Practice Final Flashcards

1
Q

The purpose of a(n) ________ is to support and integrate all facets of the business, including planning, manufacturing, sales, marketing, and so on.

a. electronic commerce system
b. functional area information system
c. management information system
d. enterprise resource planning system
e. intelligent system

A

d. enterprise resource planning system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

________ are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market.

a. Disruptive innovations
b. Adaptive innovations
c. Facultative innovations
d. Extensive innovations
e. Constructive innovations

A

a. Disruptive innovations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

________ is the process of analyzing an organization’s activities to determine where value is added to products and/or services and what costs are incurred for doing so.

a. Value shop
b. Value migration
c. Value networking
d. Value chain analysis
e. Value grid trial

A

d. Value chain analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The executive level of an organization is also known as the ________ level.

a. tactical
b. strategic
c. managerial
d. illusory
e. operational

A

b. strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Managers in the ________ level of an organization are referred to as “executives.”

a. operational
b. tactical
c. functional
d. managerial
e. strategic

A

e. strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

________, the use of the Internet protocol (IP) for transporting voice, video, fax, and data traffic, has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs.

a. Grid computing
b. IP console
c. IP edging
d. IP convergence
e. Edge computing

A

d. IP convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ is used to transmit voice and video communication over the Internet.

a. Edge computing
b. IP console
c. IP convergence
d. Distributed computing
e. IP routing

A

c. IP convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The operating system of a computer is an example of ________ software.

a. application
b. peripheral
c. system
d. transitory
e. open source

A

c. system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The standard method of specifying the format of Web pages is called ________.

a. Assembly Language (AL)
b. Hypertext Markup Language (HTML)
c. Structured Query Language (SQL)
d. Practical Extraction and Report Language (PERL)
e. Extensible Markup Language (XML)

A

b. Hypertext Markup Language (HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following characteristics of the Web deals with stimulating a consumer’s senses?

a. functional convenience
b. structural firmness
c. representational delight
d. disintermediation capacity
e. cost compliance

A

c. representational delight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is structural firmness of a Web site achieved?

a. by using technical jargons to define a problem
b. by implementing a complicated source code
c. by redirecting Web pages to different sites if any link fails
d. by developing a mirror site
e. by providing understandable messages if anything goes wrong

A

e. by providing understandable messages if anything goes wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The form of electronic commerce that is used by organizations to conduct business with business partners without involving the end consumer is known as ________ electronic commerce.

a. business-to-business
b. peer-to-peer
c. business-to-intermediary
d. business-to-consumer
e. business-to-supplier

A

a. business-to-business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ________ is a form of e-auction which allows businesses to buy seized and surplus government equipment.

a. top-up
b. reverse auction
c. mystery auction
d. rafter bid
e. forward auction

A

e. forward auction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ refers to the process of integrating external stakeholders into the innovation process.

a. Media sharing
b. Social cataloging
c. Nearshoring
d. Open innovation
e. Crowdsourcing

A

d. Open innovation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as ________.

a. podcasts
b. tag clouds
c. folksonomies
d. geospatial metadata
e. microblogs

A

c. folksonomies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In addition to being used for communication and collaboration, organizational intranets are widely used for enabling employee self-service for administering benefits, managing retirement plans, or other human resources-based applications through employee ________.

a. tools
b. entities
c. plans
d. channels
e. portals

A

e. portals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following conditions is essential for successful Enterprise 2.0 implementation?

a. Enterprise 2.0 should be independent of the organization’s culture.
b. Enterprise 2.0 should be independent of the organization’s workforce.
c. Enterprise 2.0 should be driven by a specific usage context.
d. Enterprise 2.0 should appeal to future end users of the application and not the organization’s members.
e. Enterprise 2.0 should avoid involvement of senior management members of an organization.

A

c. Enterprise 2.0 should be driven by a specific usage context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following statements is true about a digital dashboard?

a. It is the combination of various analysis techniques and interactive visualization to solve complex problems.
b. It is a system for creating, storing, analyzing, and managing geographically referenced information.
c. It is used to combine geographic, demographic, and other data for locating target customers.
d. It can visualize features and relationships between features drawn from an underlying geographic database.
e. It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.

A

e. It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The combination of various analysis techniques and interactive visualization to solve complex problems is known as ________.

a. visual analytics
b. digital analysis
c. security analysis
d. social network analysis
e. concept analytics

A

a. visual analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In online analytical processing systems, ________ provide a way to summarize the data.

a. facts
b. dimensions
c. records
d. forms
e. measures

A

e. measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following statements is true about the online analytic processing cube?

a. It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
b. It groups related records together on the basis of having similar values for attributes.
c. It understands how data are organized in the database and has special functions for analyzing the data.
d. It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
e. It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.

A

a. It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

________ activities encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management.

a. Account
b. Procurement
c. Technology development
d. Human resource
e. Architectural

A

d. Human resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Components to simplify, standardize, and automate business processes related to inbound and outbound logistics, product development, manufacturing, and sales and service are called ________ management.

a. personal
b. organizing
c. operations
d. human resource
e. financial

A

c. operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

For most businesses, the ________ process entails several subprocesses including creating a customer record, checking the customer’s creditworthiness, creating an order, checking and allocating stock, and shipping.

a. order-to-cash
b. make-to-stock
c. plan-to-produce
d. make-to-order
e. procure-to-pay

A

a. order-to-cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In core business processes, which of the following uses a push-based approach?

a. production-to-order
b. procure-to-pay
c. order-to-cash
d. make-to-order
e. make-to-stock

A

e. make-to-stock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Inventory and safety stock planning ________.

a. leads to the development of a sourcing plan
b. leads to the development of a transportation schedule
c. focuses on delivering products or services to consumers as well as warehousing
d. leads to the development of the overall demand forecast
e. focuses on the coordination of all activities needed to create a product or service

A

a. leads to the development of a sourcing plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

________ refers to systems for providing effective and efficient communication with the customer from the entire organization.

a. Sales force automation
b. Operational customer relationship management (CRM)
c. Collaborative customer relationship management (CRM)
d. Analytical customer relationship management (CRM)
e. Business intelligence

A

c. Collaborative customer relationship management (CRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is the main objective of information systems that focuses on improving supply chains?

a. decentralizing the organizations
b. encouraging the bullwhip effect
c. discouraging vendor-managed inventory systems
d. discouraging sustainable production processes
e. accelerating product development and innovation

A

e. accelerating product development and innovation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The key use of the order promising module of supply chain management is to ________.

a. assign optimal safety stock and target stock levels in all inventories in the supply network
b. monitor key performance indicators to assess performance across the supply chain
c. manage logistics between company locations or from company to customers, taking into account transportation modes and constraints
d. provide answers to customer relationship management queries regarding product availability, costs, and delivery times
e. work with partners across the supply network to improve accuracy of demand forecasts, reduce inventory buffers, and improve customer service

A

d. provide answers to customer relationship management queries regarding product availability, costs, and delivery times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A ________ is a document that an organization uses to tell vendors what its requirements are and to invite them to provide information about how they might be able to meet those requirements.

a. vendor request
b. demand letter
c. requirements specification
d. request letter
e. request for proposal

A

e. request for proposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

________ costs are ongoing costs that occur throughout the life of the system.

a. Sector
b. Recurring
c. Smart
d. Non-recurring
e. Fixed

A

b. Recurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The final phase of the systems development life cycle is systems ________.

a. operation
b. maintenance
c. implementation
d. analysis
e. design

A

b. maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Preventive maintenance of a system involves ________.

a. making changes to an information system to repair flaws in the design
b. adding desired, but not necessarily required, system features
c. making changes to a system to reduce the chance of future system failure
d. making changes to an information system to accommodate changing business needs
e. making enhancements to improve processing performance or interface usability

A

c. making changes to a system to reduce the chance of future system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference?

a. The company insures any possible data loss for a large sum.
b. The company decides to absorb any damages that might occur.
c. It installs a corporate firewall to protect unauthorized access to information.
d. The company forms a special team of top executives to monitor and correct the information policies.
e. It enforces a strict employee data policy and prohibits employees from unauthorized access.

A

a. The company insures any possible data loss for a large sum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When a company uses a fingerprint recognition system instead of access cards, it helps the company prevent unauthorized physical access. Which of the following technologies is used for authentication here?

a. smart cards
b. access-control software
c. encryption
d. passwords
e. biometrics

A

e. biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is the most accurate definition of a botnet?

a. a common platform used by search engines to index the contents of a Web site
b. spider software used by a search algorithm to crawl various Web sites to return a query
c. a fraudulent e-mail attack that targets a specific person or organization by personalizing the message
d. destructive software robots working together on a collection of zombie computers via the Internet
e. a small text file passed to a Web browser on a user’s computer by a Web server

A

d. destructive software robots working together on a collection of zombie computers via the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A ________ is a small text file passed to a Web browser on a user’s computer by a Web server.

a. honeypot
b. cookie
c. worm
d. botnet
e. virus

A

b. cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A ________ network is configured in the shape of a closed loop or circle with each node connecting to the next node.

a. square
b. star
c. bus
d. ring
e. mesh

A

d. ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following methods is used for random access control in wireless LAN?

a. hybrid coordination function
b. carrier sense multiple access
c. group packet radio service
d. point coordination function
e. code division multiple access

A

b. carrier sense multiple access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

________ are computer-aided software engineering (CASE) tools that automatically check for incomplete, inconsistent, or incorrect specifications in diagrams, screens, and reports.

a. Analysis tools
b. Documentation generators
c. Repositories
d. Diagramming tools
e. Code generators

A

a. Analysis tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

________ is used by text recognition software to convert typed, printed, or handwritten text into the computer-based characters that form the original letters and words.

a. Autonomous automation
b. Optical character recognition
c. Speech recognition
d. Computer vision software
e. Natural language processing

A

b. Optical character recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A ________ is a networking hardware component that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points.

a. modem
b. network switch
c. network interface card
d. router
e. wireless controller

A

e. wireless controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

With respect to the types of information systems used in organizations, an automated system for analyzing bank loan applications is an example of a(n) ________ system.

a. electronic commerce
b. visualization
c. social software
d. geographic information
e. intelligent

A

e. intelligent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

WorldTravel (www.worldtravel.com) is a travel Web site that provides detailed information about the different places that tourists can visit across the globe. Additionally, it also helps visitors to book tickets and hotels in these destinations. Which of the following, if true, would most assure the customers of their online privacy?

a. WorldTravel informs its members that it is following the best practices in the industry.
b. WorldTravel decides not to send any spam mails to any of its members.
c. When collecting personal information, WorldTravel explicitly states the purpose of the information and that it will not be used for anything else.
d. When collecting personal information, WorldTravel explicitly tells all of its customers that the information collected will be protected by a third party who specializes in this domain.
e. When collecting personal information, WorldTravel explicitly tells all of its customers that the information collected is protected under the Electronic Communications Privacy Act.

A

d. When collecting personal information, WorldTravel explicitly tells all of its customers that the information collected will be protected by a third party who specializes in this domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following best describes the network effect?

a. The value of a network depends on the number of mobile devices that are attached.
b. It refers to the idea that networks are attached to each other.
c. It refers to the type of network an organization employs.
d. It refers to the effect of the wireless devices that are attached.
e. It refers to the notion that the value of a network increases with the number of users.

A

e. It refers to the notion that the value of a network increases with the number of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Connecting host computers and their networks together to form even larger networks is called ________.

a. queuing
b. network simulation
c. data mining
d. internetworking
e. Ethernet framing

A

d. internetworking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

With respect to the components of a business model, ________ is the utility that the product/service must offer to customers.

a. value grid
b. value proposition
c. cost structure
d. value migration
e. revenue stream

A

b. value proposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization.

a. illusive
b. executive
c. superficial
d. managerial
e. strategic

A

d. managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Why are information systems typically used at the operational level?

a. to define all project tasks
b. to create a risk information sheet
c. to identify all business activities
d. to increase efficiency
e. to create use cases

A

d. to increase efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What example of a platform based business model would Airbnb and Uber represent.

a. Products
b. Subscriptions
c. Communications
d. Collaboration
e. Service

A

e. Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

________ is the transmission capacity of a computer or communications channel, which represents how much binary data can be reliably transmitted over the medium in one second.

a. Latency
b. Jitter
c. Bandwidth
d. Codec
e. Data buffer

A

c. Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

________ is used to solve large-scale computing problems.

a. Grid computing
b. Distributed computing
c. Edge computing
d. IP convergence
e. Trusted computing

A

a. Grid computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following is an example of an operating system?

a. Ubuntu Linux
b. Mozilla Firefox
c. Safari
d. Microsoft Office
e. Microsoft Surface

A

a. Ubuntu Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A ________ is a software application that can be used to locate and display Web pages including text, graphics, and multimedia content.

a. Webmaster
b. Web browser
c. keylogger
d. Webcam
e. proxy server

A

b. Web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Online retailer Amazon.com is an example of a ________ company.

a. bricks-and-clicks
b. click-only
c. brick-and-mortar
d. click-and-mortar
e. click-and-flip

A

b. click-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following is an example of reintermediation?

a. Donuts Haven, a fast food chain, expands its menu beyond breakfasts by adding hearty snacks that substitute as meals in order to provide competition to the other food chains in the area.
b. Nanny Duke, a baby products manufacturing company, acquires a list of parents-to-be and showers them with samples of diapers and other baby products to capture a share of their future purchases.
c. Rusicwood, a furniture manufacturing firm, starts selling directly to its customers after experiencing a dip in sales due to channel conflicts between retailers.
d. The diamond card of the Futilery Centriono, is issued by invitation only to customers who spend more than $250,000 a year on their shopping card.
e. Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations.

A

e. Kambo, a fashion apparel company that deals directly with customers to sell its products, adds retailers to its supply chain to cater to its target audience in remote geographic locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

In the context of GPS-enabled location-based services, capturing specific locations to be viewed on the phone is an example of ________ service.

a. navigation
b. tracking
c. mapping
d. location
e. disintegration

A

c. mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Walmart.com is an example of a ________ retailer.

a. brick-and-flip
b. click-only
c. bricks-and-clicks
d. click-and-flip
e. brick-and-mortar

A

c. bricks-and-clicks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Potential pitfalls of social media and the enterprise include

a. a Web indicator, online product reviews, and social networks.
b. microblogging, lessons learned, and a Web indicator.
c. lessons learned, societal impacts of social media, and social dynamics.
d. microblogging, social networks, and social dynamics.
e. online product reviews, microblogging, and bad vibes going viral.

A

e. online product reviews, microblogging, and bad vibes going viral.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

________ refers to manually adding metadata to media or other content.

a. Netcasting
b. Tagging
c. Podcasting
d. Crowdsourcing
e. Phishing

A

b. Tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Cloud-based collaboration tools ________.

a. allow for easy transferability of documents from one person to another
b. reduce the risk of exposing sensitive corporate data
c. require users to frequently upgrade their software
d. are complex and time-consuming
e. have well-documented procedures for system complexities

A

a. allow for easy transferability of documents from one person to another

62
Q

Which of the following statements is true about a Real Simple Syndication (RSS) feed?

a. It is used to access the most current blogs, podcasts, videos, and news stories.
b. It is used to disseminate information to a narrow audience.
c. It is used to enable people to work on a variety of Internet related projects in more flexible ways.
d. It is used to increase brand awareness through the network effect.
e. It is used to market the product without the audience realizing it.

A

a. It is used to access the most current blogs, podcasts, videos, and news stories.

63
Q

Treston, an automobile manufacturer, recently implemented a new database system. It was confident that this system would help enhance the company’s internal (employees) and external (customers and channel partners) communication. Treston had planned to pursue a just-in-time inventory system soon after the database system was implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following can be cited as a reason for the failure of Treston’s database system?

a. Treston had internally trained personnel managing its new database system, thereby keeping costs low.
b. Treston’s new database system was not supported by the database system of its suppliers and distributors.
c. Aerodoungle launched a new version of Enterprise Database Access, which was better than Treston’s database system.
d. Treston’s competitors implemented its database a few days prior to Treston’s implementation date.
e. The maintenance cost of Treston’s new database system was less than the one it was previously using.

A

b. Treston’s new database system was not supported by the database system of its suppliers and distributors.

64
Q

________ is the ability of a page to attract and keep visitors.

a. Freecycling
b. Stickiness
c. Showrooming
d. Normalization
e. Crowdsourcing

A

b. Stickiness

65
Q

Which of the following statements is true about ad hoc queries?

a. They provide a summary of critical information on a recurring schedule.
b. They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
c. They answer unplanned information requests to support a non-routine decision.
d. They are produced at predefined intervals to support routine decisions.
e. They highlight situations that are out of the normal range.

A

c. They answer unplanned information requests to support a non-routine decision.

66
Q

Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory levels for its stores. It is planning to implement an Oracle database system to replace this legacy system. Which of the following most supports Bringes’ decision to replace its legacy system with an Oracle database system?

a. Bringes’ channel partners use a database system that supports the Oracle database system.
b. Maintenance of an Oracle database system is more expensive than the legacy system presently in use.
c. Implementing an Oracle database system will require Bringe to hire additional specialized personnel to manage it.
d. Conversion cost required for the implementation of an Oracle database system is not supported by the IT budget.
e. Partial implementation of the Oracle database system can create more problems than it is likely to solve.

A

a. Bringes’ channel partners use a database system that supports the Oracle database system.

67
Q

In an order-to-cash process, identify the next step that the online retailer takes after creating an order for a customer.

a. pick, pack, and ship
b. prepare and send invoice
c. create customer record
d. collect payment
e. check and allocate stock

A

e. check and allocate stock

68
Q

Which of the following is a core business process?

a. hire-to-retire
b. time-to-purchase
c. account-to-report
d. make-to-stock
e. plan-to-produce

A

d. make-to-stock

69
Q

Applications that integrate business activities across departmental boundaries are often referred to as ________ planning systems.

a. manufacturing resource
b. enterprise resource
c. computer-integrated
d. materials requirement
e. capacity requirement

A

b. enterprise resource

70
Q

A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database.

a. decision support system
b. management information system
c. enterprise system
d. legacy system
e. distributed software system

A

c. enterprise system

71
Q

Which of the following portrays the improved product development benefit of a customer relationship management (CRM) system?

a. providing product information, sales status, support information, issue tracking, and so on
b. enabling improved record keeping and efficient methods of capturing customer complaints that help to identify problems faster
c. learning how each customer defines product and service quality so that customized product, pricing, and services can be designed or developed collaboratively
d. tracking customer behavior over time that helps to identify future opportunities for product and service offerings
e. providing integrated information that removes information handoffs, thereby speeding both sales and support processes

A

d. tracking customer behavior over time that helps to identify future opportunities for product and service offerings

72
Q

Which of the following statements is true about information flow, a key element of supply chain execution?

a. Information can only flow up the supply chain.
b. The key element to the information flow is the complete removal of paper documents.
c. It refers primarily to the movement of financial assets throughout the supply chain.
d. It refers to the use of key performance indicators to monitor performance of the entire supply chain.
e. A key element of information flow is to foresee external events.

A

b. The key element to the information flow is the complete removal of paper documents.

73
Q

Analytical tools are used to optimally utilize materials, equipment, and labor during the ________ process of supply chain planning.

a. safety stock scheduling
b. production scheduling
c. inventory planning
d. distribution planning
e. demand forecasting

A

b. production scheduling

74
Q

Which of the following portrays the improved integration benefit of a customer relationship management (CRM) system?

a. Improved record keeping and efficient methods of capturing customer complaints help to identify and solve problems faster.
b. Integrated information removes information handoffs, speeding both sales and support processes.
c. Information from the CRM can be integrated with other systems to streamline business processes and gain business intelligence as well as make other cross-functional systems more efficient and effective.
d. Integrate all information for all points of contact with the customers–marketing, sales, and service–so that all who interact with customers have the same view and understanding of current issues.
e. Tracking customer behavior over time helps to identify future opportunities for product and service offerings.

A

c. Information from the CRM can be integrated with other systems to streamline business processes and gain business intelligence as well as make other cross-functional systems more efficient and effective.

75
Q

________ testing involves testing of the capabilities of the system in the user environment with actual data.

a. Comparative
b. Beta
c. Alpha
d. Evolutionary
e. Developmental

A

b. Beta

76
Q

System efficiency is the extent to which a system ________.

a. allows employees to reduce the risks associated with tasks
b. allows people to plan tasks that are achievable
c. allows firms to reach their operational targets
d. enables people to accomplish goals or tasks well
e. enables people to do things faster or at lower cost

A

e. enables people to do things faster or at lower cost

77
Q

Which of the following statements best describes the productivity paradox of technology investment?

a. While it is easy to identify and quantify the intangible benefits of an information system, it is not easy to quantify the tangible benefits.
b. As investment in technology increases, productivity decreases steadily.
c. While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use.
d. The productivity of an information system is in no way related to the investment in the technology.
e. The productivity of any technology is directly proportional to the investment in that technology.

A

c. While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use.

78
Q

________ is a group meeting-based process for requirements collection.

a. Total ownership
b. Human-computer interface
c. Reverse engineering
d. Computer-aided design
e. Joint application design

A

e. Joint application design

79
Q

The ________ is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and to establish appropriate controls.

a. control objectives for information and related technology (COBIT)
b. Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
c. Electronic Communications Privacy Act of 1986
d. U.S.A. Patriot Act
e. Sarbanes-Oxley Act of 2002 (S-OX)

A

a. control objectives for information and related technology (COBIT)

80
Q

Which of the following is the most accurate definition of a computer crime?

a. the act of stealing a computer and related hardware
b. the act of using a computer to commit an illegal act
c. the act of using someone’s computer to check e-mail
d. the act of using someone’s computer to browse the Internet
e. the act of providing personal information to Web sites when shopping

A

b. the act of using a computer to commit an illegal act

81
Q

________ refers to the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress.

a. Cyberharassment
b. Viral marketing
c. Bot herding
d. Hacktivism
e. Spam filtering

A

a. Cyberharassment

82
Q

________ targeted at networks is designed to spread by itself without the need for an infected host file to be shared.

a. A logic bomb
b. Spyware
c. Spam
d. A worm
e. Adware

A

d. A worm

83
Q

Google’s Linux-based operating system for mobile devices is known as ________.

a. iOS
b. Java
c. Symbian
d. Bada
e. Android

A

e. Android

84
Q

________ is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the network concurrently.

a. Packet switching
b. Unicode
c. JavaScript
d. Batch processing
e. An interexchange carrier

A

a. Packet switching

85
Q

________ is a technology in which extra copies of data are stored on two or more hard drives to ensure that critical data is not lost.

a. Basic input output systems (BIOS)
b. Redundant array of independent disks (RAID)
c. Single large expensive disks (SLED)
d. Switched port analyzers (SPAN)
e. Just a bunch of disks (JBOD)

A

b. Redundant array of independent disks (RAID)

86
Q

Which of the following types of computer software utilities translates a file from one format to another so that it can be used by an application other than the one used to create it?

a. backup
b. device driver
c. file conversion
d. file defragmentation
e. data compression

A

c. file conversion

87
Q

A(n) ________ is a secondary storage technology that uses nonvolatile memory chips to store data.

a. solid-state drive
b. switch
c. virtual port
d. cache register
e. router

A

a. solid-state drive

88
Q

With respect to the types of information systems used in organizations, a grocery store checkout cash register with a connection to a network is an example of a(n) ________.

a. intelligent system
b. decision support system
c. functional area information system
d. transaction processing system
e. electronic commerce system

A

d. transaction processing system

89
Q

________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard.

a. Stealware
b. Adware
c. Hardware
d. Malware
e. Spyware

A

c. Hardware

90
Q

Identify the purpose of a transaction processing system used in organizations.

a. to enable customers to buy goods and services from a firm’s Web site
b. to support the activities within a specific functional area of the firm
c. to handle day-to-day business event data at the operational level of the organization
d. to produce detailed information to help manage a firm or part of a firm
e. to support the coordination of suppliers, product or service production, and distribution

A

c. to handle day-to-day business event data at the operational level of the organization

91
Q

With respect to types of information systems used in organizations, an inventory management and planning system is an example of a(n) ________ system.

a. virtualization
b. geographic planning
c. social software
d. electronic commerce
e. management information

A

e. management information

92
Q

What a company does, how a company uniquely does it, how a company gets paid for doing it, and what costs are involved are all part of an organization’s ________.

a. competitive model
b. business model
c. value model
d. strategic model
e. revenue model

A

b. business model

93
Q

In the context of organizational requirements for innovation, to deploy innovative information systems well, people in the organization must be willing to do whatever they can to bypass and eliminate internal bureaucracy, set aside political squabbles, and pull together for the common good. These requirements can be categorized as ________ requirements.

a. customer
b. quality
c. resource
d. risk tolerance
e. process

A

e. process

94
Q

________ decisions deal with complex problems with broad and long-term ramifications for an organization.

a. Executive-level
b. Tactical-level
c. Operational-level
d. Managerial-level
e. Functional-level

A

a. Executive-level

95
Q

Identify the focus of managers at the tactical level of an organization.

a. designing long-term strategic questions facing the organization
b. solving complex problems with broad and long-term ramifications for the organization
c. managing routine, day-to-day business processes and interactions with customers
d. maintaining the efficiency of business processes within the organization
e. deploying organizational resources to achieve the strategic objectives of the organization

A

e. deploying organizational resources to achieve the strategic objectives of the organization

96
Q

Which of the following computer networks is used for providing wireless communication between devices, using technologies such as Bluetooth?

a. metropolitan area network
b. campus area network
c. body sensor network
d. personal area network
e. storage area network

A

d. personal area network

97
Q

With respect to the five general classes of computers, ________ are typically used for mission critical applications, such as transaction processing.

a. supercomputers
b. personal computers
c. workstations
d. mainframes
e. servers

A

d. mainframes

98
Q

Which of the following statements is true about the software as a service model?

a. The customer has to manage the licenses for the operating systems being used.
b. The customer can run his or her own applications that are typically designed using tools provided by the service provider.
c. The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
d. The user has control over the applications, but has limited or no control over the underlying infrastructure.
e. The customer is provided with the basic capabilities of processing, storage, and networking.

A

c. The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

99
Q

As defined by the National Institute of Standards and Technology (NIST), “________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

a. Social networking
b. Cloud computing
c. Internetworking
d. Web phishing
e. Green computing

A

b. Cloud computing

100
Q

When an organization offers the customer both a retail store and Internet shopping experience, it is referred to as ________.

a. bi-retailing
b. network retailing
c. multichannel retailing
d. omni-channel retailing
e. cross-channel retailing

A

c. multichannel retailing

101
Q

All of the following are valid payment methods for electronic commerce except ________.

a. Square
b. TechPay
c. Apple Pay
d. Google Wallet
e. PayPal

A

b. TechPay

102
Q

Ben buys a camera from Xenthix which starts malfunctioning, as the camera fell from his hand and broke its lens. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage is of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce?

a. Ben files a complaint on Xenthix’s Web site asking for a refund.
b. Ben sells the camera to the world’s largest used camera dealer, Koenister.com.
c. Ben sells the camera to Balvinder Singh on Iora.com.
d. Ben files an online suit against Xenthix.
e. Ben buys another camera from Xenthix’s online store.

A

c. Ben sells the camera to Balvinder Singh on Iora.com.

103
Q

In electronic commerce, ________ is defined as the percentage of single-page visits.

a. bounce rate
b. showrooming
c. exit rate
d. freecycling
e. value chain analysis

A

a. bounce rate

104
Q

Which of the following is an example of asynchronous communication?

a. electronic meeting support systems
b. online chat
c. videoconferencing
d. e-mail
e. shared whiteboards

A

d. e-mail

105
Q

________ is a cooperative social media application making use of the network effect.

a. Instant messaging
b. Media tagging
c. Media sharing
d. Rich site summary
e. A discussion forum

A

c. Media sharing

106
Q

________ is an example of an online office suite comprised of a spreadsheet application, a word processor, and a presentation application.

a. Google Calendar
b. Google Mail
c. Google Docs
d. Google Talk
e. Google Maps

A

c. Google Docs

107
Q

Which of the following statements is true about peer production?

a. Only editors have the right to develop new content.
b. It is also known as an enterprise content system.
c. Anyone can help in producing or improving the final outcome.
d. A guest is a person who can only view the digital information.
e. The creator is responsible for publishing new information.

A

c. Anyone can help in producing or improving the final outcome.

108
Q

A ________ is a collection of related attributes about a single instance of an entity.

a. query
b. record
c. bot
d. field
e. form

A

b. record

109
Q

Which of the following statements is true about a GIS?

a. A GIS can link the square footage of commercial real estate to its exact location in terms of latitude and longitude.
b. A GIS is a system for creating, storing, analyzing, and managing abstract data.
c. A GIS cannot be used to create a thematic map.
d. A GIS can be used to track user input.
e. A GIS works behind the scenes to create a knowledge management system.

A

a. A GIS can link the square footage of commercial real estate to its exact location in terms of latitude and longitude.

110
Q

Which of the following statements is true about exception reports?

a. They provide a summary of critical information on a recurring schedule.
b. They answer unplanned information requests to support a non-routine decision.
c. They highlight situations that are out of the normal range.
d. They are produced at predefined intervals to support routine decisions.
e. They help analyze why a key indicator is not at an appropriate level or why an exception occurred.

A

c. They highlight situations that are out of the normal range.

111
Q

Social network analysis is a technique that attempts to ________.

a. discover hidden predictive relationships in the data
b. analyze why a key indicator is not at an appropriate level or why an exception occurred
c. allow hypothetical changes to the data associated with a problem and observe how these changes influence the results
d. find groups of people who work together
e. analyze large data warehouses to detect changes deemed important by a user

A

d. find groups of people who work together

112
Q

Which of the following is true regarding the formula for success of an enterprise system?

a. Using outside consultants tends to complicate the implementation of an enterprise system.
b. Enterprise systems are simple to understand and implement when compared to stand-alone systems.
c. Once enterprise systems go live, employees experience an immediate growth in productivity.
d. The success of an enterprise system depends directly on the support received from middle-management.
e. Enterprise systems implementations should include personnel from different departments.

A

e. Enterprise systems implementations should include personnel from different departments.

113
Q

________ activities are performed by the functional areas that process inputs and produce outputs.

a. Core
b. Base
c. Support
d. Extended
e. Focus

A

a. Core

114
Q

Applications that are designed and developed exclusively for a specific organization are known as ________ software.

a. groupware
b. collaborative
c. ready-made application
d. packaged
e. custom

A

e. custom

115
Q

Which of the following goods are typically produced under a make-to-order approach?

a. mass-produced goods
b. expensive high-volume goods
c. cheap high-volume goods
d. goods from external vendors
e. very expensive low-volume goods

A

e. very expensive low-volume goods

116
Q

________ tools help a company in the execution of the customer relationship management (CRM) strategy by improving the management of promotional campaigns.

a. Business intelligence
b. Execution management
c. Sales force automation
d. Enterprise marketing management
e. Customer interaction center

A

d. Enterprise marketing management

117
Q

A(n) ________ is a label that is inserted into an XML document in order to specify how the data contained in the document or a portion of the document should be interpreted and/or used.

a. Extensible Markup Language (XML) tag
b. Extensible Markup Language (XML) query
c. Extensible Markup Language (XML) Unicode
d. Hypertext Markup Language (HTML
e. Hypertext Markup Language (HTML) font

A

a. Extensible Markup Language (XML) tag

118
Q

________ planning focuses on delivering products or services to consumers as well as warehousing, delivering, invoicing, and payment collection.

a. Distribution
b. Inventory
c. Product demand
d. Production
e. Safety stock

A

a. Distribution

119
Q

Supply chain execution ________.

a. involves the management of product flow, information flow, and financial flow
b. refers to the ability to track products as they move through the supply chain
c. involves the development of a sourcing plan
d. involves the development of demand forecast
e. refers to the use of key performance indicators to monitor production

A

a. involves the management of product flow, information flow, and financial flow

120
Q

________ are alternative measures of outcomes that help clarify the impact a change will have on the firm.

a. Proxy variables
b. Pseudocodes
c. Constants
d. Protocols
e. Prototypes

A

a. Proxy variables

121
Q

In an information system, a ________ is the point of contact between a system and users.

a. point-to-point link
b. network interface
c. data link
d. biointerface
e. human computer interface

A

e. human computer interface

122
Q

Which of the following can be considered beta testing?

a. System users at URP feed data into a new information system to test its capability.
b. Taro Inc. checks the correctness of the modules in its new information system.
c. Software testers compare the finished system against user requirements to see if it satisfies all necessary criteria.
d. MNP Inc. checks the system to ensure that it meets all the necessary design requirements.
e. A programmer at Linus Systems checks the integration of multiple modules of an information system.

A

a. System users at URP feed data into a new information system to test its capability.

123
Q

A company implemented a new information system two months ago, but it has not resulted in concrete increases in productivity. A similar system has been in place at the company headquarters for the past two years, and this system has resulted in significant, quantifiable benefits. Which of the following reasons is the most likely explanation for the lack of results?

a. It can take years from the first implementation of this new system before the magnitude of benefits is felt by the organization.
b. The new system may be beneficial for individual firms, but not for a particular industry or the economy as a whole.
c. The new system is being used to redistribute market share rather than make the whole market bigger.
d. The benefits of the new information system are difficult to pinpoint because the firm is not familiar with the working of the system.
e. The benefits of the new information system are difficult to pinpoint because the firm is considering the wrong indicators.

A

a. It can take years from the first implementation of this new system before the magnitude of benefits is felt by the organization.

124
Q

Which of the following is a part of a computer system designed to detect intrusion and to prevent unauthorized access to or from a private network?

a. honeypot
b. firewall
c. spam filter
d. botnet
e. cookie

A

b. firewall

125
Q

While adding information to the employee information database, Neil’s computer crashed, and the entire database was erased. Which of the following types of viruses caused Neil’s computer to crash?

a. spyware
b. adware
c. logic bombs
d. worms
e. encryption

A

c. logic bombs

126
Q

With ________, employees may be identified by fingerprints, retinal patterns in the eye, facial features, or other bodily characteristics before being granted access to use a computer or to enter a facility.

a. biometrics
b. passwords
c. smart cards
d. ECHELONs
e. CAPTCHAs

A

a. biometrics

127
Q

An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur. This approach is called ________.

a. risk acceptance
b. risk transference
c. risk mitigation
d. risk rescheduling
e. risk reduction

A

a. risk acceptance

128
Q

Identify the computer software utility that allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data.

a. file defragmentation
b. data compression
c. file conversion
d. device drivers
e. disk and data recovery

A

b. data compression

129
Q

A(n) ________ network is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers.

a. wide area
b. enterprise
c. value-added
d. local area
e. campus area

A

d. local area

130
Q

________ are private, third-party-managed WANs typically used for B2B communications.

a. Global networks
b. Local area networks
c. Value-added networks
d. Enterprise networks
e. Personal area networks

A

c. Value-added networks

131
Q

In which of the following network topologies are all the nodes or workstations connected to a central hub through which all messages pass?

a. ring network
b. bus network
c. square network
d. star network
e. mesh network

A

d. star network

132
Q

Entering a large number of separate forms or documents into a computer system and manipulating these data at a single time is referred to as ________.

a. context switching
b. inter-processor communication
c. process control block
d. batch processing
e. chain loading

A

d. batch processing

133
Q

Which of the following is an economic change brought about by globalization enabled by information technology?

a. availability of low-cost communication systems
b. increase in the outsourcing of labor
c. development of low-cost computing platforms
d. increase in the frequency of worldwide fads and phenomena
e. decentralization of organizations

A

b. increase in the outsourcing of labor

134
Q

Which of the following predictions made by Peter Drucker is true?

a. Knowledge workers lack valuable real-world skills.
b. Knowledge workers are continually learning how to do their jobs better.
c. Knowledge workers lack reliance on formal education.
d. Knowledge workers are paid less in comparison with their prior industrial counterparts.
e. Knowledge workers have less bargaining power than workers in other industries.

A

b. Knowledge workers are continually learning how to do their jobs better.

135
Q

Outsourcing has seen a huge increase because of the ________.

a. increase in advertising costs
b. decrease in telecommunication costs
c. increase in the use of cloud computing
d. increase in decentralization
e. decrease in the cost of raw materials

A

b. decrease in telecommunication costs

136
Q

Which of the following types of information systems supports the coordination of suppliers, product or service production, and distribution?

a. intelligent system
b. geographic information system
c. supply chain management system
d. electronic commerce system
e. collaboration system

A

c. supply chain management system

137
Q

The managerial level of an organization is also known as the ________ level.

a. executive
b. operational
c. functional
d. tactical
e. strategic

A

d. tactical

138
Q

Which type of innovation is best described as supporting and enhancing the value of an offering?

a. Structure innovation
b. Channel innovation
c. Process innovation
d. Brand innovation
e. Service innovation

A

e. Service innovation

139
Q

At the ________ level of an organization, information systems provide key performance indicators (KPIs) that are focused on balancing performance across the organization.

a. tactical
b. executive
c. operational
d. illusive
e. managerial

A

b. executive

140
Q

Which of the following is the host name in the URL “labs.google.co.in/jack carver”?

a. labs
b. google
c. co
d. in
e. jack carver

A

a. labs

141
Q

With respect to the general classes of computers, a ________ is used for small business computing.

a. server
b. personal computer
c. mainframe computer
d. supercomputer
e. workstation

A

b. personal computer

142
Q

Which of the following statements is true about servers?

a. They are optimized for visualization and rendering of three-dimensional models.
b. They are used for personal computing and small business computing.
c. They are primarily used as the main, central computing system for major corporations.
d. They are used primarily to assist in solving massive scientific problems.
e. They are used to provide services to users within large organizations or to Web users.

A

e. They are used to provide services to users within large organizations or to Web users.

143
Q

The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides users with a simple, consistent interface to access a wide variety of information.

a. Media Access Control Address
b. parameter random access memory
c. World Wide Web
d. point to point protocol
e. private branch exchange

A

c. World Wide Web

144
Q

Which of the following statements is true about firms pursuing a brick-and-mortar business strategy?

a. These firms are only involved in export business activities.
b. These firms operate in both physical and virtual arenas.
c. These firms avoid indulgence in electronic commerce.
d. These firms avoid indulgence in physical store locations.
e. These firms indulge in rafter bidding activities.

A

c. These firms avoid indulgence in electronic commerce.

145
Q

When shoppers come into a store to evaluate the look and feel of a product, just to then purchase it online or at a competitor’s store is known as ________.

a. a forward auction
b. freecycling
c. a rafter bid
d. crowdsourcing
e. showrooming

A

e. showrooming

146
Q

Timothy was reading tournament results of the football World Cup matches on Infogoalistic.com. As he was going through the results, an advertisement of new football studs popped up. This is an example of ________ advertising.

a. contextual
b. niche
c. user-generated
d. covert
e. surrogate

A

a. contextual

147
Q

________ is the distribution of digital media, such as audio or video files, via syndication feeds for on-demand playback on digital media players.

a. Webcasting
b. Phishing
c. Crowdsourcing
d. Blogging
e. Narrowcasting

A

a. Webcasting

148
Q

A major benefit of social software is the ability to harness the “wisdom of crowds” that is also referred to as ________.

a. preference elicitation
b. creative commons
c. collective intelligence
d. consensus democracy
e. collaborative filtering

A

c. collective intelligence

149
Q

The WhatsApp application was created in 2009, and has quickly risen to broad popularity. WhatsApp is a(n) ________ application.

a. e-commerce
b. blogging
c. microblogging
d. social networking
e. instant messaging

A

e. instant messaging

150
Q

Which of the following is a shifting perspective from Web 1.0 to Web 2.0?

a. Web 1.0 - Read, Web 2.0 - Write
b. Web 1.0 - You, Web 2.0 - Me
c. Web 1.0 - Me, Web 2.0 - You
d. Web 1.0 - Write, Web 2.0 - Read
e. Web 1.0 - Read, Web 2.0 - Read, write

A

e. Web 1.0 - Read, Web 2.0 - Read, write