Practice Final Flashcards
The purpose of a(n) ________ is to support and integrate all facets of the business, including planning, manufacturing, sales, marketing, and so on.
a. electronic commerce system
b. functional area information system
c. management information system
d. enterprise resource planning system
e. intelligent system
d. enterprise resource planning system
________ are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market.
a. Disruptive innovations
b. Adaptive innovations
c. Facultative innovations
d. Extensive innovations
e. Constructive innovations
a. Disruptive innovations
________ is the process of analyzing an organization’s activities to determine where value is added to products and/or services and what costs are incurred for doing so.
a. Value shop
b. Value migration
c. Value networking
d. Value chain analysis
e. Value grid trial
d. Value chain analysis
The executive level of an organization is also known as the ________ level.
a. tactical
b. strategic
c. managerial
d. illusory
e. operational
b. strategic
Managers in the ________ level of an organization are referred to as “executives.”
a. operational
b. tactical
c. functional
d. managerial
e. strategic
e. strategic
________, the use of the Internet protocol (IP) for transporting voice, video, fax, and data traffic, has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs.
a. Grid computing
b. IP console
c. IP edging
d. IP convergence
e. Edge computing
d. IP convergence
________ is used to transmit voice and video communication over the Internet.
a. Edge computing
b. IP console
c. IP convergence
d. Distributed computing
e. IP routing
c. IP convergence
The operating system of a computer is an example of ________ software.
a. application
b. peripheral
c. system
d. transitory
e. open source
c. system
The standard method of specifying the format of Web pages is called ________.
a. Assembly Language (AL)
b. Hypertext Markup Language (HTML)
c. Structured Query Language (SQL)
d. Practical Extraction and Report Language (PERL)
e. Extensible Markup Language (XML)
b. Hypertext Markup Language (HTML)
Which of the following characteristics of the Web deals with stimulating a consumer’s senses?
a. functional convenience
b. structural firmness
c. representational delight
d. disintermediation capacity
e. cost compliance
c. representational delight
How is structural firmness of a Web site achieved?
a. by using technical jargons to define a problem
b. by implementing a complicated source code
c. by redirecting Web pages to different sites if any link fails
d. by developing a mirror site
e. by providing understandable messages if anything goes wrong
e. by providing understandable messages if anything goes wrong
The form of electronic commerce that is used by organizations to conduct business with business partners without involving the end consumer is known as ________ electronic commerce.
a. business-to-business
b. peer-to-peer
c. business-to-intermediary
d. business-to-consumer
e. business-to-supplier
a. business-to-business
A ________ is a form of e-auction which allows businesses to buy seized and surplus government equipment.
a. top-up
b. reverse auction
c. mystery auction
d. rafter bid
e. forward auction
e. forward auction
________ refers to the process of integrating external stakeholders into the innovation process.
a. Media sharing
b. Social cataloging
c. Nearshoring
d. Open innovation
e. Crowdsourcing
d. Open innovation
Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as ________.
a. podcasts
b. tag clouds
c. folksonomies
d. geospatial metadata
e. microblogs
c. folksonomies
In addition to being used for communication and collaboration, organizational intranets are widely used for enabling employee self-service for administering benefits, managing retirement plans, or other human resources-based applications through employee ________.
a. tools
b. entities
c. plans
d. channels
e. portals
e. portals
Which of the following conditions is essential for successful Enterprise 2.0 implementation?
a. Enterprise 2.0 should be independent of the organization’s culture.
b. Enterprise 2.0 should be independent of the organization’s workforce.
c. Enterprise 2.0 should be driven by a specific usage context.
d. Enterprise 2.0 should appeal to future end users of the application and not the organization’s members.
e. Enterprise 2.0 should avoid involvement of senior management members of an organization.
c. Enterprise 2.0 should be driven by a specific usage context.
Which of the following statements is true about a digital dashboard?
a. It is the combination of various analysis techniques and interactive visualization to solve complex problems.
b. It is a system for creating, storing, analyzing, and managing geographically referenced information.
c. It is used to combine geographic, demographic, and other data for locating target customers.
d. It can visualize features and relationships between features drawn from an underlying geographic database.
e. It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.
e. It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.
The combination of various analysis techniques and interactive visualization to solve complex problems is known as ________.
a. visual analytics
b. digital analysis
c. security analysis
d. social network analysis
e. concept analytics
a. visual analytics
In online analytical processing systems, ________ provide a way to summarize the data.
a. facts
b. dimensions
c. records
d. forms
e. measures
e. measures
Which of the following statements is true about the online analytic processing cube?
a. It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
b. It groups related records together on the basis of having similar values for attributes.
c. It understands how data are organized in the database and has special functions for analyzing the data.
d. It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
e. It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
a. It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
________ activities encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management.
a. Account
b. Procurement
c. Technology development
d. Human resource
e. Architectural
d. Human resource
Components to simplify, standardize, and automate business processes related to inbound and outbound logistics, product development, manufacturing, and sales and service are called ________ management.
a. personal
b. organizing
c. operations
d. human resource
e. financial
c. operations
For most businesses, the ________ process entails several subprocesses including creating a customer record, checking the customer’s creditworthiness, creating an order, checking and allocating stock, and shipping.
a. order-to-cash
b. make-to-stock
c. plan-to-produce
d. make-to-order
e. procure-to-pay
a. order-to-cash
In core business processes, which of the following uses a push-based approach?
a. production-to-order
b. procure-to-pay
c. order-to-cash
d. make-to-order
e. make-to-stock
e. make-to-stock
Inventory and safety stock planning ________.
a. leads to the development of a sourcing plan
b. leads to the development of a transportation schedule
c. focuses on delivering products or services to consumers as well as warehousing
d. leads to the development of the overall demand forecast
e. focuses on the coordination of all activities needed to create a product or service
a. leads to the development of a sourcing plan
________ refers to systems for providing effective and efficient communication with the customer from the entire organization.
a. Sales force automation
b. Operational customer relationship management (CRM)
c. Collaborative customer relationship management (CRM)
d. Analytical customer relationship management (CRM)
e. Business intelligence
c. Collaborative customer relationship management (CRM)
Which of the following is the main objective of information systems that focuses on improving supply chains?
a. decentralizing the organizations
b. encouraging the bullwhip effect
c. discouraging vendor-managed inventory systems
d. discouraging sustainable production processes
e. accelerating product development and innovation
e. accelerating product development and innovation
The key use of the order promising module of supply chain management is to ________.
a. assign optimal safety stock and target stock levels in all inventories in the supply network
b. monitor key performance indicators to assess performance across the supply chain
c. manage logistics between company locations or from company to customers, taking into account transportation modes and constraints
d. provide answers to customer relationship management queries regarding product availability, costs, and delivery times
e. work with partners across the supply network to improve accuracy of demand forecasts, reduce inventory buffers, and improve customer service
d. provide answers to customer relationship management queries regarding product availability, costs, and delivery times
A ________ is a document that an organization uses to tell vendors what its requirements are and to invite them to provide information about how they might be able to meet those requirements.
a. vendor request
b. demand letter
c. requirements specification
d. request letter
e. request for proposal
e. request for proposal
________ costs are ongoing costs that occur throughout the life of the system.
a. Sector
b. Recurring
c. Smart
d. Non-recurring
e. Fixed
b. Recurring
The final phase of the systems development life cycle is systems ________.
a. operation
b. maintenance
c. implementation
d. analysis
e. design
b. maintenance
Preventive maintenance of a system involves ________.
a. making changes to an information system to repair flaws in the design
b. adding desired, but not necessarily required, system features
c. making changes to a system to reduce the chance of future system failure
d. making changes to an information system to accommodate changing business needs
e. making enhancements to improve processing performance or interface usability
c. making changes to a system to reduce the chance of future system failure
Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference?
a. The company insures any possible data loss for a large sum.
b. The company decides to absorb any damages that might occur.
c. It installs a corporate firewall to protect unauthorized access to information.
d. The company forms a special team of top executives to monitor and correct the information policies.
e. It enforces a strict employee data policy and prohibits employees from unauthorized access.
a. The company insures any possible data loss for a large sum.
When a company uses a fingerprint recognition system instead of access cards, it helps the company prevent unauthorized physical access. Which of the following technologies is used for authentication here?
a. smart cards
b. access-control software
c. encryption
d. passwords
e. biometrics
e. biometrics
Which of the following is the most accurate definition of a botnet?
a. a common platform used by search engines to index the contents of a Web site
b. spider software used by a search algorithm to crawl various Web sites to return a query
c. a fraudulent e-mail attack that targets a specific person or organization by personalizing the message
d. destructive software robots working together on a collection of zombie computers via the Internet
e. a small text file passed to a Web browser on a user’s computer by a Web server
d. destructive software robots working together on a collection of zombie computers via the Internet
A ________ is a small text file passed to a Web browser on a user’s computer by a Web server.
a. honeypot
b. cookie
c. worm
d. botnet
e. virus
b. cookie
A ________ network is configured in the shape of a closed loop or circle with each node connecting to the next node.
a. square
b. star
c. bus
d. ring
e. mesh
d. ring
Which of the following methods is used for random access control in wireless LAN?
a. hybrid coordination function
b. carrier sense multiple access
c. group packet radio service
d. point coordination function
e. code division multiple access
b. carrier sense multiple access
________ are computer-aided software engineering (CASE) tools that automatically check for incomplete, inconsistent, or incorrect specifications in diagrams, screens, and reports.
a. Analysis tools
b. Documentation generators
c. Repositories
d. Diagramming tools
e. Code generators
a. Analysis tools
________ is used by text recognition software to convert typed, printed, or handwritten text into the computer-based characters that form the original letters and words.
a. Autonomous automation
b. Optical character recognition
c. Speech recognition
d. Computer vision software
e. Natural language processing
b. Optical character recognition
A ________ is a networking hardware component that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points.
a. modem
b. network switch
c. network interface card
d. router
e. wireless controller
e. wireless controller
With respect to the types of information systems used in organizations, an automated system for analyzing bank loan applications is an example of a(n) ________ system.
a. electronic commerce
b. visualization
c. social software
d. geographic information
e. intelligent
e. intelligent
WorldTravel (www.worldtravel.com) is a travel Web site that provides detailed information about the different places that tourists can visit across the globe. Additionally, it also helps visitors to book tickets and hotels in these destinations. Which of the following, if true, would most assure the customers of their online privacy?
a. WorldTravel informs its members that it is following the best practices in the industry.
b. WorldTravel decides not to send any spam mails to any of its members.
c. When collecting personal information, WorldTravel explicitly states the purpose of the information and that it will not be used for anything else.
d. When collecting personal information, WorldTravel explicitly tells all of its customers that the information collected will be protected by a third party who specializes in this domain.
e. When collecting personal information, WorldTravel explicitly tells all of its customers that the information collected is protected under the Electronic Communications Privacy Act.
d. When collecting personal information, WorldTravel explicitly tells all of its customers that the information collected will be protected by a third party who specializes in this domain.
Which of the following best describes the network effect?
a. The value of a network depends on the number of mobile devices that are attached.
b. It refers to the idea that networks are attached to each other.
c. It refers to the type of network an organization employs.
d. It refers to the effect of the wireless devices that are attached.
e. It refers to the notion that the value of a network increases with the number of users.
e. It refers to the notion that the value of a network increases with the number of users.
Connecting host computers and their networks together to form even larger networks is called ________.
a. queuing
b. network simulation
c. data mining
d. internetworking
e. Ethernet framing
d. internetworking
With respect to the components of a business model, ________ is the utility that the product/service must offer to customers.
a. value grid
b. value proposition
c. cost structure
d. value migration
e. revenue stream
b. value proposition
At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization.
a. illusive
b. executive
c. superficial
d. managerial
e. strategic
d. managerial
Why are information systems typically used at the operational level?
a. to define all project tasks
b. to create a risk information sheet
c. to identify all business activities
d. to increase efficiency
e. to create use cases
d. to increase efficiency
What example of a platform based business model would Airbnb and Uber represent.
a. Products
b. Subscriptions
c. Communications
d. Collaboration
e. Service
e. Service
________ is the transmission capacity of a computer or communications channel, which represents how much binary data can be reliably transmitted over the medium in one second.
a. Latency
b. Jitter
c. Bandwidth
d. Codec
e. Data buffer
c. Bandwidth
________ is used to solve large-scale computing problems.
a. Grid computing
b. Distributed computing
c. Edge computing
d. IP convergence
e. Trusted computing
a. Grid computing
Which of the following is an example of an operating system?
a. Ubuntu Linux
b. Mozilla Firefox
c. Safari
d. Microsoft Office
e. Microsoft Surface
a. Ubuntu Linux
A ________ is a software application that can be used to locate and display Web pages including text, graphics, and multimedia content.
a. Webmaster
b. Web browser
c. keylogger
d. Webcam
e. proxy server
b. Web browser
Online retailer Amazon.com is an example of a ________ company.
a. bricks-and-clicks
b. click-only
c. brick-and-mortar
d. click-and-mortar
e. click-and-flip
b. click-only
Which of the following is an example of reintermediation?
a. Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute as meals in order to provide competition to the other food chains in the area.
b. Nanny Duke, a baby products manufacturing company, acquires a list of parents-to-be and showers them with samples of diapers and other baby products to capture a share of their future purchases.
c. Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers.
d. The diamond card of the Futilery Centriono, is issued by invitation only to customers who spend more than $250,000 a year on their shopping card.
e. Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations.
e. Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations.
In the context of GPS-enabled location-based services, capturing specific locations to be viewed on the phone is an example of ________ service.
a. navigation
b. tracking
c. mapping
d. location
e. disintegration
c. mapping
Walmart.com is an example of a ________ retailer.
a. brick-and-flip
b. click-only
c. bricks-and-clicks
d. click-and-flip
e. brick-and-mortar
c. bricks-and-clicks
Potential pitfalls of social media and the enterprise include
a. a Web indicator, online product reviews, and social networks.
b. microblogging, lessons learned, and a Web indicator.
c. lessons learned, societal impacts of social media, and social dynamics.
d. microblogging, social networks, and social dynamics.
e. online product reviews, microblogging, and bad vibes going viral.
e. online product reviews, microblogging, and bad vibes going viral.
________ refers to manually adding metadata to media or other content.
a. Netcasting
b. Tagging
c. Podcasting
d. Crowdsourcing
e. Phishing
b. Tagging