Test Bank Ch. 2, 4, 6, 9, 10 Flashcards
Which of the following is an example of business-to-consumer electronic commerce?
A) Brenda files her income tax online.
B) Canchi, a shoe manufacturer, conducts business over the Web with its retailers.
C) Juan buys guitars for resale on Monsung.com.
D) Reuben buys a pair of shoes on Mysticshoes.com.
E) Neal places a bid for a mobile phone on the online auction site Feliciate.com.
D) Reuben buys a pair of shoes on Mysticshoes.com.
Which of the following is an example of consumer-to-consumer electronic commerce?
A) Niobi makes an online deposit of $5,000 into her friend’s account.
B) Heath buys a gift for Vanessa on Aniocride.com.
C) Blanco, a manufacturer, conducts business over the Web with its retailers.
D) Ashley buys a new pair of shoes on Fequette.com.
E) Marty buys Lobsang’s mountaineering equipment on Chieoke.com.
E) Marty buys Lobsang’s mountaineering equipment on Chieoke.com.
Identify a true statement about the Internet of things.
A) It enables companies to offer various innovative products and services that go beyond the initial purchase.
B) It defines a set of reachable and exploitable vulnerabilities present in a business model.
C) It contains rules and guidelines that describe how security is to be enforced during system operation.
D) It identifies the tasks that are critical within a business model and builds a network that depicts their interdependencies.
E) It is defined as the percentage of visitors who leave the Web site after viewing that page.
A) It enables companies to offer various innovative products and services that go beyond the initial purchase.
In the context of GPS-enabled location-based services, the ability to see another person’s location is an example of ________ service.
A) reintegration B) navigation C) mapping D) disintegration E) tracking
E) tracking
In e-business terminology, ________ companies are sometimes called “pure play companies.”
A) bricks-and-clicks B) click-and-mortar C) brick-and-mortar D) click-and-flip E) click-only
E) click-only
In ________ pricing, companies set the prices that consumers pay for products.
A) viral B) top-up C) menu-driven D) reverse E) rafter bid
C) menu-driven
How do comparison shopping sites generate revenue?
A) by charging a commission on transactions
B) by selling their products in physical stores as well
C) by charging a virtual shelf space fee to manufacturers
D) by increasing the click count on their sites
E) by charging distribution fees to consumers
A) by charging a commission on transactions
EZBiz, the brainchild of three college friends, is a startup venture that plans to produce and market sports gear. The venture is still stuck in the planning phase as they have not been able to decide the suitable business strategy to opt for. They are currently trying to decide between a bricks-and-clicks strategy or a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?
A) The company has limited access to funds and is looking to keep its costs low.
B) The public is wary of sharing confidential information after a recent spate of credit card scandals.
C) A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain.
D) Several companies who have switched from a brick-and-mortar strategy to a click-only strategy are experiencing severe channel conflicts.
E) Some click-only companies have been unable to achieve economies of scale and are subsequently unable to offer lower prices.
B) The public is wary of sharing confidential information after a recent spate of credit card scandals.
With respect to e-tailing, ________ can initiate certain actions, such as making a phone call to a sales representative or sending a text message to a pre-specified number.
A) MaxiCodes B) CPC Binary Barcodes C) viral codes D) MSI barcodes E) QR codes
E) QR codes
Identify a true statement about the function of Google’s Ad Words.
A) It ensures high-quality leads when a search is conducted online.
B) It presents a view of short-term technology integration.
C) It presents a view of long-term technology integration.
D) It redirects Web pages to different sites if the link fails.
E) It provides immediate communication to and receives feedback from customers.
A) It ensures high-quality leads when a search is conducted online.
Which of the following characteristics of the Web deals with making the interaction with a Web site easier or more convenient?
A) representational delight B) cost compliance C) structural firmness D) disintermediation capacity E) functional convenience
E) functional convenience
Which of the following explains Web analytics?
A) conducting online marketing research to improve product quality
B) analyzing Web sites in order to find the best one in a category
C) tracking all online purchasers to try and increase their frequency of visit to a particular Web site
D) analyzing Web surfers’ behavior in order to improve Web site performance
E) analyzing Web sites in order to find the best online business practices
D) analyzing Web surfers’ behavior in order to improve Web site performance
A way to ensure that a company’s site is on the first page users see when looking for a specific term is using ________ advertising.
A) stealth B) viral C) buzz D) search E) affiliate
D) search
Companies use ________ to move up their Web sites in the organic search engine results.
A) search engine image protection B) search engine optimization C) search engine keyword insertion D) search-oriented architecture E) domain stacking
B) search engine optimization
A recent trend in display advertising has been ________ advertising, where the ads placed on a page are in some way related to the content of that page.
A) contextual B) buzz C) viral D) affiliate E) stealth
A) contextual
The performance of a pay-per-click advertising model can be assessed by ________, which reflects the percentage of visitors who actually perform the marketer’s desired action such as making a purchase.
A) click fraud rate B) contextual search rate C) pop-up rate D) click-through rate E) conversion rate
E) conversion rate
Click-through rate reflects ________.
A) the ratio of surfers who visit a Web site divided by the number of surfers who clicked on an ad
B) the ratio of surfers who click on an ad divided by the number of times it was displayed
C) the percentage of visitors who actually perform the marketer’s desired action
D) the ratio of surfers who click on an ad divided by the number of people who make a purchase
E) the ratio of surfers who visit a Web site divided by the number of people who make a purchase
B) the ratio of surfers who click on an ad divided by the number of times it was displayed
How can the effectiveness of e-mail advertising campaigns be measured directly?
A) by reflecting the percentage of visitors who actually perform the marketer’s desired action
B) by reflecting the number of surfers who click on an ad divided by the number of times it was displayed
C) by creating use cases and business models to determine the ratio of the opened mails to the sent mails
D) by conducting online polls, starting online forums, and collecting user feedbacks
E) by including special links in the e-mail that allow tracking which e-mails the customers have opened or reacted to
E) by including special links in the e-mail that allow tracking which e-mails the customers have opened or reacted to
In the context of GPS-enabled location-based services, the ability to determine the basic geographic position of a cell phone is an example of ________ service.
A) location B) mapping C) navigation D) tracking E) reintegration
A) location
In the context of GPS-enabled location-based services, capturing specific locations to be viewed on the phone is an example of ________ service.
A) location B) mapping C) navigation D) tracking E) disintegration
B) mapping
In the context of GPS-enabled location-based services, the ability to give route directions from one point to another is an example of ________ service.
A) mapping B) disintegration C) navigation D) reintegration E) tracking
C) navigation
________ is used in consumer-to-business e-commerce to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people.
A) Nearshoring B) Insourcing C) Offshoring D) Crowdsourcing E) Homesourcing
D) Crowdsourcing
________ is a three-digit code located on the back of a credit or debit card that is used for authorization by the card-issuing bank to combat fraud in online purchases.
A) Competitive Fraud Detector B) Card Verification Value C) Online Purchase Processor D) Card Detection Value E) Purchase Processing Value
B) Card Verification Value
Responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ________ level of an organization.
A) operational B) executive C) tactical D) business E) strategic
A) operational
When we consider entities as tables, each row is a ________.
A) field B) record C) bot D) form E) query
B) record
When we consider entities as tables, each column is a(n) ________.
A) attribute B) record C) form D) applet E) query
A) attribute
An attribute is also referred to as a ________.
A) form B) record C) field D) query E) bot
C) field
A ________ is a collection of related attributes about a single instance of an entity.
A) bot B) form C) query D) field E) record
E) record
In a database management system (DBMS), data are kept separate from the application’s programming code. This means that ________.
A) an application cannot be changed without making changes to the database
B) an application’s programming code needs to be updated continuously to keep up with the database
C) an application needs to be changed when the database is changed
D) the database does not need to be changed if a change is made to an application
E) the database needs to be changed when a change is made to an application
D) the database does not need to be changed if a change is made to an application
One of the advantages of a database approach is program-data independence. This means that it is ________.
A) easier to deploy and control data access using a centralized system
B) easier to evolve and alter software to changing business needs when data and programs are independent
C) a centralized system, thereby making it easier to enforce access restrictions
D) a centralized system, thereby making it much easier to enforce standards and rules for data creation, modification, naming, and deletion
E) useful for eliminating redundancy, thereby reducing the possibilities of inconsistency
B) easier to evolve and alter software to changing business needs when data and programs are independent
Identify an advantage when the database approach makes it easier to deploy and control data access.
A) improved data accessibility B) improved data consistency C) improved data quality D) increased security E) improved data sharing
A) improved data accessibility
Big Data is ________.
A) structured data which fit neatly into spreadsheets
B) semistructured data such as clickstream and sensor data
C) unstructured data such as audio and video
D) characterized based on its high velocity
E) organizational wide data
D) characterized based on its high velocity
Data type helps a database management system (DBMS) to ________.
A) present the data in a useful format B) format data C) allocate storage space D) eliminate data duplication E) retrieve information
C) allocate storage space
A data dictionary is also known as ________.
A) a data mart B) a data warehouse C) a metadata repository D) ubiquitous computing E) clickstream data
C) a metadata repository
Once the data model is created, the format of the data is documented in a data ________.
A) warehouse B) entry C) mart D) domain E) dictionary
E) dictionary
Business rules are captured by the designers of a database and included in a data dictionary to ________.
A) organize and sort the data, complete calculations, and allocate storage space
B) prevent illegal or illogical entries from entering the database
C) eliminate data duplication
D) make sure that each table contains only attributes that are related to an entity
E) capture the structure of the database
B) prevent illegal or illogical entries from entering the database
________ are used to capture data to be added, modified, or deleted from a database.
A) Forms B) Reports C) Queries D) Bots E) Layers
A) Forms
A(n) ________ is a compilation of data from a database that is organized and produced in printed format.
A) form B) attribute C) field D) entity E) report
E) report
A query is used to ________.
A) organize and sort the data in a database
B) allocate storage space for a database
C) eliminate data duplication
D) retrieve data from a database
E) prevent illegal or illogical entries from entering the database
D) retrieve data from a database
________ are the data that is deemed most important in the operation of a business.
A) Metadata B) Master data C) Reference data D) Query data E) Tactical data
B) Master data
Which of the following statements is true about an operational system?
A) Its primary purpose is to support managerial decision making.
B) It consists of historical or point-in-time data.
C) Its goal is to enhance ease of access and use.
D) It consists of narrow and simple updates and queries.
E) It is primarily used by managers.
D) It consists of narrow and simple updates and queries.
Which of the following statements is true about an information system?
A) Its primary purpose is to run the business on a current basis.
B) It is primarily used by online customers, clerks, salespersons, and administrators.
C) It consists of narrow and simple updates and queries.
D) Its design goal is to enhance performance.
E) Its design goal is to enhance ease of access and use.
E) Its design goal is to enhance ease of access and use.
The purpose of a data warehouse is to ________.
A) standardize the format of data retrieved from different systems
B) allow managers to run queries and reports themselves without having to know query languages or the structure of the underlying data
C) provide capabilities for discovering hidden predictive relationships in the data
D) put key business information into the hands of more decision makers
E) increase the complexity of the data to be analyzed
D) put key business information into the hands of more decision makers
Which of the following statements is true about a data mart?
A) It standardizes the format of data retrieved from different systems.
B) It contains selected data from a data warehouse.
C) It stores master data only.
D) It is a compilation of data from the database that is organized and produced in printed format.
E) It helps to eliminate data duplication.
B) It contains selected data from a data warehouse.
Which of the following is NOT a type of report generated by businesses?
A) Scheduled report B) Business report C) Drill-down report D) Key-indicator report E) Exception report
B) Business report
Select the correct statement below.
A) Artificial intelligence is the science of enabling humans to simulate machine thinking.
B) Predictive modeling helps build unexplained models.
C) Machine learning allows systems to learn by imitating humans.
D) Intelligent systems emulate and enhance human capabilities.
E) Intelligent agents (also called ‘bots’) are used by users to control how programs are opened.
D) Intelligent systems emulate and enhance human capabilities.
________ are produced at predefined intervals to support routine decisions.
A) Security reports B) Exception reports C) Drill-down reports D) Scheduled reports E) Key-indicator reports
D) Scheduled reports
Which of the following statements is true about exception reports?
A) They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
B) They are produced at predefined intervals to support routine decisions.
C) They answer unplanned information requests to support a non-routine decision.
D) They provide a summary of critical information on a recurring schedule.
E) They highlight situations that are out of the normal range.
E) They highlight situations that are out of the normal range.
________ help in analyzing why a key indicator is not at an appropriate level or why an exception occurred.
A) Activity reports B) Exception reports C) Drill-down reports D) Scheduled reports E) Key-indicator reports
C) Drill-down reports
Which of the following statements is true about an online analytical processing server?
A) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
B) It groups related records together on the basis of having similar values for attributes.
C) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
E) It understands how data are organized in a database and has special functions for analyzing the data.
E) It understands how data are organized in a database and has special functions for analyzing the data.
How do online analytical processing systems improve performance?
A) They preaggregate data so that only the subset of the data necessary for the queries is extracted.
B) They use reasoning methods to outline how sensitive information will be handled, stored, transmitted, and destroyed.
C) They make hypothetical changes to the data associated with a problem.
D) They allow for multiple dimensions to be added to a traditional two-dimensional table.
E) They provide capabilities for discovering hidden predictive relationships in the data.
A) They preaggregate data so that only the subset of the data necessary for the queries is extracted.
In online analytic processing systems, ________ are the values or numbers the user wants to analyze.
A) dimensions B) forms C) measures D) queries E) entities
C) measures
In online analytical processing systems, ________ provide a way to summarize the data.
A) forms B) measures C) facts D) records E) dimensions
E) dimensions
Data mining complements online analytical processing in that it ________.
A) finds associations or correlations among sets of items
B) provides capabilities for discovering hidden predictive relationships in the data
C) extracts textual information from Web documents
D) groups related records together on the basis of having similar values for attributes
E) analyzes different dimensions of data beyond simple data summaries
B) provides capabilities for discovering hidden predictive relationships in the data
________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals.
A) Data cleansing B) Normalization C) Clustering D) Data reduction E) Inferencing
D) Data reduction
Which of the following statements is true about association discovery?
A) It is a technique used to find correlations among sets of items.
B) It is the process of grouping related records together on the basis of having similar values for attributes.
C) It is the use of analytical techniques for extracting information from textual documents.
D) It is a type of intelligent system that uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
E) It makes sure that each table contains only attributes that are related to an entity.
A) It is a technique used to find correlations among sets of items.
________ is the process of grouping related records together based on having similar values for attributes.
A) Normalization B) Data mining C) Clustering D) Inferencing E) Slicing and dicing
C) Clustering
Which of the following is used for Web content mining?
A) clustering B) Web underlining C) neural networks D) Web crawler E) data reduction
D) Web crawler
________ allows using approximations or subjective values to handle situations where information about a problem is incomplete.
A) Fuzzy logic B) Normalization C) Clustering D) What-if analysis E) Stickiness
A) Fuzzy logic
Which of the following is a role of monitoring and sensing agents?
A) keeping track of key data
B) sending a report at the first of the month automatically
C) assembling customized news
D) analyzing data warehouses to detect changes deemed important by a user
E) finding the best price for a particular product a user wants to purchase
A) keeping track of key data
Which of the following is a role of data mining agents?
A) tracking inventory levels
B) sending a report at the first of the month automatically
C) assembling customized news
D) analyzing data warehouses to detect changes deemed important by a user
E) finding the best price for a particular product a user wants to purchase
D) analyzing data warehouses to detect changes deemed important by a user