictive analysis.
E) analyze the database’s performance.

A

B) display data in an easier-to-read format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
A) normalization.
B) data scrubbing.
C) data cleansing.
D) data defining.
E) optimization.
A

A) normalization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q
A schematic of the entire database that describes the relationships in a database is called a(n):
A) data dictionary.
B) intersection relationship diagram.
C) entity-relationship diagram.
D) data definition diagram.
E) data analysis table.
A

C) entity-relationship diagram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with:
A) one short mark.
B) two short marks.
C) three short marks.
D) a crow's foot.
E) a crow's foot topped by a short mark.
A

E) a crow’s foot topped by a short mark.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q
You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?
A) Address
B) City
C) Airport code
D) State
E) Day
A

C) Airport code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

The logical and physical views of data are separated in a DBMS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Every record in a file should contain at least one key field.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

NoSQL technologies are used to manage sets of data that don’t require the flexibility of tables and relations.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

CGI is a DBMS programming language that end users and programmers use to manipulate data in the database.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Complicated groupings of data in a relational database need to be adjusted to eliminate awkward many-to-many relationships.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

A physical view shows data as it is actually organized and structured on the data storage media.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

DBMS have a data definition capability to specify the structure of the content of the database.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Relational DBMSs use key field rules to ensure that relationships between coupled tables remain consistent.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

The term big data refers to all of the following except:
A) datasets with fewer than a billion records.
B) datasets with unstructured data.
C) machine-generated data (i.e. from sensors).
D) data created by social media (i.e. tweets, Facebook Likes).
E) data from Web traffic.

A

A) datasets with fewer than a billion records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q
Which of the following technologies would you use to analyze the social media data collected by a major online retailer?
A) OLAP
B) Data warehouse
C) Data mart
D) Hadoop
E) DBMS
A

D) Hadoop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q
Which of the following is not one of the techniques used in web mining?
A) Content mining
B) Structure mining
C) Server mining
D) Usage mining
E) Data mining
A

C) Server mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will the data mining software you are using to do which of the following?
A) Identify associations
B) Identify clusters
C) Identify sequences
D) Classify data
E) Create a forecast
A

C) Identify sequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q
You work for a car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will the data mining software you are using to do which of the following?
A) Identify associations
B) Identify clusters
C) Identify sequences
D) Classify data
E) Create a forecast
A

D) Classify data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q
A data warehouse is composed of:
A) historical data from legacy systems.
B) current data.
C) internal and external data sources.
D) historic and current internal data.
E) historic external data.
A

D) historic and current internal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q
All of the following are technologies used to analyze and manage big data except:
A) cloud computing.
B) noSQL.
C) in-memory computing.
D) analytic platforms.
E) Hadoop.
A

A) cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q
A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data?
A) Text mining tools
B) Sentiment analysis software
C) Web mining technologies
D) Data mining software 
E) Data governance software
A

B) Sentiment analysis software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q
Which of the following tools enables users to view the same data in different ways using multiple dimensions?
A) Predictive analysis
B) SQL
C) OLAP
D) Data mining
E) Hadoop
A

C) OLAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

OLAP enables:
A) users to obtain online answers to ad-hoc questions in a rapid amount of time.
B) users to view both logical and physical views of data.
C) programmers to quickly diagram data relationships.
D) programmers to normalize data.
E) users to quickly generate summary reports.

A

A) users to obtain online answers to ad-hoc questions in a rapid amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Data mining allows users to:
A) quickly compare transaction data gathered over many years.
B) find hidden relationships in data.
C) obtain online answers to ad-hoc questions in a rapid amount of time.
D) summarize massive amounts of data into much smaller, traditional reports.
E) access the vast amounts of data in a data warehouse.

A

B) find hidden relationships in data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

In the context of data relationships, the term associations refers to:
A) events linked over time.
B) patterns that describe a group to which an item belongs.
C) occurrences linked to a single event.
D) undiscovered groupings.
E) relationships between different customers.

A

C) occurrences linked to a single event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q
\_\_\_\_\_\_\_\_ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships.
A) OLAP
B) Text mining
C) In-memory
D) Clustering
E) Classification
A

B) Text mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q
Which of the following enables you to create a script that allows a web server to communicate with a back-end database? 
A) CGI
B) HTML
C) Java
D) SQL
E) NoSQL
A

A) CGI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

HTML has become the preferred method of communicating with back-end databases because it is a cross-platform language.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Legacy systems are used to populate and update data warehouses.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Multiple data marts are combined and streamlined to create a data warehouse.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

You can use OLAP to perform multidimensional data analysis.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

OLAP is unable to manage and handle queries with very large sets of data.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

In-memory computing relies primarily on a computer (RAM) for data storage.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Middleware is an application that transfers information from an organization’s internal database to a web server for delivery to a user as part of a web page.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Implementing a web interface for an organization’s internal database usually requires substantial changes to be made to the database.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

You can manipulate data on a web server by using a CGI script.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

You can use text mining tools to analyze unstructured data, such as memos and legal cases.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

In a client/server environment, a DBMS is located on a dedicated computer called a web server.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Associations are occurrences linked to multiple events.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q
Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases?
A) Database server software
B) Application server software
C) Web browser software
D) Data mining software
E) Web server software
A

B) Application server software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q
In data mining, which of the following involves using a series of existing values to determine what other future values will be?
A) Associations
B) Sequences
C) Classifications
D) Clustering
E) Forecasting
A

E) Forecasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q
An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n):
A) information policy.
B) data definition file.
C) data quality audit.
D) data governance policy.
E) data policy.
A

A) information policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q
In a large organization, which of the following functions would be responsible for physical database design and maintenance?
A) Data administration
B) Database administration.
C) Information policy administration
D) Data auditing
E) Database management
A

B) Database administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name?
A) Data normalization
B) Data accuracy
C) Data redundancy
D) Data inconsistency
E) Data duplication
A

D) Data inconsistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:
A) data auditing.
B) defragmentation.
C) data scrubbing.
D) data optimization.
E) data normalization.
A

C) data scrubbing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Data cleansing not only corrects errors but also:
A) establishes logical relationships between data.
B) structures data.
C) normalizes data.
D) removes duplicate data.
E) enforces consistency among different sets of data.

A

E) enforces consistency among different sets of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Which of the following is not a method for performing a data quality audit?
A) Surveying entire data files
B) Surveying samples from data files
C) Surveying data definition and query files
D) Surveying end users about their perceptions of data quality
E) Surveying managers about their perceptions of data quality

A

C) Surveying data definition and query files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

The term data governance refers to the policies and processes for managing the integrity and security of data in a firm.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q
In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources?
A) Data administration
B) Database administration.
C) Information policy administration
D) Data auditing
E) Database management
A

A) Data administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Data scrubbing is a more intensive corrective process than data cleansing.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q
In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules?
A) Associations
B) Sequences
C) Classifications
D) Clustering
E) Forecasting
A

C) Classifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q
In data mining, which of the following involves events linked over time? 
A) Associations
B) Sequences
C) Classifications
D) Clustering
E) Forecasting
A

B) Sequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q
MongoDB and SimpleDB are both examples of:
A) open source databases.
B) SQL databases.
C) NoSQL databases.
D) cloud databases.
E) .big data databases.
A

C) NoSQL databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:
A) in two short marks.
B) in one short mark.
C) with a crow’s foot.
D) with a crow’s foot topped by a short mark.
E) with a crow’s foot topped by two short marks.

A

A) in two short marks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q
Which of the following would you use to find patterns in user interaction data recorded by a web server?
A) Web usage mining
B) Web server mining
C) Web structure mining
D) Web content mining
E) Web protocol mining
A

A) Web usage mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q
Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination? 
A) Hub
B) Switch
C) Router
D) NIC
E) Modem
A

B) Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

The Internet is based on which three key technologies?
A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers
D) Client/server computing, packet switching, and HTTP
E) E-mail, instant messaging, and newsgroups

A

C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? 
A) Multiplexing
B) Packet shifting
C) Packet routing
D) ATM.
E) Packet switching
A

E) Packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q
The telephone system is an example of a \_\_\_\_\_\_\_\_ network.
A) peer-to-peer
B) wireless
C) packet-switched
D) circuit-switched
E) client/server
A

D) circuit-switched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Which of the following is not a characteristic of packet switching?
A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.
E) Packets are reassembled into the original message when they reach their destinations.

A

C) Packet switching requires point-to-point circuits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

In TCP/IP, IP is responsible for which of the following?
A) Disassembling and reassembling packets during transmission
B) Establishing an Internet connection between two computers
C) Moving packets over the network
D) Sequencing the transfer of packets
E) Breaking messages down into packets

A

A) Disassembling and reassembling packets during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Which of the following is the best description of a protocol in a telecommunications network architecture?
A) A device that handles the switching of voice and data in a local area network
B) A standard set of rules and procedures for control of communications in a network
C) A communications service for microcomputer users
D) The main computer in a telecommunications network
E) A pathway through which packets are routed

A

B) A standard set of rules and procedures for control of communications in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

What are the four layers of the TCP/IP reference model?
A) Physical, application, transport, and network interface
B) Physical, application, Internet, and network interface
C) Application, transport, Internet, and network interface
D) Application, hardware, Internet, and network interface
E) Software, hardware, network interface, Internet

A

C) Application, transport, Internet, and network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q
On which of the following protocols is the Internet based? 
A) TCP/IP
B) FTP
C) IMAP
D) HTTP
E) DNS
A

A) TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q
A(n) \_\_\_\_\_\_\_\_ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.
A) modem
B) router
C) packet
D) telnet
E) hub
A

B) router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Computer networks are fundamentally different from telephone networks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

An NOS must reside on a dedicated server computer in order to manage a network.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

A hub is a networking device that is used to filter and forward data to specified destinations on the network.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

A computer network consists of at least three computers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Central large mainframe computing has largely replaced client/server computing.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

More than 200 million Americans access the Internet via mobile devices.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

TCP/IP was developed in the developed during the early 1970s to support Uefforts to help scientists transmit data among different types of computers over long distances.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q
Which signal types are represented by a continuous waveform?
A) Laser
B) Optical
C) Digital
D) RFID
E) Analog
A

E) Analog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q
To use the analog telephone system for sending digital data, you must also use:
A) a modem.
B) a router.
C) DSL.
D) twisted wire.
E) TCP/IP.
A

A) a modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q
Which type of network is used to connect digital devices within a half-mile or 500-meter radius? 
A) Wi-Fi
B) LAN
C) WAN
D) MAN
E) SAN
A

B) LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
A) MAN
B) Wireless
C) LAN
D) Windows domain network
E) Peer-to-peer
A

E) Peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q
Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?
A) MAN
B) Domain-based LAN
C) Peer-to-peer network
D) WAN
E) SAN
A

C) Peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q
A network that spans a city, and sometimes its major suburbs, as well, is called a:
A) CAN.
B) MAN.
C) LAN.
D) WAN.
E) WSN.
A

B) MAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q
A network that covers entire geographical regions is most commonly referred to as a(n):
A) local area network.
B) intranet.
C) peer-to-peer network.
D) wide area network.
E) MAN.
A

D) wide area network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Bandwidth is the:
A) number of frequencies that can be broadcast through a medium.
B) number of cycles per second that can be sent through a medium.
C) difference between the highest and lowest frequencies that can be accommodated on a single channel.
D) total number of bytes that can be sent through a medium per second.
E) geographical distance spanned by a network.

A

C) difference between the highest and lowest frequencies that can be accommodated on a single channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
A) bps.
B) Hertz.
C) baud.
D) gigaflops.
E) RPMs.
A

A) bps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q
A(n) \_\_\_\_\_\_\_\_ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
A) modulated
B) broadband
C) T1
D) analog
E) digital
A

E) digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

Fiber-optic cable is more expensive and harder to install than wire media.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q
Which of the following is not one of the top five search engines?
A) Facebook
B) Yahoo
C) Microsoft Bing
D) Ask
E) Google
A

A) Facebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

Digital subscriber lines:
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial cable lines to deliver Internet access.
C) are very-high-speed data lines typically leased from long-distance telephone companies.
D) have up to twenty-four 64-Kbps channels.
E) are assigned to every computer on the Internet.

A

A) operate over existing telephone lines to carry voice, data, and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

T1 lines:
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) do not provide guaranteed service levels, but simply “best effort.”
D) have up to twenty-four 64-Kbps channels.
E) are high-speed, leased data lines providing guaranteed service levels.

A

E) are high-speed, leased data lines providing guaranteed service levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q
What service converts IP addresses into more recognizable alphanumeric names? 
A) HTML
B) FTP
C) IP
D) HTTP
E) DNS
A

E) DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q
The child domain of the root is called the:
A) top-level domain.
B) second-level domain.
C) host name.
D) domain extension.
E) mid-tier domain.
A

A) top-level domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

In the domain name “http://books.azimuth-interactive.com”, which element is the second-level domain?
A) books
B) azimuth-interactive
C) com
D) none; there is no second-level domain in this name
E) books.azimuth-interactive

A

B) azimuth-interactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q
Which organization helps define the overall structure of the Internet?
A) none (no one "owns" the Internet)
B) W3C
C) ICANN
D) The Department of Commerce (U.S.)
E) IAB
A

E) IAB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

IPv6 has been developed in order to:
A) update the packet transmission protocols for higher bandwidth.
B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
E) reduce excess IP addresses.

A

B) create more IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Predictive search in Google’s search engine:
A) maintains a history of your searches and then predicts what you will search on next.
B) uses a tracking service and cookies on your browser to predict search results.
C) uses a knowledge graph of what similar people searched on to predict your search interests.
D) uses a semantic approach to predict what you are looking for.
E) predicts what you are looking for as you enter words into the query box.

A

E) predicts what you are looking for as you enter words into the query box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q
Instant messaging is a type of \_\_\_\_\_\_\_\_ service.
A) chat
B) cellular
C) e-mail
D) wireless
E) network
A

A) chat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q
\_\_\_\_\_\_\_\_ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
A) Wireless networks
B) Intranets
C) Virtual private networks
D) Modems
E) Unified communications
A

E) Unified communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

A VPN:
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
E) is a proprietary networking service technology developed by individual corporations.

A

A) is an encrypted private network configured within a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q
Web browser software requests web pages from the Internet using which of the following protocols? 
A) URL
B) HTTP
C) DNS
D) HTML
E) FTP
A

B) HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):
A) uniform resource locator.
B) IP address.
C) third-level domain.
D) root domain.
E) child domain.
A

A) uniform resource locator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q
The most common web server today is:
A) Microsoft IIS.
B) WebSTAR.
C) IBM HTTP Server.
D) Netscape Server.
E) Apache HTTP Server.
A

E) Apache HTTP Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q
Which of the following pulls content from websites and feeds it automatically to a user’s computers? 
A) FTP
B) RSS
C) HTTP
D) Bluetooth
E) IPv6
A

B) RSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q
Which of the following can be used to help a website achieve a higher ranking with the major search engines? 
A) VPN.
B) IAB.
C) SEM.
D) SEO.
E) RSS.
A

D) SEO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

Which of the following statements is not true about search engines?
A) They are arguably the Internet’s “killer app.”
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
E) Users are increasingly using search engines on mobile devices.

A

D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q
Which process is used to protect transmitted data in a VPN?
A) Tunneling
B) PPP
C) VOIP
D) Packet-switching
E) Chaining
A

A) Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q
\_\_\_\_\_\_\_\_ monetizes the value of the data stored by search engines.
A) TCP/IP
B) RSS
C) WiMax
D) IoT
E) SEM
A

E) SEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q
Shopping bots use \_\_\_\_\_\_\_\_ software for searching the Internet.
A) Web 2.0
B) Web 3.0
C) intelligent agent
D) comparison
E) SEO
A

C) intelligent agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q
Which of the following is not a defining feature of Web 2.0?
A) Interactivity
B) Real-time user control
C) Semantic search
D) Social participation (sharing)
E) User-generated content
A

C) Semantic search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q
A(n) \_\_\_\_\_\_\_\_ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
A) RSS
B) WAN
C) NFP
D) ISP
E) FTP
A

D) ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q
The backbone networks of the Internet are typically owned by long-distance telephone companies called:
A) regional network providers.
B) enhanced service providers.
C) internet bulk providers.
D) backbone providers.
E) network service providers.
A

E) network service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q
A(n) \_\_\_\_\_\_\_\_ is software for locating and managing stored web pages.
A) web server
B) net server
C) router
D) modem
E) hub
A

web pages.

A) web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

Wikis allow visitors to change or add to the original posted material.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

The Domain Name System (DNS) converts domain names to IP addresses.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

VoIP technology delivers voice information in digital form using packet switching.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

Web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

Mobile search makes up at more than 50% of all Internet searches.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q
All of the following are physical components of an RFID system except:
A) bar codes.
B) antennas.
C) radio transmitters.
D) tags.
E) a stationary or handheld device.
A

A) bar codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q
Which digital cellular standard is used widely throughout the world except the United States?
A) GSM
B) CDMA
C) WLAN
D) LTD
E) 4G
A

A) GSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q
The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called:
A) the Internet of Things.
B) the Semantic Web.
C) Internet2.
D) a 3-D Web.
E) Web 2.0.
A

A) the Internet of Things.

238
Q

Which of the following statements about RFID is not true?
A) RFIDs transmit only over a short range.
B) RFIDs use an antenna to transmit data.
C) Microchips embedded in RFIDs are used to store data.
D) RFIDs require line-of-sight contact to be read.
E) RFID tags and antennas come in a variety of shapes and sizes.

A

D) RFIDs require line-of-sight contact to be read.

239
Q
Which of the following is the first generation of cellular systems suitable for watching videos?
A) 2G
B) 2.5G
C) 3G
D) 3.5G
E) 4G
A

E) 4G

240
Q
4G networks use which of the following standards?
A) GSM and LTD
B) CDMA and PAN
C) LTE and LTD
D) T-Mobile and AT&T
E) LTE and WiMax
A

E) LTE and WiMax

241
Q
The most appropriate wireless networking standard for creating PANs is:
A) I-mode.
B) IEEE 802.11b.
C) Wi-Fi.
D) Bluetooth.
E) RFID.
A

D) Bluetooth.

242
Q
Bluetooth can be used to link up to \_\_\_\_\_\_\_\_ devices within a 10-meter area using low-power, radio-based communication. 
A) two
B) five
C) eight
D) fifteen
E) twenty
A

C) eight

243
Q
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
A) touch points.
B) netcenters.
C) hot points.
D) wireless hubs.
E) hotspots.
A

E) hotspots.

244
Q
The 802.11 set of standards is known as:
A) WLAN.
B) WSN.
C) Wi-Fi.
D) WiMax.
E) WAN.
A

C) Wi-Fi.

245
Q
The WiMax standard can transmit up to a distance of approximately:
A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
E) 70 miles.
A

C) 30 miles.

246
Q
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?
A) Logging transactions
B) Managing the supply chain
C) Lowering network costs
D) Enabling client communication
E) Improving employee engagement
A

B) Managing the supply chain

247
Q
Macy’s Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following?
A) IoT application
B) IoP application
C) BLE application
D) GPS application
E) Web 3.0 application
A

A) IoT application

248
Q
A(n) \_\_\_\_\_\_\_\_ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
A) RFID receiver
B) WiMax receiver
C) access point
D) hub
E) hotspot
A

C) access point

249
Q

RFID technology is being gradually replaced by less costly technologies such as WSNs.

A

False

250
Q

e “Internet of Things” refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet.

A

True

251
Q

Apple Pay uses an RFID-related technology called near field communication.

A

True

252
Q

NFC tags are always passive.

A

False

253
Q

Digital rights activists believe “zero-rating” practices violate net neutrality principles.

A

True

254
Q

In addition to being an online retailer, Amazon is also a powerful search engine.

A

True

255
Q

The emerging Internet of People is based on sensors attached to clothing and personal effects that monitor physical states and locations of individuals.

A

True

256
Q
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? 
A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management
A

A) Security

257
Q
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls
A

E) Controls

258
Q
Most computer viruses deliver a: 
A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.
A

E) payload.

259
Q

Which of the following statements about wireless security is not true?
A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network,
D) Intruders can force a user’s NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

A

E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

260
Q
All of the following are specific security challenges that threaten the communications lines in a client/server environment except: 
A) errors.
B) tapping.
C) theft and fraud.
D) radiation.
E) sniffing.
A

A) errors.

261
Q
All of the following are specific security challenges that threaten corporate servers in a client/server environment except:
A) hacking.
B) malware.
C) denial-of-service attacks.
D) sniffing.
E) vandalism.
A

D) sniffing.

262
Q
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
A) theft of data.
B) copying of data.
C) alteration of data.
D) radiation.
E) hardware failure.
A

D) radiation.

263
Q
CryptoLocker is an example of which of the following?
A) Worm
B) SQL injection attack
C) Sniffer
D) Evil twin
E) Ransomware
A

E) Ransomware

264
Q

Which of the following statements about the Internet security is not true?
A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides access.
C) VoIP is more secure than the switched voice network.
D) Instant messaging can provide hackers access to an otherwise secure network.
E) Smartphones have the same security weaknesses as other Internet devices.

A

C) VoIP is more secure than the switched voice network

265
Q

A Trojan horse:
A) is software that appears to be benign but does something other than expected.
B) is a virus that replicates quickly.
C) is malware named for a breed of fast-moving Near-Eastern horses.
D) installs spyware on users’ computers.
E) is a type of sniffer used to infiltrate corporate networks.

A

A) is software that appears to be benign but does something other than expected.

266
Q
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
A) phishing.
B) pharming.
C) spoofing.
D) evil twins.
E) click fraud.
A

E) click fraud.

267
Q
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
A) Sasser
B) Zeus 
C) Cryptolocker
D) ILOVEYOU
E) Conficker
A

E) Conficker

268
Q
\_\_\_\_\_\_\_\_ is malware that hijacks a user's computer and demands payment in return for giving back access.
A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin
A

B) Ransomware

269
Q
\_\_\_\_\_\_\_\_ is malware that logs and transmits everything a user types.
A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer
A

C) A keylogger

270
Q

Which of the following statements about botnets is not true?
A) Eighty percent of the world’s malware is delivered by botnets..
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world’s spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.

A

E) It is not possible to make a smartphone part of a botnet.

271
Q
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) \_\_\_\_\_\_\_\_ attack.
A) DDoS
B) DoS
C) SQL injection
D) phishing
E) botnet
A

A) DDoS

272
Q

Which of the following is not an example of a computer used as a target of crime?
A) Knowingly accessing a protected computer to commit fraud
B) Accessing a computer system without authority
C) Illegally accessing stored electronic communication
D) Threatening to cause damage to a protected computer
E) Breaching the confidentiality of protected computerized data

A

C) Illegally accessing stored electronic communication

273
Q

Which of the following is not an example of a computer used as an instrument of crime?
A) Theft of trade secrets
B) Intentionally attempting to intercept electronic communication
C) Unauthorized copying of software
D) Breaching the confidentiality of protected computerized data
E) Schemes to defraud

A

D) Breaching the confidentiality of protected computerized data

274
Q

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?
A) Computer Fraud and Abuse Act
B) Economic Espionage Act
C) Electronic Communications Privacy Act
D) Data Security and Breach Notification Act
E) National Information Infrastructure Protection Act

A

E) National Information Infrastructure Protection Act

275
Q
The intentional defacement or destruction of a website is called:
A) spoofing.
B) cybervandalism. 
C) cyberwarfare.
D) phishing.
E) pharming.
A

B) cybervandalism.

276
Q

Evil twins are:
A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) e-mail messages that mimic the e-mail messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business’s website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.

A

E) bogus wireless network access points that look legitimate to users.

277
Q

Pharming involves:
A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
B) pretending to be a legitimate business’s representative in order to garner information about a security system.
C) setting up fake website to ask users for confidential information.
D) using e-mails for threats or harassment.
E) setting up fake Wi-Fi access points that look as if they are legitimate public networks

A

A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

278
Q
hich of the following is the single greatest cause of network security breaches?
A) Viruses
B) User lack of knowledge
C) Trojan horses
D) Cyberwarfare
E) Bugs
A

B) User lack of knowledge

279
Q
Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:
A) sniffing.
B) social engineering.
C) phishing.
D) pharming.
E) snooping
A

B) social engineering.

280
Q
According to Ponemon Institute’s 2015 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately: 
A) $1.5 million.
B) $15 million.
C) $150 million.
D) $1.5 billion.
E) $15 billion.
A

B) $15 million.

281
Q
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? 
A) War driving
B) Sniffing
C) Cybervandalism
D) Drive-by tapping
E) Snooping
A

A) War driving

282
Q
\_\_\_\_\_\_\_\_ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else. 
A) Identity theft
B) Spoofing
C) Social engineering
D) Evil twins
E) Pharming
A

A) Identity theft

283
Q
\_\_\_\_\_\_\_\_ identify the access points in a Wi-Fi network.
A) NICs
B) Mac addresses
C) URLs
D) UTMs
E) SSIDs
A

E) SSIDs

284
Q
A foreign country attempting to access government networks in order to disable a national power grid is an example of:
A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.
A

C) cyberwarfare

285
Q

Smartphones have the same security flaws as other Internet-connected devices.

A

True

286
Q

The Apple iOS platform is mobile platform most frequently targeted by hackers

A

False

287
Q

Viruses can be spread through e-mail.

A

True

288
Q

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

A

False

289
Q

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

A

False

290
Q

A computer virus replicates more quickly than a computer worm

A

False

291
Q

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

A

True

292
Q

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

A

True

293
Q

DoS attacks are used to destroy information and access restricted areas of a company’s information system.

A

False

294
Q

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

A

True

295
Q

Most IoT devices support sophisticated security approaches

A

False

296
Q

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

A

False

297
Q

The HIPAA Act of 1996:
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

A

D) outlines medical security and privacy rules.

298
Q

The Gramm-Leach-Bliley Act:
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

A

A) requires financial institutions to ensure the security of customer data.

299
Q

The Sarbanes-Oxley Act:
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

A

C) imposes responsibility on companies and management to safeguard the accuracy of financial information.

300
Q
Which of the following is the most common type of electronic evidence?
A) Voice-mail
B) Spreadsheets
C) Instant messages
D) E-mail
E) VOIP data
A

D) E-mail

301
Q

Which of the following is a type of ambient data?
A) Computer log containing recent system errors
B) A file deleted from a hard disk
C) A file that contains an application’s user settings
D) A set of raw data from an environmental sensor
E) Data that has been recorded over

A

B) A file deleted from a hard disk

302
Q

Computer forensics tasks include all of the following except:
A) presenting collected evidence in a court of law.
B) securely storing recovered electronic data.
C) collecting physical evidence on the computer.
D) finding significant information in a large volume of electronic data.

A

C) collecting physical evidence on the computer.

303
Q
Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure? 
A) $500
B) $1,000
C) $1,250
D) $1,500
E) $2,500
A

C) $1,250

304
Q

Application controls:
A) can be classified as input controls, processing controls, and output controls.
B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
D) include software controls, computer operations controls, and implementation controls.
E) monitor the use of system software and prevent unauthorized access to software and programs.

A

A) can be classified as input controls, processing controls, and output controls.

305
Q
\_\_\_\_\_\_\_\_ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
A) Software 
B) Administrative 
C) Data security 
D) Implementation 
E) Input
A

C) Data security

306
Q
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?
A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
A

C) Risk assessment

307
Q
A statements ranking information risks and identifying security goals would be included in which of the following?
A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
A

A) Security policy

308
Q

An acceptable use policy defines the acceptable level of access to information assets for different users.

A

False

309
Q
Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?
A) TLS
B) AUP
C) VPN
D) WPA2
E) UTM
A

D) WPA2

310
Q

Which of the following statements about passwords is not true?
A) Authentication cannot be established by the use of a password
B) Password systems that are too rigorous may hinder employee productivity.
C) Passwords can be stolen through social engineering.
D) Passwords are often disregarded by employees.
E) Passwords can be sniffed when being transmitted over a network.

A

A) Authentication cannot be established by the use of a password

311
Q

An authentication token is a(n):
A) device the size of a credit card that contains access permission data.
B) type of smart card.
C) gadget that displays passcodes.
D) electronic marker attached to a digital authorization file.

A

C) gadget that displays passcodes.

312
Q
All of the following are currently being used as traits that can be profiled by biometric authentication except:
A) fingerprints.
B) facial characteristics.
C) body odor.
D) retinal images.
E) voice.
A

C) body odor.

313
Q

A firewall allows the organization to:
A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing e-mail messages.
E) create access rules for a network.

A

A) enforce a security policy on data exchanged between its network and the Internet.

314
Q

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
E) Firewalls

A

B) Intrusion detection systems

315
Q
Currently, the protocols used for secure information transfer over the Internet are:
A) TCP/IP and SSL.
B) S-HTTP and CA.
C) HTTP and TCP/IP.
D) S-HTTP and SHTML.
E) SSL, TLS, and S-HTTP.
A

E) SSL, TLS, and S-HTTP.

316
Q
According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2015?
A) $1.5 million
B) $15 million
C) $150 million
D) $1.5 billion
E) $15 billion
A

E) $15 billion

317
Q
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
A) SSL/TLS
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) Distributed encryption
A

B) Symmetric key encryption

318
Q

A digital certificate system:
A) uses third-party CAs to validate a user’s identity.
B) uses digital signatures to validate a user’s identity.
C) uses tokens to validate a user’s identity.
D) is used primarily by individuals for personal correspondence.
E) protects a user’s identity by substituting a certificate in place of identifiable traits.

A

A) uses third-party CAs to validate a user’s identity.

319
Q
All of the following are types of information systems general controls except:
A) application controls.
B) computer operations controls.
C) physical hardware controls.
D) software controls.
E) administrative controls
A

A) application controls.

320
Q
For 100-percent availability, online transaction processing requires:
A) high-capacity storage.
B) a multi-tier server network.
C) fault-tolerant computer systems.
D) dedicated phone lines.
E) a digital certificate system.
A

C) fault-tolerant computer systems.

321
Q
In controlling network traffic to minimize slow-downs, a technology called \_\_\_\_\_\_\_\_ is used to examine data files and sort low-priority data from high-priority data.
A) high availability computing
B) deep-packet inspection
C) application proxy filtering
D) stateful inspection
E) unified threat management
A

B) deep-packet inspection

322
Q
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:
A) smart card authentication.
B) biometric authentication.
C) two-factor authentication.
D) symmetric key authorization.
E) token authentication.
A

C) two-factor authentication.

323
Q
Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver?
A) NAT
B) Packet filtering
C) Deep packet inspection
D) Stateful inspection
E) Application proxy filtering
A

D) Stateful inspection

324
Q
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called \_\_\_\_\_\_\_\_ systems. 
A) DPI
B) MSSP
C) NSP
D) PKI
E) UTM
A

E) UTM

325
Q

Organizations can use existing network security software to secure mobile devices

A

False

326
Q

The dispersed nature of cloud computing makes it difficult to track unauthorized access.

A

True

327
Q

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.

A

False

328
Q

Packet filtering catches most types of network attacks.

A

False

329
Q

NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs

A

True

330
Q

SSL is a protocol used to establish a secure connection between two computers.

A

True

331
Q

Public key encryption uses two keys.

A

True

332
Q

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

A

False

333
Q

Authentication refers to verifying that a person is who he or she claims to be.

A

True

334
Q

You can test software before it is even written by conducting a walkthrough.

A

True

335
Q

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

A

True

336
Q

All of the following have contributed to an increase in software flaws except:
A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets,
D) the inability to fully test programs.
E) the increase in malicious intruders seeking system access.

A

E) the increase in malicious intruders seeking system access.

337
Q
Which of the following defines acceptable uses of a firm’s information resources and computing equipment? 
A) An information systems audit policy
B) A CA policy
C) A MSSP
D) A UTM system
E) An AUP
A

E) An AUP

338
Q
Which of the following focuses primarily on the technical issues of keeping systems up and running?
A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit
A

C) Disaster recovery planning

339
Q
Which of the following is an example of a keylogger?
A) Zeus
B) Conficker
C) Sasser
D) ILOVEYOU
E) Cryptolocker
A

A) Zeus

340
Q

Target has had to pay out over $100 million to U.S. banks, credit card companies and consumers as a result of a data breach in 2013.

A

True

341
Q

Which of the following statements best describes the business value of improved decision making?
A) Improved decision making creates better products.
B) Improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values.
C) Improved decision making enables senior executives to more accurately foresee future financial trends.
D) Improved decision making strengthens customer and supplier intimacy, which reduces costs.
E) Improved decision making creates a better organizational culture.

A

B) Improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values.

342
Q
When there is no well-understood or agreed-on procedure for making a decision, it is said to be:
A) undocumented.
B) unstructured.
C) documented.
D) semi-structured.
E) ad-hoc.
A

B) unstructured.

343
Q
If you can follow a definite procedure to make a business decision, you are making a(n) \_\_\_\_\_\_\_\_ decision.
A) ad-hoc
B) procedural
C) unstructured
D) semistructured
E) structured
A

E) structured

344
Q
Which type of decision is calculating gross pay for hourly workers?
A) Semi-structured
B) Procedural
C) Structured
D) Unstructured
E) Ad hoc
A

C) Structured

345
Q
Which type of decision is deciding whether to introduce a new product line?
A) Structured
B) Unstructured
C) Recurring
D) Nonrecurring
E) Procedural
A

B) Unstructured

346
Q
The decision to approve a capital budget is an example of a(n) \_\_\_\_\_\_\_\_ decision.
A) structured
B) ad hoc
C) semi-structured
D) undocumented
E) unstructured
A

E) unstructured

347
Q
The decisions involved in creating and producing a corporate intranet can be classified as \_\_\_\_\_\_\_\_ decisions.
A) semistructured
B) procedural
C) ad hoc
D) structured
E) unstructured
A

A) semistructured

348
Q
Checking store inventory is an example of a(n) \_\_\_\_\_\_\_\_ decision.
A) procedural
B) structured
C) ad hoc
D) unstructured
E) semi-structured
A

B) structured

349
Q
The \_\_\_\_\_\_\_\_ phase of decision making finds or recognizes a problem, need, or opportunity.
A) choice
B) design
C) implementation
D) analysis
E) intelligence
A

E) intelligence

350
Q
Which of the following is not one of the Simon's four stages of decision making?
A) Implementation
B) Intelligence
C) Analysis
D) Choice
E) Design
A

C) Analysis

351
Q

Which of the following is not one of the five observed ways in which managerial behavior differs from the classical description of managers?
A) Managers perform a great deal of work at an unrelenting pace.
B) Managers perform a low number of activities for a high percentage of time.
C) Managers prefer current, specific, ad-hoc information.
D) Managers prefer oral forms of communication.
E) Managers give high priority to maintaining a diverse web of contacts.

A

B) Managers perform a low number of activities for a high percentage of time.

352
Q
The role of liaison falls into which of Mintzberg's managerial classifications?
A) Decisional
B) Informational
C) Interpersonal
D) Symbolic
E) Leading
A

C) Interpersonal

353
Q

Mintzberg outlined three categories of managerial roles:
A) interpersonal, informational, and decisional.
B) control, leadership, oversight.
C) operational, management, and executive.
D) cultural, organizational, and technical.
E) middle management, senior management, executive

A

A) interpersonal, informational, and decisional.

354
Q
The role of entrepreneur falls into which of Mintzberg's managerial classifications?
A) Decisional
B) Informational
C) Interpersonal
D) Symbolic
E) Leading
A

A) Decisional

355
Q
According to Mintzberg, managers in their informational role act as:
A) figureheads for the organization.
B) leaders.
C) nerve centers of the organization.
D) negotiators.
E) liaisons.
A

C) nerve centers of the organization.

356
Q
Which of the following systems support a manager's role as leader of an organization?
A) DSS
B) Telepresence systems
C) E-mail
D) MIS
E) ESS
A

B) Telepresence systems

357
Q
All of the following managerial roles can be supported by information systems except: 
A) liaison.
B) resource allocator.
C) nerve center
D) disseminator.
E) negotiator.
A

E) negotiator.

358
Q
When managers represent their company in the outside world and perform symbolic duties, they are acting in their: 
A) decisional role.
B) managerial role.
C) informational role.
D) interpersonal role.
E) leadership role.
A

D) interpersonal role.

359
Q

As discussed in the chapter text, the three main reasons that investments in information technology do not always produce positive results are:
A) management support, technical logistics, and user compliance.
B) organization, environment, culture.
C) information quality, information integrity, and information accuracy.
D) information quality, organizational culture, and management filters.
E) organization, culture, and technology.

A

D) information quality, organizational culture, and management filters.

360
Q
The concept of management \_\_\_\_\_\_\_\_ describes situations in which managers act on preconceived notions that reject information that does not conform to their prior conceptions.
A) filters
B) backgrounds
C) biases
D) inefficiency
E) politics
A

A) filters

361
Q
Which quality dimension of information is concerned that the data values of an information source fall within a defined range? 
A) Timeliness
B) Consistency
C) Completeness
D) Accessibility
E) Validity
A

E) Validity

362
Q
The dimension of \_\_\_\_\_\_\_\_ describes whether data elements are consistently defined.
A) completeness
B) accuracy
C) validity
D) consistency
E) integrity
A

D) consistency

363
Q
High-velocity decision making systems are growing rapidly for decisions classed as:
A) semistructured.
B) financial.
C) ad hoc.
D) predefined.
E) highly structured.
A

E) highly structured.

364
Q

Which of the following describes how the Simon framework of decision-making works in high-velocity decision environments?
A) Only the initial step is performed by the software; the final three steps are handled by humans.
B) The first two steps of Simon’s framework are eliminated and the final two steps are handled by software algorithms.
C) The first three steps of the process are handled by software algorithms and the final step is handled by experienced managers.
D) All four steps are performed by humans with the support of high-speed, high-volume DSS and ESS.
E) All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow.

A

E) All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow.

365
Q

A drawback to high-velocity, automated decision-making systems is that they are unable to:
A) handle high volumes of decisions.
B) handle structured decisions.
C) handle semi structured decisions.
D) control themselves and respond to new environments.
E) be applied to situations outside of the financial world.

A

D) control themselves and respond to new environments

366
Q

Improving the quality of high-value decision making by an executive will save an organization far more money than improving the quality of lesser-value decisions made at a lower level.

A

False

367
Q

A structured decision cannot be made by following a well-defined set of procedures. “Feel” or intuition is necessary.

A

False

368
Q

Middle management face primarily semi-structured decisions.

A

True

369
Q

Structured decision making is most prevalent at lower organizational levels.

A

True

370
Q

The design phase of decision making consists of discovering, identifying, and understanding the problems occurring in the organization.

A

False

371
Q

The choice phase of Simon’s decision-making model includes choosing among solution alternatives.

A

True

372
Q

The first stage in Simon’s decision-making process model is the design stage.

A

False

373
Q

The classical model of management does not address what exactly managers do when they plan, decide things, and control the work of others.

A

True

374
Q

A structured decision is repetitive and routine, for which known procedures provide solutions.

A

True

375
Q

The third stage in Simon’s description of decision making is implementation.

A

False

376
Q
Behavioral models of management see managers as being \_\_\_\_\_\_\_\_ than does the classical model.
A) more systematic
B) more informal
C) more reflective
D) more well organized
E) less reactive
A

B) more informal

377
Q
Which of the following is not one of the five classical functions of managers?
A) Leading
B) Deciding
C) Planning
D) Organizing
E) Controlling
A

A) Leading

378
Q
Which of the following BI tools or abilities has been driving the movement toward "smart cities?"
A) OLAP 
B) Chi-square analysis 
C) Predictive analytics
D) Data mining 
E) Big data analytics
A

E) Big data analytics

379
Q
The dimension of \_\_\_\_\_\_\_\_ in information quality describes whether the structure of data is consistent.
A) integrity
B) accuracy
C) timeliness
D) completeness
E) consistency
A

A) integrity

380
Q

Which of the following statements best describes the term business intelligence?
A) Software developed exclusively for business management
B) The tools and techniques used to analyze and understand business data
C) The infrastructure for collecting and managing business data
D) Information systems involved in business decision making
E) Enterprise systems used to make business decisions

A

A) Software developed exclusively for business management

381
Q
Decisions regarding managing and monitoring day-to-day business activities are referred to as \_\_\_\_\_\_\_\_ intelligence.
A) business
B) analytical
C) operational
D) transactional
E) production
A

C) operational

382
Q
Which of the following companies is not identified in the text as one of the leading producers of business intelligence and analytics products?
A) Google
B) Microsoft
C) SAP
D) IBM
E) SAS
A

A) Google

383
Q
Which of the following is not one of the six main elements in the business intelligence environment discussed in this chapter?
A) Managerial users and methods
B) Organizational environment
C) User interface
D) Data from the business environment
E) Platform
A

B) Organizational environment

384
Q
Which of the following is not one of the six main analytic functionalities of BI systems for helping decision makers understand information and take action?
A) Production reports
B) Parameterized reports
C) Business case archives
D) Forecasts, scenarios, and models
E) Drill down
A

C) Business case archives

385
Q
\_\_\_\_\_\_\_\_ are visual tools for presenting performance data in a BI system.
A) Dashboards and scorecards
B) Parameterized reports
C) Reports and the drill-down feature
D) Scenarios and models
E) Ad hoc report creation
A

A) Dashboards and scorecards

386
Q
Which of the following are most likely to rely primarily on the drill-down functionality of BI for their decision-making needs?
A) IT developers
B) Middle managers
C) Operational employees
D) Business analysts
E) Senior executives
A

B) Middle managers

387
Q
A(n)\_\_\_\_\_\_\_\_ report is produced when a user enters various values in a pivot table to filter data.
A) drill-down
B) SQL
C) ad hoc
D) production
E) parameterized
A

E) parameterized

388
Q
A(n) \_\_\_\_\_\_\_\_ is a BI feature that presents performance data defined by users.
A) ad hoc query
B) parameterized report
C) interface
D) portal
E) dashboard
A

E) dashboard

389
Q
BI that is designed to determine the most likely effects of changes in the business environment is called:
A) statistical modeling.
B) environmental analytics.
C) predictive analytics.
D) big data analytics.
E) parameterized reports.
A

C) predictive analytics.

390
Q
Which of the following are most likely to rely primarily on production reports for their decision-making needs?
A) Operational supervisors
B) Senior managers
C) Analytic modelers
D) Business analysts
E) Executives
A

A) Operational supervisors

391
Q
Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized maps?
A) GIS
B) DSS
C) Location analytics
D) Executive support systems
E) GDSS
A

A) GIS

392
Q

Predictive analytics is used for all of the following except:
A) anticipating customer response to price changes.
B) identifying the most profitable customers.
C) determining the best routes for product delivery.
D) establishing consumer credit scores.
E) forecasting driver safety.

A

C) determining the best routes for product delivery.

393
Q
Which of the following is not an example of a BI predefined production report?
A) Workforce demographics
B) Order cycle time
C) Revenue forecasts
D) Supplier performance
E) Direct and indirect spending
A

C) Revenue forecasts

394
Q

You can use location analytics to determine how best to route your deliveries of products to retail outlets.

A

True

395
Q

A GIS is a DSS designed specifically to work with spatial information.

A

True

396
Q

Big data is too unwieldy to analyze for consumer preferences.

A

False

397
Q

Data visualization technologies are used to help human users see patterns and relationships in large amounts of data.

A

True

398
Q

MIS typically produce:
A) new ways of looking at data that emphasize change, flexibility, and rapid response.
B) fixed, regularly scheduled reports based on data extracted from the organization’s TPS.
C) solutions to semi-structured problems appropriate for middle management decision making.
D) assumptions, responses to ad-hoc queries, and graphic representations of existing data.
E) scorecards of overall firm performance along predefined key indicators.

A

B) fixed, regularly scheduled reports based on data extracted from the organization’s TPS.

399
Q
An information system for a building company that tracks construction costs for various projects across the United States would be categorized as a type of:
A) BPM.
B) MIS.
C) KPI.
D) GSS.
E) GDSS.
A

B) MIS.

400
Q

A pivot table is a(n):
A) spreadsheet tool that displays two or more dimensions of data in a convenient format.
B) type of relational database.
C) chart tool that can rotate columnar data quickly and visually.
D) tool for performing sensitivity analysis.
E) integral data visualization tool used in digital dashboards and scorecards.

A

A) spreadsheet tool that displays two or more dimensions of data in a convenient format.

401
Q
An information system that combines data from internal TPS with information from financial systems and external sources to deliver reports such as profit-loss statements and impact analyses, is an example of:
A) DSS.
B) ESS.
C) CDSS.
D) MIS.
E) GIS.
A

B) ESS.

402
Q
The leading methodology for understanding the really important information needed by a firm's executives is called the \_\_\_\_\_\_\_\_ method.
A) digital dashboard
B) balanced scorecard
C) KPI
D) data visualization
E) predictive analytics
A

B) balanced scorecard

403
Q
Which of the following types of systems would be used to present senior marketing executives with in-depth information about customer retention, satisfaction, and quality performance?
A) CDSS
B) MIS
C) DSS
D) TPS
E) ESS
A

E) ESS

404
Q
Measures defined by management and used to internally evaluate the success of a firm's financial, business process, customer, and learning and growth are called:
A) benchmarks.
B) KPIs.
C) the balanced scorecard method.
D) BPM.
E) parameters.
A

B) KPIs.

405
Q
A(n) \_\_\_\_\_\_\_\_ facilitates the solution to unstructured problems by a set of decision makers working together as a group.
A) DSS
B) ESS
C) CDSS
D) GIS
E) GDSS
A

E) GDSS

406
Q
The management methodology of using a firm's strategy to generate operational targets for the business and measuring progress towards them using the firm's enterprise systems is called:
A) benchmarks.
B) KPIs.
C) the balanced scorecard method.
D) BPM.
E) business intelligence.
A

D) BPM.

407
Q

ESS:
A) support the structured decision making of senior executives.
B) have the ability to drill down into lower levels of detail.
C) easily integrate data from different systems.
D) are primarily driven by information derived from a company’s transaction processing systems.
E) enable operational managers to create parameterized reports.

A

B) have the ability to drill down into lower levels of detail.

408
Q

A well-designed ESS will allow management to:
A) create routine production reports as well as view overall business performance.
B) facilitate group decision making.
C) create pivot charts.
D) analyze big data.
E) track the activities of competitors.

A

E) track the activities of competitors.

409
Q

GDSS:
A) are designed to allow meeting attendees to share their thoughts in real-time with their peers.
B) support decisions that require knowledge about the geographic distribution of resources.
C) are only used with geographically dispersed attendees.
D) facilitate the solution of unstructured problems.
E) provide tools that allow managers to visualize data.

A

D) facilitate the solution of unstructured problems.

410
Q

GDSS capabilities have improved along with all of the following except:
A) Improved power of desktop PCs
B) Explosion of mobile computing
C) Growth of cellular networks
D) Increase in dedicated conference rooms
E) Expansion of Wi-Fi bandwidth

A

D) Increase in dedicated conference rooms

411
Q
GDSS such as Cisco Collaboration Meeting Rooms Hybrid can handle up to:
A) 5 participants. 
B) 50 participants.
C) 500 participants. 
D) 1000 participants.
E) 5000 participants.
A

C) 500 participants.

412
Q

DSS primarily address structured problems.

A

False

413
Q

MIS typically produce fixed, regularly scheduled reports based on data extracted and summarized from the firm’s underlying transaction processing systems.

A

True

414
Q

DSS are a special category of location analytics.

A

False

415
Q

What-if analysis works forward from known or assumed conditions.

A

True

416
Q

Sensitivity analysis predicts outcomes from constant inputs.

A

False

417
Q

GDSS facilitate the solution of unstructured problems by a set of decision makers working together as a group in either the same location or different locations.

A

True

418
Q

GDSS requires a dedicated conference room with special hardware and software tools.

A

False

419
Q

GDSS are designed to display data in the form of digitized maps.

A

False

420
Q

KPI analysis is the leading methodology for understanding the most important information needed by a firm’s executives.

A

False

421
Q

Experts from a variety of fields have found that managers are poor at assessing risk.

A

True

422
Q

GIS are useful for businesses, but not as much for state and local governments.

A

False

423
Q

The four kinds of structural organizational change enabled by IT, in order from least to most risky, are:
A) rationalization, automation, reengineering, and redesigning.
B) rationalization, automation, reengineering, and paradigm shift.
C) automation, rationalization, redesigning, and paradigm shift.
D) automation, redesigning, restructuring, and paradigm shift.
E) paradigm shift, reengineering, rationalization, and automation.

A

C) automation, rationalization, redesigning, and paradigm shift.

424
Q

In automation:
A) more manual steps are required.
B) business processes are reorganized to cut waste and eliminate repetitive, paper-intensive tasks.
C) the nature of the business is rethought.
D) employees are enabled to perform their tasks more efficiently.
E) business processes are added.

A

D) employees are enabled to perform their tasks more efficiently.

425
Q
Which of the following is more powerful that rationalization of procedures?
A) Business process redesign
B) TQM
C) Automation
D) Six sigma
E) Systems analysis and design
A

A) Business process redesign

426
Q
A bank has reworked its mortgage application process so that several steps are handled by computer software, and some steps are combined to reduce bottlenecks in processing. The goal is to gradually improve its efficiency over time. This is an example of:
A) automation.
B) rationalization of procedures.
C) paradigm shift.
D) TQM.
E) six sigma.
A

B) rationalization of procedures.

427
Q
An upscale organic foods grocery chain is implementing an information system that will enable it to add same-day home delivery of groceries to its customers. This is an example of:
A) automation.
B) rationalization of procedures.
C) paradigm shift.
D) business process redesign.
E) organizational change.
A

C) paradigm shift.

428
Q
The idea that the achievement of quality control is an end in itself describes a main concept of:
A) BPM.
B) BPR.
C) six sigma.
D) TQM.
E) systems analysis and design
A

D) TQM.

429
Q
\_\_\_\_\_\_\_\_ provide(s) a methodology and tools for dealing with the organization's ongoing need to revise and optimize its numerous business processes. 
A) Business process redesign
B) Business process management
C) CASE tools
D) TQM
E) Systems analysis and design
A

B) Business process management

430
Q

In order, what are the first three steps in BPM?
A) 1. identifying processes for change, 2. analyzing existing processes, 3. designing the new process.
B) 1. analyzing existing processes, 2. identifying processes for change, 3. designing the new process.
C) 1. identifying processes for change, 2. designing the new process, 3. implementing the new process.
D) 1. analyzing processes to change, 2. designing the new process, 3. measuring the optimized process.
E) 1. designing new processes, 2. analyzing existing processes, 3. identifying processes for change.

A

A) 1. identifying processes for change, 2. analyzing existing processes, 3. designing the new process.

431
Q

What is the greatest barrier to successful business process change?
A) Ineffective project management
B) Usability of implemented solution
C) Selecting the correct process to change
D) Organizational change
E) Poor choice of technology

A

D) Organizational change

432
Q

Possible functions of BPM tools include all of the following except:
A) integrating existing systems to support business processes’ improvements.
B) automating business processes.
C) identifying and document business processes.
D) testing the security of business processes.
E) designing new processes.

A

D) testing the security of business processes.

433
Q

BPM software provides tools that help business do all of the following except:
A) identify and document processes requiring improvement
B) create models of improved processes
C) capture and enforce business rules for performing processes
D) capture and identify information system requirements for a new system
E) integrate existing systems to support new or redesigned processes

A

D) capture and identify information system requirements for a new system

434
Q

End user development:
A) allows end users to create highly complex information systems.
B) increases the time and steps required to produce a finished application when compared to professional development.
C) allows ends users to develop simple information systems.
D) requires more time to develop systems.
E) requires formal assistance from technical specialists.

A

C) allows ends users to develop simple information systems.

435
Q
A(n) \_\_\_\_\_\_\_\_ is an organizational change that involves rethinking the nature of the business and the nature of the organization itself.
A) automation program 
B) rationalization program 
C) systems analysis 
D) paradigm shift
E) business process redesign program
A

D) paradigm shift

436
Q

The most common form of IT-enabled organizational change is automation.

A

True

437
Q

Rationalization of procedures describes a radical rethinking of the business models

A

False

438
Q

Organizations will adjust to new information systems without any special efforts if the system is a good system to begin with.

A

False

439
Q

Six sigma describes the measurement of quality as 3.4 defects per million.

A

True

440
Q
Which conversion process introduces the system first to a limited portion of the organization?
A) Pilot study strategy
B) Phased approach strategy
C) Limited cutover strategy
D) Parallel strategy
E) Parallel approach strategy
A

A) Pilot study strategy

441
Q
Which process develops a detailed description of the functions that a new information system must perform?
A) Feasibility study
B) Requirements analysis
C) Systems design
D) Test plan development
E) Management plan
A

B) Requirements analysis

442
Q

Systems design:
A) determines whether a solution is feasible from a financial and organizational standpoint.
B) shows how the new system will fulfill the information requirements.
C) identifies which users need what information, where, when and how.
D) is concerned with the logical view of the system solution.
E) .translates system specifications into software program code.

A

B) shows how the new system will fulfill the information requirements.

443
Q
Transferring data from a legacy system to the new system would be defined by which category of system design specifications?
A) Input
B) Database
C) Manual procedures
D) Conversion
E) Implementation
A

D) Conversion

444
Q

Unit testing:
A) includes all the preparations for the series of tests to be performed on the system.
B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned.
C) involves testing the entire system with real-world data.
D) provides the final certification that the system is ready to be used in a production setting.
E) tests each program separately.

A

E) tests each program separately.

445
Q

System testing:
A) includes all the preparations for the series of tests to be performed on the system.
B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned.
C) tests each program separately.
D) provides the final certification that the system is ready to be used in a production setting.
E) tests the information requirements of a system.

A

B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned.

446
Q

Acceptance testing:
A) includes all the preparations for the series of tests to be performed on the system.
B) tests the functioning of the system as a whole.
C) tests each program separately in the system.
D) provides the final certification that the system is ready to be used in a production setting.
E) tests the conversion of legacy data to the new system.

A

D) provides the final certification that the system is ready to be used in a production setting.

447
Q

In a parallel conversion strategy, the new system:
A) is tested by an outsourced company.
B) replaces the old one on an appointed day.
C) and the old are run in parallel.
D) is introduced only to a limited area first.
E) is slowly converted from the old system.

A

C) and the old are run in parallel.

448
Q

In the direct cutover conversion strategy, the new system:
A) is tested by an outsourced company.
B) replaces the old one at on an appointed day.
C) and the old are run together.
D) is introduced in stages.
E) the old and new systems are run in parallel.

A

B) replaces the old one at on an appointed day.

449
Q
Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed:
A) acceptance.
B) production.
C) maintenance.
D) post-implementation
E) implementation.
A

C) maintenance.

450
Q
In what stage of systems development are design specifications created?
A) Systems analysis
B) Systems design
C) Testing
D) Conversion
E) Implementation
A

B) Systems design

451
Q
A systems analysis includes a(n) \_\_\_\_\_\_\_\_ that is used to determine whether the solution is achievable, from a financial, technical, and organizational standpoint.
A) feasibility study
B) data flow diagram
C) logical design
D) systems design document
E) request for proposal
A

A) feasibility study

452
Q
\_\_\_\_\_\_\_\_ provide(s) a detailed statement of the information needs that a new system must satisfy; identifies who needs what information, and when, where, and how the information is needed.
A) Systems analysis and design documents
B) Information requirements
C) A data flow diagram 
D) A feasibility study
E) Requests for proposal
A

B) Information requirements

453
Q
A(n) \_\_\_\_\_\_\_\_ is the model or blueprint for an information system solution and consists of all the specifications that will deliver the functions identified during systems analysis.
A) feasibility study
B) data flow diagram
C) systems design document
D) information requirements document 
E) request for proposal
A

C) systems design document

454
Q
During the \_\_\_\_\_\_\_\_ stage of system development, system specifications that were prepared during the design stage are translated into software code.
A) programming
B) systems analysis and design
C) implementation
D) conversion
E) acceptance testing
A

A) programming

455
Q
\_\_\_\_\_\_\_\_ is the process of changing from the old system to the new system.
A) Implementation
B) Conversion
C) Systems analysis and design
D) Programming
E) End user involvement
A

B) Conversion

456
Q

Information systems can only have one possible design.

A

False

457
Q

Documentation reveals how well a system works from both a technical standpoint, but not an end-user standpoint.

A

False

458
Q
The entire system-building effort is driven by:
A) six sigma.
B) feasibility studies.
C) documentation
D) user information requirements.
E) available information technology.
A

D) user information requirements.

459
Q
The primary tool for representing a system's component processes and the flow of data between them is the:
A) data dictionary.
B) process specifications diagram.
C) structure chart
D) data flow diagram.
E) object-oriented chart
A

D) data flow diagram.

460
Q
An entire information system is broken down into its subsystems by using:
A) high-level data flow diagrams.
B) low-level data flow diagrams.
C) process specifications.
D) structured diagrams.
E) logical design diagrams.
A

A) high-level data flow diagrams.

461
Q
To understand and define the contents of data flows and data stores, system builders use:
A) a data dictionary.
B) process specifications diagrams.
C) user documentation.
D) data flow diagrams.
E) systems analysis.
A

A) a data dictionary.

462
Q
To show each level of a system's design, its relationship to other levels, and its place in the overall design structure, structured methodologies use:
A) structure charts.
B) Gantt and PERT charts.
C) process specifications.
D) data flow diagrams.
E) user documentation.
A

A) structure charts.

463
Q

In object-oriented development:
A) the class is used as the basic unit of systems analysis and design.
B) an object is a collection of data that is acted on by external processes.
C) processing logic resides within objects.
D) a strict, step-by-step development process is essential.
E) data and processes are separated.

A

C) processing logic resides within objects.

464
Q
In an object-oriented development framework for a university, how would the classes Degree, Mathematics, and Physics be related?
A) Degree would be a sister class to Mathematics and Physics.
B) Degree is a superclass to Mathematics and Physics.
C) Mathematics and Physics would be ancestors to Degree.
D) Degree would be a subclass to Mathematics and Physics.
E) Math, Physics and Degree are sister classes.
A

B) Degree is a superclass to Mathematics and Physics.

465
Q
Object-oriented modeling is based on the concepts of:
A) class and inheritance.
B) classes and objects.
C) objects and relationships.
D) objects and inheritance.
E) classes and relationships.
A

A) class and inheritance.

466
Q

Object-oriented development could potentially reduce the time and cost of writing software because:
A) object-oriented programming requires less training.
B) iterative prototyping is not required.
C) objects are reusable.
D) a single user interface object can be used for the entire application.
E) it’s not necessary to use a formal methodology to design a system.

A

C) objects are reusable.

467
Q

Which of the following statements about CASE is not true?
A) CASE provides hardware and software tools.
B) To be used effectively, CASE tools require organizational discipline.
C) CASE tools can improve communication between users and technical specialists.
D) CASE tools support iterative design.
E) CASE tools facilitate the creation of clear documentation.

A

A) CASE provides hardware and software tools.

468
Q

A native mobile app is:
A) a mobile website.
B) a mobile web app.
C) a stand-alone application that does not use a browser.
D) a responsive mobile app.
E) one that can only operate on selected devices.

A

C) a stand-alone application that does not use a browser.

469
Q
\_\_\_\_\_\_\_\_ describe the transformation occurring within the lowest level of the data flow diagrams.
A) Design requirements
B) Information requirements
C) Technology design plans
D)  object-oriented frameworks
E) Process specifications
A

E) Process specifications

470
Q
Organizational software packages often include \_\_\_\_\_\_\_\_ features that allow the software to be modified to meet organizational requirements.
A) automation 
B) object oriented 
C) programming 
D) design
E) customization
A

E) customization

471
Q

A data flow diagram offers a logical and graphical model of information flow, partitioning a system into modules that show manageable levels of detail.

A

True

472
Q

A structure chart is a top-down chart, showing each level of design, its relationship to other levels, and its place in the overall design structure.

A

True

473
Q

Objects are grouped into hierarchies, and hierarchies into classes.

A

False

474
Q

Traditional structured development is more incremental than object-oriented development.

A

False

475
Q

CASE tools facilitate the creation of clear documentation and the coordination of team development efforts.

A

True

476
Q
The oldest method for building information systems is:
A) component-based development.
B) prototyping.
C) object-oriented development.
D) the systems development lifecycle.
E)computer-aided software engineering
A

D) the systems development lifecycle.

477
Q

In the traditional systems development lifecycle, end users:
A) are important and ongoing members of the team from the original analysis phase through maintenance.
B) are important only in the testing phases.
C) have no input.
D) are limited to providing information requirements and reviewing the technical staff’s work.
E) control the development of the system.

A

D) are limited to providing information requirements and reviewing the technical staff’s work.

478
Q
In which type of systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage begin?
A) Traditional
B) Prototyping
C) RAD
D) JAD
E) Object oriented development
A

A) Traditional

479
Q
You are an IT project manager for an advertising firm. The firm wishes to create an online tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project?
A) RAD
B) JAD
C) End-user development
D) Prototyping
E) Traditional
A

D) Prototyping

480
Q
A systems building approach in which the system is developed as successive versions, each version reflecting requirements more accurately, is described to be:
A) end-user oriented.
B) prototyped.
C) object-oriented.
D) agile.
E) iterative.
A

E) iterative.

481
Q

Which of the following may occur when systems are created rapidly, without a formal development methodology?
A) End users can take over the work of IT specialists.
B) The organization quickly outgrows the new system.
C) Hardware, software, and quality standards are less important.
D) Testing and documentation may be inadequate.
E) IT specialists dominate the design of the system.

A

D) Testing and documentation may be inadequate.

482
Q

What is the primary driving factor for firms in selecting domestic outsourcing firms to build system solutions?
A) To take advantage of technical skills the firm does not have
B) To save labor costs
C) To avoid change management issues
D) To reduce the cost of hardware
E) To avoid offshore outsourcing

A

A) To take advantage of technical skills the firm does not have

483
Q
A software package evaluation process is often based on a series of questions sent to vendors, called a(n):
A) systems design document.
B) strategic planning document.
C) information systems management plan.
D) request for proposal.
E) logical design document.
A

D) request for proposal.

484
Q

The systems life cycle maintains a formal division of labor between end users and information systems specialists.

A

True

485
Q

Prototyping is more iterative than the conventional lifecycle.

A

True

486
Q

A prototype is a working version of an information system that serves as a final model..

A

False

487
Q

End-user-developed systems can be completed more rapidly than those developed through the conventional systems lifecycle.

A

True

488
Q

A primary benefit of offshore outsourcing is that this can substantially reduce hidden costs.

A

False

489
Q

What is the purpose of responsive web design?
A) It allows one website to serve different platforms, such as tablets, PCs, and mobile phones.
B) It allows websites to respond quickly to changing user needs.
C) It enables websites to customize design according to user preferences.
D) It enables websites to customize content based on user location and preferences.
E) It enables different people to responsively program the system.

A

A) It allows one website to serve different platforms, such as tablets, PCs, and mobile phones.

490
Q
A "responsive design" for mobile applications is a design that responds to a user’s: 
A)  needs.
B) location. 
C) voice commands.
D) digital device and screen size. 
E) gestures.
A

D) digital device and screen size.

491
Q

As a technical project manager, you have decided to propose implementing a prototyping methodology for a small web-based design project. What is the order of steps you will follow in this project?
A) Develop the prototype; use the prototype; revise and enhance the prototype.
B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype.
C) Define the requirements, develop solutions, select the best prototype, and implement the prototype.
D) Define the requirements, develop the prototype, revise and enhance the prototype.
E) Select the best prototype, define the requirements, and implement the prototype.

A

B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype.

492
Q

Which of the following is not a top priority in mobile application development?
A) Designing for multitouch
B) Saving resources
C) Limiting the use of keyboards
D) Designing for keyboard data entry
E) Designing for a mobile device’s camera or other features

A

D) Designing for keyboard data entry

493
Q
The process of creating workable information systems in a very short period of time is called:
A) RAD.
B) JAD.
C) prototyping.
D) systems analysis and design.
E) end user design.
A

A) RAD.

494
Q
Which type of systems development is characterized by significantly speeding up the design phase and the generation of information requirements and involving users at an intense level?
A) RAD
B) JAD
C) Prototyping
D) End-user development
E) Traditional
A

B) JAD

495
Q
Groups of objects are assembled into software components for common functions, which can be combined into large-scale business applications, in which type of software development?
A) Object-oriented development
B) Component-based development
C) Structured methodologies
D) RAD
E) Agile development
A

B) Component-based development

496
Q
\_\_\_\_\_\_\_\_ development focuses on rapid delivery of working software by breaking a large project into a series of small sub-projects that are completed in short periods of time using iteration and continuous feedback. 
A) Agile
B) Rapid application
C) Joint application
D) Object-oriented
E) DevOps
A

A) Agile

497
Q

Compared to the use of proprietary components, web services promise to be less expensive and less difficult to implement because of:
A) their ability to integrate seamlessly with legacy systems.
B) their ability to enable communication among different systems using universal standards.
C) the ubiquity of the Internet.
D) the ability to reuse web services components.
E) their use of custom programming.\

A

B) their ability to enable communication among different systems using universal standards.

498
Q

Which of the following statements about mobile web apps is true?
A) Users access mobile web apps through their mobile device’s web browser.
B) A mobile web app resides on the user’s device.
C) A mobile web app only works on certain mobile platforms.
D) A mobile web app requires the user to sign onto a web page.
E) A mobile web app requires the user to login to a web service.

A

A) Users access mobile web apps through their mobile device’s web browser.

499
Q

In component-based development, applications are developed one small portion at a time, with each portion able to function independently.

A

False

500
Q

Responsive web design enables websites to change layouts according to the user’s screen size.

A

True

501
Q

Native apps are cheap to develop and only one version is required for different mobile operating systems.

A

False

502
Q

Systems development activities always take place in sequential order.

A

False

503
Q

Web services are less expensive to weave together than proprietary components.

A

True

504
Q

DevOps stands for “development opportunities.”

A

False

505
Q

DevOps emphasizes close collaboration between the software developers and IT operational staff.

A

True

506
Q

Companies using DevOps, like Netflix, can update its production systems with new software in a matter of months.

A

False

507
Q

A request for proposal (RFP) is a detailed list of questions submitted to software vendors.

A

True

508
Q
On average, private sector IT projects underestimated budget and delivery time of systems by \_\_\_\_\_\_\_\_ percent.
A) 30
B) 40
C) 50
D) 60
E) 70
A

C) 50

509
Q

As discussed in the chapter, which of the following is not one of the immediate consequences of inadequate software project management?
A) Cost overruns
B) Customer loyalty
C) Time slippage
D) Technical shortfalls
E) Failure to obtain anticipated benefits

A

B) Customer loyalty

510
Q
Which of the following is not one of the five main variables affecting project success?
A) Risk
B) Vendors
C) Time
D) Quality
E) Cost
A

B) Vendors

511
Q
You have been hired to implement an enterprise system that will automate much of the billing and accounting work for a statewide HVAC services company. Which of the following would you prepare to describe how the new system will affect a firm's structure and operations?
A) Information systems plan
B) Internal integration report
C) Sociotechnical design report
D) Organizational impact analysis
E) Strategic planning document
A

D) Organizational impact analysis

512
Q

All of the following are indications of a failed information systems project except:
A) employees are refusing to switch to the new system.
B) employees have created a spreadsheet solution to manipulate the data generated by the system.
C) a redesigned website has fewer visits to the customer support pages.
D) employees require training to properly use the system.
E) the system is not being used by anyone.

A

D) employees require training to properly use the system.

513
Q
Which of the following project management variables defines what work is or is not included in a project?
A) Goals
B) Risk
C) Quality
D) Scope
E) Cost
A

D) Scope

514
Q

Which of the following statistics from studies on failed projects is not true?
A) Large software projects on average run 33 percent over schedule.
B) Large software projects on average run 66 percent over budget.
C) Between 30 and 40 percent of all software projects are “runaway” projects that far exceed the original schedule and budget projections and fail to perform as originally specified.
D) As many as 17 percent of projects turn out so badly that they can threaten the existence of the company.
E) The average cost overrun of IT projects is 20 percent.

A

E) The average cost overrun of IT projects is 20 percent.

515
Q

The cost of a project is based on the time to complete a project multiplied by the cost of human resources required to complete the project.

A

True

516
Q

An information system project’s scope is directly related to its business requirements.

A

True

517
Q

Project management refers to the application of knowledge, skills, tools and techniques to achieve specific targets within specified budget and time constraints.

A

True

518
Q
Which of the following variables in project management is an indicator of how well the project satisfies management objectives?
A) Scope
B) Quality
C) Time
D) Cost
E) Risk
A

B) Quality

519
Q

The data entry screen is an example of a user interface.

A

True

520
Q

According to a 2015 report by 1E, over 50% of all software installed is not being used.

A

False

521
Q

Which of the following is at the top of the management structure for information systems projects in a large company?
A) Project team
B) Project management group
C) Corporate strategic planning group and information systems steering committee
D) Information systems managers
E) End-user managers

A

C) Corporate strategic planning group and information systems steering committee

522
Q

The ________ reviews and approves plans for systems in all divisions.
A) project management group
B) project team
C) information systems steering committee
D) corporate strategic planning committee
E) board of directors

A

C) information systems steering committee

523
Q

The ________ consists of systems analysts, specialists from the relevant end-user business areas, application programmers, and perhaps database specialists.
A) project management group
B) project team
C) IS steering committee
D) corporate strategic planning committee
E) system planning committee

A

B) project team

524
Q

The ________ is directly responsible for the individual systems project.
A) project management group
B) project team
C) IS steering committee
D) corporate strategic planning committee
E) systems planning committee

A

B) project team

525
Q
A road map indicating the direction of systems development, the rationale, the current systems, new developments to consider, the management strategy, the implementation plan, and the budget is called a(n):
A) project plan.
B) portfolio analysis.
C) information systems plan.
D) enterprise analysis.
E) strategic planning document.
A

C) information systems plan.

526
Q

Which of the following best describes the central method used in a portfolio analysis?
A) Performing an inventory all of the organization’s information systems projects and assets
B) Performing a weighted comparison of the criteria used to evaluate a system
C) Surveying a large sample of managers on their objectives, decision-making process, and uses and needs for data and information
D) Interviewing a small number of top managers to identify their goals and criteria for achieving success
E) Scoring proposed systems on a number of dimensions, and select the one with the highest score.

A

A) Performing an inventory all of the organization’s information systems projects and assets

527
Q

A firm in the finance industry should do which of the following to ensure that it stays current with technology?
A) Select only low-cost, low risk projects
B) Limit work to those projects with great rewards.
C) Select only low-risk, high-reward projects.
D) Have a few high-risk, high benefit projects
E) Avoid projects that were very costly.

A

D) Have a few high-risk, high benefit projects

528
Q
Which method would you use to develop risk profiles for a firm's information system projects and assets?
A) Information systems plan
B) Scoring model
C) Portfolio analysis
D) TCO
E) Real options model
A

C) Portfolio analysis

529
Q
You have been hired by a firm in a non-information-intensive industry to evaluate its inventory of systems and IT projects. Which types of projects should the firm focus on?
A) High-risk projects
B) Low cost, low-benefit projects
C) High-benefit, low-risk projects
D) Any project that might be beneficial
E) Low cost, high benefit projects
A

C) High-benefit, low-risk projects

530
Q

Which of the following best describes the central method used in a scoring model?
A) Performing an inventory all of the organization’s information systems projects and assets
B) Performing a weighted comparison of the criteria used to evaluate a system
C) Surveying a large sample of managers on their objectives, decision-making process, and uses and needs for data and information
D) Interviewing a small number of top managers to identify their goals and criteria for achieving success
E) Calculating the return on investment for each system, and choose the system with the best return

A

B) Performing a weighted comparison of the criteria used to evaluate a system

531
Q
Which method is used to assign weights to various features of a system?
A) Information systems plan
B) Scoring model
C) Portfolio analysis
D) TCO
E) Real options model
A

B) Scoring model

532
Q

Which of the following statements about scoring models is not true?
A) There are many qualitative judgments involved in using a scoring model.
B) A scoring model is useful for selecting projects where many criteria must be considered.
C) The most important outcome of a scoring model is the score.
D) A scoring model requires experts who understand the issues and the technology.
E) It is appropriate to cycle through a scoring model several times.

A

C) The most important outcome of a scoring model is the score.

533
Q

The information systems steering committee is composed of information systems managers and end-user managers responsible for overseeing several specific information systems projects.

A

False

534
Q

An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals.

A

True

535
Q

If an intended benefit of an IT project is improved decision making, managers should develop a set of metrics to quantify the value of an improved decision.

A

True

536
Q

Scoring models are most commonly used to make the final decision when selecting different systems.

A

False

537
Q

The criteria used in a scoring model are usually the result of lengthy discussions among the decision-making group.

A

True

538
Q

You are using a capital budgeting method to assess the worth of your company’s new information system. Which of the following costs would you include in measuring the cash outflow?
A) Increased sales of products
B) Hardware and software expenditures
C) Labor expenditures
D) Reduced costs in production and operation
E) Hardware, software, and labor expenditures

A

E) Hardware, software, and labor expenditures

539
Q

The worth of systems from a financial perspective essentially revolves around the issue of:
A) total cost of ownership.
B) adherence to information requirements.
C) asset utilization.
D) return on invested capital.
E) the cost of computing equipment.

A

D) return on invested capital.

540
Q
All of the following are intangible benefits of information systems except:
A) improved asset utilization.
B) increased organizational learning.
C) improved operations.
D) reduced workforce.
E) employee morale.
A

D) reduced workforce.

541
Q
Which of the following is not a tangible benefit of information systems?
A) Reduced rate of growth in expenses
B) Lower computer expenses
C) Improved resource control
D) Increased productivity
E) End user satisfaction
A

C) Improved resource control

542
Q
The principal capital budgeting models for evaluating information technology projects are the payback method, the accounting rate of return on investment (ROI), the net present value, and the:
A) future present value.
B) internal rate of return.
C) external rate of return.
D) ROPM (real options pricing model).
E) present value of future cash flows
A

B) internal rate of return.

543
Q

Which of the following strategies represents the proper approach to a high risk, high reward project?
A) Identify and develop
B) Avoid
C) Treat as a routine project
D) Pursue after all other projects are complete
E) Cautiously examine

A

E) Cautiously examine

544
Q
Enhanced employee goodwill falls under what category of costs and benefits of information systems?
A) Costs
B) Tangible benefits
C) Cost savings
D) Intangible costs
E) Intangible benefits
A

E) Intangible benefits

545
Q

Counterimplementation is best defined as:
A) multiple implementations that are run in parallel.
B) deliberate attempts to thwart the implementation of a system.
C) critiquing the implementation of a system constructively.
D) all of the organizational challenges involved in implementing a system.
E) strategies used to overcome user resistance to change.

A

B) deliberate attempts to thwart the implementation of a system

546
Q

Which of the following is a limitation of using a financial approach to evaluate information systems?
A) Inability to measure ROI
B) Inability to control vendor costs
C) Inability to assess risk
D) Inability to assess costs from organizational disruption
E) Inability to assess the cost of technology

A

D) Inability to assess costs from organizational disruption

547
Q

Transaction and clerical systems that displace labor and save space typically produce more measurable, tangible benefits than management information systems.

A

True

548
Q

Intangible benefits generally do not lead to quantifiable gains in the long run

A

True

549
Q

A benefit of using TCO analysis to evaluate an information technology investment is that it is able to incorporate intangible and “soft” factors such as benefits and complexity costs.

A

False

550
Q

More timely information is a intangible benefit of information systems.

A

True

551
Q

The difference between cash outflows and cash inflows is used for calculating the financial worth of an investment.

A

True

552
Q
\_\_\_\_\_\_\_\_ methods rely on measures of cash flows into and out of the firm.
A) Scoring model
B) Portfolio analysis
C) Real options pricing
D) Capital budgeting
E) Cost effectiveness
A

D) Capital budgeting

553
Q
In one strategic approach to determining information requirements, managers select a small number of \_\_\_\_\_\_\_\_ that reflect firm success and profitability.
A) efficiency measures
B) output measures
C) strategic indicators
D) key performance indicators
E) financial indicators
A

D) key performance indicators

554
Q

All of the following are directly correlated with increased risk except:
A) a large amount of technical expertise from project team and information team staff
B) a large amount of dollars spent
C) a large amount of implementation staff
D) a large amount of time allocated for implementation
E) a large amount of organizational units affected

A

A) a large amount of technical expertise from project team and information team staff

555
Q

Which of the following statements best describes the effect that project structure has on overall project risk?
A) Highly structured projects are more complex, and run a higher risk of programmers and users misunderstanding the ultimate goals.
B) Projects with relatively undefined goals are more likely to be subjected to users changing requirements and to run a higher risk of not satisfying project goals.
C) Highly structured projects tend to be larger, affecting more organizational units, and run both the risk of out-of-control costs and becoming too difficult to control.
D) Less structured projects are more able to be quickly developed, tested, and implemented using cutting-edge RAD and JAD development techniques, and pose less risk of running up unforeseen costs.
E) The less structured a project, the greater the freedom of users to define the system

A

B) Projects with relatively undefined goals are more likely to be subjected to users changing requirements and to run a higher risk of not satisfying project goals.

556
Q

Which of the following statements about project risk is not true?
A) The more dollars spent on project, the greater the risk.
B) The higher the number of implementation staff on a project, the lower the risk.
C) The higher the number of organizational units affected by a project, the greater the risk.
D) Very large-scale systems project have a failure rate that is 50 to 75 percent higher than that for other projects.
E) The organizational complexity of a system contributes to the complexity of large-scale systems projects.

A

B) The higher the number of implementation staff on a project, the lower the risk.

557
Q
Which of the following refers to all organizational activities working toward the adoption, management, and routinization of a new information system?
A) Production
B) Maintenance
C) Implementation
D) Acceptance
E) Final acceptance
A

C) Implementation

558
Q
Which of the following would not be covered in the Strategic Business Plan Rationale section of an information systems plan?
A) Current situation
B) Current business organization
C) Firm’s strategic plan
D) Changing environments
E) Current infrastructure capabilities
A

E) Current infrastructure capabilities

559
Q
Which of the following would not be covered in the Management Strategy section of an information systems plan?
A) Acquisition plans
B) Progress reports
C) Organizational realignment
D) Internal reorganization
E) Major training initiatives
A

A) Acquisition plans

560
Q

Which of the following would not be covered in the Budget Requirements section of an information systems plan?
A) Requirements
B) Potential savings
C) Difficulties meeting business requirements
D) Financing
E) Acquisition cycle

A

C) Difficulties meeting business requirements

561
Q

Which of the following is not one of the activities of the systems analyst?
A) Acting as a change agent
B) Communicating with users
C) Mediating between competing interest groups
D) Formulating of capital budgeting models
E) Deciding which systems to develop

A

D) Formulating of capital budgeting models

562
Q

Which of the following types of projects is most likely to fail?
A) Integration of a third-party automated payment system
B) Replacement of middleware with web services for legacy application integration
C) Business process redesign project that restructures workflow and responsibilities
D) Redesigning a user interface to an online investment site
E) Building a web-based interface to an existing system

A

C) Business process redesign project that restructures workflow and responsibilities

563
Q

Which of the following is not a responsibility of effective change management?
A) Integrating legacy systems
B) Dealing with fear and anxiety about new systems
C) Training users of the new system
D) Enforcing user participation at all stages of system development
E) Ensuring users are properly trained

A

A) Integrating legacy systems

564
Q

Which of the following is not something you would use to control risk factors in an information systems project?
A) Internal integration tools
B) External integration tools
C) Formal planning tools and formal control tools
D) Real options pricing models
E) Gantt charts

A

D) Real options pricing models

565
Q

Internal integration tools:
A) enable a project to have sufficient technical support for projects with challenging and complex technology.
B) enable a project manager to properly document and monitor project plans.
C) portray a project as a network diagram with numbered nodes representing project tasks.
D) consist of ways to link the work of the implementation team with users at all organization levels.
E) enable end users to communicate with system developers.

A

A) enable a project to have sufficient technical support for projects with challenging and complex technology.

566
Q

Which of the following is an example of using an internal integration tool?
A) Creating a Gantt chart
B) Including user representatives as active members of the project team
C) Creating PERT chart
D) Holding frequent project team meetings
E) Developing a scoring model

A

D) Holding frequent project team meetings

567
Q

Formal planning and control tools:
A) are used to select projects where many criteria must be considered.
B) enable a project manager to properly document and monitor project plans.
C) are used to evaluate alternative systems projects.
D) link the work of the implementation team with users at all organization levels.
E) serve as a road map indicating the direction of systems development.

A

B) enable a project manager to properly document and monitor project plans.

568
Q
Which type of planning tool shows each task as a horizontal bar whose length is proportional to the time required to complete it?
A) PERT chart
B) Gantt chart
C) Both a PERT chart and a Gannt chart
D) Scoring model
E) Portfolio analysis
A

B) Gantt chart

569
Q
To review a project's tasks and their interrelationships, you would use which of the following?
A) PERT chart
B) Gantt chart
C) PERT chart or a Gantt chart
D) Scoring model
E) Portfolio analysis
A

A) PERT chart

570
Q

Which of the following helps project managers identify bottlenecks in project development?
A) Internal integration tools
B) External integration tools
C) Formal planning and control tools
D) Both internal and external integration tools
E) Portfolio analysis tools

A

C) Formal planning and control tools

571
Q

External integration tools:
A) enable a project to have sufficient technical support for project management and development.
B) enable a project manager to properly document and monitor project plans.
C) portray a project as a network diagram with numbered nodes representing project tasks.
D) consist of ways to link the work of the implementation team with users at all organization levels.
E) enable project team members to keep track of external costs of a project.

A

D) consist of ways to link the work of the implementation team with users at all organization levels.

572
Q

Which of the following is an example of using an external integration tool?
A) Creating a Gantt chart
B) Including user representatives as active members of the project team.
C) Creating a PERT chart.
D) Using portfolio analysis.
E) Developing a scoring model

A

B) Including user representatives as active members of the project team.

573
Q
Which of the following is not an organizational factor in systems planning and implementation?
A) Standards and performance monitoring
B) Government regulatory compliance
C) Health and safety
D) User interface
E) Ergonomics
A

D) User interface

574
Q

In sociotechnical design:
A) separate sets of technical and social design solutions are developed and compared.
B) ergonomic features of a system are considered to be the most important consideration.
C) systems analysts with proven backgrounds in sociological concerns rate and compare a system’s social and technical aspects.
D) human needs are given more importance than technical needs.
E) technical needs are given more importance than organizational needs.

A

A) separate sets of technical and social design solutions are developed and compared.

575
Q
Which of the following is the most widely used project management software today?
A) Vertabase
B) IBM Project Guide
C) Microsoft Project
D) Microsoft Excel
E) Zoho Projects
A

C) Microsoft Project

576
Q

The larger the systems project, the greater the chance that the project will be completed on time, within budget, and according to project requirements

A

False

577
Q

The systems analyst is the catalyst for the entire change process and is responsible for making sure that everyone involved accepts the changes created by a new system.

A

True

578
Q

The relationship between users and information systems specialists has traditionally been a problem area for information systems implementation efforts.

A

True

579
Q

User concerns and designer concerns are usually the same at the beginning of the project but may diverge later as the system is built.

A

False

580
Q

A Gantt chart graphically depicts project tasks and their interrelationships.

A

False

581
Q

Mandatory use of a system is one effective way of overcoming user resistance to an information system.

A

False

582
Q

Counterimplementation refers to a deliberate strategy to thwart the implementation of an information system or an innovation in an organization.

A

True

583
Q

The design of jobs, health issues, and the end-user interface of information systems are all considerations in the field of ergonomics.

A

True

584
Q

The goal of sociotechnical design is to create systems where the organization and the technology change and adjust to one another.

A

True

585
Q
Successful system building requires careful \_\_\_\_\_\_\_\_ management to minimize organizational resistance.
A) cost
B) technology
C) change
D) supply chain
E) system application
A

C) change

586
Q

Which of the following statements about the user-designer communications gap is not true?
A) It occurs because users and information systems specialists tend to have different backgrounds, interests, and priorities.
B) It is one of the major reasons why user requirements are not properly incorporated into information systems.
C) It is one of the major reasons why users are driven out of the implementation process.
D) When it is pronounced, it creates a very high risk of failure for a systems development project.
E) Information systems specialists prefer systems that are oriented toward solving business problems or facilitating organizational tasks.

A

E) Information systems specialists prefer systems that are oriented toward solving business problems or facilitating organizational tasks.

587
Q

Ergonomics is the interaction of people and machines in the work environment, including the design of jobs, health issues, and the end-user interface of information systems

A

True

588
Q

Which of the following best describes the relationship between system implementation and user involvement and management support?
A) System implementation rarely benefits from user involvement.
B) System implementation benefits from user support, but does not require management support.
C) System implementation generally benefits from high levels of user involvement and management support.
D) System implementation benefits from management support, but does not require user support.
E) System implementation rarely benefits from management support.

A

C) System implementation generally benefits from high levels of user involvement and management support.

589
Q

The differing backgrounds between users and information systems specialists is referred to as the:
A) user expertise gap.
B) information system specialist inefficiency.
C) user-designer paradigm.
D) user-designer expertise gap.
E) user-designer communications gap.

A

E) user-designer communications gap.

590
Q

Information systems specialists often tend to seek solutions that:
A) are oriented towards solving business problems.
B) facilitate organizational tasks.
C) optimize hardware and software efficiency at the expense of ease of use.
D) are simplistic for end users to understand.
E) employ clear documentation.

A

C) optimize hardware and software efficiency at the expense of ease of use.

591
Q

According to the Project Management Institute, what is the leading factor in project success?
A) Upper management that financially backs the project
B) Executive sponsors who are actively engaged
C) Carefully monitored changes in work habits and procedures
D) Communication between technicians and end users
E) End users who communicate their needs for the project

A

B) Executive sponsors who are actively engaged

592
Q

While users are concerned about an information system delivering the information needed for work, designers might be concerned about:
A) accessing the data on iPhones and tablets
B) the procedures required to enter data into the system
C) how operation of the system will change their daily routines
D) what demands the system will place on the company servers
E) opening lines of communication with end users

A

D) what demands the system will place on the company servers