TEST BANK for Business Driven Information Systems, 8th Edition by Baltzan

Page 1


APPENDIX A 1)

Describe the six major categories of hardware and provide an example of each.

2)

Identify the different computer categories and explain their potential business uses.

3)

Explain the difference between primary and secondary storage.

4)

List the common input, output, storage, and communication devices.

Version 1

1


5)

Describe the eight categories of computers by size.

6)

Define the relationship between operating system software and utility software.

7)

What is software?

A) any computer-based tool that people use to work with information and support the information and information-processing needs of an organization B) the set of instructions that the hardware executes to carry out specific tasks C) consists of the physical devices associated with a computer system D) an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data

8)

What is hardware?

Version 1

2


A) any computer-based tool that people use to work with information and support the information and information-processing needs of an organization B) the set of instructions that the hardware executes to carry out specific tasks C) consists of the physical devices associated with a computer system D) an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data

9)

What is a CPU?

A) the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together B) the computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU) C) equipment designed to store large volumes of data for long-term storage D) equipment used to capture information and commands

10)

What is the arithmetic-logic unit?

A) the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together B) interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions C) a type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly D) performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)

11)

What is a complex instruction set computer chip?

Version 1

3


A) the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together B) interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions C) a type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly D) performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)

12)

Which of the following represents megahertz?

A) the number of millions of CPU cycles per second B) the number of billions of CPU cycles per second C) a type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly D) limit the number of instructions the CPU can execute to increase processing speed

13)

What is the number of bits (0s and 1s) that can be processed by the CPU at any one time? A) clock speed B) word length C) bus width D) chip line width

14) What is the size of the internal electrical pathway along which signals are sent from one part of the computer to another?

Version 1

4


A) clock speed B) word length C) bus width D) chip line width

15)

What is roughly 1 million bytes? A) megabyte B) terabyte C) kilobyte D) gigabyte

16) What is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium? A) magnetic medium B) magnetic tape C) hard drive D) RAM

17) What is a form of a stationary mouse on which the movement of a finger causes the pointer on the screen to move? A) microphone B) touch pad C) pointing stick D) touch screen

Version 1

5


18) What detects the presence or absence of a mark in a predetermined place (popular for multiple-choice exams)? A) magnetic ink character reader B) optical-character recognition C) optical-mark recognition D) point-of-sale

19) What is the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together? A) CPU B) control unit C) ALU D) primary storage

20) What interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions? A) CPU B) control unit C) ALU D) primary storage

21) What performs all arithmetic operations (for example, addition and subtraction) and all logic operations?

Version 1

6


A) CPU B) control unit C) ALU D) primary storage

22)

What is the number of millions of CPU cycles per second? A) megahertz B) gigahertz C) CISC D) RISC

23)

What is the number of billions of CPU cycles per second? A) megahertz B) gigahertz C) CISC D) RISC

24) What is a type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly? A) megahertz B) gigahertz C) CISC D) RISC

Version 1

7


25) What limits the number of instructions the CPU can execute to increase processing speed? A) megahertz B) gigahertz C) CISC D) RISC

26) What is the computer’s main memory, which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU? A) CPU B) control unit C) secondary storage D) primary storage

27) What is the computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external data bus? A) RAM B) ROM C) volatility D) flash memory

28)

What refers to a device’s ability to function with or without power?

Version 1

8


A) RAM B) ROM C) volatility D) flash memory

29) What is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM? A) RAM B) cache memory C) volatility D) flash memory

30) What is the portion of a computer’s primary storage that does not lose its contents when one switches off the power? A) RAM B) ROM C) volatility D) flash memory

31) What is a special type of rewritable read-only memory (ROM) that is compact and portable? A) RAM B) ROM C) volatility D) flash memory

Version 1

9


32) What contains high-capacity storage that holds data such as captured images, music, or text files? A) RAM B) memory stick C) memory card D) flash memory

33) What provides nonvolatile memory for a range of portable devices including computers, digital cameras, MP3 players, and PDAs? A) RAM B) memory stick C) memory card D) flash memory

34) What consists of equipment designed to store large volumes of data for long-term storage? A) primary storage B) secondary storage C) memory stick D) flash memory

35) What is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials?

Version 1

10


A) input device B) output device C) magnetic tape D) magnetic medium

36) What is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium? A) input device B) output device C) magnetic tape D) magnetic medium

37)

What is equipment used to capture information and commands? A) input device B) output device C) magnetic tape D) magnetic medium

38) What is an input device designed for special applications for use by people with different types of special needs? A) input device B) output device C) adaptive computer devices D) magnetic medium devices

Version 1

11


39) What is equipment used to see, hear, or otherwise accept the results of informationprocessing requests? A) input device B) output device C) magnetic tape D) magnetic medium

40) What is similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time? A) tablet B) PDA C) workstation D) minicomputer

41) What is a computer dedicated to a single function, such as a calculator or computer game? A) tablet B) PDA C) appliance D) minicomputer

42) What is an electronic book that can be read on a computer or special reading device. Some are small enough to carry around, while others are the size of a telephone booth?

Version 1

12


A) tablet B) eBook C) appliance D) minicomputer

43) What is a cellular telephone with a keypad that runs programs, music, photos, email, and includes many features of a PDA? A) tablet B) PDA C) eBook D) smartphone

44) What is a small handheld computer that performs simple tasks such as taking notes, scheduling appointments, and maintaining an address book and a calendar? A) tablet B) PDA C) eBook D) smartphone

45) What is a computer portable enough to fit on a lap or in a bag and has its own power source or battery? A) tablet B) PDA C) laptop computer D) desktop computer

Version 1

13


46) What is a computer that has a flat screen that uses a mouse or fingertip for input instead of a keyboard? A) tablet B) PDA C) laptop computer D) desktop computer

47) What is a computer that sits on, next to, or under a user’s desk and is too large to carry around? A) tablet B) desktop computer C) workstation D) minicomputer

48) What is a computer designed to meet the computing needs of several people simultaneously in a small to medium-size business environment? A) supercomputer B) mainframe computer C) workstation computer D) minicomputer

49) What is a computer designed to meet the computing needs of hundreds of people in a large business environment?

Version 1

14


A) supercomputer B) mainframe computer C) workstation computer D) minicomputer

50)

What computer is the fastest, most powerful, and most expensive type of computer? A) supercomputer B) mainframe computer C) workstation computer D) minicomputer

51) What software controls how the various technology tools work together along with the application software? A) system software B) operating system software C) embedded operating system D) multitasking

52) What software controls the application software and manages how the hardware devices work together? A) system software B) operating system software C) embedded operating system D) multitasking

Version 1

15


53) What system is used in computer appliances and special-purpose applications, such as an automobile, ATM, or media player and are used for a single purpose? A) system software B) operating system software C) embedded operating system D) multitasking

54)

What allows more than one piece of software to be used at a time? A) system software B) operating system software C) embedded operating system D) multitasking

55)

What provides additional functionality to the operating system? A) system software B) operating system software C) utility software D) multitasking

56) What occurs if the system is failing and will load only the most essential parts of the operating system and will not run many of the background operating utilities?

Version 1

16


A) system restore software B) safe mode software C) crash-proof software D) disk image software

57)

What enables a user to return to the previous operating system? A) system restore software B) safe mode software C) crash-proof software D) disk image software

58)

What software helps save information if a computer crashes? A) disk optimization software B) safe mode C) crash-proof software D) disk image software

59) What is software for data recovery and relieves the burden of reinstalling applications if a hard drive crashes or becomes irretrievably corrupted? A) disk optimization software B) safe mode software C) crash-proof software D) disk image software

Version 1

17


60)

What software organizes information on a hard disk in the most efficient way? A) disk optimization software B) safe mode software C) crash-proof software D) disk image software

61) What uses programs such as Window Washer which erases file histories, browser cookies, cache contents, and other crumbs that applications and Windows leave on a hard drive? A) preventative security software B) safe mode software C) crash-proof software D) disk image software

62) What removes any software that employs a user’s Internet connection in the background without the user’s knowledge or explicit permission? A) preventative security software B) spyware software C) crash-proof software D) disk image software

63)

What software can remove software that is no longer needed? A) preventative security software B) spyware software C) crash-proof software D) uninstaller software

Version 1

18


64)

What software handles contact information, appointments, task lists, and email? A) preventative security software B) personal information management software C) crash-proof software D) course management software

65) What software contains course information such as a syllabus and assignments and offers drop boxes for quizzes and homework along with a grade book? A) preventative security software B) personal information management software C) crash-proof software D) course management software

66) What occur when the software vendor releases updates to software to fix problems or enhance features? A) software updates B) software upgrades C) crash-proof software D) course management software

67) What occurs when the software vendor releases a new version of the software making significant changes to the program?

Version 1

19


A) software updates B) software upgrades C) crash-proof software D) course management software

68)

Which license restricts the use of the software to one user at a time? A) single user license B) network user license C) site license D) application service provide license

69)

Which license enables anyone on the network to install and use the software? A) single user license B) network user license C) site license D) application service provide license

70) Which license enables any qualified users within the organization to install the software, regardless if the computer is on a network? A) single user license B) network user license C) site license D) application service provide license

Version 1

20


71) Which licenses specialty software paid for on a license basis or per-use basis or usagebased licensing? A) single user license B) network user license C) site license D) application service provider license

72)

What enables users to navigate the World Wide Web? A) a browser B) a network user license C) groupware D) PIM software

73)

What is system software?

A) controls how the various technology tools work together along with the application software B) controls the application software and manages how the hardware devices work together C) provides additional functionality to the operating system D) used for specific information-processing needs, including payroll, customer relationship management, project management, training, and many others

74)

What is application software?

Version 1

21


A) controls how the various technology tools work together along with the application software B) controls the application software and manages how the hardware devices work together C) provides additional functionality to the operating system D) used for specific information-processing needs, including payroll, customer relationship management, project management, training, and many others

75) Volatility is a protected memory space created by the CPU allowing the computer to create virtual machines. ⊚ ⊚

true false

76) Complex instruction set computer chips limits the number of instructions the CPU can execute to increase processing speed. ⊚ ⊚

true false

77) A computer is an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data. ⊚ ⊚

true false

78) The central processing unit (CPU) (or microprocessor) is the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together. ⊚ ⊚

Version 1

true false

22


79) The arithmetic-logic unit includes instructions and literally tells the other hardware devices what to do, based on the software instructions. ⊚ ⊚

true false

80) The control unit performs all arithmetic operations (for example, addition and subtraction) and all logic operations. ⊚ ⊚

81)

Gigahertz is the number of millions of CPU cycles per second. ⊚ ⊚

82)

true false

true false

Megahertz is the number of billions of CPU cycles per second. ⊚ ⊚

true false

83) Complex instruction set computer (CISC) chips, which is a type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly. ⊚ ⊚

Version 1

true false

23


84) Complex instruction set computer chips limit the number of instructions the CPU can execute to increase processing speed. ⊚ ⊚

true false

85) Primary storage is the computer’s main memory, which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU. ⊚ ⊚

true false

86) Random access memory (RAM) is the computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external data bus. ⊚ ⊚

true false

87) Volatility refers to a device’s ability to function with or without power. RAM is volatile, meaning it must have constant power to function; its contents are lost when the computer’s electric supply fails. ⊚ ⊚

true false

88) Cache memory is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM. ⊚ ⊚

Version 1

true false

24


89) Random access memory is the portion of a computer’s primary storage that does not lose its contents when one switches off the power. ⊚ ⊚

true false

90) ROM is nonvolatile, meaning it does not require constant power to function. ROM contains essential system programs that neither the user nor the computer can erase. Since the computer’s internal memory is blank during start-up, the computer cannot perform any functions unless given start-up instructions. ⊚ ⊚

true false

91) Flash memory is a special type of rewritable read-only memory (ROM) that is compact and portable. ⊚ ⊚

true false

92) Memory cards contain high-capacity storage that holds data such as captured images, music, or text files. ⊚ ⊚

true false

93) Memory sticks provide nonvolatile memory for a range of portable devices including computers, digital cameras, MP3 players, and PDAs. ⊚ ⊚ Version 1

true false 25


94) Secondary storage consists of equipment designed to store large volumes of data for long-term storage. ⊚ ⊚

95)

true false

A megabyte (MB or M or Meg) is roughly 1 million bytes. ⊚ ⊚

true false

96) Magnetic medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials. ⊚ ⊚

true false

97) Memory stick is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium. ⊚ ⊚

true false

98) A hard drive is a secondary storage medium that uses several rigid disks coated with a magnetically sensitive material and housed together with the recording heads in a hermetically sealed mechanism. ⊚ ⊚

Version 1

true false

26


99)

An input device is equipment used to capture information and commands. ⊚ ⊚

true false

100) Adaptive computer devices are input devices designed for special applications for use by people with different types of special needs. ⊚ ⊚

true false

101) An input device is equipment used to see, hear, or otherwise accept the results of information-processing requests. ⊚ ⊚

true false

102) A tablet is a pen-based computer that provides the screen capabilities of a PDA with the functional capabilities of a laptop or desktop computer. ⊚ ⊚

true false

103) An appliance is a computer dedicated to a single function, such as a calculator or computer game. ⊚ ⊚

Version 1

true false

27


104) A desktop computer is an electronic book that can be read on a computer or special reading device. Some are small enough to carry around, while others are the size of a telephone booth. ⊚ ⊚

true false

105) A workstation is a cellular telephone with a keypad that runs programs, music, photos, email, and includes many features of a PDA. ⊚ ⊚

true false

106) Personal digital assistant (PDA) is a small handheld computer that performs simple tasks such as taking notes, scheduling appointments, and maintaining an address book and a calendar. The PDA screen is touch-sensitive, allowing a user to write directly on the screen, capturing what is written. ⊚ ⊚

true false

107) A handheld computer portable enough to fit in a purse or pocket and has its own power source or battery. ⊚ ⊚

true false

108) A desktop computer portable enough to fit on a lap or in a bag and has its own power source or battery. ⊚ ⊚

Version 1

true false

28


109) A tablet computer has a flat screen that uses a mouse or fingertip for input instead of a keyboard. Similar to PDAs, tablet PCs use a writing pen or stylus to write notes on the screen and touch the screen to perform functions such as clicking on a link while visiting a website. ⊚ ⊚

true false

110) A personal computer is a computer that is operated by a single user who can customize the functions to match personal preferences. ⊚ ⊚

true false

111) A desktop computer sits on, next to, or under a user’s desk and is too large to carry around. The computer box is where the CPU, RAM, and storage devices are held with a monitor on top, or a vertical system box (called a tower) usually placed on the floor within a work area. ⊚ ⊚

true false

112) A workstation computer is similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time. ⊚ ⊚

true false

113) A minicomputer is designed to meet the computing needs of several people simultaneously in a small to medium-size business environment. ⊚ ⊚ Version 1

true false 29


114) A common type of minicomputer is a server and is used for managing internal company applications, networks, and websites. ⊚ ⊚

true false

115) A mainframe computer is designed to meet the computing needs of hundreds of people in a large business environment. Mainframe computers are a step up in size, power, capability, and cost from minicomputers. ⊚ ⊚

true false

116) A supercomputer is the fastest, most powerful, and most expensive type of computer. Organizations such as NASA that are heavily involved in research and number crunching employ supercomputers because of the speed with which they can process information. Other large, customer-oriented businesses such as General Motors and AT&T employ supercomputers just to handle customer information and transaction processing. ⊚ ⊚

117)

Utility software provides additional functionality to the operating system. ⊚ ⊚

118)

true false

true false

Disk optimization software helps save information if a computer crashes. ⊚ ⊚

Version 1

true false

30


119) System software controls how the various technology tools work together along with the application software. System software includes both operating system software and utility software. ⊚ ⊚

true false

120) Operating system software controls the application software and manages how the hardware devices work together. When using Excel to create and print a graph, the operating system software controls the process, ensures that a printer is attached and has paper, and sends the graph to the printer along with instructions on how to print it. Some computers are configured with two operating systems so they can dual boot— provide the user with the option of choosing the operating system when the computer is turned on. ⊚ ⊚

true false

121) Application software is used in computer appliances and special-purpose applications, such as an automobile, ATM, or media player and are used for a single purpose. ⊚ ⊚

122)

true false

An iPod has a single-purpose embedded operating system. ⊚ ⊚

true false

123) Application software also supports a variety of useful features, one of which is multitasking.

Version 1

31


⊚ ⊚

true false

124) Multitasking allows more than one piece of software to be used at a time. Multitasking is used when creating a graph in Excel and simultaneously printing a word processing document. ⊚ ⊚

true false

125) Utility software provides additional functionality to the operating system. Utility software includes antivirus software, screen savers, and antispam software. ⊚ ⊚

true false

126) Utility systems are customized by using the control panel, which is a Windows feature that provides options that set default values for the Windows operating system. ⊚ ⊚

true false

127) Safe mode occurs if the system is failing and will load only the most essential parts of the operating system and will not run many of the background operating utilities. ⊚ ⊚

128)

true false

System restore enables a user to return to the previous operating system. ⊚ ⊚

Version 1

true false

32


129)

Crash-proof software helps save information if a computer crashes. ⊚ ⊚

true false

130) Disk image is software for data recovery and relieves the burden of reinstalling applications if a hard drive crashes or becomes irretrievably corrupted. ⊚ ⊚

131)

A disk image organizes information on a hard disk in the most efficient way. ⊚ ⊚

132)

true false

Encrypt data protects confidential information from unauthorized eyes. ⊚ ⊚

133)

true false

true false

File and data recovery software retrieves accidental deletion of photos or documents. ⊚ ⊚

true false

134) Preventative security software uses programs such as Window Washer, erases file histories, browser cookies, cache contents, and other crumbs that applications and Windows leave on a hard drive. Version 1

33


⊚ ⊚

true false

135) Spyware removes any software that employs a user’s Internet connection in the background without the user’s knowledge or explicit permission. ⊚ ⊚

136)

true false

Spyware can remove software that is no longer needed. ⊚ ⊚

true false

137) Personal information management (PIM) software handles contact information, appointments, task lists, and email. ⊚ ⊚

true false

138) Personal information management software contains course information such as a syllabus and assignments and offers drop boxes for quizzes and homework along with a grade book. ⊚ ⊚

true false

139) Course management software occurs when the software vendor releases updates to software to fix problems or enhance features. ⊚ ⊚ Version 1

true false 34


140) Software upgrade occurs when the software vendor releases a new version of the software making significant changes to the program. ⊚ ⊚

141)

A single user license restricts the use of the software to one user at a time. ⊚ ⊚

142)

true false

true false

A network user license enables anyone on the network to install and use the software. ⊚ ⊚

true false

143) A site license enables any qualified users within the organization to install the software, regardless if the computer is on a network. Some employees might install the software on a home computer for working remotely. ⊚ ⊚

true false

144) Application service provider licenses specialty software paid for on a license basis or peruse basis or usage-based licensing. ⊚ ⊚

Version 1

true false

35


145) Communication turns a computer into a terminal for transmitting data to and receiving data from distant computers through the telephone system. ⊚ ⊚

true false

146) Desktop publishing transforms a computer into a desktop publishing workstation. Leading packages include Adobe FrameMaker, Adobe PageMaker, and QuarkXpress. ⊚ ⊚

true false

147) Email provides email services for computer users, including receiving mail, sending mail, and storing messages. Leading email software includes Microsoft Outlook, Microsoft Outlook Express, and Eudora. ⊚ ⊚

true false

148) Desktop publishing increases the cooperation and joint productivity of small groups of co-workers. ⊚ ⊚

true false

149) Presentation graphics create and enhance charts and graphs so that they are visually appealing and easily understood by an audience. A full-features presentation graphics package such as Lotus Freelance. ⊚ ⊚

Version 1

true false

36


150) Graphics or Microsoft PowerPoint includes facilities for making a wide variety of charts and graphs and for adding titles, legends, and explanatory text anywhere in the chart or graph. ⊚ ⊚

Version 1

true false

37


Answer Key Test name: Appendix A_8e 7) B 8) C 9) A 10) D 11) C 12) A 13) B 14) C 15) A 16) B 17) B 18) C 19) A 20) B 21) C 22) A 23) B 24) C 25) D 26) D 27) A 28) C 29) B 30) B 31) D 32) C Version 1

38


33) B 34) B 35) D 36) C 37) A 38) C 39) B 40) C 41) C 42) B 43) D 44) B 45) C 46) A 47) B 48) D 49) B 50) A 51) A 52) B 53) C 54) D 55) C 56) B 57) A 58) C 59) D 60) A 61) A 62) B Version 1

39


63) D 64) B 65) D 66) A 67) B 68) A 69) B 70) C 71) D 72) A 73) A 74) D 75) FALSE 76) FALSE 77) TRUE 78) TRUE 79) FALSE 80) FALSE 81) FALSE 82) FALSE 83) TRUE 84) FALSE 85) TRUE 86) TRUE 87) TRUE 88) TRUE 89) FALSE 90) TRUE 91) TRUE 92) TRUE Version 1

40


93) TRUE 94) TRUE 95) TRUE 96) TRUE 97) FALSE 98) TRUE 99) TRUE 100) TRUE 101) FALSE 102) TRUE 103) TRUE 104) FALSE 105) FALSE 106) TRUE 107) TRUE 108) FALSE 109) TRUE 110) TRUE 111) TRUE 112) TRUE 113) TRUE 114) TRUE 115) TRUE 116) TRUE 117) TRUE 118) FALSE 119) TRUE 120) TRUE 121) FALSE 122) TRUE Version 1

41


123) FALSE 124) TRUE 125) TRUE 126) FALSE 127) TRUE 128) TRUE 129) TRUE 130) TRUE 131) FALSE 132) TRUE 133) TRUE 134) TRUE 135) TRUE 136) FALSE 137) TRUE 138) FALSE 139) FALSE 140) TRUE 141) TRUE 142) TRUE 143) TRUE 144) TRUE 145) TRUE 146) TRUE 147) TRUE 148) FALSE 149) TRUE 150) TRUE

Version 1

42


APPENDIX B 1)

Compare LANs, WANs, and MANs.

2)

List and describe the four components that differentiate networks.

3)

Compare the two types of network architectures.

4)

Explain topology and the different types found in networks.

Version 1

1


5)

Describe TCP/IP along with its primary purpose.

6)

Identify the different media types found in networks

7)

What is a telecommunications system?

A) enables the transmission of data over public or private networks B) a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together C) any network without a central file server and in which all computers in the network have access to the public files located on all other workstations D) a computer that is designed to request information from a server

8)

Which of the following is not one of the differentiating factors of a network? A) architecture B) topology C) protocols D) telecommunication system

Version 1

2


9)

What is a network?

A) enables the transmission of data over public or private networks B) a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together C) any network without a central file server and in which all computers in the network have access to the public files located on all other workstations D) a computer that is designed to request information from a server

10) What is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home? A) local area network B) wide area network C) metropolitan area network D) peer-to-peer network

11)

What spans a large geographic area, such as a state, province, or country? A) local area network B) wide area network C) metropolitan area network D) peer-to-peer network

12)

What is a large computer network usually spanning a city?

Version 1

3


A) client/server network B) corporate network C) metropolitan area network D) peer-to-peer network

13)

What is a peer-to-peer network?

A) enables the transmission of data over public or private networks B) a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together C) any network without a central file server and in which all computers in the network have access to the public files located on all other workstations D) a computer that is designed to request information from a server

14)

What is a client?

A) enables the transmission of data over public or private networks B) a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together C) any network without a central file server and in which all computers in the network have access to the public files located on all other workstations D) a computer that is designed to request information from a server

15) What runs a network, steering information between computers and managing security and users?

Version 1

4


A) client B) server C) peer-to-peer network D) network operating system

16)

What is a computer that is designed to request information from a server? A) client B) packet-switching C) peer-to-peer network D) network operating system

17) What occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer? A) client B) packet-switching C) peer-to-peer network D) network operating system

18)

What is a router?

Version 1

5


A) occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer B) an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination C) refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network D) a model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients

19)

What is a client/server network?

A) occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer B) an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination C) refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network D) a model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients

20)

What is packet-switching?

Version 1

6


A) occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer B) an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination C) refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network D) a model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients

21)

What is interoperability?

A) an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination B) refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network C) a standard that specifies the format of data as well as the rules to be followed during transmission D) the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

22)

What is network topology?

A) occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer B) an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination C) refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network D) a model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients

Version 1

7


23)

Which of the following is not a network topology? A) bus B) ring C) ethernet D) star

24)

Which of the following represents the bus topology?

A) All devices are connected to a central cable or backbone. B) All devices are connected to a central device, called a hub. C) All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. D) Groups of star-configured workstations are connected to a linear bus backbone cable.

25)

Which of the following represents the ring topology?

A) All devices are connected to a central cable or backbone. B) All devices are connected to a central device, called a hub. C) All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. D) Groups of star-configured workstations are connected to a linear bus backbone cable.

26)

What is a protocol?

Version 1

8


A) an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination B) refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network C) a standard that specifies the format of data as well as the rules to be followed during transmission D) the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

27) What allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network? A) File Transfer Protocol (FTP) B) Simple Mail Transfer Protocol (SMTP) C) Hypertext Transfer Protocol (HTTP) D) Simple Network Management Protocol (SNMP)

28)

What allows the management of networked nodes to be managed from a single point? A) File Transfer Protocol (FTP) B) Simple Mail Transfer Protocol (SMTP) C) Hypertext Transfer Protocol (HTTP) D) Simple Network Management Protocol (SNMP)

29)

What is TCP/IP’s own messaging system for email?

Version 1

9


A) File Transfer Protocol (FTP) B) Simple Mail Transfer Protocol (SMTP) C) Hypertext Transfer Protocol (HTTP) D) Simple Network Management Protocol (SNMP)

30)

What allows web browsers and servers to send and receive web pages? A) File Transfer Protocol (FTP) B) Simple Mail Transfer Protocol (SMTP) C) Hypertext Transfer Protocol (HTTP) D) Simple Network Management Protocol (SNMP)

31) What refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath? A) twisted-pair cable B) coaxial cable C) fiber-optic cable D) Transmission Control Protocol/Internet Protocol

32)

Which of the following represents the TCP/IP four-layer reference model? A) Application, Internet, Transport, Network Interfaces B) Application, Internet, Network Interfaces, Transport C) Application, Transport, Internet, Network Interfaces D) Application, Network Interfaces, Internet, Transport

33)

How many layers does the OSI model contain?

Version 1

10


A) four B) seven C) ten D) eleven

34)

Which of the following is not a commonly used type of guided media? A) twisted-pair wiring B) coaxial cable C) fiber-optic cable D) Transmission Control Protocol/Internet Protocol

35)

What refers to the various types of media used to carry the signal between computers? A) twisted-pair wiring B) network transmission media C) fiber-optic cable D) Transmission Control Protocol/Internet Protocol

36) What is transmission material manufactured so that signals will be confined to a narrow path and will behave predictably? A) wire media B) network transmission media C) fiber-optic cable D) Transmission Control Protocol/Internet Protocol

Version 1

11


37) What refers to a type of cable composed of four copper wires twisted around each other within a plastic sheath? A) twisted-pair wiring B) network transmission media C) fiber-optic cable D) Transmission Control Protocol/Internet Protocol

38)

What is cable that can carry a wide range of frequencies with low signal loss? A) twisted-pair wiring B) coaxial cable C) fiber-optic cable D) Transmission Control Protocol/Internet Protocol

39) What refers to the technology associated with the transmission of information as light impulses along a glass wire or fiber? A) twisted-pair wiring B) coaxial cable C) fiber-optic cable D) Transmission Control Protocol/Internet Protocol

40) What refers to the technology associated with the transmission of information as light impulses along a glass wire or fiber?

Version 1

12


A) twisted-pair wiring B) coaxial cable C) fiber-optic cable D) wireless media

41) File Transfer Protocol (FTP) allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network. ⊚ ⊚

true false

42) Telecommunication systems enable the transmission of data over public or private networks. ⊚ ⊚

true false

43) A network is a communications system created by linking two or more devices and establishing a standard methodology by which they can communicate. ⊚ ⊚

true false

44) A wide area network (WAN) spans a large geographic area, such as a state, province, or country. WANs often connect multiple smaller networks, such as local area networks or metropolitan area networks. The world’s most popular WAN is the Internet. A metropolitan area network (MAN) is a large computer network usually spanning a city. ⊚ ⊚

Version 1

true false

13


45) A MAN is a set of communication rules to make sure that everyone speaks the same language. ⊚ ⊚

true false

46) A WAN is a card that plugs into the back (or side) of your computers and lets them send and receive messages from other computers. ⊚ ⊚

47)

Cable is the medium to connect all of the computers. ⊚ ⊚

48)

true false

Topology includes peer-to-peer networks and client/server networks. ⊚ ⊚

50)

true false

A hub (switch or router) is the hardware to perform traffic control. ⊚ ⊚

49)

true false

true false

Protocols includes bus, star, ring, hybrid, and wireless.

Version 1

14


⊚ ⊚

true false

51) Architecture includes Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP). ⊚ ⊚

52)

true false

Media includes coaxial, twisted-pair, and fiber-optic. ⊚ ⊚

true false

53) A peer-to-peer (P2P) network is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server. ⊚ ⊚

true false

54) A server is a computer designed to request information from a server. A server is a computer dedicated to providing information in response to requests. ⊚ ⊚

true false

55) A peer-to-peer network is a model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients. ⊚ ⊚ Version 1

true false 15


56) A network operating system (NOS) is the operating system that runs a network, steering information between computers and managing security and users. ⊚ ⊚

true false

57) Packet-switching occurs when the sending computer divides a message into a number of efficiently sized units of data called packets, each of which contains the address of the destination computer. ⊚ ⊚

true false

58) A router is an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination. ⊚ ⊚

true false

59) A network topology refers to the geometric arrangement of the actual physical organization of the computers (and other network devices) in a network. Topologies vary depending on cost and functionality. ⊚ ⊚

true false

60) A protocol is a standard that specifies the format of data as well as the rules to be followed during transmission. ⊚ ⊚ Version 1

true false

16


61) A protocol is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers. ⊚ ⊚

62)

true false

A WAN is a physical and data layer technology for LAN networking. ⊚ ⊚

true false

63) Transmission Control Protocol/Internet Protocol (TCP/IP) provides the technical foundation for the public Internet as well as for large numbers of private networks. ⊚ ⊚

true false

64) The application layer serves as the window for users and application processes to access network services. ⊚ ⊚

65)

true false

The application layer handles end-to-end packet transportation. ⊚ ⊚

Version 1

true false

17


66) The transport layer formats the data into packets, adds a header containing the packet sequence and the address of the receiving device, and specifies the services required from the network. ⊚ ⊚

67)

true false

The network interface layer places data packets on the network for transmission. ⊚ ⊚

true false

68) File Transfer Protocol (FTP) allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network. ⊚ ⊚

69)

true false

Simple Mail Transfer Protocol (SMTP) is TCP/IP’s own messaging system for email. ⊚ ⊚

true false

70) FTP provides terminal emulation that allows a personal computer or workstation to act as a terminal, or access device, for a server. ⊚ ⊚

true false

71) Hypertext Transfer Protocol (HTTP) allows web browsers and servers to send and receive web pages.

Version 1

18


⊚ ⊚

true false

72) Simple Network Management Protocol (SNMP) allows networked nodes to be managed from a single point. ⊚ ⊚

true false

73) Network transmission media refers to the various types of media used to carry the signal between computers. ⊚ ⊚

true false

74) Wireless media are transmission material manufactured so that signals will be confined to a narrow path and will behave predictably. ⊚ ⊚

true false

75) Coaxial cable refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath. ⊚ ⊚

true false

76) Twisted-pair cable can carry a wide range of frequencies with low signal loss. It consists of a metallic shield with a single wire placed along the center of a shield and isolated from the shield by an insulator.

Version 1

19


⊚ ⊚

true false

77) Fiber-optic (or optical fiber) refers to the technology associated with the transmission of information as light impulses along a glass wire or fiber. ⊚ ⊚

Version 1

true false

20


Answer Key Test name: Appendix B_8e 7) A 8) D 9) B 10) A 11) B 12) C 13) C 14) D 15) D 16) A 17) B 18) B 19) D 20) A 21) D 22) C 23) C 24) A 25) C 26) C 27) A 28) D 29) B 30) C 31) A 32) C Version 1

21


33) B 34) D 35) B 36) A 37) A 38) B 39) C 40) C 41) TRUE 42) TRUE 43) TRUE 44) TRUE 45) FALSE 46) FALSE 47) TRUE 48) TRUE 49) FALSE 50) FALSE 51) FALSE 52) TRUE 53) TRUE 54) FALSE 55) FALSE 56) TRUE 57) TRUE 58) TRUE 59) TRUE 60) TRUE 61) FALSE 62) FALSE Version 1

22


63) TRUE 64) TRUE 65) FALSE 66) FALSE 67) TRUE 68) TRUE 69) TRUE 70) FALSE 71) TRUE 72) TRUE 73) TRUE 74) FALSE 75) FALSE 76) FALSE 77) TRUE

Version 1

23


APPENDIX C 1) What is a technique for documenting the entities and relationships in a database environment? A) entity-relationship diagram B) data model C) database D) relational database model

2)

Which of the following is a type of attribute? A) single-valued attribute B) multi-valued attribute C) null-valued attribute D) All of the answers are correct.

3)

What has only a single value of each attribute of an entity? A) single-valued attribute B) multi-valued attribute C) null-valued attribute D) All of the answers are correct.

4)

What has the potential to contain more than one value for an attribute?

Version 1

1


A) single-valued attribute B) multi-valued attribute C) null-valued attribute D) All of the answers are correct.

5)

What kind of attribute can be calculated using the value of another attribute? A) single-valued attribute B) multi-valued attribute C) derived attribute D) stored attribute

6) What kind of attribute is assigned to an attribute when no other value applies or when a value is unknown? A) single-valued attribute B) multi-valued attribute C) derived attribute D) null-valued attribute

7)

What kind of attribute would be date of birth? A) null-valued attribute B) multi-valued attribute C) derived attribute D) stored attribute

Version 1

2


8)

What kind of attribute would be age? A) null-valued attribute B) multi-valued attribute C) derived attribute D) stored attribute

9)

What kind of attribute would be given for a person who does not have an email address? A) null-valued attribute B) multi-valued attribute C) single-valued attribute D) stored attribute

10)

What is a statement that defines an aspect of a business? A) attribute B) entity C) business relational diagram D) business rule

11)

Which of the following is a possible business rule? A) A customer can purchase many DVDs. B) DVDs can be purchased by many customers. C) A DVD title can have many copies. D) All of the answers are correct.

Version 1

3


12)

Which of the following statements is accurate?

A) A correct business rule for one organization may not be correct for another organization. B) Each business rule will have entities and sometimes even attributes. C) A typical business may have hundreds of business rules. D) All of the answers are correct.

13) What occurs between two entities in which an instance of one entity can be related to only one instance of a related entity? A) one-to-one relationship B) one-to-many relationship C) many-to-many relationship D) composite entity

14)

What occurs when two entities can be related to each other in many instances? A) one-to-one relationship B) one-to-many relationship C) many-to-many relationship D) composite entity

15) What occurs between two entities in which an instance of one entity can be related to many instances of a related entity?

Version 1

4


A) one-to-one relationship B) one-to-many relationship C) many-to-many relationship D) composite entity

16)

What exists to represent the relationship between two other entities? A) one-to-one relationship B) one-to-many relationship C) many-to-many relationship D) composite entity

17)

What expresses the specific number of instances in an entity? A) cardinality B) composite entity C) business rule D) null-valued attribute

18)

What is a characteristic of a table? A) field B) table C) record D) key

19)

What is composed of rows and columns that represent an entity?

Version 1

5


A) field B) table C) record D) key

20)

What is a collection of related data elements? A) field B) table C) record D) key

21)

What is a primary key?

A) a field that uniquely identifies a given record in a table B) a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables C) a table that uniquely identifies a given record in a field D) a foreign key of one table that appears as an entity in another table and acts to provide a logical relationship between the two records

22)

What is a foreign key?

A) a field that uniquely identifies a given record in a table B) a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables C) a table that uniquely identifies a given record in a field D) a foreign key of one table that appears as an entity in another table and acts to provide a logical relationship between the two records

Version 1

6


23)

A primary key is a field that uniquely identifies a given record in a table. ⊚ ⊚

true false

24) A foreign key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables. ⊚ ⊚

25)

true false

A field is composed of rows and columns that represent an entity. ⊚ ⊚

true false

26) A one-to-many relationship occurs between two entities in which an instance of one entity can be related to only one instance of a related entity. ⊚ ⊚

27)

true false

Date of birth would be a stored attribute. ⊚ ⊚

Version 1

true false

7


Answer Key Test name: Appendix C_8e 1) A 2) D 3) A 4) B 5) C 6) D 7) D 8) C 9) A 10) D 11) D 12) D 13) A 14) C 15) B 16) D 17) A 18) A 19) B 20) C 21) A 22) B 23) TRUE 24) TRUE 25) FALSE 26) FALSE Version 1

8


27) TRUE

Version 1

9


APPENDIX D 1) Organizations anticipate, forecast, and assess future events using a variety of rational, scientific methods including A) trend analysis. B) trend monitoring. C) trend projection. D) All of the answers are correct.

2)

What is trend analysis?

A) When numerical data are available, a trend can be plotted to display changes through time and into the future. B) A trend is examined to identify its nature, causes, speed of development, and potential impacts. C) Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers. D) Complex systems can be modeled by means of mathematical equations and different scenarios can be run against the model to determine “what if” analysis.

3)

What is trend monitoring?

A) When numerical data are available, a trend can be plotted to display changes through time and into the future. B) A trend is examined to identify its nature, causes, speed of development, and potential impacts. C) Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers. D) Complex systems can be modeled by means of mathematical equations and different scenarios can be run against the model to determine “what if” analysis.

Version 1

1


4)

What is trend projection?

A) When numerical data are available, a trend can be plotted to display changes through time and into the future. B) A trend is examined to identify its nature, causes, speed of development, and potential impacts. C) Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers. D) Complex systems can be modeled by means of mathematical equations and different scenarios can be run against the model to determine “what if” analysis.

5)

What is historical analysis?

A) When numerical data are available, a trend can be plotted to display changes through time and into the future. B) A trend is examined to identify its nature, causes, speed of development, and potential impacts. C) Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers. D) Historical events are studied to anticipate the outcome of current developments.

6) All of the following are scientific methods organizations use to anticipate, forecast, and assess the future except A) computer simulation. B) historical analysis. C) trend analysis. D) trend simulation.

Version 1

2


7)

Which of the following is not one of the top reasons organizations should study trends? A) generate current revenue B) gain confidence C) generate ideas D) beat the competition

8) All of the following are countries expected to have the largest increases in population between 2000 and 2050 except A) Palestinian Territory. B) India. C) Democratic Republic of the Congo. D) Yemen.

9) Which of the following is not a potential business impact from the world’s population doubling in the next 40 years? A) Developed nations will begin to increase immigration limits. B) Developed nations will find that retirees will have to remain on the job to remain competitive. C) Global agriculture will be required to supply as much food as has been produced during all of human history. D) The time to get products and services to market is being shortened by technology.

10) On average, how many years longer does each generation live than the previous in the United States?

Version 1

3


A) one B) two C) three D) four

11)

What are the life expectancies for men and women in many developed countries? A) over 65 years for males and over 75 years for females B) over 80 years for males and over 75 years for females C) over 75 years for males and over 80 years for females D) over 75 years for males and over 75 years for females

12) Which of the following is not a potential business impact from people in developed countries living longer? A) global demand for elderly products will grow B) global demand for elderly services will grow C) the cost of health care will decrease D) pharmaceutical companies will be pushed for advances in geriatric medicine

13)

What kind of society is being created by the growth in information industries? A) knowledge-independent global society B) knowledge-dependent global society C) knowledge-independent local society D) knowledge-dependent local society

Version 1

4


14) Which of the following is not a potential business impact created by the growth in information industries? A) top managers must be computer-literate B) knowledge workers are generally higher paid C) entry-level positions will require less education D) downsizing will continue

15)

Why is the global economy becoming more integrated? A) relaxed borders in the European Union B) the Internet C) international outsourcing D) All of the answers are correct.

16)

Which of the following is one of the primary reasons for the increase in Internet use? A) reorganization B) connectivity technology C) organizational restructuring D) All of the answers are correct.

17)

All of the following jobs will be increasingly performed by robots except A) mundane commercial and service jobs. B) environmentally dangerous jobs. C) the repair of inaccessible equipment such as space stations. D) jobs performed by scientists, engineers, and technicians.

Version 1

5


18) What does 50 percent of what a student learns about innovative technology in their freshman year of college become by their senior year? A) obsolete B) revised C) taken for granted D) All of the answers are correct.

19)

What percentage will all of today’s technical knowledge represent in 2050? A) one B) ten C) twenty D) fifty

20)

How long does a product’s entire life cycle last today? A) 4 weeks B) 40 weeks C) 4 months D) 4 years

21) Which trend has the following potential business impact? Companies must take an active role in helping their employees balance their time at work with their family lives and need for leisure.

Version 1

6


A) The global economy is becoming more integrated. B) The pace of technological innovation is increasing. C) The economy and society are dominated by technology. D) Time is becoming one of the world’s most precious commodities.

22) Which trend has the following potential business impact? The time to get products and services to market is being shortened by technology. A) The global economy is becoming more integrated. B) The pace of technological innovation is increasing. C) The economy and society are dominated by technology. D) Time is becoming one of the world’s most precious commodities.

23) Which trend has the following potential business impact? Demand for personnel in distant countries will increase the need for foreign language training, employee incentives suited to other cultures, and many other aspects of performing business globally. A) The global economy is becoming more integrated. B) The pace of technological innovation is increasing. C) The economy and society are dominated by technology. D) Time is becoming one of the world’s most precious commodities.

24) Which trend has the following potential business impact? Top managers must be computer-literate to retain their jobs and achieve success.

Version 1

7


A) The global economy is becoming more integrated. B) The pace of technological innovation is increasing. C) The growth in information industries is creating a knowledge-dependent global society. D) Time is becoming one of the world’s most precious commodities.

25) What is a type of artificial intelligence that enables computers to both understand concepts in the environment and also to learn? A) autonomic computing B) real-time adaptive security C) autonomous agent D) machine learning

26) What is software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy and employs some knowledge or representation of the user’s goals or desires? A) autonomic computing B) real-time adaptive security C) autonomous agent D) machine learning

27) What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises?

Version 1

8


A) autonomic computing B) real-time adaptive security C) autonomous agent D) machine learning

28) What is a self-managing computing model named after, and patterned on, the human body’s autonomic nervous system? A) autonomic computing B) real-time adaptive security C) autonomous agent D) machine learning

29) What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another? A) ambient digital experience B) biological 3D Printing C) Internet of Things (IoT) D) Information of Everything (IoE)

30) What includes the printing of skin and organs and is progressing from theory to reality; however, politicians and the public do not have a full understanding of the implications? A) ambient digital experience B) biological 3D Printing C) Internet of Things (IoT) D) Information of Everything (IoE)

Version 1

9


31) What is a world where interconnected Internet-enabled devices or “things” have the ability to collect and share data without human intervention? A) ambient digital experience B) biological 3D Printing C) Internet of Things (IoT) D) Information of Everything (IoE)

32) What is a concept that extends the Internet of Things emphasis on machine-to-machine communications to describe a more complex system that also encompasses people and processes? A) ambient digital experience B) biological 3D Printing C) Internet of Things (IoT) D) Information of Everything (IoE)

33) Trend analysis is the examination of a trend to identify its nature, causes, speed of development, and potential impacts. ⊚ ⊚

true false

34) Trend projection is the examination of a trend to identify its nature, causes, speed of development, and potential impacts. ⊚ ⊚

Version 1

true false

10


35)

The world’s population will double in the next 20 years. ⊚ ⊚

36)

true false

People in undeveloped countries are living longer. ⊚ ⊚

true false

37) The ambient digital experience is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another. ⊚ ⊚

true false

38) Biological 3D printing includes the printing of skin and organs and is progressing from theory to reality; however, politicians and the public do not have a full understanding of the implications. ⊚ ⊚

true false

39) The Information of Everything (IoE) is a concept that extends the Internet of Things emphasis on machine-to-machine communications to describe a more complex system that also encompasses people and processes. ⊚ ⊚

Version 1

true false

11


40) The Internet of Things (IoT) is a concept with emphasis on machine-to-machine communications to describe a more complex system that also encompasses people and processes. ⊚ ⊚

true false

41) Real-time adaptive computing is a self-managing computing model named after, and patterned on, the human body’s autonomic nervous system. ⊚ ⊚

Version 1

true false

12


Answer Key Test name: Appendix D_8e 1) D 2) B 3) C 4) A 5) D 6) D 7) A 8) B 9) D 10) C 11) C 12) C 13) B 14) C 15) D 16) B 17) D 18) D 19) A 20) B 21) D 22) B 23) A 24) C 25) D 26) C Version 1

13


27) B 28) A 29) A 30) B 31) C 32) D 33) TRUE 34) FALSE 35) FALSE 36) FALSE 37) TRUE 38) TRUE 39) TRUE 40) FALSE 41) FALSE

Version 1

14


APPENDIX E 1)

Which of the following are the three primary network categories? A) LAN, WAN, SAN B) LAN, WAN, MAN C) LAN, SAN, XAN D) LAN, WAN, XAN

2)

Which of the following includes the three primary network access technologies? A) DSL, cable modem, broadband B) LAN, WAN, MAN C) VoIP, UC, IPTV D) TCP/IP, FTP, DHCP

3)

Which of the following includes the three primary network providers? A) DSL, cable modem, broadband B) LAN, WAN, MAN C) VoIP, UC, IPTV D) ISP, NSP, RSP

4)

Which of the following includes the three forms of primary network convergence? A) DSL, cable modem, broadband B) LAN, WAN, MAN C) VoIP, UC, IPTV D) TCP/IP, FTP, DHCP

Version 1

1


5)

Which of the following are the three primary network categories? A) DSL, cable modem, broadband B) LAN, WAN, MAN C) VoIP, UC, IPTV D) TCP/IP, FTP, DHCP

6)

Which of the following includes the three primary network protocols? A) DSL, cable modem, broadband B) LAN, WAN, MAN C) VoIP, UC, IPTV D) TCP/IP, FTP, DHCP

7) What is a large computer network usually spanning a city or a specific infrastructure like a college? A) Metropolitan area network (MAN) B) Local area network (LAN) C) Wide area network (WAN) D) Secure area network (SAN)

8) What spans a large geographic area such as a state, province, or country, similar to the Internet?

Version 1

2


A) Metropolitan area network (MAN) B) Local area network (LAN) C) Wide area network (WAN) D) Secure area network (SAN)

9) What connects a group of computers in close proximity, such as in a school or office setting? A) Metropolitan area network (MAN) B) Local area network (LAN) C) Wide area network (WAN) D) Secure area network (SAN)

10)

What are the five elements that are needed to create a connected world or a network? A) categories, programs, alternatives, people, and core philosophy B) program, providers, access, mechanics, and teachers C) categories, providers, access technologies, protocols, and convergence D) LAN, WAN, MAN, PAN, and SAN

11) LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions? A) reliability and timing B) confidentiality and performance C) security and cost D) cost and performance

Version 1

3


12) What is the largest and most important network that has evolved into a global information superhighway? A) Internet B) Intranet C) Extranet D) LAN

13)

Which of the below offers a common example of a LAN? A) college campus B) home office C) city library D) All of the answers are correct.

14)

Which of the below offers an example of a WAN? A) the Internet B) Microsoft’s main campus in Washington C) the City of Denver’s Court and Police Departments D) All of the answers are correct,

15)

Which of the below offers a common example of a WAN?

Version 1

4


A) college campus B) home office C) city library D) the Internet

16)

Which of the below offers an example of a LAN? A) the Internet B) Microsoft’s main campus in Washington C) the City of Denver’s Court and Police Departments D) college campus

17)

Which of the below is a WAN? A) home office B) business office C) college dorm room D) the Internet

18) The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include A) new system provider (NSP), current system provider (CSP), and order entry system provider (OSP). B) national service provider (NSP), regional service provider (RSP), and Internet service provider (ISP). C) net server point (NSP), radio server point (RSP), and Internet server point (ISP). D) All of the answers are correct.

Version 1

5


19) What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time? A) bandwidth B) frequency C) access D) protocol

20)

The speed of transmission of a network is determined by the speed of its smallest A) unit of time. B) number of computers. C) amount of bandwidth. D) number of customers.

21)

What is a device that enables a computer to transmit and receive data? A) broadband B) modem C) bandwidth D) ISP

22) Which of the following terms refers to the smallest element of data and has a value of either 0 or 1?

Version 1

6


A) bit B) bandwidth C) modem D) Internet Protocol

23)

What measures bandwidth in terms of numbers transferred or received per unit of time? A) connection time B) broadband C) protocol D) bit rate

24) What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps? A) analog B) dial-up C) broadband D) protocol

25)

What are the two most prevalent types of broadband access? A) data subscriber and cable connection B) digital subscriber line and cable connection C) digital line and client line D) digital server and client server

Version 1

7


26) Which of the following allows high-speed digital data transmission over standard telephone lines? A) digital subscriber line (DSL) B) data subscription service (DSS) C) dominance service line (DSL) D) data converter input (DCI)

27) Which of the following provides Internet access using a cable television company’s infrastructure and a special cable modem? A) ISP cable box B) Internet cable connection C) Satellite cable box D) Satellite cable connection

28)

Which of the below allows a user to access the Internet? A) dial-up connection B) cable C) T1 line D) All of the answers are correct.

29) Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL?

Version 1

8


A) T1 line B) dial-up line C) modem line D) All of the answers are correct.

30) What is the standard that specifies the format of data as well as the rules to be followed during transmission? A) bandwidth B) bit rate C) protocol D) transmission record

31) What is the standard Internet protocol, which provides the technical foundation for the public Internet? A) data streaming and DSL protocols B) transmission control protocol/Internet protocol (TCP/IP) C) data streaming rules and regulations D) Internet protocol/transmission control protocol (IP/TCP)

32)

How do TCP and IP differ?

A) TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address. B) TCP verifies the information is reliable, and IP verifies that the data is sent. C) IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the data are sent to the correct IP address. D) IP verifies connectivity, and TCP verifies the rate at which the data is sent.

Version 1

9


33) What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions? A) domain grades B) URL spaces C) domain national sequences (DNS) D) domain name system (DNS)

34)

Which domain is reserved for U.S. government agencies? A) .info B) .USA C) .gov D) .US

35) Which domain is the most common and reserved for commercial organizations and businesses? A) .net B) .com C) .biz D) .org

36)

Which domain is reserved for accredited postsecondary institutions?

Version 1

10


A) .mil B) .edu C) .biz D) .org

37)

Which domain is reserved for the U.S. military? A) .mil B) .gov C) .org D) .age

38) What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures? A) network protocol B) networking category C) network convergence D) network communication

39)

What is a benefit of network convergence? A) the weaving together of voice, data, and video B) multiple services offered from a single vendor C) multiple devices supported by one provider D) All of the answers are correct.

Version 1

11


40)

What is a benefit of network convergence? A) the uncoupling of voice, data, and video service B) multiple services offered from several different vendors C) multiple devices supported by one provider D) All of the answers are correct.

41)

What is the integration of communication channels into a single service? A) instant communication B) unified communication C) peer-to-peer communication D) voice over communication

42)

What is VoIP? A) VoIP uses IP technology to transmit telephone calls. B) VoIP offers the low cost ability to receive personal and business calls via computer. C) VoIP offers the ability to have more than one phone number. D) VoIP offers all of these.

43) What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server? A) peer-to-peer (P2P) B) Voice over IP (VoIP) C) Internet Protocol TV (IPTV) D) All of the answers are correct.

Version 1

12


44)

Which of the below is an example of P2P? A) GoDaddy B) Skype C) Federal Communication Commission (FCC) D) Facebook

45)

Which statement below is inaccurate in reference to domain names? A) domain names are rented B) domain names are owned C) domain names are renewable D) GoDaddy is a popular domain name registrar

46)

What can unified communications merge? A) IMing B) videoconferencing C) voice mail D) All of the answers are correct.

47)

Which of the below statements is inaccurate in reference to unified communications? A) UC decreases communication costs. B) UC enhances the way individuals communicate. C) UC enhances the way individuals collaborate. D) UC increases communication expenses.

Version 1

13


48)

VoIP allows users to A) call anyone with a local telephone number. B) call anyone with an international telephone number. C) call anyone with a cellular telephone number. D) All of the answers are correct.

49)

What is a benefit of VoIP? A) lowers costs B) clear connection C) higher expenses D) All of the answers are correct.

50) What distributes digital video content using IP across the Internet and private IP networks? A) Internet broadband policy network B) Internet Protocol TV (IPTV) C) Internet Television Interactivity (ITVI) D) Internet television personalization

51)

What is a feature of IPTV?

Version 1

14


A) IPTV uses low bandwidth. B) IPTV offers personalization. C) IPTV supports multiple devices. D) All of the answers are correct.

52) What is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons? A) proxy B) broadband over power line C) attenuation D) repeater

53) What technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems? A) proxy B) broadband over power line C) attenuation D) repeater

54) What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals? A) proxy B) broadband over power line C) attenuation D) repeater

Version 1

15


55)

What receives and repeats a signal extending its attenuation or range? A) proxy B) broadband over power line C) attenuation D) repeater

56) What allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data? A) telecommuting B) repeater C) packet header D) virtual attenuation

57)

What is a single unit of binary data routed through a network? A) packet B) traceroute packet C) packet header D) packet footer

58) Which formats include a packet header, packet body containing the original message, and packet footer?

Version 1

16


A) attenuation B) standard packet C) packet header D) packet footer

59) What lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data? A) traceroute B) standard packet C) packet header D) packet footer

60)

What represents the end of the packet or transmission end? A) traceroute B) standard packet C) packet header D) packet footer

61) What is a utility application that monitors the network path of packet data sent to a remote computer? A) traceroute B) standard packet C) packet header D) packet footer

Version 1

17


62) What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls. A) traceroute B) standard packet C) packet header D) packet footer

63)

What is traceroute?

A) a single unit of binary data routed through a network B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data C) represents the end of the packet or transmission end D) a utility application that monitors the network path of packet data sent to a remote computer

64)

What is a packet?

A) a single unit of binary data routed through a network B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data C) represents the end of the packet or transmission end D) a utility application that monitors the network path of packet data sent to a remote computer

65)

What is a packet header?

Version 1

18


A) a single unit of binary data routed through a network B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data C) represents the end of the packet or transmission end D) a utility application that monitors the network path of packet data sent to a remote computer

66)

What is a packet footer?

A) a single unit of binary data routed through a network B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data C) represents the end of the packet or transmission end D) a utility application that monitors the network path of packet data sent to a remote computer

67)

What are standard packet formats? A) include a packet header, packet body containing the original message, and packet

footer B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data C) represents the end of the packet or transmission end D) a utility application that monitors the network path of packet data sent to a remote computer

68)

What is a proxy?

Version 1

19


A) software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons B) a standard that specifies the format of data as well as the rules to be followed during transmission C) a simple network protocol that allows the transfer of files between two computers on the Internet D) a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks

69)

What is a protocol?

A) software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons B) a standard that specifies the format of data as well as the rules to be followed during transmission C) a simple network protocol that allows the transfer of files between two computers on the Internet D) a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks

70)

What is a file transfer protocol (FTP)?

A) software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons B) a standard that specifies the format of data as well as the rules to be followed during transmission C) a simple network protocol that allows the transfer of files between two computers on the Internet D) a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks

Version 1

20


71)

What is transmission control protocol/Internet protocol (TCP/IP)?

A) software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons B) a standard that specifies the format of data as well as the rules to be followed during transmission C) a simple network protocol that allows the transfer of files between two computers on the Internet D) a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks

72)

What is Dynamic Host Configuration Protocol (DHCP)?

A) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network B) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions C) the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures D) the integration of communication channels into a single service

73)

What is domain name system (DNS)?

A) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network B) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions C) the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures D) the integration of communication channels into a single service

Version 1

21


74)

What is network convergence?

A) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network B) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions C) the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures D) the integration of communication channels into a single service

75)

What is unified communications (UC)?

A) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network B) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions C) the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures D) the integration of communication channels into a single service

76)

What is voice over IP (VoIP)?

A) uses IP technology to transmit telephone calls B) a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server C) distributes digital video content using IP across the Internet and private IP networks D) the integration of communication channels into a single service

77)

What is peer-to-peer (P2P)?

Version 1

22


A) uses IP technology to transmit telephone calls B) a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server C) distributes digital video content using IP across the Internet and private IP networks D) the integration of communication channels into a single service

78)

What is Internet Protocol TV (IPTV)?

A) uses IP technology to transmit telephone calls B) a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server C) distributes digital video content using IP across the Internet and private IP networks D) the integration of communication channels into a single service

79) What is a restricted network that relies on Internet technologies to provide an Internetlike environment within the company for information sharing, communications, collaboration, and web publishing? A) national ISP B) regional ISP C) intranet D) extranet

80)

What is an extension of an intranet that is available only to authorized outsiders? A) national ISP B) regional ISP C) intranet D) extranet

Version 1

23


81)

An extranet is not available for use by a(n) A) customer. B) supplier. C) employee. D) competitor.

82)

What is a VPN?

A) a direct network provider using a company server B) a direct private network that creates a “private tunnel” within the Internet to connect to the corporate server C) a direct URL that creates a private tunnel for a company D) a direct P2p that creates an open access community for a company

83)

Why would a company use an intranet? A) Intranets are used for business operations and management. B) Intranets are used for communications and collaboration. C) Intranets are used for web publishing. D) All of the answers are correct.

84)

The network categories include LAN, WAN, and MAN. ⊚ ⊚

Version 1

true false

24


85)

The network providers include ISP, NSP, and RSP. ⊚ ⊚

86)

The network access technologies include DSL, cable modem, and broadband. ⊚ ⊚

87)

true false

The network categories include ISP, NSP, and RSP. ⊚ ⊚

90)

true false

Network convergence includes VoIP, UC, and IPTV. ⊚ ⊚

89)

true false

The network protocols include TCP/IP, FTP, and DHCP. ⊚ ⊚

88)

true false

true false

The network providers include LAN, WAN, and MAN. ⊚ ⊚

Version 1

true false

25


91)

The network access technologies include VoIP, UC, and IPTV. ⊚ ⊚

92)

The network protocols include LAN, WAN, and MAN. ⊚ ⊚

93)

true false

true false

Network convergence includes TCP/IP and FTP. ⊚ ⊚

true false

94) A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. ⊚ ⊚

true false

95) A wide area network (WAN) spans a large geographic area such as a state, province, or country. ⊚ ⊚

true false

96) A wide area network (WAN) connects a group of computers in close proximity, such as in an office building, school, or home.

Version 1

26


⊚ ⊚

true false

97) A metropolitan area network (MAN) spans a large geographic area such as a state, province, or country. ⊚ ⊚

true false

98) Attenuation represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls. ⊚ ⊚

99)

true false

A repeater receives and repeats a signal to reduce its attenuation and extend its range. ⊚ ⊚

true false

100) A metropolitan area network (MAN) is a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN. ⊚ ⊚

101)

true false

A local area network (LAN) is a large computer network usually spanning a city. ⊚ ⊚

Version 1

true false 27


102)

Network convergence is the integration of communication channels into a single service. ⊚ ⊚

true false

103) A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions. ⊚ ⊚

true false

104) A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs, and to wide area networks. ⊚ ⊚

true false

105) A wide area network (WAN) spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet. ⊚ ⊚

true false

106) Broadband over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems. ⊚ ⊚

Version 1

true false

28


107) A repeater represents the loss of a network signal strength measured in decibels and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals. ⊚ ⊚

108)

A repeater receives and repeats a signal extending its attenuation or range. ⊚ ⊚

109)

true false

A metropolitan area network (MAN) is a large computer network usually spanning a city. ⊚ ⊚

110)

true false

true false

Attenuation is a single unit of binary data routed through a network. ⊚ ⊚

true false

111) Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets. ⊚ ⊚

Version 1

true false

29


112) Traceroute formats include a packet header, packet body containing the original message, and packet footer. ⊚ ⊚

true false

113) The packet header lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data. ⊚ ⊚

true false

114) The packet footer represents the end of the packet or transmission end. The packet header and packet footer contain error-checking information to ensure the entire message is sent and received. The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence. ⊚ ⊚

true false

115) Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer. ⊚ ⊚

true false

116) Telecommuting (virtual workforce) allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data. ⊚ ⊚

Version 1

true false

30


117)

IP address is a unique number that identifies where computers are located on the network. ⊚ ⊚

true false

118) IP address is a simple network protocol that allows the transfer of files between two computers on the Internet. ⊚ ⊚

true false

119) Dynamic Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network. ⊚ ⊚

true false

120) A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons. ⊚ ⊚

121)

true false

Voice over IP (VoIP) uses IP technology to transmit telephone calls. ⊚ ⊚

true false

122) Peer-to-peer (P2P) is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.

Version 1

31


⊚ ⊚

true false

123) Internet Protocol TV (IPTV), which distributes digital video content using IP across the Internet and private IP networks. ⊚ ⊚

124)

true false

Peer-to-peer uses IP technology to transmit telephone calls. ⊚ ⊚

true false

125) Voice over IP is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server. ⊚ ⊚

true false

126) A repeater distributes digital video content using IP across the Internet and private IP networks. ⊚ ⊚

true false

127) An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes. ⊚ ⊚ Version 1

true false 32


128) An extranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers. ⊚ ⊚

true false

129) Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called a virtual private network (VPN). ⊚ ⊚

true false

130) An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes. ⊚ ⊚

true false

131) An intranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers. ⊚ ⊚

true false

132) Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called an extranet. ⊚ ⊚ Version 1

true false

33


133) VPNs are often used to connect to a corporate server. VPN stands for a Valued Partner Network. ⊚ ⊚

Version 1

true false

34


Answer Key Test name: Appendix E_8e 1) B 2) A 3) D 4) C 5) B 6) D 7) A 8) C 9) B 10) C 11) D 12) A 13) D 14) D 15) D 16) D 17) A 18) B 19) A 20) C 21) B 22) A 23) D 24) C 25) B 26) A Version 1

35


27) B 28) D 29) A 30) C 31) B 32) A 33) D 34) C 35) B 36) B 37) A 38) C 39) D 40) C 41) B 42) D 43) A 44) B 45) B 46) D 47) D 48) D 49) A 50) B 51) D 52) A 53) B 54) C 55) D 56) A Version 1

36


57) A 58) B 59) C 60) D 61) A 62) B 63) D 64) A 65) B 66) C 67) A 68) A 69) B 70) C 71) D 72) A 73) B 74) C 75) D 76) A 77) B 78) C 79) C 80) D 81) D 82) B 83) D 84) TRUE 85) TRUE 86) TRUE Version 1

37


87) TRUE 88) TRUE 89) FALSE 90) FALSE 91) FALSE 92) FALSE 93) FALSE 94) TRUE 95) TRUE 96) FALSE 97) FALSE 98) TRUE 99) TRUE 100) TRUE 101) FALSE 102) FALSE 103) TRUE 104) TRUE 105) TRUE 106) TRUE 107) FALSE 108) TRUE 109) TRUE 110) FALSE 111) TRUE 112) FALSE 113) TRUE 114) TRUE 115) FALSE 116) TRUE Version 1

38


117) TRUE 118) FALSE 119) TRUE 120) TRUE 121) TRUE 122) TRUE 123) TRUE 124) FALSE 125) FALSE 126) FALSE 127) TRUE 128) TRUE 129) TRUE 130) FALSE 131) FALSE 132) FALSE 133) FALSE

Version 1

39


APPENDIX F 1) What types of BI decisions include predicting sales, determining correct inventory levels and distribution schedules among outlets, and loss prevention? A) retail and sales BI decisions B) banking BI decisions C) operations management BI decisions D) insurance BI decisions

2) What types of BI decisions include forecasting levels of bad loans and fraudulent credit card use, credit card spending by new customers, and which kinds of customers will best respond to new loan offers? A) retail and sales BI decisions B) banking BI decisions C) operations management BI decisions D) insurance BI decisions

3) What types of BI decisions include predicting machinery failures and finding key factors that control optimization of manufacturing capacity? A) retail and sales BI decisions B) banking BI decisions C) operations management BI decisions D) insurance BI decisions

4) What types of BI decisions include forecasting claim amounts, medical coverage costs, classifying the most important elements that affect medical coverage to predicting which customers will buy new insurance policies?

Version 1

1


A) retail and sales BI decisions B) banking BI decisions C) operations management BI decisions D) insurance BI decisions

5)

Which of the following can use BI to make informed decisions? A) law enforcement industry B) airline industry C) broadcasting industry D) All of the answers are correct.

6) Which of the following is a result of implementing business intelligence systems and tools allowing business users to receive data for analysis? A) reliable B) understandable C) easily manipulated D) All of the answers are correct.

7) Which of the following is the result of BI that implies that the data have been documented as the certified or approved data for the enterprise? A) reliable B) consistent C) understandable D) easily manipulated

Version 1

2


8) Which of the following is the result of BI that the processes that deliver the data to the business community are well documented and there are no surprises such as missing or inaccurate data? A) reliable B) consistent C) understandable D) easily manipulated

9) Which of the following is the result of BI that the data have been defined in business terms and calculations and algorithms are easily accessed for comprehension? A) reliable B) consistent C) understandable D) easily manipulated

10) Which of the following is the result of BI that it is no longer required to have a PhD in statistics to get sophisticated analytics delivered to users’ fingertips? A) reliable B) consistent C) understandable D) easily manipulated

11) What do organizations using BI ask to find the root causes to problems and provide solutions?

Version 1

3


A) what B) when C) where D) why

12)

Which type of BI manages daily operations and integrates BI with operational systems? A) operational BI B) tactical BI C) strategic BI D) All of the answers are correct.

13)

Which type of BI conducts short-term analysis to achieve strategic goals? A) operational BI B) tactical BI C) strategic BI D) All of the answers are correct.

14)

Which type of BI achieves long-term organizational goals? A) operational BI B) tactical BI C) strategic BI D) All of the answers are correct.

15)

Which form of BI has managers and analysts as its primary users?

Version 1

4


A) operational BI B) tactical BI C) strategic BI D) All of the answers are correct.

16)

Which form of BI uses the time frame of days to weeks to months? A) operational BI B) tactical BI C) strategic BI D) All of the answers are correct.

17)

Which form of BI uses real-time metrics for its data? A) operational BI B) tactical BI C) strategic BI D) All of the answers are correct.

18)

Which form of BI uses months to years as its time frame? A) operational BI B) tactical BI C) strategic BI D) All of the answers are correct.

19)

What is data latency?

Version 1

5


A) the time duration to make data ready for analysis and loading the data into the database B) the time from which data are made available to the time when analysis is complete C) the time it takes a human to comprehend the analytic results and determine an appropriate action D) All of the answers are correct.

20)

What is analysis latency?

A) the time duration to make data ready for analysis and loading the data into the database B) the time from which data are made available to the time when analysis is complete C) the time it takes a human to comprehend the analytic results and determine an appropriate action D) All of the answers are correct.

21)

What is decision latency?

A) the time duration to make data ready for analysis and loading the data into the database B) the time from which data are made available to the time when analysis is complete C) the time it takes a human to comprehend the analytic results and determine an appropriate action D) All of the answers are correct.

22) What is the process of analyzing data to extract information not offered by the raw data alone?

Version 1

6


A) data integrity B) data mart analysis C) data mining D) data extraction

23)

What are the two main objectives associated with data mining? A) uncovering tactics and plans B) uncovering trends and patterns C) uncovering intelligence and unstructured data issues D) uncovering competitors and market advantages

24) Which of the following uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making? A) data analysis tools B) electronic analysis tools C) data-mining tools D) data integrity tools

25)

Which of the following is not a common form of data-mining analysis? A) division organization B) classification C) estimation D) clustering

Version 1

7


26) Which of the following forms of data mining assigns records to one of a predefined set of classes? A) clustering B) classification C) estimation D) affinity grouping

27) What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible? A) statistical detection B) cluster analysis C) association detection D) social media analytics

28) What is an example of using cluster analysis in business to create target-marketing strategies? A) Google search B) first name information C) ZIP code segmentation D) last name associations

29) Which of the following reveals the relationship between variables along with the nature and frequency of the relationship?

Version 1

8


A) association detection B) masking detection tool C) cluster grouping D) blocking barriers

30) What is a common association detection analysis technique in which you analyze certain items to detect customers’ buying behavior and predict future behavior? A) clustering factors B) mashup technology C) market basket analysis D) drill-down basket analysis

31)

What is prediction?

A) a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover B) a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste C) predictions based on time-series information D) a statistical process for estimating the relationships among variables

32)

What is optimization?

Version 1

9


A) a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover B) a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste C) predictions based on time-series information D) a statistical process for estimating the relationships among variables

33)

What are forecasts?

A) a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover B) a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste C) predictions based on time-series information D) a statistical process for estimating the relationships among variables

34)

What is regression?

A) a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover B) a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste C) predictions based on time-series information D) a statistical process for estimating the relationships among variables

35) What is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover?

Version 1

10


A) prediction B) optimization C) forecasting D) regression

36) What is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste? A) prediction B) optimization C) forecasting D) regression

37)

What are predictions based on time-series information? A) predictions B) optimizations C) forecasts D) regression

38)

What is a statistical process for estimating the relationships among variables? A) prediction B) optimization C) forecasting D) regression

Version 1

11


39)

What is classification? A) determines values for an unknown continuous variable behavior or estimated future

value B) determines which things go together C) segments a heterogeneous population of more homogeneous subgroups D) assigns records to one of a predefined set of classes

40)

What is estimation? A) determines values for an unknown continuous variable behavior or estimated future

value B) determines which things go together C) segments a heterogeneous population of more homogeneous subgroups D) assigns records to one of a predefined set of classes

41)

What is being accomplished by affinity grouping? A) determines values for an unknown continuous variable behavior or estimated future

value B) determines which things go together C) segments a heterogeneous population of more homogeneous subgroups D) assigns records to one of a predefined set of classes

42)

What does clustering accomplish?

Version 1

12


A) determines values for an unknown continuous variable behavior or estimated future value B) determines which things go together C) segments a heterogeneous population of more homogeneous subgroups D) assigns records to one of a predefined set of classes

43)

What assigns records to one of a predefined set of classes? A) classification B) estimation C) affinity grouping D) clustering

44) What determines values for an unknown continuous variable behavior or estimated future value? A) classification B) estimation C) affinity grouping D) clustering

45)

What determines which things go together? A) classification B) estimation C) affinity grouping D) clustering

Version 1

13


46)

What segments a heterogeneous population of more homogeneous subgroups? A) classification B) estimation C) affinity grouping D) clustering

47)

What is data mining?

A) the common term for the representation of multidimensional information B) a particular attribute of information C) using a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making D) the process of analyzing data to extract information not offered by the raw data alone

48) What is the process of analyzing data to extract information not offered by the raw data alone? A) data integrity B) data mart analysis C) data mining D) data extraction

49)

What are the two main objectives associated with data mining?

Version 1

14


A) uncovering tactics and plans B) uncovering trends and patterns C) uncovering intelligence and unstructured data issues D) uncovering competitors and market advantages

50) Which of the following uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making? A) data analysis tools B) electronic analysis tool C) data-mining tools D) data integrity tools

51)

Which of the following is not a common form of data-mining analysis? A) division organization B) classification C) estimation D) clustering

52) What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible? A) statistical detection B) cluster analysis C) association detection D) social media analytics

Version 1

15


53) What is an example of using cluster analysis in business to create target-marketing strategies? A) Google search B) first name information C) ZIP code segmentation D) last name associations

54) Which of the below reveals the relationship between variables along with the nature and frequency of the relationship? A) affinity grouping analysis B) masking detection tool C) cluster grouping D) blocking barriers

55) What is a common association detection analysis technique where you analyze certain items to detect customers’ buying behavior and predict future behavior? A) clustering factors B) mashup technology C) market basket analysis D) drill-down basket analysis

56)

What is prediction?

Version 1

16


A) a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover B) a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste C) predictions based on time-series information D) a statistical process for estimating the relationships among variables

57)

What is optimization?

A) a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover B) a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste C) predictions based on time-series information D) a statistical process for estimating the relationships among variables

58)

What are forecasts?

A) a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover B) a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste C) predictions based on time-series information D) a statistical process for estimating the relationships among variables

59)

What is regression?

Version 1

17


A) a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover B) a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste C) predictions based on time-series information D) a statistical process for estimating the relationships among variables

60) What is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover? A) prediction B) optimization C) forecasting D) regression

61) What is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste? A) prediction B) optimization C) forecasting D) regression

62)

What are predictions based on time-series information?

Version 1

18


A) prediction B) optimization C) forecasting D) regression

63)

What is a statistical process for estimating the relationships among variables? A) prediction B) optimization C) forecasting D) regression

64)

What is estimation? A) determines values for an unknown continuous variable behavior or estimated future

value B) determine which things go together C) segments a heterogeneous population of more homogeneous subgroups D) assigns records to one of a predefined set of classes

65)

What is being accomplished by affinity grouping? A) determines values for an unknown continuous variable behavior or estimated future

value B) determine which things go together C) segments a heterogeneous population of more homogeneous subgroups D) assigns records to one of a predefined set of classes

Version 1

19


66) What determines values for an unknown continuous variable behavior or estimated future value? A) classification B) estimation C) affinity grouping D) clustering

67)

What determines which things go together? A) classification B) estimation C) affinity grouping D) clustering

68)

What is data mining?

A) the common term for the representation of multidimensional information B) a particular attribute of information C) uses a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making D) process of analyzing data to extract information not offered by the raw data alone

69)

Which of the following is a business benefit of BI?

Version 1

20


A) single point of access to information for managers only B) BI available to financial organizational departments only C) up-to-the minute information for everyone D) All of the answers are correct.

70)

Which of the following is one of the four main categories of BI benefits? A) quantifiable benefits B) predictable benefits C) tangible benefits D) All of the answers are correct.

71) Which type of BI benefits includes working time saved in producing reports and selling information to suppliers? A) quantifiable benefits B) predictable benefits C) tangible benefits D) All of the answers are correct.

72)

Which type of BI benefits are the results of discoveries made by creative users? A) quantifiable benefits B) indirectly quantifiable benefits C) unpredictable benefits D) intangible benefits

Version 1

21


73) Which type of BI benefits includes improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing? A) quantifiable benefits B) indirectly quantifiable benefits C) unpredictable benefits D) intangible benefits

74)

Improving the quality of business decisions has a direct impact on costs and revenue. ⊚ ⊚

true false

75) Affinity grouping analysis reveals the relationship between variables along with the nature and frequency of the relationship. ⊚ ⊚

true false

76) Sensitivity analysis, what-if analysis, return on investment, and market basket analysis are the common DSS analysis techniques. ⊚ ⊚

true false

77) Affinity grouping analysis is a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible. ⊚ ⊚

Version 1

true false

22


78)

A pivot rotates data to display alternative presentations of the data. ⊚ ⊚

79)

A consolidation rotates data to display alternative presentations of the data. ⊚ ⊚

80)

true false

true false

Digital dashboards offer consolidation, drill-down, and slice-and-dice capabilities. ⊚ ⊚

true false

81) Prediction is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover. ⊚ ⊚

true false

82) Optimization is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste. ⊚ ⊚

83)

true false

Time-series information is time-stamped information collected at a particular frequency.

Version 1

23


⊚ ⊚

84)

true false

Forecasts are predictions based on time-series information. ⊚ ⊚

true false

85) Regression is a statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables when the focus is on the relationship between a dependent variable and one or more independent variables. ⊚ ⊚

true false

86) Regression is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover. ⊚ ⊚

true false

87) Prediction is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste. ⊚ ⊚

88)

true false

Regression is a prediction based on time-series information. ⊚ ⊚

Version 1

true false 24


89)

Optimization is a statistical process for estimating the relationships among variables. ⊚ ⊚

true false

90) Estimation determines values for an unknown continuous variable behavior or estimated future value. ⊚ ⊚

91)

true false

Affinity grouping determines which things go together. ⊚ ⊚

true false

92) Association detection reveals the relationship between variables along with the nature and frequency of the relationship. ⊚ ⊚

true false

93) Association detection is a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible. ⊚ ⊚

Version 1

true false

25


94)

Data mining occurs on structured data that are already in a database or a spreadsheet. ⊚ ⊚

true false

95) Prediction is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover. ⊚ ⊚

true false

96) Optimization is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste. ⊚ ⊚

97)

Time-series information is time-stamped information collected at a particular frequency. ⊚ ⊚

98)

true false

true false

Forecasts are predictions based on time-series information. ⊚ ⊚

true false

99) Regression is a statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables when the focus is on the relationship between a dependent variable and one or more independent variables.

Version 1

26


⊚ ⊚

true false

100) Regression is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover. ⊚ ⊚

true false

101) Prediction is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste. ⊚ ⊚

102)

Regression is a prediction based on time-series information. ⊚ ⊚

103)

true false

Optimization is a statistical process for estimating the relationships among variables. ⊚ ⊚

104)

true false

true false

Classification assigns records to one of a predefined set of classes. ⊚ ⊚

Version 1

true false

27


105) Estimation determines values for an unknown continuous variable behavior or estimated future value. ⊚ ⊚

106)

Clustering segments a heterogeneous population of more homogeneous subgroups. ⊚ ⊚

107)

true false

true false

Clustering assigns records to one of a predefined set of classes. ⊚ ⊚

true false

108) Affinity grouping determines values for an unknown continuous variable behavior or estimated future value. ⊚ ⊚

109)

Estimation determines which things go together. ⊚ ⊚

110)

true false

true false

Classification segments a heterogeneous population of more homogeneous subgroups.

Version 1

28


⊚ ⊚

true false

111) Data-mining tools use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making. ⊚ ⊚

true false

112) Affinity determines values for an unknown continuous variable behavior or estimated future value. ⊚ ⊚

113)

true false

Estimation determines which things go together. ⊚ ⊚

true false

114) Data-mining tools use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making. ⊚ ⊚

true false

115) Quantifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits. ⊚ ⊚

Version 1

true false

29


116) Data latency is the time from which data are made available to the time when analysis is complete. ⊚ ⊚

117)

true false

The three forms of BI include operational, tactical, and value-added. ⊚ ⊚

Version 1

true false

30


Answer Key Test name: Appendix F_8e 1) A 2) B 3) C 4) D 5) D 6) D 7) A 8) B 9) C 10) D 11) D 12) A 13) B 14) C 15) A 16) B 17) A 18) C 19) A 20) B 21) C 22) C 23) B 24) C 25) A 26) B Version 1

31


27) B 28) C 29) A 30) C 31) A 32) B 33) C 34) D 35) A 36) B 37) C 38) D 39) D 40) A 41) B 42) C 43) A 44) B 45) C 46) D 47) D 48) C 49) B 50) C 51) A 52) B 53) C 54) A 55) C 56) A Version 1

32


57) B 58) C 59) D 60) A 61) B 62) C 63) D 64) A 65) B 66) B 67) C 68) D 69) C 70) A 71) A 72) C 73) D 74) TRUE 75) TRUE 76) FALSE 77) FALSE 78) TRUE 79) FALSE 80) TRUE 81) TRUE 82) TRUE 83) TRUE 84) TRUE 85) TRUE 86) FALSE Version 1

33


87) FALSE 88) FALSE 89) FALSE 90) TRUE 91) TRUE 92) TRUE 93) FALSE 94) TRUE 95) TRUE 96) TRUE 97) TRUE 98) TRUE 99) TRUE 100) FALSE 101) FALSE 102) FALSE 103) FALSE 104) TRUE 105) TRUE 106) TRUE 107) FALSE 108) FALSE 109) FALSE 110) FALSE 111) TRUE 112) FALSE 113) FALSE 114) TRUE 115) TRUE 116) FALSE Version 1

34


117) FALSE

Version 1

35


CHAPTER 1 1) Describe the information age and the differences between data, information, business intelligence, and knowledge.

2) Identify the different departments in a company and why they must work together to achieve success.

3)

Explain the concept of data silos and provide an example of their effect on a company.

4) Define the six primary MIS-related strategic positions in an organization along with their associated responsibilities.

Version 1

1


5) Explain systems thinking and how management information systems enable business communications.

6)

Explain why competitive advantages are temporary.

7)

Describe Porter’s Five Forces Model and explain each of the five forces.

8)

Compare Porter’s three generic strategies.

Version 1

2


9)

Demonstrate how a company can add value by using Porter’s value chain analysis.

10)

Explain a digital value chain and explain how it benefits a company.

11)

Which of the following is NOT considered a core driver of the information age? A) information B) business intelligence C) competitive facts D) data

12)

Which of the following is NOT considered a core driver of the information age? A) information B) business intelligence C) knowledge D) variables

Version 1

3


13)

Which of the following is considered a core driver of the information age? A) fact B) goods C) competitive intelligence D) data

14)

Which of the following is considered a core driver of the information age? A) business analytics B) unstructured data C) analytics D) knowledge

15)

Why do students need to study management information systems? A) Management information systems are everywhere in business. B) Management information systems are rarely discussed in business. C) Management information systems are rarely used in organizations. D) Management information systems are found in only a few businesses.

16)

What is the confirmation or validation of an event or object? A) fact B) data C) data scientist D) business intelligence

Version 1

4


17) The age we live in has infinite quantities of facts that are widely available to anyone who can use a computer. What is this age called? A) data age B) information age C) business intelligence age D) data scientist age

18) Which of the following companies used technology to revamp the business process of selling books? A) Netflix B) Dell C) Zappos D) Amazon

19) Which of the following companies used technology to revamp the business process of renting videos? A) Netflix B) Dell C) Zappos D) Amazon

20) Which of the following companies used technology to revamp the business process of selling shoes?

Version 1

5


A) Netflix B) Dell C) Zappos D) Amazon

21)

What is data?

A) raw facts that describe the characteristics of an event or object B) data converted into a meaningful and useful context C) information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making D) skills, experience, and expertise, coupled with information and intelligence, which create a person’s intellectual resources

22)

What is information?

A) raw facts that describe the characteristics of an event or object B) data converted into a meaningful and useful context C) information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making D) skills, experience, and expertise, coupled with information and intelligence, which create a person’s intellectual resources

23)

What is business intelligence?

Version 1

6


A) raw facts that describe the characteristics of an event or object B) data converted into a meaningful and useful context C) information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making D) skills, experience, and expertise, coupled with information and intelligence, which create a person’s intellectual resources

24)

What is knowledge?

A) raw facts that describe the characteristics of an event or object B) data converted into a meaningful and useful context C) information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making D) skills, experience, and expertise, coupled with information and intelligence, which create a person’s intellectual resources

25)

Which of the following is considered information? A) quantity sold B) date sold C) best-selling item by month D) product sold

26)

Which of the following is considered data? A) quantity sold B) best customer by month C) best-selling item by month D) worst-selling item by month

Version 1

7


27) Cheryl Steffan is the operations manager for Nature’s Bread Company, which specializes in providing natural products for health-conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company’s profitability and forecast production for the next day. Which of the following is an example of a piece of data Cheryl would be using to successfully perform her job? A) Craig Newmark is customer number 15467. B) compare the costs of supplies, including energy, over the last five years to determine the best-selling product by month C) best-selling product by day D) best-selling product changes when Tony the best baker is working

28) Cheryl Steffan is the operations manager for Nature’s Bread Company, which specializes in providing natural products for health-conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company’s profitability and forecast production for the next day. Which of the following is an example of the type of information Cheryl would be using to successfully perform her job? A) Craig Newmark is customer number 15467. B) Flour Power is supplier number 8745643. C) best-selling product by day D) best-selling product changes when Tony the best baker is working

29) Cheryl Steffan is the operations manager for Nature’s Bread Company, which specializes in providing natural products for health-conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company’s profitability and forecast production for the next day. Which of the following is an example of knowledge that Cheryl would be using to successfully perform her job?

Version 1

8


A) Craig Newmark is customer number 15467. B) Flour Power is supplier number 8745643. C) best-selling product by day D) best-selling product changes when Tony the best baker is working

30) Data is useful for understanding individual sales, but to gain deeper insight into a business, data needs to be turned into information. Which of the following offers an example of turning data into information? A) Who are my best customers? B) What is my best-selling product? C) What is my worst-selling product? D) All answers provide an example of turning data into information.

31)

Which of the following provides an example of information? A) Who is customer number 12345XX? B) What is product number 12345XX? C) What customer number is Bob Smith? D) What is my worst-selling product?

32)

Which of the following provides an example of data? A) Who are my best customers? B) What is my best-selling product? C) What is my worst-selling product? D) Who is customer number 12345XX?

Version 1

9


33) Business intelligence is information collected from multiple sources. Which of the following provides an example of a source that would be included in business intelligence? A) supplier source systems B) customer source systems C) competitor source systems D) All of the answers are correct.

34)

Which of the following represents the core drives of the information age? A) data, information, business intelligence, knowledge B) fact, data, intelligence, experience C) fact, intelligence, business skills, knowledge D) data, intelligence, business information, knowledge

35)

Which of the following represents the definition of a variable?

A) a data characteristic that is collected through competitive intelligence and cannot change over time B) a data characteristic that stands for a value that changes or varies over time C) a data characteristic that stands for a value that does not change or vary over time D) a data characteristic that is collected only through competitive intelligence and can change over time

36) Today’s workers are referred to as________, and they use BI along with personal experience to make decisions based on both information and intuition, a valuable resource for any company.

Version 1

10


A) knowledge workers B) knowledge thinkers C) knowledge resources D) fact workers

37) What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making? A) supplier’s intelligence B) social intelligence C) employee intelligence D) business intelligence

38) Information is data converted into useful, meaningful context. What are data characteristics that change or vary over time? A) facts B) variables C) supplies D) services

39)

What is data converted into a meaningful and useful context? A) competitive intelligence B) information C) buyer power D) first-mover advantage

Version 1

11


40) What is a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention? A) Internet of Things B) predictive analytics C) machine-to-machine D) fourth industrial revolution

41)

What refers to devices that connect directly to other devices? A) information age B) predictive analytics C) machine-to-machine D) descriptive analytics

42) What extracts information from data and uses it to predict future trends and identify behavioral patterns? A) Internet of Things B) predictive analytics C) machine-to-machine D) fourth industrial revolution

43)

What is the Internet of Things?

Version 1

12


A) a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention B) extracts information from data and uses it to predict future trends and identify behavioral patterns C) refers to devices that connect directly to other devices D) opportunities to change the way people purchase books

44)

Which of the following definitions describes machine-to-machine?

A) a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention B) extracts information from data and uses it to predict future trends and identify behavioral patterns C) refers to devices that connect directly to other devices D) opportunities to change the way people purchase books

45)

What is predictive analytics?

A) a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention B) techniques that extract information from data and use it to predict future trends and identify behavioral patterns C) refers to devices that connect directly to other devices D) opportunities to change the way people purchase books

46) Who collects, queries, and consumes organizational data to uncover patterns and provide insights for strategic business decisions?

Version 1

13


A) business intelligence manager B) data scientist C) data worker D) data analyst

47)

What role does a data analyst perform?

A) collects, queries, and consumes organizational data to uncover patterns and provide insights for strategic business decisions B) extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information C) records, measures, and reports monetary transactions D) supports sales by planning, pricing, and promoting goods or services

48)

What are the three key skills required for a data analyst? A) understanding of math and statistics B) coding skills to work with data C) business area subject matter expertise D) All of the answers are correct.

49)

What is the science of fact-based decision making? A) business intelligence B) information C) knowledge D) analytics

Version 1

14


50) What is the scientific process of transforming data into insight for making better decisions? A) business analytics B) descriptive analytics C) prescriptive analytics D) predictive analytics

51)

What describes past performance and history? A) diagnostic analytics B) descriptive analytics C) prescriptive analytics D) predictive analytics

52) What extracts information from data and use it to predict future trends and identify behavioral patterns? A) diagnostic analytics B) descriptive analytics C) prescriptive analytics D) predictive analytics

53)

What creates models indicating the best decision to make or course of action to take?

Version 1

15


A) diagnostics analytics B) descriptive analytics C) prescriptive analytics D) predictive analytics

54)

What are business analytics?

A) the scientific process of transforming data into insight for making better decisions B) describe past performance and history C) extracts information from data and use it to predict future trends and identify behavioral patterns D) creates models indicating the best decision to make or course of action to take

55)

What are descriptive analytics?

A) examines data or content to answer the question, “Why did it happen?” B) describe past performance and history C) extracts information from data and use it to predict future trends and identify behavioral patterns D) creates models indicating the best decision to make or course of action to take

56)

What are diagnostic analytics?

A) examines data or content to answer the question, “Why did it happen?” B) describe past performance and history C) extracts information from data and use it to predict future trends and identify behavioral patterns D) creates models indicating the best decision to make or course of action to take

Version 1

16


57)

What are predictive analytics?

A) examines data or content to answer the question, “Why did it happen?” B) describe past performance and history C) extracts information from data and use it to predict future trends and identify behavioral patterns D) creates models indicating the best decision to make or course of action to take

58)

What are prescriptive analytics?

A) examines data or content to answer the question, “Why did it happen?” B) describe past performance and history C) extracts information from data and use it to predict future trends and identify behavioral patterns D) creates models indicating the best decision to make or course of action to take

59)

What are the four primary areas of analytics? A) descriptive analytics, diagnostics analytics, predictive analytics, prescriptive analytics B) descriptive analytics, primary analytics, secondary analytics, response analytics C) descriptive analytics, diagnostics analytics, future analytics, past analytics D) technique analytics, diagnostics analytics, future analytics, past analytics

60)

What are the human, structural, and recorded resources available to the organization?

Version 1

17


A) knowledge assets B) knowledge facilitators C) predictive analytics D) business analytics

61) What resides within the minds of members, customers, and colleagues and include physical structures and recorded media? A) knowledge assets B) knowledge facilitators C) predictive analytics D) business analytics

62)

What helps harness the wealth of knowledge in the organization? A) knowledge assets B) knowledge facilitators C) data analysts D) business analytics

63)

What helps acquire and catalog the knowledge assets in an organization? A) knowledge assets B) knowledge facilitators C) predictive analytics D) business analytics

Version 1

18


64)

What data is created by a machine without human intervention? A) human-generated B) machine-generated C) structured data D) facts

65)

What data is generated by humans in interaction with computers? A) human-generated B) machine-generated C) machine-to-machine D) big data

66)

What type of structured data includes sensor data, point-of-sale data, and web log data? A) human-generated B) machine-generated C) collective intelligence D) systems thinking

67)

What type of structured data includes input data, click-stream data, or gaming data? A) human-generated B) machine-generated C) machine-to-machine (M2M) D) systems thinking

Version 1

19


68)

Which of the following describes structured data? A) data that has a defined length, type, and format B) data that includes numbers, dates, or strings such as Customer Address C) data that is typically stored in a relational database or spreadsheet D) All of the answers are correct.

69)

What refers to devices that connect directly to other devices? A) human-generated B) machine-generated C) machine-to-machine D) systems thinking

70)

What is the characteristic of unstructured data? A) does not follow a specified format B) free-form text C) emails, Twitter tweets, and text messages D) All of the answers are correct.

71)

Which of the following does not describe unstructured data? A) does not follow a specified format B) a defined length, type, and format C) free-form text D) emails, twitter tweets, and text messages

Version 1

20


72)

Which of the following does not describe structured data? A) data with a defined length B) emails, Twitter tweets, and text messages C) typically stored in a relational database or spreadsheet D) data with a defined format

73)

Which of the following represent machine-generated unstructured data? A) satellite images B) scientific atmosphere data C) radar data D) All of the answers are correct.

74)

Which of the following represent human-generated unstructured data? A) text messages B) social media data C) emails D) All of the answers are correct.

75)

Which of the following does not represent machine-generated unstructured data? A) satellite images B) radar data C) social media data D) All of the answers are correct.

Version 1

21


76)

Which of the following does not represent human-generated unstructured data? A) text messages B) social media data C) scientific atmosphere data D) All of the answers are correct.

77)

What is a snapshot?

A) a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention B) a view of data at a particular moment in time C) refers to devices that connect directly to other devices D) opportunities to change the way people purchase books

78)

What is a view of data at a particular moment in time? A) knowledge B) big data C) snapshot D) unstructured data

79)

What is a report?

Version 1

22


A) a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information B) a collection of large complex datasets, including structured and unstructured, which cannot be analyzed using traditional database methods and tools C) a view of data at a particular moment in time D) a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention

80)

What type of report is created based on data that does not change? A) static report B) dynamic report C) variable report D) structured report

81)

What type of report changes automatically during creation? A) static report B) dynamic report C) variable report D) structured report

82) What type of report can include a sales report from last year or salary report from five years ago? A) static report B) dynamic report C) variable report D) unstructured report

Version 1

23


83) What type of report can include updating daily stock market prices or the calculation of available inventory? A) static report B) dynamic report C) variable report D) structured report

84) Who extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends? A) data scientist B) knowledge worker C) data analyst D) chief sustainability officer

85)

What area does a data scientist extract knowledge from to identify trends? A) statistical analysis B) data mining C) advanced analytics on big data D) All of the answers are correct.

86)

Which of the following terms is synonymous with analytics?

Version 1

24


A) data analyst B) business analytics C) structured data D) data scientist

87) What is the scientific process of transforming data into insight for making better decisions? A) business analytics B) Internet of Things C) machine-to-machine D) big data

88)

Which of the following definitions represents a data scientist?

A) extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information B) collects, queries, and consumes organizational data to uncover patterns and provide insights for strategic business decisions C) individuals valued for their ability to interpret and analyze information D) All of the answers are correct.

89) Who extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information?

Version 1

25


A) data scientist B) data analyst C) data worker D) knowledge facilitator

90)

In terms of big data, what is variety? A) includes different forms of structured and unstructured data B) includes the uncertainty of data, including biases, noise, and abnormalities C) includes the scale of data D) includes the analysis of streaming data as it travels around the Internet

91)

In terms of big data, what is veracity? A) includes different forms of structured and unstructured data B) includes the uncertainty of data, including biases, noise, and abnormalities C) includes the scale of data D) includes the analysis of streaming data as it travels around the Internet

92)

In terms of big data, what is volume? A) includes different forms of structured and unstructured data B) includes the uncertainty of data, including biases, noise, and abnormalities C) includes the scale of data D) includes the analysis of streaming data as it travels around the Internet

93)

In terms of big data, what is velocity?

Version 1

26


A) includes different forms of structured and unstructured data B) includes the uncertainty of data, including biases, noise, and abnormalities C) includes the scale of data D) includes the analysis of streaming data as it travels around the Internet

94)

In terms of big data, what includes different forms of structured and unstructured data? A) variety B) veracity C) volume D) velocity

95) In terms of big data, what includes the uncertainty of data, including biases, noise, and abnormalities? A) variety B) veracity C) volume D) velocity

96)

In terms of big data, what includes the scale of data? A) variety B) veracity C) volume D) velocity

Version 1

27


97) In terms of big data, what includes the analysis of streaming data as it travels around the Internet? A) variety B) veracity C) volume D) velocity

98) What is a collection of large, complex datasets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools? A) big data B) data scientist C) data analyst D) descriptive analytics

99)

What is big data?

A) a collection of large, complex datasets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools B) processes and manages algorithms across many machines in a computing environment C) focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization D) extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

Version 1

28


100) In Lou’s Pizza Planet Inc., each department works independently. The sales and marketing department focuses on providing goods and services to customers and maintains transactional data, the finance and accounting department focuses on managing the organization’s resources and maintains monetary data, and the human resources department focuses on hiring and training people and maintains employee data. In the context of how Lou’s functions, which of the following best describes the situation? A) data silos B) data democratization C) data digitization D) data science

101) What of the following terms describes a situation at a company when one business unit is unable to freely communicate with other business units? A) data silos B) data democratization C) competitive advantage D) productivity

102)

How are most companies today typically organized? A) by departments or functional areas B) by departments or financial areas C) by degree or financial areas D) by manager or knowledge area

103)

How does a company operate if it wants to be successful in the information age?

Version 1

29


A) functionally independent between departments B) interdependently between departments C) together as one department with little or no independence D) each department acting as its own individual business unit

104) Most companies are typically organized by departments or functional areas. Which of the following is not a common department found in a company? A) accounting B) payroll C) marketing D) human resources

105)

The sales department needs to rely on information from operations to understand A) inventory. B) customer orders. C) demand forecasts. D) All of the answers are correct.

106) Which of the following is the department that maintains policies, plans, and procedures for the effective management of employees? A) human resources B) sales resources C) employee resources D) employee relations

Version 1

30


107) Greg works for Geneva Steel Corporation. Greg’s duties include managing the overall processes for the company and transforming the steel resources into goods. Which department would Greg most likely work in? A) accounting B) operations management C) marketing D) chief information officer

108) The department within a company that records, measures, and reports monetary transactions is called A) accounting. B) marketing. C) human resources. D) operations management.

109) The department within a company that performs the function of selling goods or services is called A) marketing. B) sales. C) finance. D) operations management.

110) The department within a company that supports the sales by planning, pricing, and promoting goods or services is called

Version 1

31


A) sales. B) operations management. C) accounting. D) marketing.

111) Which department tracks strategic financial issues, including money, banking, credit, investments, and assets? A) sales B) operations management C) accounting D) finance

112) Which department manages the process of converting or transforming resources into goods or services? A) sales B) operations management C) accounting D) finance

113)

Which department records, measures, and reports monetary transactions? A) sales B) operations management C) accounting D) finance

Version 1

32


114) Which department maintains policies, plans, and procedures for the effective management of employees? A) sales B) operations management C) accounting D) human resources

115)

Which activities belong in the accounting department? A) records, measures, and reports monetary transactions B) tracks strategic financial issues, including money, banking, credit, investments, and

assets C) supports the sales by planning, pricing, and promoting goods or services D) relies on information from operations to understand inventory, place orders, and forecast consumer demand

116)

Which activities belong in the finance department? A) records, measures, and reports monetary transactions B) tracks strategic financial issues, including money, banking, credit, investments, and

assets C) supports the sales by planning, pricing, and promoting goods or services D) relies on information from operations to understand inventory, place orders, and forecast consumer demand

117)

Which activities belong in the marketing department?

Version 1

33


A) records, measures, and reports monetary transactions B) tracks strategic financial issues, including money, banking, credit, investments, and assets C) supports the sales by planning, pricing, and promoting goods or services D) relies on information from operations to understand inventory, place orders, and forecast consumer demand

118)

Which activities belong in the sales department? A) records, measures, and reports monetary transactions B) tracks strategic financial issues, including money, banking, credit, investments, and

assets C) supports the sales by planning, pricing, and promoting goods or services D) relies on information from operations to understand inventory, place orders, and forecast consumer demand

119)

Which activities belong in the human resources department? A) records, measures, and reports monetary transactions B) tracks strategic financial issues, including money, banking, credit, investments, and

assets C) supports the sales by planning, pricing, and promoting goods or services D) maintains policies, plans, and procedures for the effective management of employees

120)

Which activities belong in the operations management department?

Version 1

34


A) records, measures, and reports monetary transactions B) manages the process of converting or transforming resources into goods or services C) supports the sales by planning, pricing, and promoting goods or services D) maintains policies, plans, and procedures for the effective management of employees

121)

Which data types are typically found in the marketing department? A) promotion data, sales data, advertising data B) employee data, promotion data, vacation data C) investment data, monetary data, reporting data D) transactional data, purchasing data, payroll data, tax data

122)

Which data types are typically found in the human resources department? A) promotion data, sales data, advertising data B) employee data, promotion data, vacation data C) investment data, monetary data, reporting data D) transactional data, purchasing data, payroll data, tax data

123)

Which data types are typically found in the finance department? A) promotion data, sales data, advertising data B) employee data, promotion data, vacation data C) investment data, monetary data, reporting data D) transactional data, purchasing data, payroll data, tax data

124)

Which data types are typically found in the accounting department?

Version 1

35


A) promotion data, sales data, advertising data B) employee data, promotion data, vacation data C) investment data, monetary data, reporting data D) transactional data, purchasing data, payroll data, tax data

125)

Which data types are typically found in the sales department? A) sales data, customer data, commission data, customer support data B) employee data, promotion data, vacation data C) investment data, monetary data, reporting data D) transactional data, purchasing data, payroll data, tax data

126)

Which data types are typically found in the operations management department? A) manufacturing data, distribution data, production data B) sales data, customer data, commission data, customer support data C) employee data, promotion data, vacation data D) investment data, monetary data, reporting data

127)

Which of the following describes the relationship between functional areas in a business? A) independent B) autonomous C) interdependent D) self-sufficient

Version 1

36


128) Which of the following represents the types of data commonly found in the accounting department? A) tax data B) payroll data C) transactional data D) All of the answers are correct.

129) Which of the following represents the types of data commonly found in the finance department? A) monetary data B) technology data C) production data D) employee data

130) Which of the following represents the types of data commonly found in the human resource department? A) financial data B) technology data C) production data D) employee data

131) Which of the following represents the types of data commonly found in the sales department?

Version 1

37


A) customer data B) sales report data C) commission data D) All of the answers are correct.

132) Which of the following represents the types of data commonly found in the marketing department? A) promotional data B) payroll data C) tax data D) employee data

133) Which of the following represents the types of data commonly found in the operations management department? A) monetary data B) payroll data C) production data D) employee data

134)

Who is responsible for collecting, maintaining, and distributing company knowledge? A) chief knowledge officer (CKO) B) chief privacy officer (CPO) C) chief technology officer (CTO) D) chief information officer (CIO)

Version 1

38


135) Who is responsible for ensuring the ethical and legal use of information within a company? A) chief knowledge officer (CKO) B) chief privacy officer (CPO) C) chief technology officer (CTO) D) chief information officer (CIO)

136) Who is responsible for ensuring the speed, accuracy, availability, and reliability of the management information systems? A) chief knowledge officer (CKO) B) chief privacy officer (CPO) C) chief technology officer (CTO) D) chief information officer (CIO)

137) Who is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives? A) chief knowledge officer (CKO) B) chief privacy officer (CPO) C) chief technology officer (CTO) D) chief information officer (CIO)

138) Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses?

Version 1

39


A) chief knowledge officer (CKO) B) chief security officer (CSO) C) chief technology officer (CTO) D) chief information officer (CIO)

139) Trina Hauger works for Johnson Electric as a corporate lawyer, and part of her duties are to ensure the ethical and legal use of information within the company. Which of the following represents Trina’s role at Johnson Electric? A) chief knowledge officer (CKO) B) chief privacy officer (CPO) C) chief technology officer (CTO) D) chief information officer (CIO)

140) The challenge that companies today sometimes have is that they are departmentalized into functions that act independently of each other. One solution that can help a company work________ includes management information systems. A) variables B) human resource data C) interdepartmentally D) resource information systems

141) Susan Stewart is an executive at Equity Title, where she is responsible for collecting, maintaining and distributing knowledge for the company. What is Susan’s role at Equity Title?

Version 1

40


A) chief knowledge officer (CKO) B) chief technology officer (CTO) C) chief information officer (CIO) D) chief security officer (CSO)

142)

What is the primary responsibility of the CTO? A) overseeing all uses of MIS B) ensuring the security of business systems C) ensuring speed, accuracy, and reliability for MIS D) collecting and distributing company information

143) Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers. What is Jeremy’s role within the company? A) chief executive officer (CEO) B) chief security officer (CSO) C) chief procurement officer (CPO) D) chief technology officer (CTO)

144) Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategic aligns with business goals and objectives? A) chief knowledge officer (CKO) B) chief privacy officer (CPO) C) chief information officer (CIO) D) chief security officer (CSO)

Version 1

41


145) Recently, 150 of the Fortune 500 companies added which of the following positions to their list of senior executives? A) chief technology officer (CTO) B) chief data officer (CDO) C) chief privacy officer (CPO) D) chief knowledge officer (CKO)

146) Who is responsible for ensuring the speed, accuracy, availability, and reliability of the MIS? A) chief technology officer (CTO) B) chief security officer (CSO) C) chief privacy officer (CPO) D) chief data officer (CDO)

147) Who is responsible for ensuring the ethical and legal use of information within a company? A) chief technology officer (CTO) B) chief security officer (CSO) C) chief privacy officer (CPO) D) chief knowledge officer (CKO)

148) Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses?

Version 1

42


A) chief technology officer (CTO) B) chief security officer (CSO) C) chief privacy officer (CPO) D) chief knowledge officer (CKO)

149)

Who is responsible for collecting, maintaining, and distributing company knowledge? A) chief data officer (CDO) B) chief security officer (CSO) C) chief privacy officer (CPO) D) chief knowledge officer (CKO)

150) Who is responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives? A) chief information officer (CIO) B) chief data officer (CDO) C) chief privacy officer (CPO) D) chief knowledge officer (CKO)

151) Who is responsible for determining the types of information the enterprise will capture, retain, analyze, and share? A) chief information officer (CIO) B) chief security officer (CSO) C) chief data officer (CDO) D) chief knowledge officer (CKO)

Version 1

43


152) Which of the following includes the roles and responsibilities of the chief technology officer (CTO)? A) ensuring the speed, accuracy, availability, and reliability of the MIS B) ensuring the ethical and legal use of information within a company C) ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses D) ensuring that MIS strategically aligns with business goals and objectives

153) Which of the following includes the roles and responsibilities of the chief information officer (CIO)? A) ensuring the speed, accuracy, availability, and reliability of the MIS B) ensuring the ethical and legal use of information within a company C) ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses D) ensuring that MIS strategically aligns with business goals and objectives

154) Which of the following includes the roles and responsibilities of the chief privacy officer (CPO)? A) ensuring the speed, accuracy, availability, and reliability of the MIS B) ensuring the ethical and legal use of information within a company C) ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses D) ensuring that MIS strategically aligns with business goals and objectives

155) Which of the following includes the roles and responsibilities of the chief security officer (CSO)? Version 1

44


A) ensuring the speed, accuracy, availability, and reliability of the MIS B) ensuring the ethical and legal use of information within a company C) ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses D) ensuring that MIS strategically aligns with business goals and objectives

156) Which of the following includes the roles and responsibilities of the chief data officer (CDO)? A) determining the types of information the enterprise will capture, retain, analyze, and share B) ensuring the ethical and legal use of information within a company C) ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses D) ensuring that MIS strategically aligns with business goals and objectives

157) Which of the following includes the roles and responsibilities of the chief knowledge officer (CKO)? A) determining the types of information the enterprise will capture, retain, analyze, and share B) collecting, maintaining, and distributing company knowledge C) ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses D) ensuring that MIS strategically aligns with business goals and objectives

158)

Which of the following executive levels might we see created over the next decade?

Version 1

45


A) chief intellectual property officer B) chief automation officer C) chief user experience officer D) All of the answers are correct.

159) The chief intellectual property officer is a new executive level we might see created over the next decade. Which of the following includes the roles and responsibilities of this officer? A) manage and defend intellectual property, copyrights and patents B) determine if a person or business process can be replaced by a robot or software C) create the optimal relationship between user and technology D) ensure the ethical and legal use of information within an organization

160) The chief automation officer is a new executive level we might see created over the next decade. Which of the following includes the roles and responsibilities of this officer? A) manage and defend intellectual property, copyrights, and patents B) determine if a person or business process can be replaced by a robot or software C) create the optimal relationship between user and technology D) ensure the ethical and legal use of information within an organization

161) The chief user experience officer is a new executive level we might see created over the next decade. Which of the following includes the roles and responsibilities of this officer? A) manage and defend intellectual property, copyrights, and patents B) determine if a person or business process can be replaced by a robot or software C) create the optimal relationship between user and technology D) ensure the ethical and legal use of information within an organization

Version 1

46


162)

Which of the following is not a broad function of a chief information officer? A) manager B) follower C) communicator D) leader

163)

What is the difference between the chief information officer and chief data officer?

A) the CIO is responsible for the data, regardless of the information system; the CDO is responsible for the information systems through which data is stored and processed B) the CIO is responsible for the information systems through which data is stored and processed; the CDO is responsible for the data, regardless of the information system C) their roles and relationships are identical D) All of the answers are correct.

164) What is the difference between existing MIS workplace knowledge and the knowledge required to fulfill business goals and strategies? A) off-site training B) MIS skills gap C) social recruiting D) information security

165)

In recruiting lingo, what are perfect MIS candidates sometimes called?

Version 1

47


A) turquoise turtles B) red rabbits C) purple squirrels D) white unicorns

166) Eric Eberly holds an executive position at Parker Industries. He has designed and implemented a system to collect, maintain, and share information across the many departments of Parker Industries. He’s also instilled an updating protocol requiring department heads to keep the system up-to-date. Based on this description, what position does Eric hold? A) chief information officer B) chief security officer C) chief data officer D) chief knowledge officer

167) Cody Osterman holds an executive position at Trek Enterprises. His role is the newest senior executive position at the organization. He has advised the company on privacy procedures and processes, and has initiated a training program for employees about the privacy policy, customer confidentiality, and data security. Based on this description, what position does Cody hold at Trek Enterprises? A) chief information officer B) chief security officer C) chief data officer D) chief privacy officer

Version 1

48


168) Sara McGuire holds an executive position at Henry Commerce. She is a big-picture thinker, and makes sure the technology strategy at Henry Commerce serves its business strategy. She has a well-rounded knowledge of MIS, and her primary responsibilities include the efficiency of Henry Commerce’s MIS systems. Based on this description, what position does Sara hold? A) chief user experience officer B) chief technology officer C) chief data officer D) chief privacy officer

169) Allana Nation holds an executive position at PH Corporation. He has an extensive understanding of networks and telecommunications. Adam is aware of the informationtechnology threats the company faces and institutes security protocols and safeguards to secure the MIS systems at PH Corporation. Based on this description, what position does Allana hold? A) chief security officer B) chief user experience officer C) chief data officer D) chief automation officer

170) Jasmine Coleman holds an executive position at Keck-Howes Group. Jasmine has improved the quality of the data gathered by the organization and has created a model to decrease the cost of managing data while increasing the value of the data gathered. Based on this description, what position does Jasmine hold at Keck-Howes Group? A) chief security officer B) chief user experience officer C) chief data officer D) chief automation officer

Version 1

49


171) What is the ability for data to be collected, analyzed, and accessible to all users (the average end users)? A) data democratization B) business unit C) knowledge democratization D) business data

172)

What is a segment of a company representing a specific business function? A) data democratization B) business unit C) knowledge democratization D) business data

173) You are working for a new boss, Jill Slater. Jill believes that all employees in the company should have access to the data they need when they need it for analysis and to make data-driven business decisions. Which term best describes Jill’s business belief? A) data democratization B) business unit C) knowledge dissemination D) business data

174) Feedback is information that returns to its original transmitter and modifies the transmitter’s actions. What would the original transmitter include?

Version 1

50


A) input, transform, output B) input, transform, outnumber C) output, input, perform D) All of the answers are correct.

175) MIS is a business function. Which of the following does MIS perform to help aid the company in decision making and problem solving? A) moves information about people B) moves processes across the company to improve systems C) moves information about products D) All of the answers are correct.

176)

In terms of system thinking, what is data entered in a computer? A) input B) output C) process D) feedback

177)

In terms of system thinking, what controls to ensure correct processes? A) input B) output C) process D) feedback

Version 1

51


178) In terms of system thinking, what is the resulting information from the computer program? A) input B) output C) process D) feedback

179)

In terms of system thinking, what is the computer program that processes the data? A) input B) output C) process D) feedback

180)

In terms of system thinking, what is input? A) data entered in a computer B) controls to ensure correct processes C) the resulting information from the computer program D) the computer program that processes the data

181)

In terms of system thinking, what is output? A) data entered in a computer B) controls to ensure correct processes C) the resulting information from the computer program D) the computer program that processes the data

Version 1

52


182)

In terms of system thinking, what is feedback? A) data entered in a computer B) controls to ensure correct processes C) the resulting information from the computer program D) the computer program that processes the data

183)

In terms of system thinking, what is process? A) data entered in a computer B) controls to ensure correct processes C) the resulting information from the computer program D) the computer program that processes the data

184) A system is a collection of parts that link to achieve a common purpose. Systems thinking is a way of monitoring A) the entire system B) a division within the sales role C) the executive team D) the company’s competitors

185) MIS can be an important enabler of business success and innovation. Which of the below statements is accurate when referring to MIS?

Version 1

53


A) MIS equals business success and innovation. B) MIS represents business success and innovation. C) MIS is not a valuable tool that leverages talent. D) MIS is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.

186) What is a way of monitoring the entire system in a company by viewing the multiple inputs being processed to produce outputs? A) feedback thinking B) systems thinking C) output management D) operational thinking

187)

Which of the following statements is true? A) MIS equals business success. B) MIS equals business innovation. C) MIS represents business success and innovation. D) MIS enables business success and innovation.

188)

What is the name of a company’s internal computer department? A) management information systems B) information systems C) information technology D) All of the answers are correct.

Version 1

54


189)

What are material items or products that customers will buy to satisfy a want or need? A) goods B) services C) production D) productivity

190)

What are tasks performed by people that customers will buy to satisfy a want or need? A) goods B) services C) production D) productivity

191) What is the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services? A) goods B) services C) production D) productivity

192) What is the rate at which goods and services are produced based upon total output given total inputs?

Version 1

55


A) goods B) services C) production D) productivity

193)

What are goods?

A) material items or products that customers will buy to satisfy a want or need B) tasks performed by people that customers will buy to satisfy a want or need C) the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services D) the rate at which goods and services are produced based upon total output given total inputs

194)

What are services?

A) material items or products that customers will buy to satisfy a want or need B) tasks performed by people that customers will buy to satisfy a want or need C) the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services D) the rate at which goods and services are produced based upon total output given total inputs

195)

What is production?

Version 1

56


A) material items or products that customers will buy to satisfy a want or need B) tasks performed by people that customers will buy to satisfy a want or need C) the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services D) the rate at which goods and services are produced based upon total output given total inputs

196)

What is productivity?

A) material items or products that customers will buy to satisfy a want or need B) tasks performed by people that customers will buy to satisfy a want or need C) the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services D) the rate at which goods and services are produced based upon total output given total inputs

197)

Cars, groceries, and clothing belong in which category? A) goods B) services C) production D) productivity

198)

Teaching, waiting tables, and cutting hair belong in which category? A) goods B) services C) production D) productivity

Version 1

57


199)

Which of the following is considered a good? A) cars B) groceries C) clothing D) All of the answers are correct.

200)

Which of the following is considered a service? A) teaching B) waiting tables C) cutting hair D) All of the answers are correct.

201)

Which of the following is considered a good? A) cars B) teaching C) waiting tables D) All of the answers are correct.

202)

Which of the following is considered a service? A) cars B) groceries C) cutting hair D) All of the answers are correct.

Version 1

58


203)

Which of the following is considered goods? A) milk and eggs B) managing a team C) selling groceries D) All of the answers are correct.

204)

Which of the following is considered a service? A) selling groceries B) managing a team C) cutting hair D) All of the answers are correct.

205) The lettuce, tomatoes, patty, bun, and ketchup are included in which category of making a hamburger? A) input B) process C) output D) All of the answers are correct.

206) Cooking a patty and putting the ingredients together are included in which category of making a hamburger?

Version 1

59


A) input B) process C) output D) All of the answers are correct.

207)

The actual hamburger is included in which category of making a hamburger? A) input B) process C) output D) All of the answers are correct.

208) Assume you are in the business of producing and selling hamburgers. If you could produce more hamburgers with the same input, what would happen to your productivity and profits assuming the price of your hamburgers remains the same? A) increase in productivity, decrease in profits B) increase in productivity, increase in profits C) decrease in productivity, decrease in profits D) decrease in productivity, increase in profits

209) Assume you are in the business of producing and selling T-shirts. If you could produce more T-shirts with the same input, what would happen to your productivity and profits assuming the price of your T-shirts remains the same? A) increase in productivity, decrease in profits B) increase in productivity, increase in profits C) decrease in productivity, decrease in profits D) decrease in productivity, increase in profits

Version 1

60


210) Assume you are in the business of producing and selling cars. If you could produce more cars with the same input, what would happen to your productivity and profits assuming the price of your cars remains the same? A) increase in productivity, decrease in profits B) increase in productivity, increase in profits C) decrease in productivity, decrease in profits D) decrease in productivity, increase in profits

211)

Which four elements are included in systems thinking? A) output, process, feedback, and accounting B) process, output, operations, and accounting C) input, process, output, and feedback D) input, output, sales, and feedback

212) MIS is a business function, like accounting or sales, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. What does MIS stand for? A) management information strategy B) management intelligence system C) management information system D) management information strategist

213) Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby’s tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby gathering?

Version 1

61


A) feedback B) processing C) output management D) sales processing

214)

Which of the following provides an accurate definition of systems thinking?

A) a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part B) a way of monitoring individual components including an input, the process, and an output while continuously gathering feedback on the entire system C) a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on the entire system D) a way of monitoring singular parts of a system by viewing a single input that is processed or transformed to produce an entire system that is continuously monitored to gather feedback on each individual part

215) If you were thinking about a washing machine as a system, which of the following represents the inputs? A) the dirty clothes, water, and detergent B) the clean clothes C) the wash and rinse cycles D) the light indicating that the washer is off balance and has stopped

216) If you were thinking about a washing machine as a system, which of the following represents the process?

Version 1

62


A) the dirty clothes, water, and detergent B) the clean clothes C) the wash and rinse cycles D) the light indicating that the washer is off balance and has stopped

217) If you were thinking about a washing machine as a system, which of the following represents the feedback? A) the dirty clothes, water, and detergent B) the clean clothes C) the wash and rinse cycles D) the light indicating that the washer is off balance and has stopped

218) If you were thinking about a washing machine as a system, which of the following represents the outputs? A) the dirty clothes, water, and detergent B) the clean clothes C) the wash and rinse cycles D) the light indicating that the washer is off balance and has stopped

219) If you were thinking about an oven as a system, which of the following represents the input? A) the uncooked food B) the cooked food C) a light indicating that the oven has reached the preheated temperature D) the oven running at 350 degrees for 20 minutes

Version 1

63


220) If you were thinking about an oven as a system, which of the following represents the output? A) the uncooked food B) the cooked food C) a light indicating that the oven has reached the preheated temperature D) the oven running at 350 degrees for 20 minutes

221) If you were thinking about an oven as a system, which of the following represents the process? A) the uncooked food B) the cooked food C) a light indicating that the oven has reached the preheated temperature D) the oven running at 350 degrees for 20 minutes

222) If you were thinking about an oven as a system, which of the following represents the feedback? A) the uncooked food B) the cooked food C) a light indicating that the oven has reached the preheated temperature D) the oven running at 350 degrees for 20 minutes

223) If you were thinking about a home theater system, which of the following represents the inputs?

Version 1

64


A) the DVD player, DVD movie, speakers, TV, and electricity B) playing the movie, including the audio through the speakers and the video on the TV C) a message stating that the disk is dirty and cannot be played D) spinning the disk to play, pause, rewind, or fast forward

224) If you were thinking about a home theater system, which of the following represents the outputs? A) the DVD player, DVD movie, speakers, TV, and electricity B) playing the movie, including the audio through the speakers and the video on the TV C) a message stating that the disk is dirty and cannot be played D) spinning the disk to play, pause, rewind, or fast forward

225) If you were thinking about a home theater system, which of the following represents the process? A) the DVD player, DVD movie, speakers, TV, and electricity B) playing the movie, including the audio through the speakers and the video on the TV C) a message stating that the disk is dirty and cannot be played D) spinning the disk to play, pause, rewind, or fast forward

226) If you were thinking about a home theater system, which of the following represents the feedback? A) the DVD player, DVD movie, speakers, TV, and electricity B) playing the movie, including the audio through the speakers and the video on the TV C) a message stating that the disk is dirty and cannot be played D) spinning the disk to play, pause, rewind, or fast forward

Version 1

65


227) Which of the following is not a typical way that a company would duplicate a competitive advantage? A) acquiring the new technology B) copying the business operations C) hiring away key employees D) carrying large product inventories

228) When a company is the first to market with a competitive advantage, this is called a firstmover advantage. All of the following companies were first-movers except A) FedEx—Online Self-Service Software. B) Apple—iPad. C) Apple—iPod. D) Microsoft—Bing Search Engine.

229) Which of the following is a tool a manager can use to analyze competitive intelligence and identify competitive advantages? A) the three generic strategies B) the threat of substitute buyer power C) differentiated costs D) supplier loyalty

230) Identifying competitive advantages can be difficult, which explains why they are typically

Version 1

66


A) temporary. B) satisfactory. C) terminated. D) unsuccessful.

231) Updating business strategies is a continuous undertaking as internal and external environments A) become less competitive. B) remains stagnant. C) rapidly changes. D) become more consistent.

232) Which of the following represents a reason why competitive advantages are typically temporary? A) The competitor will hire away your key employees. B) The competitor quickly seeks ways to duplicate your business operations. C) The competitor will purchase new technology. D) All of the answers are correct.

233)

What is a competitive advantage?

Version 1

67


A) a product that an organization’s customers place a lesser value on than similar offerings from a competitor B) a feature of a product or service on which customers place a lesser value than they do on similar offerings from another supplier C) a service that an organization’s customers place a lesser value on than similar offerings from another supplier D) a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

234) Which of the following is not a common tool used in industry to analyze and develop competitive advantages? A) Five Forces Model B) three generic strategies C) competitive analysis model D) value chain analysis

235) What is the process of gathering information about the competitive environment, including competitors’ plans, activities, and products, to improve a company’s ability to succeed? A) feedback B) information C) competitive intelligence D) data

236)

Who is a person or group that has an interest or concern in an organization?

Version 1

68


A) stakeholder B) business strategy C) supplier D) partner

237) Which group of stakeholder’s primary interests include reliable contracts, ethical materials handling, and responsible production? A) partners/suppliers B) shareholders/investors C) community D) government

238) Which group of stakeholder’s primary interests include adhering to regulations/laws, increasing employment, and ethical taxation reporting? A) partners/suppliers B) shareholders/investors C) community D) government

239) Which group of stakeholder’s primary interests include maximizing profits, growing market share, and high return on investment? A) partners/suppliers B) shareholders/investors C) community D) government

Version 1

69


240) Which group of stakeholder’s primary interests include exceptional customer service, high-quality products, and ethical dealings? A) partners/suppliers B) shareholders/investors C) community D) customers

241) Which group of stakeholder’s primary interests include fair compensation, job security, and ethical conduct/treatment? A) employees B) shareholders/investors C) community D) customers

242) Which group of stakeholder’s primary interests include professional associations, ethical recycling, and increasing employment? A) employees B) shareholders/investors C) community D) customers

243) What is a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors?

Version 1

70


A) competitive advantage B) competitor advantage C) power advantage D) first-mover advantage

244)

Which of the following evaluates a project’s position? A) SWOT analysis B) Five Forces Model C) value chain analysis D) three generic strategies

245)

What is a SWOT analysis?

A) evaluates an organization’s strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies B) analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry C) views a firm as a series of business processes, each of which adds value to the product or service D) generic business strategies that are neither organization- nor industry-specific and can be applied to any business, product, or service

246)

What evaluates industry attractiveness? A) SWOT analysis B) Five Forces Model C) value chain analysis D) three generic strategies

Version 1

71


247)

What is Porter’s Five Forces Model?

A) evaluates an organization’s strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies B) analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry C) views a firm as a series of business processes, each of which adds value to the product or service D) generic business strategies that are neither organization- nor industry-specific and can be applied to any business, product, or service

248)

What executes business strategy? A) SWOT analysis B) Five Forces Model C) value chain analysis D) three generic strategies

249)

What is a value chain analysis?

A) evaluates an organization’s strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies B) analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry C) views a firm as a series of business processes, each of which adds value to the product or service D) generic business strategies that are neither organization- nor industry-specific and can be applied to any business, product, or service

Version 1

72


250)

Which strategy below helps an organization choose its business focus? A) SWOT analysis B) Five Forces Model C) value chain analysis D) three generic strategies

251)

What are Porter’s three generic strategies?

A) evaluate an organization’s strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies. B) analyze the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry. C) view a firm as a series of business processes, each of which adds value to the product or service. D) generic business strategies that are neither organization- nor industry-specific and can be applied to any business, product, or service

252)

Which of the following describes a stakeholder? A) a leadership plan that achieves a specific set of goals or objectives B) a feature of a product or service on which customers place a greater value C) a person or group that has an interest or concern in an organization D) information about a competitive environment

253) There are many different stakeholders found in an organization. Stakeholder’s drive business strategies, and depending on the stakeholder’s perspective, the business strategy can change. Which of the following is a main concern for customers?

Version 1

73


A) exceptional customer service B) fair compensation C) professional associations D) reliable contracts

254) There are many different stakeholders found in an organization. Stakeholder’s drive business strategies, and depending on the stakeholder’s perspective, the business strategy can change. Which of the following is a main concern for employees? A) exceptional customer service B) fair compensation C) professional associations D) reliable contracts

255) There are many different stakeholders found in an organization. Stakeholder’s drive business strategies, and depending on the stakeholder’s perspective, the business strategy can change. Which of the following is a main concern for the community? A) exceptional customer service B) fair compensation C) professional associations D) reliable contracts

256) There are many different stakeholders found in an organization. Stakeholder’s drive business strategies, and depending on the stakeholder’s perspective, the business strategy can change. Which of the following is a main concern for partners/suppliers?

Version 1

74


A) exceptional customer service B) fair compensation C) professional associations D) reliable contracts

257) There are many different stakeholders found in an organization. Stakeholder’s drive business strategies, and depending on the stakeholder’s perspective, the business strategy can change. Which of the following is a main concern for the government? A) maximized profits B) adherence to regulations/laws C) exceptional customer service D) reliable contracts

258) There are many different stakeholders found in an organization. Stakeholder’s drive business strategies, and depending on the stakeholder’s perspective, the business strategy can change. Which of the following is a main concern for shareholders/investors? A) maximized profits B) adherence to regulations/laws C) exceptional customer service D) reliable contracts

259) There are many different stakeholders found in an organization with common business interests. Depending on the stakeholder’s perspective, the business strategy can change. Which of the following is not a main concern for shareholders/investors?

Version 1

75


A) maximized profits B) grow market share C) job security D) high return on investment

260)

What is included in a SWOT analysis? A) strengths, weaknesses, organizations, and technology B) strengths, weaknesses, opportunities, and threats C) success, willingness, opportunities, and technology D) success, weaknesses, organizations, and threats

261)

Which of the following statements is correct when considering a SWOT analysis? A) Strengths and weaknesses originate inside an organization. B) Opportunities and threats originate inside an organization. C) Strengths and threats originate inside an organization. D) Opportunities and weaknesses originate outside an organization.

262)

Which of the following statements is correct when considering a SWOT analysis? A) Strengths and weaknesses originate outside an organization. B) Opportunities and threats originate outside an organization. C) Strengths and threats originate inside an organization. D) Opportunities and weaknesses originate outside an organization.

Version 1

76


263) Which of the following are included as potential internal strengths in a SWOT analysis that are helpful to an organization? A) core competencies, market leaders, cost advantages, excellent management B) lack of strategic direction, obsolete technologies, lack of managerial talent, outdated product line C) expanded product line, increase in demand, new markets, new regulations D) new entrants, substitute products, shrinking markets, costly regulatory requirements

264) Which of the following are included as potential internal weaknesses in a SWOT analysis that are harmful to an organization? A) core competencies, market leaders, cost advantages, excellent management B) lack of strategic direction, obsolete technologies, lack of managerial talent, outdated product line C) expanded product line, increase in demand, new markets, new regulations D) new entrants, substitute products, shrinking markets, costly regulatory requirements

265) Which of the following are included as potential external opportunities in a SWOT analysis that are helpful to an organization? A) core competencies, market leaders, cost advantages, excellent management B) lack of strategic direction, obsolete technologies, lack of managerial talent, outdated product line C) expanded product line, increase in demand, new markets, new regulations D) new entrants, substitute products, shrinking markets, costly regulatory requirements

266) Which of the following are included as potential external weaknesses in a SWOT analysis that are harmful to an organization?

Version 1

77


A) core competencies, market leaders, cost advantages, excellent management B) lack of strategic direction, obsolete technologies, lack of managerial talent, outdated product line C) expanded product line, increase in demand, new markets, new regulations D) new entrants, substitute products, shrinking markets, costly regulatory requirements

267)

How would you categorize strengths in a SWOT analysis? A) internal, helpful B) internal, harmful C) external, helpful D) external, harmful

268)

How would you categorize weaknesses in a SWOT analysis? A) internal, helpful B) internal, harmful C) external, helpful D) external, harmful

269)

How would you categorize opportunities in a SWOT analysis? A) internal, helpful B) internal, harmful C) external, helpful D) external, harmful

Version 1

78


270)

How would you categorize threats in a SWOT analysis? A) internal, helpful B) internal, harmful C) external, helpful D) external, harmful

271)

What does a SWOT analysis perform? A) evaluates an organizations strengths, weaknesses, objectives, and threats B) evaluates an organization’s strengths, weaknesses, opportunities, and threats C) evaluates an organization’s supporters, weaknesses, opportunities, and technology D) evaluates an organization’s systems, warehouses, outputs, and technology

272)

In a SWOT analysis, strengths and weaknesses originate________ an organization. A) inside (internally) B) outside (externally) C) both inside (internally) and outside (externally) D) All of the answers are correct.

273)

In a SWOT analysis, opportunities and threats originate________ an organization. A) inside (internally) B) outside (externally) C) both inside (internally) and outside (externally) D) All answer choices are correct.

Version 1

79


274) In a SWOT analysis, which of the following could you discover as potential internal strengths (helpful)? A) cost advantages B) damaged reputation C) new markets D) competitor issues

275) In a SWOT analysis, which of the following could you discover as potential inner weaknesses (harmful)? A) cost advantages B) damaged reputation C) new markets D) competitor issues

276) In a SWOT analysis, which of the following could you discover as potential external opportunities (helpful)? A) cost advantages B) damaged reputation C) new markets D) improved marketing campaigns

277) Managers use four common tools to analyze competitive intelligence and develop competitive advantages. Which of the following is not one of these tools?

Version 1

80


A) three generic strategies B) Five Forces Model C) first-mover advantage D) SWOT analysis

278) The Victory Wireless store in Denver is currently offering a fabulous marketing strategy for potential new iPhone customers. Victory Wireless offers customers who purchase an iPhone with a 2-year subscription a free Otter phone case, car charger, ear phones, and speakers. In terms of Porter’s Five Forces Model, what is Victory Wireless attempting to achieve with this marketing strategy? A) increased buyer power B) increased substitute products C) decreased supplier power D) decreased buyer power

279) Gina Brooks works for Aquarium Retail Services selling high-end salt water fish and tank supplies. Aquarium Retail Services is the current market leader in Gina’s city. Gina has recently been approached by Deep Blue Incorporated with an opportunity to run its corporate nation-wide marketing and sales division. Gina decides to jump at the opportunity. Deep Blue is attempting to gain a competitive________ by stealing its competitor’s key employees. A) power B) entry barrier C) advantage D) loyalty

Version 1

81


280) The banking industry has implemented several competitive advantages including ATMs, online bill pay services, and electronic statements. Of course, these competitive advantages were quickly duplicated by any competitor that wanted to remain in the banking industry. These were all examples of seeking competitive advantages through A) acquiring new technology products and services. B) hiring new employees. C) reducing expenses. D) gaining invaluable feedback from customers.

281) Michael Porter defined the Five Forces Model and the potential pressures that can hurt sales. Which of the following is not one of the potential pressures that can hurt sales? A) Suppliers can drive down profits by charging more for supplies. B) New market entrants can steal potential investment capital. C) Substitute products can steal customers. D) Competition can steal customers.

282) Kevin Campbell is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses, and he needs to purchase a rather expensive laptop. In an effort to save money, Kevin begins a Facebook group finding other college students who need to purchase laptops. Soon, Kevin’s Facebook group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops? A) collecting business intelligence B) decreasing entry barriers C) purchasing a substitute product D) increasing buyer power

283)

What are costs that make customers reluctant to switch to another product or service?

Version 1

82


A) support activities B) switching costs C) loyalty rewards D) value chain activities

284) Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called the Edgewater Café. Each time a customer purchases their 100th cup of coffee at the Edgewater Café, they receive a free pound of coffee of their choice. What is Callie attempting to create with her unique “Free Pound of Coffee” marketing program? A) reducing buyer power with a loyalty program B) increasing buyer power with a loyalty program C) decreasing supplier power with a differentiated product D) creating a substitute product

285) What includes all parties involved, directly or indirectly, in obtaining raw materials or a product? A) support chain B) supply chain C) system chain D) supply choice

286)

Which of the below represents a company in a supply chain? A) customer and competitor B) supplier and competitor C) knowledge worker and supplier D) supplier and customer

Version 1

83


287) In the center of Porter’s Five Forces Model is competition. Which of the below represents the four outer boxes? A) buyer power, systems power, threat of false entrants, and threat of substitute products or services B) buyer power, systems power, threat of new entrants, and threat of substitute products or services C) buyer power, supplier power, threat of new entrants, and threat of substitute products or services D) business power, supplier power, threat of new entrants, and threat of powerful services

288) Shawn McGill is on the executive board for ABC Pharmaceuticals. The company produces the top-selling cancer-fighting drug on the market. Due to its incredible success, ABC Pharmaceuticals has decided to increase the cost of the drug from $8 a pill to $15 a pill. Which force is ABC Pharmaceuticals using to increase its drug price? A) supplier power B) buyer power C) threat of false entrants D) business power

289)

What is one of the most common ways a company can decrease supplier power? A) charge lower prices B) charge higher prices C) use MIS to find and create alternative products D) companies cannot impact supplier power

290)

If a supplier has high power, what can it do to influence its industry?

Version 1

84


A) charge higher prices B) shift costs to industry participants C) limit quality or services D) All of the answers are correct.

291)

How can a company reduce the threat of substitute products or services? A) market the product to fewer than 10 customers B) ignore competitive forces C) offer additional value through wider product distribution D) offer less value making the product far more generic and similar to the competition

292) Which one of Porter’s five forces is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market? A) threat of new entrants B) threat of substitute products or services C) threat of buyer power D) supply chain competition

293) John Cleaver is the CEO of Tech World, a retail store that sells computers, monitors, cameras, televisions, and many other electronic products. John and his executive team are meeting to brainstorm new ideas on how to grow the business. One idea is to mimic a competitor product that is attempting to sell a new product in a different industry. After performing a Porter’s Five Forces Model analysis, John determines that all of the forces are high in this new industry. What should John do?

Version 1

85


A) explode into the market with an overflow of the product B) contemplate other products to introduce at the same time in this new market C) compare the competitor’s prices and offer his product at a lower price in this new market D) not introduce the product because all five forces are strong and this would be a highly risky business strategy

294) What is a feature of a product or service that customers have come to expect and entering competitors must offer the same if they want to survive? A) significant barrier B) entry barrier C) product differentiation D) entry chain

295)

Which of the following represents a typical supply chain? A) company – customers – suppliers B) company – suppliers – customers C) suppliers – company – customers D) suppliers – customers – company

296) Imagine you are creating a new product to sell in an up-and-coming market. Which of the following statements indicates that it would be easy for you as the new entrant to compete in this market?

Version 1

86


A) The threat of new entrants’ force is high in the up-and-coming market. B) The threat of new entrants’ force is low in the up-and-coming market. C) The threat of new entrants’ force is impossible to define in the up-and-coming market. D) All of the answers are correct depending on the time of year.

297) Imagine you are creating a new product to sell in an up-and-coming market. Which of the following statements indicates that it would be difficult for you to enter this new market? A) The threat of new entrants’ force is high in the up-and-coming market. B) The threat of new entrants’ force is low in the up-and-coming market. C) The threat of new entrants’ force is high during the summer months in the up-andcoming market. D) All of the answers are correct depending on the time of year.

298) Which of the following is an example in which Porter’s five forces are mostly strong and competition is high? A) dog-walking business B) ski resort C) professional hockey team D) All of the answers are correct.

299) Which of the following offers an example in which Porter’s five forces are mostly weak and competition is low?

Version 1

87


A) an international hotel chain purchasing milk B) a coffee shop C) a single consumer purchasing milk D) a dog-walking business

300) Some industries’ competition is much more intense than others. Retail grocery stores such as Kroger, Safeway, and Albertson’s in the United States experience fierce competition and offer similar marketing campaigns to compete. What is this an example of in terms of Porter’s Five Forces Model? A) rivalry among new entrants B) rivalry among existing competitors C) threat of substitute products or services D) buyer power

301) Amazon.com uses a customer profiling system whenever a customer visits its website. Using this system, Amazon can offer products tailored to that particular customer’s profile and buying pattern. What is Amazon using to achieve this competitive advantage? A) rivalry B) buyer power C) product differentiation D) substitute product

302) Your boss, Penny Dirks, has asked you to analyze the music industry using Porter’s Five Forces Model. Which of the following represents supplier power in the music industry?

Version 1

88


A) established record labels such as EMI, Sony, and Universal B) Walmart, Target, iTunes C) game systems such as Xbox and social networks such as Facebook. D) Taylor Swift,Beyoncé, The Beatles, The Stones

303) Your boss, Penny Dirks, has asked you to analyze the music industry using Porter’s Five Forces Model. Which of the following represents buyer power in the music industry? A) established record labels such as EMI, Sony, and Universal B) Walmart, Target, iTunes C) independent record labels D) game systems such as Xbox and social networks such as Facebook

304) Your boss, Penny Dirks, has asked you to analyze the music industry using Porter’s Five Forces Model. Which of the following represents the threat of substitute products or services in the music industry? A) established record labels such as EMI, Sony, and Universal B) independent record labels C) game systems such as Xbox and social networks such as Facebook D) Taylor Swift,Beyoncé, The Beatles, The Stones

305) Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents supplier power in the soft drink industry?

Version 1

89


A) Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. B) Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. C) Zevia Natural Diet Soda begins selling directly over the Internet. D) vitamin water, fruit juice, coffee

306) Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents buyer power in the soft drink industry? A) Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. B) Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. C) Zevia Natural Diet Soda begins selling directly over the Internet. D) vitamin water, fruit juice, coffee

307) Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents a threat of a new entrant in the soft drink industry? A) Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. B) Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. C) Zevia Natural Diet Soda begins selling directly over the Internet. D) vitamin water, fruit juice, coffee

Version 1

90


308) Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents a substitute product in the soft drink industry? A) Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. B) Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. C) Zevia Natural Diet Soda begins selling directly over the Internet. D) vitamin water, fruit juice, coffee

309)

What is buyer power?

A) the ability of buyers to affect the price they must pay for an item B) the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services) C) high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market D) high when there are many alternatives to a product or service and low when there are few alternatives from which to choose

310)

What is supplier power?

A) the ability of buyers to affect the price they must pay for an item B) the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services) C) high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market D) high when there are many alternatives to a product or service and low when there are few alternatives from which to choose

Version 1

91


311)

What is the threat of substitute products or services?

A) the ability of buyers to affect the price they must pay for an item B) the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services) C) high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market D) high when there are many alternatives to a product or service and low when there are few alternatives from which to choose

312)

What is the threat of new entrants?

A) the ability of buyers to affect the price they must pay for an item B) the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services) C) high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market D) high when there are many alternatives to a product or service and low when there are few alternatives from which to choose

313)

What is the rivalry among existing competitors?

A) the ability of buyers to affect the price they must pay for an item B) the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services) C) high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market D) high when competition is fierce in a market and low when competitors are more complacent

Version 1

92


314) Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents rivalry in the soft drink industry? A) Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases. B) Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store. C) Zevia Natural Diet Soda begins selling directly over the Internet. D) Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games.

315) Porter identified three generic strategies that a business could follow after identifying a market it wanted to enter. Which of the following is not included as one of Porter’s three generic strategies? A) broad differentiation B) supplier cost differentiation C) focused strategy D) broad cost leadership

316) When analyzing Porter’s three generic strategies for entering a market, if you have a focused strategy, what market should you target? A) a niche market B) a broad market C) neither niche nor broad markets D) both niche and broad markets

Version 1

93


317) Which of the following offers an example of a company operating in a narrow focused market as the low-cost provider? A) Walmart B) Tiffany & Co. C) Neiman Marcus D) Payless Shoes

318) Broad differentiation, broad cost leadership, and________ create the three generic strategies identified by Porter. A) narrow market leadership B) high cost versus low cost C) focused strategy D) None of the answer choices are correct.

319) Jennifer Bloom is writing a paper, and she must determine which of Porter’s three generic strategies The Museum Company has implemented. Jennifer finds out that The Museum Company offers specialty products found only in museums around the world to affluent customers. What would Jennifer determine The Museum Company is using as its generic strategy? A) broad market, low cost B) narrow market, high cost C) broad market, high cost D) narrow market, low cost

320) According to Porter, companies that wish to dominate broad markets should operate using a________ strategy.

Version 1

94


A) cost leadership with a low cost B) differentiation with a low cost C) cost leadership with a high cost D) All answer choices are correct.

321) Which of the following demonstrates a company that has implemented a low-cost, broad market strategy? A) Neiman Marcus B) Payless Shoes C) the Sharper Image D) Walmart

322)

If a business is following a focused strategy, then its competitive scope is A) broad market. B) narrow market. C) broad range products. D) broad range of services.

323) When applying Porter’s three generic strategies, Tiffany & Co. has a competitive scope and cost strategy that is A) broad market, high cost. B) narrow market, low cost. C) narrow market, high cost. D) broad market, low cost.

Version 1

95


324) When analyzing the book store industry, some of today’s businesses compete with different business strategies and cost strategies. Which of the following is using a broad market competitive scope along with a low-cost strategy? A) Amazon.com B) local independent bookstore specializing in antique books C) Barnes & Noble D) bookstore at the airport

325)

Which of the following is similar to a focused strategy versus a broad strategy? A) large market versus leadership B) large market versus uniqueness C) niche market versus large market D) niche market versus generic

326) Your boss, Penny Dirks, has asked you to analyze the airline industry using Porter’s three generic strategies. Which of the following companies are using a cost leadership strategy? A) Southwest, Horizon, Frontier, JetBlue B) British Airways, Singapore Airlines, Virgin Atlantic C) Sky Taxi, a rent-by-the-hour personal plane service D) All of the answers are correct.

327) Your boss, Penny Dirks, has asked you to analyze the airline industry using Porter’s three generic strategies. Which of the following companies are using a differentiation strategy?

Version 1

96


A) Southwest, Horizon, Frontier, JetBlue B) British Airways, Singapore Airlines, Virgin Atlantic C) Sky Taxi, a rent-by-the-hour personal plane service D) All of the answers are correct.

328) Your boss, Penny Dirks, has asked you to analyze the airline industry using Porter’s three generic strategies. Which of the following companies are using a focused strategy? A) Southwest, Horizon, Frontier, JetBlue B) British Airways, Singapore Airlines, Virgin Atlantic C) Sky Taxi, a rent-by-the-hour personal plane service D) All of the answers are correct.

329) A(n)________ allows primary activities to connect digitally to help speed up the transition from sales to manufacturing in an organization. A) SWOT analysis B) digital distribution platform C) management information system D) digital value chain

330) Baltzan bike manufacturing needed to decrease the amount of time it took to develop a customized bike. Many customers requested special parts to be assembled for the one-time creation for a bike. By connecting the sales systems to the manufacturing systems and adding 3D printing to its manufacturing process, it was able to cut down on the amount of time it took between sales and production. What type of technology is this called?

Version 1

97


A) digital value chain B) buyer power C) first-mover advantage D) SWOT analysis

331) When reviewing Porter’s value chain analysis, which of the following provides customer support after the sale of goods and services? A) inbound logistics B) outbound logistics C) operations D) service

332) Which of the following represents procurement as part of the support value activities in a value chain analysis? A) purchases inputs such as raw materials, resources, equipment and supplies B) applies MIS to processes to add value C) distributes goods and services to customers D) promotes, prices, and sells products to customers

333) What includes support value activities and primary value activities and is used to determine how to create the greatest possible value for customers? A) supplier power B) operations management C) Porter’s Five Forces Model D) value chain analysis

Version 1

98


334)

What is a standardized set of activities that accomplishes a specific task? A) business strategy B) business outcome C) business process D) knowledge process

335) Which of the following analyzes a company’s business processes and is useful for determining how to create the greatest possible value for customers? A) product analysis B) primary supplier power C) value chain analysis D) buyer chain analysis

336) The goal of value chain analysis is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a________ or________. A) focused strategy; product differentiation B) focused strategy; cost advantage C) cost advantage; primary value activities D) cost advantage; product differentiation

337)

What are the two main categories in a value chain analysis?

Version 1

99


A) primary value activities and secondary value activities B) primary value activities and support value activities C) primary value activities and strengthening value activities D) None of the answer choices are correct.

338) Which of the following is not considered a category within the primary value activities in a value chain analysis? A) inbound logistics B) firm infrastructure C) operations D) service

339) Which of the following is not considered a category within the support value activities in a value chain analysis? A) technology development B) outbound logistics C) human resource management D) firm infrastructure

340) What is the support value activity that provides employees with training, hiring, and compensation? A) procurement B) operations resource management C) human resource management D) firm infrastructure

Version 1

100


341) Sandy Fiero works as the chief knowledge officer for Bend Lumbar Company. She has been given the responsibility to create a product or service that will bring an added value to its customers to increase the company’s revenue. Sandy determines that the best value she can add is by creating a service that offers free next-day shipping on any order over $50. Where in the value chain is Sandy adding value? A) primary value activity outbound logistics B) primary value activity inbound logistics C) primary value activity marketing and sales D) primary value activity operations

342) When evaluating the value chain, all of the following are included in the primary value activities except A) inbound activities. B) operations. C) service. D) MIS development.

343) When evaluating the value chain, which of the following is included in the support value activities? A) inbound activities B) marketing and sales C) firm infrastructure D) finance and sales

344) Which of the following decisions does a firm need to make as soon as it has identified the activities from the value chain that are bringing the highest added value to their customers? Version 1

101


A) target high value-adding activities to further enhance their value B) target low value-adding activities to increase their value C) perform some combination of the two D) All of the answers are correct.

345) MIS can add value to both primary activities and support activities in the value chain. Which of the following is not an example of adding value by the use of MIS in a primary activity? A) creating an online system for employees to track paychecks, benefits, wellness program rewards, and other employee benefit items B) a system for the sales and marketing departments to track specific sales targets and follow-up processes C) an easy electronic survey, similar to the Survey Monkey, to be sent to the customer right after a service is completed D) using a custom order and delivery system through an easily accessible web portal for the customer to track delivery status

346) MIS can add value to both primary and support activities within a business. Which of the following is not an example of adding value by the use of MIS in a support activity? A) creating a business strategy for the video rental market that delivers videos via the mail B) creating a tracking system to efficiently reward employees based on their performance C) creating an online system for employees to track paychecks, benefits, wellness program rewards, and other employee benefit items D) creating a program to automatically order office supplies such as pens and pads of paper for employees

Version 1

102


347) Companies today are successful when they combine the power of the information age with traditional business methods. ⊚ ⊚

true false

348) Diagnostic analytics is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making. ⊚ ⊚

true false

349) Business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making. ⊚ ⊚

true false

350) The information age is a time infinite quantities of facts are widely available to anyone who can use a computer. ⊚ ⊚

true false

351) Top managers use bits to define the future of the business, analyzing markets, industries and economies to determine the strategic direction the company must follow to remain unprofitable. ⊚ ⊚

Version 1

true false

103


352) A variable is a business intelligence characteristic that stands for a value that cannot change over time. ⊚ ⊚

true false

353) A fact is the confirmation or validation of an event or object. In the past, people primarily learned facts from books. ⊚ ⊚

354)

Zappos primary business focus is to sell books and competitive intelligence. ⊚ ⊚

355)

true false

true false

Order date, amount sold, and customer number are all forms of data. ⊚ ⊚

true false

356) Choosing not to fire a sales representative who is underperforming while knowing that the representative is experiencing family problems is a form of knowledge. ⊚ ⊚

Version 1

true false

104


357) Information is data converted into a meaningful and useful context. The truth about information is that its value is only as good as the people who use it. People using the same information can make different decisions depending on how they interpret or analyze the information. ⊚ ⊚

true false

358) The Internet of Things (IoT) is a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention. ⊚ ⊚

359)

Machine-to-machine (M2M) refers to devices that connect directly to other devices. ⊚ ⊚

360)

true false

true false

The Internet of Things (IoT) refers to devices that connect directly to other devices. ⊚ ⊚

true false

361) Predictive analytics extracts information from data and uses it to predict future trends and identify behavioral patterns. ⊚ ⊚

true false

362) Predictive analytics is a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention. Version 1

105


⊚ ⊚

true false

363) Top managers use predictive analytics to define the future of the business, analyzing markets, industries, and economies to determine the strategic direction the company must follow to remain profitable. Tony will set the strategic direction for his firm, which might include introducing new flavors of potato chips or sports drinks as new product lines or schools and hospitals as new market segments. ⊚ ⊚

true false

364) A data analyst collects, queries, and consumers organizational data to uncover patterns and provide insights for strategic business decision making. ⊚ ⊚

true false

365) Knowledge workers are individuals valued for their ability to mitigate risk and implement critical human resource and accounting rules and regulations. ⊚ ⊚

true false

366) Using only data and information to make decisions and solve problems is the key to finding success in business. These are also the only core drivers of the information age and the building blocks of business systems. ⊚ ⊚

Version 1

true false

106


367) Big data is a collection of large complex datasets, which cannot be analyzed using traditional database methods and tools. ⊚ ⊚

368)

The four common characteristics of big data include variety, veracity, volume, velocity. ⊚ ⊚

369)

true false

true false

Variety in big data includes different forms of structured and unstructured data. ⊚ ⊚

true false

370) Veracity in big data includes the uncertainty of data, including biases, noise, and abnormalities. ⊚ ⊚

371)

true false

Volume in big data includes the scale of data. ⊚ ⊚

true false

372) Velocity in big data includes the analysis of streaming data as it travels around the Internet. ⊚ ⊚

Version 1

true false

107


373)

Velocity in big data includes different forms of structured and unstructured data. ⊚ ⊚

true false

374) Volume in big data includes the uncertainty of data, including biases, noise, and abnormalities. ⊚ ⊚

375)

Big data is a view of data at a moment in time. ⊚ ⊚

376)

true false

true false

A snapshot is a view of data at a particular moment in time. ⊚ ⊚

true false

377) A static report can include updating daily stock market prices or the calculation of available inventory. ⊚ ⊚

true false

378) A dynamic report can include updating daily stock market prices or the calculation of available inventory. Version 1

108


⊚ ⊚

true false

379) Business analytics is the scientific process of transforming data into insight for making better decisions. ⊚ ⊚

380)

true false

Descriptive analytics describes past performance and history. ⊚ ⊚

true false

381) Predictive analytics extracts information from data to predict future trends and identify behavioral patterns. ⊚ ⊚

true false

382) Prescriptive analytics creates models indicating the best decision to make or course of action to take. ⊚ ⊚

true false

383) Knowledge assets, also called intellectual capital, are the human, structural, and recorded resources available to the organization. ⊚ ⊚

Version 1

true false

109


384) Knowledge assets reside within the minds of members, customers, and colleagues and include physical structures and recorded media. ⊚ ⊚

385)

true false

Knowledge facilitators help harness the wealth of knowledge in the organization. ⊚ ⊚

true false

386) Descriptive analytics is the scientific process of transforming data into insight for making better decisions. ⊚ ⊚

387)

true false

Diagnostic analytics describes past performance and history. ⊚ ⊚

true false

388) Prescriptive analytics extracts information from data to predict future trends and identify behavioral patterns. ⊚ ⊚

Version 1

true false

110


389) Analytics, also called intellectual capital, are the human, structural, and recorded resources available to the organization. ⊚ ⊚

true false

390) Knowledge facilitators reside within the minds of members, customers, and colleagues and include physical structures and recorded media. ⊚ ⊚

true false

391) Structured data extracts information from data and uses it to predict future trends and identify behavioral patterns. ⊚ ⊚

true false

392) Unstructured data extracts information from data and uses it to predict future trends and identify behavioral patterns. ⊚ ⊚

true false

393) Structured data is data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address. ⊚ ⊚

true false

394) Unstructured data is data that is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages. Version 1

111


⊚ ⊚

true false

395) Unstructured data is data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address. ⊚ ⊚

true false

396) Structured data is data that is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages. ⊚ ⊚

true false

397) Unstructured data extracts information from data and uses it to predict future trends and identify behavioral patterns. ⊚ ⊚

398)

A business unit is a segment of a company representing a specific business function. ⊚ ⊚

399)

true false

true false

The terms department, functional area, and business unit are used interchangeably. ⊚ ⊚

Version 1

true false

112


400) Companies update business strategies continuously as internal and external environments change. ⊚ ⊚

401)

true false

The finance department performs the function of selling goods or services. ⊚ ⊚

true false

402) The marketing department supports sales by planning, pricing, and promoting goods or services. ⊚ ⊚

true false

403) The operations management department manages the process of converting or transforming resources into goods or services. ⊚ ⊚

404)

The accounting and finance departments primarily use monetary data. ⊚ ⊚

405)

true false

true false

The sales and marketing departments primarily use monetary data.

Version 1

113


⊚ ⊚

true false

406) A data silo occurs when one business unit is able to freely communicate with other business units from silo to silo. ⊚ ⊚

true false

407) A data silo occurs when one business unit is unable to freely communicate with other business units, making it difficult or impossible for organizations to work cross-functionally. ⊚ ⊚

true false

408) A data silo is beneficial because it helps keep all the data for a company organized in one place. ⊚ ⊚

true false

409) For an organization to succeed, every department or functional area must work independently to be most effective. ⊚ ⊚

true false

410) Successful companies today operate cross-functionally, integrating the operations of all departments. ⊚ ⊚ Version 1

true false 114


411) MIS is a tool that is most valuable when it leverages the talents of people who know how to use and manage it effectively. ⊚ ⊚

true false

412) The chief technology officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks from hackers and viruses. ⊚ ⊚

true false

413) The chief security officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks from hackers and viruses. ⊚ ⊚

true false

414) The chief data officer is responsible for ensuring the speed, accuracy, availability, and reliability for MIS. ⊚ ⊚

true false

415) The chief privacy officer is responsible for ensuring the ethical and legal use of information within a company. ⊚ ⊚

Version 1

true false

115


416) The business decisions made by the marketing department include promotional data, sales data, and advertising data. ⊚ ⊚

true false

417) The business decisions made by the human resources department include employee data, promotion data, and vacation data. ⊚ ⊚

true false

418) The business decisions made by the finance department include investment data, monetary data, and reporting data. ⊚ ⊚

true false

419) The business decisions made by the accounting department include transactional data, purchasing data, payroll data and tax data. ⊚ ⊚

true false

420) The business decisions made by the sales department include potential customer data, sales report data, commission data, and customer support data. ⊚ ⊚

Version 1

true false

116


421) The business decisions made by the operations management department include manufacturing data, distribution data, and production data. ⊚ ⊚

true false

422) The business decisions made by the finance department include promotion data, sales data, and advertising data. ⊚ ⊚

true false

423) The business decisions made by the accounting department include employee data, promotion data, and vacation data. ⊚ ⊚

true false

424) The business decisions made by the human resources department include investment data, monetary data, and reporting data. ⊚ ⊚

true false

425) The business decisions made by the marketing department include transactional data, purchasing data, payroll data and tax data. ⊚ ⊚

Version 1

true false

117


426) The business decisions made by the human resources department include potential customer data, sales report data, commission data, and customer support data. ⊚ ⊚

true false

427) The business decisions made by the accounting department include manufacturing data, distribution data, and production data. ⊚ ⊚

true false

428) The chief data officer is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives. ⊚ ⊚

true false

429) The chief knowledge officer is responsible for collecting, maintaining, and distributing company knowledge. ⊚ ⊚

true false

430) Most organizations maintain positions such as chief executive officer (CEO), chief financial officer (CFO), and chief operations officer (COO) at the strategic level. ⊚ ⊚

Version 1

true false

118


431) The chief knowledge officer is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives. ⊚ ⊚

true false

432) The chief knowledge officer is responsible for collecting, maintaining, and distributing company knowledge. ⊚ ⊚

true false

433) The chief data officer (CDO) is responsible for determining the types of information the enterprise will capture, retain, analyze, and share. ⊚ ⊚

true false

434) The chief data officer (CDO) is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization’s information technology. ⊚ ⊚

true false

435) The chief technology officer (CTO) is responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses. ⊚ ⊚

Version 1

true false

119


436) The chief privacy officer (CPO) is responsible for ensuring the ethical and legal use of information within an organization. ⊚ ⊚

true false

437) The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization’s knowledge. ⊚ ⊚

true false

438) The chief security officer (CSO) is responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses. ⊚ ⊚

true false

439) According to Fast Company magazine, a few executive levels you might see created over the next decade include chief intellectual property officer, chief automation officer, and chief user experience officer. ⊚ ⊚

true false

440) The difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies is called a data analyst certification. ⊚ ⊚

Version 1

true false

120


441) Most chief technology officers do not possess a well-rounded knowledge of all aspects of MIS, such as hardware, software, and telecommunications. ⊚ ⊚

true false

442) Many chief privacy officers (CPOs) are lawyers by training, enabling them to understand the often-complex legal issues surrounding the use of information. ⊚ ⊚

true false

443) MIS skills gap is the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies. ⊚ ⊚

true false

444) In many instances, an MIS job will remain unfilled for an extended period when an employer needs to hire someone who has a very specific set of skills. In recruiting lingo, such candidates are referred to as purple turtles. ⊚ ⊚

445)

true false

Goods are material items or products that customers will buy to satisfy a want or need. ⊚ ⊚

Version 1

true false

121


446) Waiting tables, teaching, and cutting hair are all examples of services that people pay for to fulfill their needs. ⊚ ⊚

447)

true false

An overview of systems thinking includes input, process, output, and finances. ⊚ ⊚

true false

448) A stakeholder is a person or group that has an interest or concern in an organization. Stakeholder’s drive business strategies, and depending on the stakeholder’s perspective, the business strategy can change. It is not uncommon to find stakeholder’s business strategies have conflicting interests such as investors looking to increase profits by eliminating employee jobs. ⊚ ⊚

449)

true false

Cars, groceries, and clothing are all examples of goods. ⊚ ⊚

true false

450) Production is the process by which a business takes raw materials and processes them or converts them into a finished product for its goods or services. ⊚ ⊚

Version 1

true false

122


451) Productivity is the rate at which goods and services are produced based upon total output given total inputs. ⊚ ⊚

true false

452) Lettuce, tomatoes, patty, bun, and ketchup are included in the output of making a hamburger. ⊚ ⊚

true false

453) Cooking a patty and putting the ingredients together are included in the process of making a hamburger. ⊚ ⊚

true false

454) Bread, cheese, and butter are included in the process of making a grilled cheese sandwich. ⊚ ⊚

455)

true false

A grilled cheese sandwich is considered the final output of a making-a-sandwich process. ⊚ ⊚

Version 1

true false

123


456) If a business could produce the same hamburger with less expensive inputs, it would probably see a decrease in profits. ⊚ ⊚

true false

457) If a business could produce more hamburgers with the same inputs, it would see a rise in productivity and possibly an increase in profits. ⊚ ⊚

458)

true false

A leadership plan that achieves a specific set of goals or objectives is a business strategy. ⊚ ⊚

true false

459) To combat business challenges, leaders communicate and execute business strategies; the word strategy comes from the Greek stratus for army and ago for leading. ⊚ ⊚

true false

460) Businesses rarely need to update business strategies as the business environment remains relatively stable. ⊚ ⊚

true false

461) Attracting new customers, decreasing costs, and entering new markets are all examples of successful business strategies.

Version 1

124


⊚ ⊚

true false

462) Decreasing customer loyalty, increasing costs, and decreasing sales are all examples of business strategies. ⊚ ⊚

true false

463) A first-mover advantage is the process of gathering information about the competitive environment, including competitors’ plans, activities, and products, to improve a company’s ability to succeed. ⊚ ⊚

true false

464) FedEx created a first-mover advantage by developing its customer self-service software, which allows people to request parcel pickups, print mailing slips, and track parcels online. ⊚ ⊚

true false

465) A SWOT analysis will evaluate potential internal strengths, internal weaknesses, and external opportunities. ⊚ ⊚

true false

466) A SWOT analysis evaluates an organization’s strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies.

Version 1

125


⊚ ⊚

true false

467) A SWOT analysis evaluates an organization’s strengths, weaknesses, objectives, and threats. ⊚ ⊚

true false

468) A SWOT analysis evaluates an organization’s strengths, worries, opportunities, and technologies to identify significant influences that work for or against business strategies. ⊚ ⊚

true false

469) In a SWOT analysis, strengths and weaknesses originate inside an organization, or internally. Opportunities and threats originate outside an organization, or externally, and cannot always be anticipated or controlled. ⊚ ⊚

true false

470) In a SWOT analysis, potential internal strengths are helpful when they identify all key strengths associated with the competitive advantage, including cost advantages, new and/or innovative services, special expertise and/or experience, proven market leader, improved marketing campaigns, and so on. ⊚ ⊚

Version 1

true false

126


471) In a SWOT analysis, potential internal weaknesses are harmful when they identify all key areas that require improvement. Weaknesses focus on the absence of certain strengths, including absence of an Internet marketing plan, damaged reputation, problem areas for service, outdated technology, employee issues, and so on. ⊚ ⊚

true false

472) In a SWOT analysis, potential external opportunities are helpful when they identify all significant trends along with how the organization can benefit from each, including new markets, additional customer groups, legal changes, innovative technologies, population changes, competitor issues, and so on. ⊚ ⊚

true false

473) In a SWOT analysis, potential external threats are harmful when they identify all threats or risks detrimental to your organization, including new market entrants, substitute products, employee turnover, differentiating products, shrinking markets, adverse changes in regulations, economic shifts, and so on. ⊚ ⊚

true false

474) Competitive advantages provide the same product or service either at a lower price or with additional value that can fetch premium prices. ⊚ ⊚

true false

475) Mark Peterson identified Porter’s Five Forces Model, which analyzes the competitive forces within a business environment.

Version 1

127


⊚ ⊚

476)

true false

Porter’s Five Forces Model outlines the process for a sales strategy. ⊚ ⊚

true false

477) With the Five Forces Model, companies should watch the forces in the market. If the forces are strong, competition generally increases, and if the forces are weak, competition typically decreases. ⊚ ⊚

true false

478) There are many challenges to changing doctors, including transferring medical records and losing the doctor-patient relationship along with the doctor’s knowledge of the patient’s history. Changing doctors provides a great example of switching costs. ⊚ ⊚

true false

479) Supplier power is one of Porter’s five forces, and it measures the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services). ⊚ ⊚

true false

480) Polaroid had a unique competitive advantage for many years until it forgot to observe competitive intelligence. The firm went bankrupt when people began taking digital pictures. Polaroid provides a great example of Porter’s supplier power.

Version 1

128


⊚ ⊚

true false

481) Product differentiation occurs when a company develops unique differences in its products or services with the intent to influence demand. ⊚ ⊚

482)

true false

Buyer power is the ability of buyers to affect the price they must pay for an item. ⊚ ⊚

true false

483) Rivalry among existing competitors refers to the ability of buyers to affect the price they must pay for an item. ⊚ ⊚

true false

484) The threat of substitute products or services refers to the power of customers to purchase alternatives. ⊚ ⊚

true false

485) The threat of substitute products or services refers to the power of competitors to enter a new market. ⊚ ⊚

Version 1

true false

129


486) Tiffany & Company competes in the marketplace by offering high-cost, custom jewelry. Tiffany & Company is following a broad market and cost leadership strategy. ⊚ ⊚

true false

487) Porter has identified three generic business strategies, including focused, broad cost leadership, and switching strategy. ⊚ ⊚

true false

488) According to Porter’s three generic strategies, Walmart is following a business strategy that focuses on broad market and low cost. ⊚ ⊚

489)

According to Porter, it is recommended to adopt only one of the three generic strategies. ⊚ ⊚

490)

true false

true false

Buyer power is included as one of Porter’s three generic strategies. ⊚ ⊚

Version 1

true false

130


491) Value chain analysis views a firm as a series of business processes that each adds value to the product or service. ⊚ ⊚

true false

492) A standardized set of activities that accomplish a specific task is called a supply chain component. ⊚ ⊚

true false

493) The value chain will group a company’s activities into two categories: primary value activities and support value activities. ⊚ ⊚

true false

494) A digital value chain digitizes work across primary and supporting activities. It allows primary activities to connect digitally to help speed up the transition from sales to manufacturing in an organization. ⊚ ⊚

495)

true false

A digital data silo digitizes work across primary and supporting activities. ⊚ ⊚

true false

496) A business process is a standardized set of activities that accomplish a specific task, such as processing a customer’s order. Version 1

131


⊚ ⊚

true false

497) A primary value activity is a standardized set of activities that accomplish a specific task, such as processing a customer’s order. ⊚ ⊚

498)

Inbound logistics and operations are part of the primary value activities. ⊚ ⊚

499)

true false

true false

Inbound logistics and operations are part of the support value activities. ⊚ ⊚

true false

500) Firm infrastructure and human resource management are part of the primary value activities. ⊚ ⊚

true false

501) Firm infrastructure and human resource management are part of the support value activities. ⊚ ⊚

Version 1

true false

132


Version 1

133


Answer Key Test name: Chap 01_8e_Baltzan 11) C 12) D 13) D 14) D 15) A 16) A 17) B 18) D 19) A 20) C 21) A 22) B 23) C 24) D 25) C 26) A 27) A 28) C 29) D 30) D 31) D 32) D 33) D 34) A 35) B 36) A Version 1

134


37) D 38) B 39) B 40) A 41) C 42) B 43) A 44) C 45) B 46) D 47) A 48) D 49) D 50) A 51) B 52) D 53) C 54) A 55) B 56) A 57) C 58) D 59) A 60) A 61) A 62) B 63) B 64) B 65) A 66) B Version 1

135


67) A 68) D 69) C 70) D 71) B 72) B 73) D 74) D 75) C 76) C 77) B 78) C 79) A 80) A 81) B 82) A 83) B 84) A 85) D 86) B 87) A 88) A 89) A 90) A 91) B 92) C 93) D 94) A 95) B 96) C Version 1

136


97) D 98) A 99) A 100) A 101) A 102) A 103) B 104) B 105) D 106) A 107) B 108) A 109) B 110) D 111) D 112) B 113) C 114) D 115) A 116) B 117) C 118) D 119) D 120) B 121) A 122) B 123) C 124) D 125) A 126) A Version 1

137


127) C 128) D 129) A 130) D 131) D 132) A 133) C 134) A 135) B 136) C 137) D 138) B 139) B 140) C 141) A 142) C 143) B 144) C 145) C 146) A 147) C 148) B 149) D 150) A 151) C 152) A 153) D 154) B 155) C 156) A Version 1

138


157) B 158) D 159) A 160) B 161) C 162) B 163) B 164) B 165) C 166) D 167) D 168) B 169) A 170) C 171) A 172) B 173) A 174) A 175) D 176) A 177) D 178) B 179) C 180) A 181) C 182) B 183) D 184) A 185) D 186) B Version 1

139


187) D 188) D 189) A 190) B 191) C 192) D 193) A 194) B 195) C 196) D 197) A 198) B 199) D 200) D 201) A 202) C 203) A 204) D 205) A 206) B 207) C 208) B 209) B 210) B 211) C 212) C 213) A 214) A 215) A 216) C Version 1

140


217) D 218) B 219) A 220) B 221) D 222) C 223) A 224) B 225) D 226) C 227) D 228) D 229) A 230) A 231) C 232) D 233) D 234) C 235) C 236) A 237) A 238) D 239) B 240) D 241) A 242) C 243) A 244) A 245) A 246) B Version 1

141


247) B 248) C 249) C 250) D 251) D 252) C 253) A 254) B 255) C 256) D 257) B 258) A 259) C 260) B 261) A 262) B 263) A 264) B 265) C 266) D 267) A 268) B 269) C 270) D 271) B 272) A 273) B 274) A 275) B 276) C Version 1

142


277) C 278) D 279) C 280) A 281) A 282) D 283) B 284) A 285) B 286) D 287) C 288) A 289) C 290) D 291) C 292) A 293) D 294) B 295) C 296) A 297) B 298) A 299) A 300) B 301) C 302) A 303) B 304) C 305) A 306) B Version 1

143


307) C 308) D 309) A 310) B 311) D 312) C 313) D 314) D 315) B 316) A 317) D 318) C 319) B 320) A 321) D 322) B 323) C 324) A 325) C 326) A 327) B 328) C 329) D 330) A 331) D 332) A 333) D 334) C 335) C 336) D Version 1

144


337) B 338) B 339) B 340) C 341) A 342) D 343) C 344) D 345) A 346) A 347) TRUE 348) FALSE 349) TRUE 350) TRUE 351) FALSE 352) FALSE 353) TRUE 354) FALSE 355) TRUE 356) TRUE 357) TRUE 358) TRUE 359) TRUE 360) FALSE 361) TRUE 362) FALSE 363) TRUE 364) TRUE 365) FALSE 366) FALSE Version 1

145


367) TRUE 368) TRUE 369) TRUE 370) TRUE 371) TRUE 372) TRUE 373) FALSE 374) FALSE 375) FALSE 376) TRUE 377) FALSE 378) TRUE 379) TRUE 380) TRUE 381) TRUE 382) TRUE 383) TRUE 384) TRUE 385) TRUE 386) FALSE 387) FALSE 388) FALSE 389) FALSE 390) FALSE 391) FALSE 392) FALSE 393) TRUE 394) TRUE 395) FALSE 396) FALSE Version 1

146


397) FALSE 398) TRUE 399) TRUE 400) TRUE 401) FALSE 402) TRUE 403) TRUE 404) TRUE 405) FALSE 406) FALSE 407) TRUE 408) FALSE 409) FALSE 410) TRUE 411) TRUE 412) FALSE 413) TRUE 414) FALSE 415) TRUE 416) TRUE 417) TRUE 418) TRUE 419) TRUE 420) TRUE 421) TRUE 422) FALSE 423) FALSE 424) FALSE 425) FALSE 426) FALSE Version 1

147


427) FALSE 428) FALSE 429) TRUE 430) TRUE 431) FALSE 432) TRUE 433) TRUE 434) FALSE 435) FALSE 436) TRUE 437) FALSE 438) TRUE 439) TRUE 440) FALSE 441) FALSE 442) TRUE 443) TRUE 444) FALSE 445) TRUE 446) TRUE 447) FALSE 448) TRUE 449) TRUE 450) TRUE 451) TRUE 452) FALSE 453) TRUE 454) TRUE 455) TRUE 456) FALSE Version 1

148


457) TRUE 458) TRUE 459) TRUE 460) FALSE 461) TRUE 462) FALSE 463) FALSE 464) TRUE 465) TRUE 466) TRUE 467) FALSE 468) FALSE 469) TRUE 470) TRUE 471) TRUE 472) TRUE 473) TRUE 474) TRUE 475) FALSE 476) FALSE 477) TRUE 478) TRUE 479) TRUE 480) FALSE 481) TRUE 482) TRUE 483) FALSE 484) TRUE 485) FALSE 486) FALSE Version 1

149


487) FALSE 488) TRUE 489) TRUE 490) FALSE 491) TRUE 492) FALSE 493) TRUE 494) TRUE 495) FALSE 496) TRUE 497) FALSE 498) TRUE 499) FALSE 500) FALSE 501) TRUE

Version 1

150


CHAPTER 2 1) Explain the importance of decision making for managers at each of the three primary organization levels along with the associated decision characteristics.

2) Define critical success factors (CSFs) and key performance indicators (KPIs) and explain how managers use them to measure the success of MIS projects.

3) Classify the different operational support systems, managerial support systems, and strategic support systems, and explain how managers can use these systems to make decisions and gain competitive advantages.

4) Define bias and provide two examples of personal bias. Bias is a disproportionate weight in favor of or against an idea or thing, usually in a way that is closed-minded, prejudicial, or unfair. [Student may choose two of the four personal biases identified in his chapter]

Version 1

1


5) Explain the value of business processes for a company, and differentiate between customer-facing and business-facing processes.

6) Demonstrate the value of business process modeling, and compare As-Is and To-Be models.

7)

Differentiate among business process improvements, streamlining, and reengineering.

8)

Which of the following is NOT a type of organizational information system?

Version 1

2


A) executive information system B) decisions support system C) analysis processing system D) transactional processing system

9)

Which of the following is an important challenge facing managers today? A) making business decisions B) solving business problems C) competing to win in today’s market D) All of the answers are correct.

10) Imagine an important customer shows up at a hotel that is fully booked, and the reservation is missing. The manager must decide how to respond to the customer. At which level would this decision be made? A) operational level B) structured level C) strategic level D) analysis level

11)

Which of the following is not a step in the six-step decision-making process? A) data collection B) employee decisions C) solution generation D) solution test

Version 1

3


12) When evaluating the six-step decision-making process, what occurs during the solution implementation step? A) the process will begin again if the decisions made were incorrect B) defining the problem as clearly and precisely as possible C) identifying details of every solution possible, including ideas that seem far-fetched D) selecting the question that best solves the problem

13)

Which of the following is a step in the six-step decision-making process? A) employee engagement B) data collection C) detail collection D) data-driven decision management

14)

Which of the following represents the structure of a typical organization? A) flat line B) pyramid C) circle D) cube

15) Which of the following represents the three different levels of a company pyramid from the top to the bottom?

Version 1

4


A) managerial—strategic—operational B) strategic—managerial—operational C) operational—managerial—strategic D) strategic—operational—managerial

16) Which of the following would you include as decisions and responsibilities typically found at the managerial level of a company? A) monthly plans B) monthly budgets C) monthly staffing D) All of the answers are correct.

17) Data collection, solution generation, and solution implementation are all concepts associated which of the following processes? A) the three-step problem identification process B) the six-step decision-making process C) the four-step problem-solving process D) the four-step decision-making process

18) Review the following key terms. Which one defines an operational decision that involves situations where established processes offer potential solutions? A) optimization analysis decision B) artificial intelligence decision C) structured decision D) unstructured decision

Version 1

5


19)

Which of the following is considered a structured decision or strategic decision? A) reordering inventory B) deciding to enter a new market C) creating the employee weekly staffing schedule D) creating the employee weekly production schedule

20)

Which of the following is considered an operational decision or structured decision? A) determining how many employees are out sick B) determining the impact of last month’s marketing campaign C) allocating resources to a department for a new system D) monitoring performance of a project team over the last six months

21)

Which of the following is considered a managerial decision or semistructured decision? A) determining how many employees are out sick B) determining the impact of last month’s marketing campaign C) determining which employee makes the least amount of errors per day D) tracking how much inventory is in the warehouse

22) Which of the following key terms represents the types of decisions made at the operational, managerial, and strategic levels of a company?

Version 1

6


A) structured decisions B) unstructured decisions C) semistructured decisions D) All of the answers are correct.

23) At which level do managers develop the overall business strategies and monitor the performance of the organization and the competitive business environment? A) operational level B) strategic level C) managerial level D) All of the answers are correct.

24) Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Jenny? A) managerial level B) operational level C) strategic level D) All of the answers are correct.

25) Andy Benton works at the local Starbucks coffee shop, and his responsibilities include taking orders, fulfilling orders, and ringing in sales. At what level of the organizational pyramid would you categorize Andy?

Version 1

7


A) strategic level B) owner level C) operational level D) managerial level

26) Bill Schultz works at a high-powered investment firm in Los Angeles. Bill is responsible for promoting the firm’s vision and creating the companywide goals and strategies. He also monitors the overall strategic performance of the company and its direction for future business strategies. At what level of the organizational pyramid would you categorize Bill? A) strategic level B) owner level C) operational level D) managerial level

27) Chuck Biggs has been hired to oversee all of the plans that the city of Denver has created to expand its train transportation system by adding six more lines in the metropolitan area. Chuck will be responsible for planning the project, managing the processes, and finalizing each new line as it is completed. How would you categorize the majority of the decisions Chuck will have to make to complete his job? A) unstructured decisions B) semistructured decisions C) structured decisions D) key performance indicators

28) What occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision?

Version 1

8


A) key performance indicators B) structured decisions C) critical success factors D) semistructured decisions

29) What occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice? A) key performance indicators B) structured decisions C) unstructured decisions D) semistructured decisions

30)

What arises in situations where established processes offer potential solutions? A) analytics B) structured decisions C) unstructured decisions D) key performance indicators

31) The structure of an organization is similar to a pyramid. The different levels require different types of information to assist with which of the following? A) decision making B) problem solving C) opportunity capturing D) All of the answers are correct.

Version 1

9


32)

At which level will a manager use analytics to make decisions? A) operational level B) managerial level C) strategic level D) All of the answers are correct.

33) At which level of an organization do employees develop, control, and maintain core business activities required to run the day-to-day operations? A) operational level B) managerial level C) strategic level D) All of the answers are correct.

34) At which level of an organization are employees continuously evaluating company operations to hone the firm’s abilities to identify, adapt to, and leverage change? A) operational level B) managerial level C) strategic level D) All of the answers are correct.

35) At which level of an organization do managers develop overall business strategies, goals, and objectives as part of the company’s strategic plan?

Version 1

10


A) operational level B) managerial level C) strategic level D) All of the answers are correct.

36) Lower management, department managers, analysts, and staff are all employees at the ________ level. A) operational level B) managerial level C) strategic level D) All of the answers are correct.

37)

Middle management, managers, and directors are all employees at the ________ level. A) operational level B) managerial level C) strategic level D) All of the answers are correct.

38) Senior management, presidents, leaders, and executives are all employees at the ________ level. A) operational level B) managerial level C) strategic level D) All of the answers are correct.

Version 1

11


39)

What is the typical timeframe for decisions at the operational level? A) day-to-day decisions B) monthly decisions C) yearly decisions D) All of the answers are correct.

40)

What is the typical timeframe for decisions at the managerial level? A) day-to-day decisions B) monthly decisions C) yearly decisions D) All of the answers are correct.

41)

What is the typical time frame for decisions at the strategic level? A) day-to-day B) monthly C) yearly D) All of the answers are correct.

42) What are measurements that evaluate results to determine whether a project is meeting its goals?

Version 1

12


A) models B) metrics C) benchmarks D) genetic algorithms

43) What are the crucial steps companies perform to achieve their goals and objectives and implement their strategies? A) critical success factors B) crucial success factors C) key performance indicators D) key performance factors

44)

Which of the following is an example of a critical success factor? A) increase customer satisfaction B) number of new customers C) number of new products D) percentage of employee turnover

45)

Which of the following statements is accurate? A) key performance indicators can have no more than four critical success factors B) critical success factors can have no more than four key performance indicators C) key performance indicators can have several critical success factors D) critical success factors can have several key performance indicators

Version 1

13


46) Key performance indicators are the metrics a company uses to evaluate progress toward critical success factors. Which of the following represents a key performance indicator? A) create high-quality products B) reduce product costs C) percentage of help-desk calls answered in the first minute D) hire the best business professionals

47) Critical success factors (CSFs) and key performance indicators (KPIs) are the two core metrics used within a business to track progress or success. What is the relationship between CSFs and KPIs? A) CSFs are business strategy elements, whereas KPIs measure the progress of the CSFs. B) CSFs build the business environment, whereas KPIs explain how to build the CSFs. C) KPIs are used first, and CSFs are applied later. D) KPIs promote employees on their performance, whereas CSFs demote employees based on their performance.

48) Market share measures a firm’s external performance relative to that of its competitors. Which of the following represents how a firm measures market share? A) multiplying the firm’s sales by the industries total sales B) dividing the firm’s sales by the total market sales for the entire industry C) subtracting competitor’s sales from the firm’s total sales D) subtracting the industry’s total sales from the firm’s total sales

49) Anne-Marie Cole runs the sales division for a local auto insurance firm. One of her key duties is to calculate her company’s market share. When evaluating the prior-year numbers, she found that her firm achieved total sales of $3 million and the entire industry had $30 million in sales. What is the current market share of Anne-Marie’s company?

Version 1

14


A) 1 percent B) 10 percent C) 18 percent D) 20 percent

50) Anne-Marie Cole runs the sales division for a local auto insurance firm. One of her key duties is to ensure the company has 10 percent market share by the end of the year. When evaluating the current sales numbers, she determines that her sales division has total sales of $3 million and the entire industry has total sales of $50 million. What additional sales must AnneMarie’s division meet to ensure they have 10 percent of the market by the end of the year? A) $1 million B) $2 million C) $5 million D) $10 million

51) Which of the following represents an internal key performance indicator that shows the earning power of a project? A) market share B) return on intelligence C) sensitivity analysis D) return on investment

52)

What could a manager use to measure the success of an MIS project?

Version 1

15


A) effectiveness MIS metrics, efficiency MIS metrics B) effectiveness MIS metrics, expert MIS metrics C) expert MIS metrics, executive MIS metrics D) All of the answers are correct.

53)

What type of metrics measure throughput, transaction speed, and system availability? A) efficiency MIS metrics B) effectiveness MIS metrics C) ROI D) benchmarks

54)

What types of metrics measure customer satisfaction? A) efficiency MIS metrics B) effectiveness MIS metrics C) both efficiency and effectiveness MIS metrics D) both ROI and market share

55)

According to Peter Drucker, what are managers who do things right addressing? A) efficiency B) effectiveness C) both efficiency and effectiveness D) customer satisfaction only

56)

According to Peter Drucker, what are managers who do the right things addressing?

Version 1

16


A) efficiency B) effectiveness C) both efficiency and effectiveness D) customer satisfaction only

57)

Which of the following is a type of effectiveness MIS metric? A) transaction speed B) system availability C) usability D) throughput

58)

Which of the following is a type of efficiency MIS metric? A) customer satisfaction B) conversion rates C) financial transactions D) web traffic

59) Which term is used to describe the ease with which people perform transactions and/or find information? A) usability B) customer satisfaction C) financial D) conversion rates

Version 1

17


60) What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer? A) usability B) customer satisfaction C) financial D) conversion rates

61)

What would a company like eBay or Amazon be constantly benchmarking? A) financial metrics B) MIS input, process, output C) MIS efficiency and MIS effectiveness D) All of the answers are correct.

62) When considering the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate? A) upper right-hand corner B) lower right-hand corner C) upper left-hand corner D) lower left-hand corner

63)

Which of the following would efficiency MIS metrics measure? A) response time B) system availability C) transaction speed D) All of the answers are correct.

Version 1

18


64) Drew Savage is an MIS manager for an international consulting firm. Drew travels to different European countries where he implements news response tracking systems. Some of the metrics he uses to track the performance of his system include tracking the response time it takes to respond to Twitter posts mentioning the news station, as well as the speed and accuracy of content posted on numerous websites and social media sites. What type of metrics is Drew using to measure his system? A) customer satisfaction metrics B) efficiency metrics C) effectiveness metrics D) benchmarking metrics

65) Efficiency MIS metrics focus on the extent to which a firm is using its resources in an optimal way, whereas effectiveness MIS metrics focus on A) understanding how successful a firm is at achieving its goals and objectives. B) analyzing if a firm is doing the right things. C) setting the right goals and ensuring they are accomplished. D) All of the answers are correct.

66)

Which of the following describes the efficiency MIS metric of throughput? A) the number of hours a system is available for users B) the time it takes to respond to user interactions such as a mouse click C) the amount of information that can travel through a system at any point in time D) the ease with which people perform transactions and/or find information

67) Which of the following tracks the number of customers an organization “touches” for the first time and persuades to purchase its products or services? Version 1

19


A) customer satisfaction B) usability C) conversion rates D) financial

68)

What do usability effectiveness MIS metrics measure?

A) the ease with which people perform transactions and find information B) the number of customers an organization “touches” for the first time and persuades to purchase its products or services C) the amount of time a system takes to perform a transaction D) the number of hours a system is available for users

69) A common mistake that many managers make is focusing on only one type of metrics because they are easier to measure. Which type of metrics do they focus on? A) effectiveness MIS metrics B) efficiency MIS metrics C) endurance MIS metrics D) product sales metrics

70) When analyzing the interrelationships between efficiency and effectiveness, where would a company ideally want to operate? A) with high efficiency B) in the upper right-hand corner of the interrelationship graph C) with high effectiveness D) All of the answers are correct.

Version 1

20


71) What is the process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance? A) benchmarking B) bottlenecking C) consolidation D) All of the answers are correct.

72)

Which of the following is not included as part of a benchmark?

A) benchmarks help assess how an MIS project performs over time B) when measured against MIS projects, benchmarks can provide feedback so managers can control the system C) benchmarks help to establish baseline values the system seeks to attain D) All of the answers are correct.

73) As a manager for your company, some of your responsibilities include measuring metrics and overseeing company strategies. You observe some critical success factors and see large increases in productivity. What would you suspect would be the primary reason for the large increases in productivity? A) decreases in effectiveness B) increases in effectiveness C) increases in executive roles D) decreases in efficiency

74) What are the most successful solutions or problem-solving methods that have been developed by a specific organization or industry? Version 1

21


A) return on investment B) metrics C) best practices D) key performance indicators

75)

What indicates the earning power of a project? A) return on investment B) metrics C) best practices D) key performance indicators

76) What are measurements that evaluate results to determine whether a project is meeting its goals? A) return on investment B) metrics C) best practices D) key performance indicators

77) What are the crucial steps companies perform to achieve their goals and objectives and implement their strategies? A) return on investment B) critical success factors C) best practices D) key performance indicators

Version 1

22


78) What are the quantifiable metrics a company uses to evaluate progress toward critical success factors? A) return on investment B) critical success factors C) key performance indicators D) return on performance

79) What type of decision is the following: How many employees do we need to staff for Memorial Day? A) operational decision B) managerial decision C) strategic decision D) All of the answers are correct.

80) What type of decision is the following: What was the impact of last month’s loyalty 10 percent discount on all grocery sales? A) operational decision B) managerial decision C) strategic decision D) All of the answers are correct.

81) What type of decision is the following: What was the difference between forecasted sales and actual sales last year?

Version 1

23


A) operational decision B) managerial decision C) strategic decision D) All of the answers are correct.

82)

What type of decision is the following: How will new data laws impact the business? A) operational decision B) managerial decision C) strategic decision D) All of the answers are correct.

83) What type of decision is the following: Which employee should we let go home since business is slow? A) operational decision B) managerial decision C) strategic decision D) All of the answers are correct.

84) What type of decision is the following: How many temporary employees do we need to hire for the holiday season? A) operational decision B) government decision C) strategic decision D) All of the answers are correct.

Version 1

24


85) What type of decision is the following: What is the best route for dropping off products customers ordered in your neighborhood? A) efficiency decision B) effectiveness decision C) AI decision D) All of the answers are correct.

86)

What type of decision is the following: Did we meet sales quotas? A) efficiency decision B) effectiveness decision C) AI decision D) All of the answers are correct.

87) What type of decision is the following: Should we reduce costs by buying lower-quality ingredients? A) efficiency decision B) KPI metric decision C) AI decision D) All of the answers are correct.

88)

What type of decision is the following: What was the turnover rate for employees?

Version 1

25


A) efficiency decision B) effectiveness decision C) AI decision D) All of the answers are correct.

89)

What is a time-series chart?

A) a type of graph in which a circle is divided into sectors that each represents a proportion of the whole B) a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent C) a chart that is a graphical representation showing change of a variable over time D) All of the answers are correct.

90)

What is an infographic?

A) a representation of information in a graphic format designed to make the data easily understandable at a glance B) a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent C) a chart that is a graphical representation showing change of a variable over time D) All of the answers are correct.

91) Which of the following represent the top-down (executives to analysts) organizational levels of information technology systems?

Version 1

26


A) TPS, DSS, EIS B) DSS, TPS, EIS C) EIS, DSS, TPS D) All of the answers are correct.

92)

What can a model accomplish? A) calculate risks B) understand uncertainty C) manipulate time D) All of the answers are correct.

93)

What compiles information from multiple sources and tailors it to meet user needs? A) algorithm B) digitization C) deep learning D) digital dashboard

94) What captures transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information? A) online transaction processing B) online analytical processing C) transaction processing system D) decision support system

Version 1

27


95) What is the basic business system that serves the operational level and assists in making structured decisions? A) online transaction processing B) online analytical processing C) transaction processing system D) decision support system

96) What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis or semistructured decisions? A) online transaction processing B) online analytical processing C) analytical information D) transactional information

97) What encompasses all the information contained within a single business process or unit of work and its primary purpose is to support the performance of daily operational or structured decisions? A) online transaction processing B) online analytical processing C) analytical information D) transactional information

98) What is the manipulation of information to create business intelligence in support of strategic decision making?

Version 1

28


A) online transaction processing B) online analytical processing C) transaction processing system D) decision support system

99) What models information and provides assistance in evaluating and choosing among different courses of action? A) online transaction processing B) online analytical processing C) transaction processing system D) decision support system

100)

What refers to the level of detail in the model or the decision-making process? A) granularity B) visualization C) digital dashboard D) All of the answers are correct.

101) What produces graphical displays of patterns and complex relationships in large amounts of data? A) granularity B) visualization C) digital dashboard D) All of the answers are correct.

Version 1

29


102) What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs? A) granularity B) visualization C) digital dashboard D) All of the answers are correct.

103) What is a representation of information in a graphic format designed to make the data easily understandable at a glance? A) infographic B) pie chart C) bar chart D) histogram

104) What is a type of graph in which a circle is divided into sectors that each represents a proportion of the whole? A) infographic B) pie chart C) bar chart D) histogram

105) What is a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent?

Version 1

30


A) infographic B) pie chart C) bar chart D) histogram

106) What is a graphical display of data using bars of different heights that groups numbers into ranges? A) infographic B) pie chart C) bar chart D) histogram

107)

What is a small embedded line graph that illustrates a single trend? A) bar chart B) histogram C) time-series chart D) sparkline

108)

What is a graphical representation showing the change of a variable over time? A) bar chart B) histogram C) time-series chart D) sparkline

Version 1

31


109)

What is a pie chart?

A) a type of graph in which a circle is divided into sectors that each represents a proportion of the whole B) a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent C) a graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram groups numbers into ranges. D) a small embedded line graph that illustrates a single trend

110)

What is a bar chart?

A) a type of graph in which a circle is divided into sectors that each represents a proportion of the whole B) a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent C) a graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram groups numbers into ranges. D) a small embedded line graph that illustrates a single trend

111)

What is a histogram?

A) a type of graph in which a circle is divided into sectors that each represents a proportion of the whole B) a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent C) a graphical display of data using bars of different heights that groups numbers into ranges D) a small embedded line graph that illustrates a single trend

112)

What is a sparkline?

Version 1

32


A) a type of graph in which a circle is divided into sectors that each represents a proportion of the whole B) a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent C) a graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram groups numbers into ranges. D) a small embedded line graph that illustrates a single trend

113)

Which of the following is correct in terms of granularity? A) refers to the level of detail in the model B) the greater the granularity, the deeper the level of detail of the data C) the greater the granularity, the deeper the level of fineness of the data D) All of the answers are correct.

114)

Which of the following is a potential feature of a digital dashboard? A) a hot list of key performance indicators refreshed every 15 minutes B) a running line graph of planned versus actual production for the past 24 hours C) a graph of stock market prices D) All of the answers are correct.

115)

What is a simplified representation or abstraction of reality? A) model B) metric C) redundancy D) All of the answers are correct.

Version 1

33


116)

What can a manager use a model to do? A) calculate risk B) change variables C) understand uncertainty D) All of the answers are correct.

117)

What would managers use to make structured decisions at the operational level? A) transactional information B) analytical information C) executive information system D) neural network

118)

Which of the following would create transactional information? A) projecting future sales growth B) making an airline reservation C) hiring part-time employees for the holiday season D) generating payroll reports

119) What are the three primary types of management information systems available to support decision making across the company levels?

Version 1

34


A) transaction processing systems, decision support systems, executive information systems B) analytical information, decision support systems, executive information systems C) transaction processing systems, drill-down systems, expert systems D) what-if analysis, sensitivity analysis, goal-seeking analysis

120) A transaction processing system (TPS) is the basic business system that assists operational level analysts when making structured decisions. Which of the following is not an example of a TPS? A) Target’s internal payroll system B) Comfort Dental’s patient diagnosis system C) First Bank’s ATM D) Stewart Sport’s order-entry system

121) What is the management information system that manipulates information to create business intelligence in support of strategic decision making? A) online transaction processing B) online analytical processing C) digital dashboard D) visualization

122) When viewing systems thinking, source documents are the original transaction records. What would the source documents for a medical doctor’s payroll system include?

Version 1

35


A) employee time sheets B) employee benefit reports C) employee wage rates D) All of the answers are correct.

123) Online transaction processing (OLTP) and online analytical processing (OLAP) are similar MIS strategies used to help with business decision making. What is the primary difference between OLTP and OLAP? A) OLTP is used at the operational level; OLAP is used at the managerial level B) OLTP is used to capture transactional and event data; OLAP is used to manipulate information C) OLTP is used to support structured decisions; OLAP is used to support semistructured decisions D) All of the answers are correct.

124) Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and complexity of the business. What is a specialized decision support system that supports senior-level executives and unstructured decisions requiring judgment, evaluation, and insight? A) online transaction processing B) executive information system C) transaction support system D) decision support system

125) Executives of a company deal less with details of the operational activities and more with the higher, meaningful aggregations of information or “coarser” information. What refers to the level of detail in the model?

Version 1

36


A) digital dashboard B) visualization C) granularity D) consolidation

126) How does a decision support system typically differ from an executive information system? A) an executive information system requires data from external sources to support unstructured decisions, whereas a decision support system typically uses internal sources to support semistructured decisions B) a decision support system typically uses external sources, and an executive information system uses internal sources to support decisions C) a decision support system never uses external sources D) an executive information system always uses internal sources to support structured decisions

127) What is a graphical display of patterns and complex relationships in large amounts of data? A) visualization B) model C) table D) digital dashboard

128)

What is a category of AI that attempts to emulate the way the human brain works?

Version 1

37


A) intelligent agent B) artificial intelligence C) expert systems D) neural network

129) What is the automation of existing manual and paper-based processes and workflows to a digital format? A) digitization B) data augmentation C) overfitting D) underfitting

130) What occurs when you add additional training examples by transforming existing training examples? A) digitization B) data augmentation C) overfitting D) underfitting

131) What occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data? A) digitization B) data augmentation C) overfitting D) underfitting

Version 1

38


132) What occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data? A) digitization B) data augmentation C) overfitting D) underfitting

133)

Which of the following best describes affinity bias?

A) the tendency to prefer certain types of names B) acting similarly, or conforming to those around you, regardless of your own views C) looking for evidence that backs up preconceived ideas about someone D) a tendency to connect with, hire, and promote those with similar interests or backgrounds

134)

Which of the following is an example of affinity bias?

A) Javier focuses on hiring people who have similar experience and backgrounds required by the job description. B) Brian tries to hire people with an affinity for the daily requirements of the job. C) Sonequa focuses on hiring people who accept the first salary offer due to tight budgets. D) Emily often hires people who have similar backgrounds and interests as her because she believes it improves collaboration.

135) Surveys have found that voters tend to ignore information from news broadcasters that contradicts their existing beliefs and views. Which of the following types of bias best describes such type of voter behavior? Version 1

39


A) preference bias B) confirmation bias C) affinity bias D) conformity bias

136)

Which of the following best describes confirmation bias?

A) the tendency to prefer certain types of names B) actively looking for evidence that backs up preconceived ideas about someone C) acting similarly, or conforming to those around you, regardless of your own views D) a tendency to connect with, hire, and promote those with similar interests, experiences, or backgrounds

137)

Which of the following refers to the tendency to prefer certain types of names? A) affinity bias B) confirmation bias C) name bias D) preference bias

138)

Which of the following best describes name bias? A) the tendency to prefer certain types of names B) actively looking for evidence that backs up preconceived ideas about someone C) acting similarly, or conforming to those around you, regardless of your own views D) All of the answers are correct.

Version 1

40


139)

Which of the following best describes conformity bias? A) the tendency to prefer certain types of names B) the tendency to look for evidence that backs up preconceived ideas about someone C) the tendency to act similarly to those around you, regardless of your own views D) the tendency to hire those with similar work experiences

140) Which type of bias refers to the tendency of someone to match the behavior of their team members, regardless of their personality? A) name bias B) confirmation bias C) conformity bias D) affinity bias

141)

What is digitization?

A) the automation of existing manual and paper-based processes and workflows to a digital format B) occurs when adding additional training examples by transforming existing examples C) occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data D) occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data

142)

What is data augmentation?

Version 1

41


A) the automation of existing manual and paper-based processes and workflows to a digital format B) occurs when adding additional training examples by transforming existing examples C) occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data D) occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data

143)

What is overfitting?

A) the automation of existing manual and paper-based processes and workflows to a digital format B) occurs when adding additional training examples by transforming existing examples C) occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data D) occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data

144)

What is underfitting?

A) the automation of existing manual and paper-based processes and workflows to a digital format B) occurs when adding additional training examples by transforming existing examples C) occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data D) occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data

145)

What is a problem with using incorrect training data to train a machine?

Version 1

42


A) sample bias B) prejudice bias C) measurement bias D) All of the answers are correct.

146) Which type of bias occurs as a result of training data that is influenced by cultural or other stereotypes? A) sample bias B) prejudice bias C) measurement bias D) variance bias

147) What type of bias occurs when there is a problem with the data collected that skews the data in one direction? A) sample bias B) prejudice bias C) measurement bias D) variance bias

148) Which type of bias represents a tendency to connect with, hire, and promote those with similar interests, experiences, or backgrounds? A) sample bias B) prejudice bias C) measurement bias D) affinity bias

Version 1

43


149)

What is sample bias?

A) a problem with using incorrect training data to train the machine B) a result of training data that is influenced by cultural or other stereotypes C) occurs when there is a problem with the data collected that skews the data in one direction D) a mathematical property of an algorithm; this is the only bias not associated with the input or training data

150)

What is prejudice bias?

A) a problem with using incorrect training data to train the machine B) a result of training data that is influenced by cultural or other stereotypes C) occurs when there is a problem with the data collected that skews the data in one direction D) a mathematical property of an algorithm; this is the only bias not associated with the input or training data

151)

What is measurement bias?

A) a problem with using incorrect training data to train the machine B) a result of training data that is influenced by cultural or other stereotypes C) occurs when there is a problem with the data collected that skews the data in one direction D) a mathematical property of an algorithm; this is the only bias not associated with the input or training data

152)

What is variance bias?

Version 1

44


A) a problem with using incorrect training data to train the machine B) a result of training data that is influenced by cultural or other stereotypes C) occurs when there is a problem with the data collected that skews the data in one direction D) a mathematical property of an algorithm; this is the only bias not associated with the input or training data

153)

What is affinity bias?

A) a problem with using incorrect training data to train the machine B) a result of training data that is influenced by cultural or other stereotypes C) occurs when there is a problem with the data collected that skews the data in one direction D) a tendency to connect with, hire, and promote those with similar interests, experiences, or backgrounds

154)

Which of the following is NOT a type of machine learning? A) supervised machine learning B) unsupervised machine learning C) transfer machine learning D) market share machine learning

155) What is a robot capable of making its own decisions and performing an action accordingly?

Version 1

45


A) digitization B) autonomous robotics C) deep learning D) reinforcement learning

156)

What is the training of machine learning models to make a sequence of decisions? A) digitization B) autonomous robotics C) deep learning D) reinforcement learning

157) What is a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets? A) digitization B) autonomous robotics C) deep learning D) reinforcement learning

158)

Which type of AI system assigns values of 0 and 1 to vague or ambiguous information? A) genetic algorithms B) artificial intelligence C) fuzzy logic D) reinforcement learning

Version 1

46


159) Artificial Intelligence stimulates human thinking and behavior, such as the ability to reason and learn. What is the ultimate goal of AI? A) to build an information system B) to build an intelligent agent C) to build a system that can mimic human intelligence D) to build a system that can mimic an expert agent

160)

Which of the following does not represent a category of AI? A) genetic algorithms B) neural networks C) expert systems D) consolidation

161) What is the viewing of the physical world with computer-generated layers of information added to it? A) augmented reality B) deep learning C) neural network D) virtual reality

162)

What is augmented reality?

Version 1

47


A) the viewing of the physical world with computer-generated layers of information added to it B) a wearable computer with an optical head-mounted display C) uses technology allowing humans to interact with a computer through bodily sensations and movements D) a work environment that is not located in any one physical space

163) Which of the following categories of AI is used extensively in the finance industry to analyze situations in which the logic or rules are unknown? A) expert system B) virtual reality C) neural network D) genetic algorithm

164)

Which of the following is not a feature of a neural network? A) Neural networks can cope with huge volumes of information with many variables. B) Neural networks can function without complete or well-structured information. C) Neural networks can analyze linear relationships only. D) Neural networks can learn and adjust to new circumstance on their own.

165)

What is the mathematical method of handling imprecise or subjective information? A) fuzzy logic B) virtual reality C) expert system D) genetic algorithm

Version 1

48


166) What is the ability of a computer to “see” by digitizing an image, processing the data it contains, and taking some kind of action? A) case-based reasoning B) machine vision C) machine-vision sensitivity D) machine-vision resolution

167) What is the ability of a machine to see in dim light or to detect weak impulses at invisible wavelengths? A) case-based reasoning B) machine vision C) machine-vision sensitivity D) machine-vision resolution

168)

What is the extent to which a machine can differentiate between objects? A) case-based reasoning B) machine vision C) machine-vision sensitivity D) machine-vision resolution

169) What is an optimizing system that can find and evaluate solutions with many more possibilities, faster, and more thoroughly than a human?

Version 1

49


A) genetic algorithm B) robotic process automation C) overfitting D) virtual reality

170) What is a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets? A) reinforcement learning B) deep learning C) machine-vision sensitivity D) machine-vision resolution

171)

What refers to a set of instructions that completes a task? A) algorithm B) machine learning C) sample bias D) name bias

172) What is a type of artificial intelligence that enables computers to both understand concepts in the environment and to learn? A) algorithm B) machine learning C) sample bias D) reinforcement learning

Version 1

50


173)

What is machine learning?

A) refers to a set of instructions that completes a task B) a type of artificial intelligence that enables computers to both understand concepts in the environment and to learn C) machines that can still make their own decisions based on reasoning and past sets of data D) refers to the field of artificial intelligence that works toward providing brainlike powers to AI machines; in effect, it works to make machines as intelligent as the humans.

174) For what types of business decisions would an executive information system use artificial intelligence? A) semistructured decisions B) multistructured decisions C) structured decisions D) unstructured decisions

175)

Which of the following business ideas is not using AI?

A) Best Buy implements a software system that will determine how many customers are needed to increase gross profits to $5 million. B) McDonald’s unveils a robot that cleans and tidies the restaurant, while also asking guests if it can take their trays to the trash. C) Starbucks creates a system that works like a hand and lifts and moves the mixing pots for the coffees to and from the coffee machines to the counters. D) A golf course creates an automated golf cart that can offer swing and club suggestions and even navigate the course for the driver.

Version 1

51


176) What is the viewing of the physical world with computer-generated layers of information added to it? A) virtual reality B) augmented reality C) virtual workforce D) information reality

177) What is a computer-simulated environment that can be a simulation of the real world or an imaginary world? A) virtual reality B) augmented reality C) virtual workforce D) information reality

178) Which of the following business processes would you find in the marketing and sales division? A) manufacturing inventory B) enrolling employees in a health care plan C) promoting of discounts D) creating financial statements

179) Which of the following departments is primarily responsible for promoting discounts, attracting customers, and communicating marketing campaigns?

Version 1

52


A) accounting and finance B) marketing and sales C) operations management D) human resources

180) Which of the following represents a business process you would find in the operations management department? A) ordering inventory B) processing sales C) promoting of discounts D) paying of accounts payable

181) The accounting and finance department performs processes such as creating financial statements, paying accounts payables, and collecting accounts receivables. What form of processes do these represent? A) customer-facing processes B) business-facing processes C) industry-specific customer-facing processes D) all answers are correct

182) What form of processes include loan processing for a bank, claims processing for an insurance company, reservation processing for a hotel, and baggage handling for an airline? A) customer-facing processes B) business-facing processes C) industry-specific customer-facing processes D) All of the answers are correct.

Version 1

53


183) What type of processes includes order processing, customer service processing, sales processing, customer billing processing, and order shipping processing? A) customer-facing processes B) business-facing processes C) industry-specific customer-facing processes D) All of the answers are correct.

184) Which of the following represents business processes you would find in the human resources department? A) hiring employees B) enrolling employees in benefit plans C) tracking vacation and sick time D) All of the answers are correct.

185)

What is the difference between customer-facing processes and business-facing processes?

A) Business-facing processes are front-office processes; customer-facing processes are back-office processes. B) Customer-facing processes are front-office processes; business-facing processes are back-office processes. C) Customer-facing processes are back-office processes; industry-specific customerfacing processes are back-office processes. D) Customer-facing processes are back-office processes; industry-specific customerfacing processes are front-office processes.

186)

Which of the following is a customer-facing process?

Version 1

54


A) communicating with customers B) strategic goal setting C) providing performance feedback and rewards D) purchasing raw materials

187)

Which of the following represents a business-facing process? A) loan processing B) order processing C) strategic planning D) customer billing

188) Which of the following processes would be found in the operations management department? A) creating production schedules B) communicating marketing campaigns C) hiring employees D) processing sales

189)

Which of the following should a business follow for success? A) technology choices should drive business processes B) business processes should drive technology choices C) technology choices should drive business strategies and goals D) All of the answers are correct.

Version 1

55


190) What uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously? A) static process B) dynamic process C) sales process D) customer service process

191) What continuously changes and provides business solutions to ever-changing business operations? A) static process B) dynamic process C) financial process D) sales process

192)

Which of the following are examples of static processes? A) running payroll B) calculating taxes C) creating financial statements D) All of the answers are correct.

193)

Which of the following are examples of dynamic processes? A) employee layoffs B) order level changes based on currency rates C) canceling business travel due to extreme weather D) All of the answers are correct.

Version 1

56


194)

Which of the following is an example of a dynamic process? A) running payroll B) calculating taxes C) creating financial statements D) employee layoffs

195)

Which of the following is an example of a static process? A) employee layoffs B) order level changes based on currency rates C) canceling business travel due to extreme weather D) creating financial statements

196)

What is a graphical notation that depicts the steps in a business process? A) Business Process Model Nation B) Business Practice Model Notation C) Business Process Model Notation D) Business Practice Management Notes

197)

What displays the path in which the process flows? A) BPMN event B) BPMN activity C) BPMN flow D) BPMN gateway

Version 1

57


198)

What is a task in a business process? A) BPMN event B) BPMN activity C) BPMN flow D) BPMN gateway

199)

What is anything that happens during the course of a business process? A) BPMN event B) BPMN activity C) BPMN flow D) BPMN gateway

200)

What is used to control the flow of a process? A) BPMN event B) BPMN activity C) BPMN flow D) BPMN gateway

201)

What is represented by a circle in a business process model? A) BPMN event B) BPMN activity C) BPMN flow D) BPMN gateway

Version 1

58


202)

What is represented by a rounded-corner rectangle in a business process model? A) BPMN event B) BPMN activity C) BPMN flow D) BPMN gateway

203)

What is represented by a diamond shape in a business process model? A) BPMN event B) BPMN activity C) BPMN flow D) BPMN gateway

204)

What is represented by arrows in a business process model? A) BPMN event B) BPMN activity C) BPMN flow D) BPMN gateway

205) Jessica Ulta works for City Service Credit Union and is responsible for consulting on loans, talking clients through the loan process, and providing loans to members. What type of processes does Jessica primarily work with?

Version 1

59


A) business-facing processes B) industry-specific customer-facing processes C) customer-facing processes D) industry-specific business-facing processes

206) Sarah Smith was recently hired by Bank West as the Global Director of Human Resources. Her job duties include determining employment policies as well as overseeing all hiring, firing, and training of employees. What type of processes does Sarah’s new job demonstrate? A) business-facing processes B) industry-specific customer-facing processes C) customer-facing process D) industry-specific business-facing processes

207) What is a model that represents the current state of the operation without any specific improvements or changes to existing processes? A) As-Is process model B) To-Be process model C) competitive business process model D) workflow model

208) What is the business process model that ensures the process is fully and clearly understood before the details of a process solution are decided upon?

Version 1

60


A) As-Is process model B) business process reengineering model C) customer-facing process D) To-Be process model

209)

What is the difference between the As-Is process model and the To-Be process model?

A) The As-Is process model begins with what the process problem is, and the To-Be process model displays how the problem will be solved. B) The process models are not related. C) Both process models determine when to solve the problem. D) The As-Is process model begins with where to implement the solution, and the To-Be process model displays why the problem needs to be fixed.

210)

What is the primary goal of the As-Is process model? A) to outline the process elements for the To-Be process B) to create process choices for the As-Is process C) to simplify, eliminate, and improve the To-Be process D) to analyze the To-Be process elements

211) Local florist Cheryl Steffan has been in business for over 20 years. Recently, Cheryl has noticed several complaints about delivery errors. Cheryl decides to investigate the errors in her business delivery process and finds that most of the inaccuracies occur during order taking. Cheryl decides to implement an electronic ordering system to help improve order efficiency and effectiveness. What method did Cheryl follow to solve her delivery issues?

Version 1

61


A) modeled the As-Is process, fixed the errors, and then created the To-Be process B) modeled the To-Be process, fixed the errors, and then created the As-Is process C) moved directly to implementing the To-Be process without analyzing the As-Is process D) moved directly to implementing the As-Is process without analyzing the To-Be process

212)

What is the primary goal of using As-Is and To-Be process models? A) to determine employee specific errors B) to determine measurement metrics C) to determine the worst way to solve a problem D) to determine what the problem is and then how to solve it

213) Which of the following typically occurs during operational business process improvement? A) automation B) streamlining C) reengineering D) improvement

214) Which of the following typically occurs during managerial business process improvement? A) automation B) streamlining C) reengineering D) improvement

Version 1

62


215)

Which of the following typically occurs during strategic business process improvement? A) automation B) streamlining C) reengineering D) improvement

216)

What does business process reengineering assume about the current process? A) the current process is irrelevant B) the current process is broken C) the current process must be overhauled from scratch D) All of the answers are correct.

217) What is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform? A) data augmentation B) robotic process automation C) deep learning D) machine learning

218)

What improves managerial level business processes?

Version 1

63


A) performance measures B) bottlenecks C) redundancy D) streamlining

219) What is the point at which resources reach full capacity and cannot handle any additional demands? A) optimization analysis B) bottleneck C) redundancy D) swim lane

220) Automating a business process that contains ________ or _________ will magnify or amplify these problems if they are not corrected first. A) bottlenecks; regulations B) redundancies; regulations C) bottlenecks; redundancies D) redundancies; swim lanes

221)

What is the analysis and redesign of workflow within and between enterprises? A) critical success factors B) benchmarking metrics C) business process reengineering D) decision support interfaces

Version 1

64


222) Changing business processes with MIS outlines how to improve the three levels of business processes, which include operational, managerial, and strategic. From operational to strategic, what are the three major improvement strategies that the author describes? A) automation—streamlining—reengineering B) artificial intelligence—streamlining—reengineering C) automation—workflow—reinvention D) automation—consolidating—restructuring

223) Which of the following explains why a company would implement a business process reengineering strategy? A) to encourage competition B) to decrease customers C) to create value for the customer D) All of the answers are correct.

224) What includes the tasks, activities, and responsibilities required to execute each step in a business process? A) workflow B) swim lane C) automation D) streamlining

225) What is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs?

Version 1

65


A) workflow B) swim lane C) automation D) streamlining

226) What improves business process efficiencies by simplifying or eliminating unnecessary steps? A) workflow B) swim lane C) automation D) streamlining

227) What occur(s) when resources reach full capacity and cannot handle any additional demands, limiting throughput and impeding operations? A) bottlenecks B) redundancy C) automation D) streamlining

228)

What occur(s) when a task or activity is unnecessarily repeated? A) bottlenecks B) redundancy C) automation D) streamlining

Version 1

66


229) What are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes? A) operational business processes B) managerial business processes C) strategic business processes D) success business processes

230) What are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions? A) operational business processes B) managerial business processes C) strategic business processes D) success business processes

231) What are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements? A) operational business processes B) managerial business processes C) strategic business processes D) success business processes

232)

What are managerial business processes?

Version 1

67


A) dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions B) semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements C) static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes D) None of the answer choices are correct.

233)

What are strategic business processes?

A) dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions B) semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements C) static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes D) None of the answer choices are correct.

234)

What are operational business processes?

A) dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions B) semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements C) static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes D) None of the answer choices are correct.

235) At the operational level, employees are continuously evaluating company operations to hone the firm’s abilities to identify, adapt to, and leverage change.

Version 1

68


⊚ ⊚

true false

236) At the operational level, employees develop, control, and maintain core business activities required to run the day-to-day operations. ⊚ ⊚

237)

Operational decisions are considered structured decisions. ⊚ ⊚

238)

true false

Asking how many employees are out sick is a type of operational question. ⊚ ⊚

239)

true false

true false

Strategic decisions are highly structured decisions. ⊚ ⊚

true false

240) One of the most important and challenging questions confronting managers today is how to lay the foundation for tomorrow’s success while competing to win in today’s business environment. ⊚ ⊚

Version 1

true false

69


241) The structure of a typical organization is similar to a pyramid, with different levels that require one consistent type of information to assist with all managerial decision making. ⊚ ⊚

true false

242) Operational decisions or semistructured decisions arise in situations where established processes offer potential solutions. ⊚ ⊚

true false

243) Unstructured decisions occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice. ⊚ ⊚

true false

244) At the strategic decision-making level, employees develop, control, and maintain core business activities. ⊚ ⊚

245)

true false

Key performance indicators can focus on external and internal measurements. ⊚ ⊚

Version 1

true false

70


246)

The proportion of the market that a firm captures is called market share. ⊚ ⊚

247)

Benchmarks are baseline values the system seeks to attain. ⊚ ⊚

248)

true false

true false

Effectiveness MIS metrics include throughput, transaction speed, and system availability. ⊚ ⊚

true false

249) Measuring the amount of website traffic is the best way to determine an organization’s success. ⊚ ⊚

true false

250) A project is a temporary activity a company undertakes to create a unique product, service, or result. ⊚ ⊚

true false

251) Metrics are temporary activities a company undertakes to create a unique product, service, or result. ⊚ ⊚

Version 1

true false

71


252) Metrics are measurements that evaluate results to determine whether a project is meeting its goals. ⊚ ⊚

253)

true false

Efficiency MIS metrics include throughput, speed, and availability. ⊚ ⊚

true false

254) Effectiveness MIS metrics measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates. ⊚ ⊚

true false

255) Efficiency MIS metrics measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates. ⊚ ⊚

true false

256) Best practices are the most successful solutions or problem-solving methods that have been developed by a specific organization or industry. ⊚ ⊚

Version 1

true false

72


257)

Return on investment indicates the earning power of a project. ⊚ ⊚

true false

258) MIS support systems rely on models for computational and analytical routines that mathematically express relationships among variables. ⊚ ⊚

true false

259) A pie chart is a type of graph in which a circle is divided into sectors that each represent a proportion of the whole. ⊚ ⊚

true false

260) Streamlining information encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational or structured decisions. ⊚ ⊚

true false

261) A bar chart is a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent. ⊚ ⊚

true false

262) A histogram is a graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram groups numbers into ranges. Version 1

73


⊚ ⊚

true false

263) A sparkline is a small embedded line graph that illustrates a single trend. Sparklines are often used in reports, presentations, dashboards, and scoreboards. They do not include axes or labels; context comes from the related content. ⊚ ⊚

true false

264) An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance. People use infographics to quickly communicate a message, to simplify the presentation of large amounts of data, to see data patterns and relationships, and to monitor changes in variables over time. ⊚ ⊚

true false

265) A time-series chart is a graphical representation showing change of a variable over time. Time-series charts are used for data that changes continuously, such as stock prices. They allow for a clear visual representation of a change in one variable over a set amount of time. ⊚ ⊚

true false

266) Managers use transactional information when making structured decisions at the operational level. ⊚ ⊚

Version 1

true false

74


267) The manipulation of information to create business intelligence in support of strategic decision making is referred to as OLTP or online transaction processing. ⊚ ⊚

268)

A model is a simplified representation or abstraction of reality. ⊚ ⊚

269)

true false

Source documents are the original transaction records. ⊚ ⊚

271)

true false

Source documents are simplified representations or abstractions of reality. ⊚ ⊚

270)

true false

true false

Granularity refers to the level of detail in the model or the decision-making process. ⊚ ⊚

true false

272) Visualization produces graphical displays of patterns and complex relationships in large amounts of data. ⊚ ⊚

Version 1

true false

75


273) A digital dashboard produces graphical displays of patterns and complex relationships in large amounts of data. ⊚ ⊚

true false

274) A neural network is a category of efficiency and effectiveness MIS metrics where it attempts to measure the way a computer network sends and receives data. ⊚ ⊚

true false

275) A genetic algorithm is an operational system that uses human cellular information to mimic evolution for better solutions. ⊚ ⊚

true false

276) A genetic algorithm mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. ⊚ ⊚

277)

true false

Investment companies use effectiveness MIS metrics to help in trading decisions. ⊚ ⊚

Version 1

true false

76


278)

Fuzzy logic is a mathematical method of handling imprecise or subjective information. ⊚ ⊚

true false

279) Augmented reality is the viewing of the physical world with computer-generated layers of information added to it. ⊚ ⊚

280)

true false

An algorithm refers to a set of instructions that completes a task. ⊚ ⊚

true false

281) Machine learning is a type of artificial intelligence that enables computers to both understand concepts in the environment and to learn. ⊚ ⊚

true false

282) Affinity bias is when someone acts similar to those around them regardless of their own personality. ⊚ ⊚

true false

283) Affinity bias is when a person who enjoys critical thinking, chess and strategic board games, hires someone who enjoys them as well.

Version 1

77


⊚ ⊚

true false

284) Conformity bias is when a person tries to mimic the behavior and thinking of their manager regardless of their own personality. ⊚ ⊚

true false

285) Conformity bias is when a person researching a project looks for data that supports their current assumptions. ⊚ ⊚

true false

286) Confirmation bias is when a person believes their coworker to be lazy and looks for signs that they come in late, procrastinate, and try to get out of work projects. ⊚ ⊚

287)

Name bias is when a person prefers certain types of names. ⊚ ⊚

288)

true false

true false

Conformity bias is when a person prefers certain types of names. ⊚ ⊚

Version 1

true false

78


289) Affinity bias a tendency to connect with, hire, and promote those with dissimilar interests, experiences, or backgrounds. ⊚ ⊚

true false

290) Virtual reality is a computer-simulated environment that can be a simulation of the real world or an imaginary world. ⊚ ⊚

true false

291) Augmented reality is the viewing of the physical world with computer-generated layers of information added to it. ⊚ ⊚

true false

292) Augmented reality is a computer-simulated environment that can be a simulation of the real world or an imaginary world. ⊚ ⊚

true false

293) Virtual reality is the viewing of the physical world with computer-generated layers of information added to it. ⊚ ⊚

Version 1

true false

79


294) A machine-vision system uses a video camera to capture data and send it to the robot controller. Machine vision is similar in complexity to voice recognition and can be used for handwriting recognition, signature identification, and currency inspection. Two important specifications in any vision system are the sensitivity and the resolution. ⊚ ⊚

true false

295) Deep learning is a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets. ⊚ ⊚

true false

296) Business-facing processes or back-office processes are invisible to the external customer but essential to the effective management and operation of the business. ⊚ ⊚

true false

297) When evaluating the five steps in the order-to-delivery business process, step one includes creating a campaign and checking inventory, which are both part of the human resources function. ⊚ ⊚

298)

true false

Strategic planning is a customer-facing business process. ⊚ ⊚

Version 1

true false

80


299)

Product delivery is a customer-facing business process. ⊚ ⊚

true false

300) Improving the efficiency and effectiveness of its business processes will improve a firm’s value chain. ⊚ ⊚

true false

301) Core processes are business processes, such as manufacturing goods, selling products, and providing services, that make up the primary activities in a value chain. ⊚ ⊚

true false

302) Core processes are patents that protect a specific set of procedures for conducting a particular business activity. ⊚ ⊚

true false

303) A static process uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously. Managers constantly attempt to optimize static process. ⊚ ⊚

Version 1

true false

81


304) Examples of static processes include running payroll, calculating taxes, and creating financial statements. ⊚ ⊚

true false

305) Examples of dynamic processes include running payroll, calculating taxes, and creating financial statements. ⊚ ⊚

true false

306) A dynamic process continuously changes and provides business solutions to everchanging business operations. ⊚ ⊚

true false

307) A static process continuously changes and provides business solutions to ever-changing business operations. ⊚ ⊚

true false

308) As the business and its strategies change, so do the dynamic processes. Examples of dynamic processes include managing layoffs of employees, changing order levels based on currency rates, and canceling business travel due to extreme weather. ⊚ ⊚

Version 1

true false

82


309) A business process patent is a patent that protects a specific set of procedures for conducting a particular business activity. ⊚ ⊚

true false

310) A payroll management system is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint. ⊚ ⊚

true false

311) To-Be process models show the results of applying change improvement opportunities to the current (As-Is) process model. ⊚ ⊚

true false

312) Business Process Model and Notation (BPMN) is a graphical notation that depicts the steps in a business process. ⊚ ⊚

true false

313) A Business Process Model and Notation (BPMN) event is anything that happens during the course of a business process. An event is represented by a circle in a business process model. ⊚ ⊚

Version 1

true false

83


314)

A Business Process Model and Notation (BPMN) activity is a task in a business process. ⊚ ⊚

true false

315) A Business Process Model and Notation (BPMN) gateway is used to control the flow of a process. ⊚ ⊚

true false

316) A Business Process Model and Notation (BPMN) flow displays the path in which the process flows. ⊚ ⊚

true false

317) A Business Process Model and Notation (BPMN) flow is anything that happens during the course of a business process. An event is represented by a circle in a business process model. ⊚ ⊚

318)

true false

A Business Process Model and Notation (BPMN) event is a task in a business process. ⊚ ⊚

Version 1

true false

84


319) A Business Process Model and Notation (BPMN) activity is used to control the flow of a process. ⊚ ⊚

true false

320) A Business Process Model and Notation (BPMN) gateway displays the path in which the process flows. ⊚ ⊚

true false

321) The primary goal of an As-Is process model is to simplify, eliminate, and improve the To-Be processes. ⊚ ⊚

true false

322) Business processes should never drive MIS choices and should be based on business strategies and goals. ⊚ ⊚

true false

323) A swim lane layout arranges the steps of a business process into a set of rows depicting the various elements. ⊚ ⊚

324)

true false

Redundancy occurs when a task or activity is never repeated.

Version 1

85


⊚ ⊚

true false

325) Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform. ⊚ ⊚

true false

326) Business process reengineering is the analysis and redesign of workflow within and between enterprises. ⊚ ⊚

true false

327) Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform. ⊚ ⊚

true false

328) Operational business processes are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes. ⊚ ⊚

true false

329) Managerial business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.

Version 1

86


⊚ ⊚

true false

330) Strategic business processes are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions. ⊚ ⊚

true false

331) Strategic business processes are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes. ⊚ ⊚

true false

332) Operational business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements. ⊚ ⊚

true false

333) Operational business processes are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions. ⊚ ⊚

Version 1

true false

87


Answer Key Test name: Chap 02_8e_Baltzan 8) C 9) D 10) A 11) B 12) A 13) B 14) B 15) B 16) D 17) B 18) C 19) B 20) A 21) B 22) D 23) B 24) A 25) C 26) A 27) B 28) D 29) C 30) B 31) D 32) D 33) A Version 1

88


34) B 35) C 36) A 37) B 38) C 39) A 40) B 41) C 42) B 43) A 44) A 45) D 46) C 47) A 48) B 49) B 50) B 51) D 52) A 53) A 54) B 55) A 56) B 57) C 58) D 59) A 60) B 61) C 62) A 63) D Version 1

89


64) B 65) D 66) C 67) C 68) A 69) B 70) D 71) A 72) D 73) B 74) C 75) A 76) B 77) B 78) C 79) A 80) B 81) C 82) C 83) A 84) A 85) A 86) B 87) A 88) B 89) C 90) A 91) C 92) D 93) D Version 1

90


94) A 95) C 96) C 97) D 98) B 99) D 100) A 101) B 102) C 103) A 104) B 105) C 106) D 107) D 108) C 109) A 110) B 111) C 112) D 113) D 114) D 115) A 116) D 117) A 118) B 119) A 120) B 121) B 122) D 123) D Version 1

91


124) B 125) C 126) A 127) A 128) D 129) A 130) B 131) C 132) D 133) D 134) D 135) B 136) B 137) C 138) A 139) C 140) C 141) A 142) B 143) C 144) D 145) A 146) B 147) C 148) D 149) A 150) B 151) C 152) D 153) D Version 1

92


154) D 155) B 156) D 157) C 158) C 159) C 160) D 161) A 162) A 163) C 164) C 165) A 166) B 167) C 168) D 169) A 170) B 171) A 172) B 173) B 174) D 175) A 176) B 177) A 178) C 179) B 180) A 181) B 182) C 183) A Version 1

93


184) D 185) B 186) A 187) C 188) A 189) B 190) A 191) B 192) D 193) D 194) D 195) D 196) C 197) C 198) B 199) A 200) D 201) A 202) B 203) D 204) C 205) B 206) A 207) A 208) D 209) A 210) C 211) A 212) D 213) A Version 1

94


214) B 215) C 216) D 217) B 218) D 219) B 220) C 221) C 222) A 223) C 224) A 225) C 226) D 227) A 228) B 229) A 230) C 231) B 232) B 233) A 234) C 235) FALSE 236) TRUE 237) TRUE 238) TRUE 239) FALSE 240) TRUE 241) FALSE 242) FALSE 243) TRUE Version 1

95


244) FALSE 245) TRUE 246) TRUE 247) TRUE 248) FALSE 249) FALSE 250) TRUE 251) FALSE 252) TRUE 253) TRUE 254) TRUE 255) FALSE 256) TRUE 257) TRUE 258) TRUE 259) TRUE 260) FALSE 261) TRUE 262) TRUE 263) TRUE 264) TRUE 265) TRUE 266) TRUE 267) FALSE 268) TRUE 269) FALSE 270) TRUE 271) TRUE 272) TRUE 273) FALSE Version 1

96


274) FALSE 275) FALSE 276) TRUE 277) FALSE 278) TRUE 279) TRUE 280) TRUE 281) TRUE 282) FALSE 283) TRUE 284) TRUE 285) FALSE 286) TRUE 287) TRUE 288) FALSE 289) FALSE 290) TRUE 291) TRUE 292) FALSE 293) FALSE 294) TRUE 295) TRUE 296) TRUE 297) FALSE 298) FALSE 299) TRUE 300) TRUE 301) TRUE 302) FALSE 303) TRUE Version 1

97


304) TRUE 305) FALSE 306) TRUE 307) FALSE 308) TRUE 309) TRUE 310) FALSE 311) TRUE 312) TRUE 313) TRUE 314) TRUE 315) TRUE 316) TRUE 317) FALSE 318) FALSE 319) FALSE 320) FALSE 321) TRUE 322) FALSE 323) TRUE 324) FALSE 325) TRUE 326) TRUE 327) TRUE 328) TRUE 329) TRUE 330) TRUE 331) FALSE 332) FALSE 333) FALSE Version 1

98


Version 1

99


CHAPTER 3 1) Compare disruptive and sustaining technologies, and explain how the Internet and the World Wide Web caused business disruption.

2)

Explain net neutrality and its potential benefits.

3)

Describe Web 1.0 along with ebusiness and its associated advantages.

4)

Compare the four categories of ebusiness models.

Version 1

1


5)

Describe ebusiness tools for connecting and communicating.

6)

Explain how Business 2.0 is helping communities’ network and collaborate.

7)

Explain how Business 2.0 is helping communities’ network and collaborate.

8)

Compare blogs and wikis.

Version 1

2


9)

Explain the terms misinformation, disinformation, and fake news and their differences.

10)

Describe Web 3.0 and the next generation of online business.

11) Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction? A) collective intelligence B) digital Darwinism C) joint venture D) sole proprietorship

12) Which of the following produces an improved product customers are eager to buy, such as a faster car or larger hard drive?

Version 1

3


A) sustaining technology B) disruptive technology C) reputation system D) personalization

13)

Which of the follow are characteristics of disruptive technology? A) enters the marketplace at the low end B) initially doesn’t meet the needs of existing customers C) tends to open new markets and destroy old ones D) All of the answers are correct.

14)

Which of the following is a challenge of sustaining technology? A) provides a cheaper product for current customers B) provides a product that does not meet existing customer’s future needs C) provides a better product for current customers D) provides a faster product for current customers

15) The Innovator’s Dilemma suggests that established companies can take advantage of ________ without hindering existing relationships with customers, partners, and stakeholders. A) sustaining technology B) existing investments C) collective intelligence D) disruptive technology

Version 1

4


16) Which of the following began as an essential emergency military communications system operated by the U.S. Department of Defense (DARPA)? A) Internet B) ecommerce C) ebusiness D) World Wide Web

17)

Which of the following is the founding principle of net neutrality?

A) All consumers should be able to generate revenue by providing digital content such as news, music, photos, or videos. B) Consumers should be able to use the Internet and be free to access its resources without any form of discrimination. C) Companies should be able to manage the creation, storage, editing, and publication of their website content. D) All companies should be able to use masked Internet Protocol (IP) addresses.

18)

Which of the following is a description of net neutrality? A) net neutrality ensures that all information on the net is neutral and free of bias B) net neutrality ensures that everyone has equal access to the Internet C) net neutrality ensures that everyone always sees the same information on the Internet D) net neutrality protects people on the Internet from scams

19)

Which of the following terms could you use synonymously when referring to the web?

Version 1

5


A) network, paradigm shift B) URL, domain name C) HTML, Internet D) web browser, blog

20) At a local marketing firm, Steve is the lead Web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job? A) understanding that he must create a unique domain name for each client B) being able to work with HTML C) understanding the World Wide Web and how hyperlinks work D) All of the answers are correct.

21)

Which of the following is not a reason for the explosive growth of the WWW?

A) basic web pages are easy to create and extremely flexible B) the microcomputer revolution made it possible for an average person to own a computer C) digital Darwinism D) the speed, convenience, and low cost of email

22) Which term describes the WWW during its first few years of operation between 1991 and 2003? A) Web 1.0 B) eshop C) open source D) All of the answers are correct.

Version 1

6


23)

What is the difference between ecommerce and ebusiness?

A) Ecommerce includes Internet network effects; ebusiness includes ecommerce and all activities related to internal and external business operations. B) Ecommerce is buying and selling of goods or services online; ebusiness includes ecommerce and all activities related to internal and external business operations. C) Ecommerce includes ecommerce and all activities related to internal and external business operations; ebusiness includes all of the knowledge management systems. D) Ebusiness is buying and selling of goods or services online; ecommerce includes ecommerce and all activities related to internal and external business operations.

24) What is the Internet protocol web browsers use to request and display web pages using universal resource locators? A) hypertext markup language (HTML) B) URL C) hypertext transport protocol (HTTP) D) DARPA

25)

What allows users to access the WWW? A) web conferencing B) web browser C) Web 2.0 D) web business

26)

Which of the following is a type of web browser?

Version 1

7


A) Microsoft Word and Excel B) Internet Explorer and Mozilla Firefox C) Facebook and YouTube D) All of the answers are correct.

27)

What caused Polaroid to go bankrupt? A) it failed to have innovative technology and a captive customer base B) one-hour film processing and digital cameras stole its market share C) people who want instant access to their pictures also want a third party involved D) Internet websites such as Flickr and Facebook stole its market share

28) Many social media sites today allow you to customize your web address, for example www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com? A) digital bookmark B) Internet bookmark C) universal resource locator D) web browser

29) Universities were among some of the first users of the Internet. What was the Internet first called? A) HTML B) ARPANET C) OPT D) WWO

Version 1

8


30) What links documents, allowing users to move from one to another simply by clicking on a hot spot or link? A) digital Darwinism B) web browser C) hypertext transport protocol D) universal resource locator

31) What is a service that allows the owner of a domain name to maintain a simple website and provide email capacity? A) domain name B) domain name hosting C) dot-com D) paradigm shift

32) What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave? A) domain name B) domain name hosting C) click-thru D) paradigm shift

33)

What does digital Darwinism imply?

Version 1

9


A) Organizations that can adapt to the new demands placed on them for surviving in the information age are doomed to extinction. B) Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction. C) Organizations that can adapt to new information systems are doomed to extinction. D) Organizations that cannot adapt to new information systems are doomed to exile.

34)

Which of the following is an example of a disruptive technology? A) Oracle’s database software B) Sony’s transistor-based consumer electronics (transistor radio) C) Intel’s low-end microprocessor D) All of the answers are correct.

35)

Which of the following is an example of a sustaining technology? A) Porsche’s faster car B) Intel’s low-end microprocessor C) Sony’s transistor-based consumer electronics (transistor radio) D) All of the answers are correct.

36)

Which of the following is a reason for the growth of the World Wide Web? A) the microcomputer revolution B) advancements in networking hardware C) web pages being easy to create and flexible D) All of the answers are correct.

Version 1

10


37)

What is information richness?

A) a global public network of computer networks that pass information from one to another using common computer protocols B) refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information C) refers to the number of people a business can communicate with on a global basis D) occurs when those with access to technology have great advantages over those without access to technology

38)

What is information reach?

A) a global public network of computer networks that pass information from one to another using common computer protocols B) refers to the depth and breadth of information transferred between customers and businesses C) measures the number of people a firm can communicate with all over the world D) occurs when those with access to technology have great advantages over those without access to technology

39) What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together? A) intermediaries B) showrooming C) disinformation D) disintermediation

Version 1

11


40) What occurs when a business sells directly to the customer online and cuts out the middleman? A) intermediaries B) disintermediation C) cookie D) showrooming

41) Which of the following are reasons why both individuals and organizations have embraced ebusiness? A) enhance productivity B) maximize convenience C) improve communication D) All of the answers are correct.

42) What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video? A) information richness B) information age C) information reach D) All of the answers are correct.

43) What is a two-dimensional representation of data in which values are represented by colors?

Version 1

12


A) heat map B) clickstream analytics C) website traffic analytics D) website ebusiness analytics

44) What is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order? A) heat map B) clickstream analytics C) website traffic analytics D) website ebusiness analytics

45) What uses clickstream data to determine the efficiency of the site for the users and operates at the server level? A) heat map B) clickstream analytics C) website traffic analytics D) website ebusiness analytics

46) What uses clickstream data to determine the effectiveness of the site as a channel-tomarket? A) heat map B) clickstream analytics C) website traffic analytics D) website ebusiness analytics

Version 1

13


47)

What is a heat map?

A) a two-dimensional representation of data in which values are represented by colors B) the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order C) uses clickstream data to determine the efficiency of the site for the users and operates at the server level D) uses clickstream data to determine the effectiveness of the site as a channel-to-market

48)

What are clickstream analytics?

A) a two-dimensional representation of data in which values are represented by colors B) the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order C) uses clickstream data to determine the efficiency of the site for the users and operates at the server level D) uses clickstream data to determine the effectiveness of the site as a channel-to-market

49)

What are website traffic analytics?

A) a two-dimensional representation of data in which values are represented by colors B) the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order C) uses clickstream data to determine the efficiency of the site for the users and operates at the server level D) uses clickstream data to determine the effectiveness of the site as a channel-to-market

50)

What are website ebusiness analytics?

Version 1

14


A) a two-dimensional representation of data in which values are represented by colors B) the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order C) uses clickstream data to determine the efficiency of the site for the users and operates at the server level D) uses clickstream data to determine the effectiveness of the site as a channel-to-market

51)

What measures the number of people a firm can communicate with all over the world? A) information richness B) information age C) information reach D) information browser

52)

Which of the below would not be considered an advantage of ebusiness? A) expanding global reach B) opening new markets C) reducing costs D) reducing information reach

53) What is the ability of an organization to tailor its products or services to the customers’ specifications? A) personalization B) long tail C) mass customization D) information reach

Version 1

15


54) Which of the below would not be considered a company operating in the long tail of a typical sales curve? A) Walmart B) Netflix C) iTunes D) Amazon

55) Mars, Inc., offers people the opportunity to order M&Ms in special colors or with customized sayings. How would you classify Mars’s ebusiness strategy? A) information richness B) mass customization C) personalization D) interactivity

56) Amazon creates a unique recommendation listing for each customer who revisits its website. How would you classify Amazon’s ebusiness strategy? A) information richness B) mass customization C) personalization D) interactivity

57) Netflix creates a unique recommendation listing for each customer who revisits its website. How would you classify Netflix’s ebusiness strategy?

Version 1

16


A) information richness B) mass customization C) personalization D) interactivity

58) Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike’s ebusiness strategy? A) information richness B) mass customization C) personalization D) interactivity

59) When evaluating the business value of disintermediation, the more ________ that are cut from the distribution chain, the lower the product price. A) users B) customers C) data D) intermediaries

60) A company can reduce its costs by using ebusiness to change its business processes. Which of the following represents an example of a company reducing its costs through ebusiness?

Version 1

17


A) creating an online travel reservation B) ordering office supplies online and picking it up at the store C) purchasing a book online and picking it up in the store D) researching products to find the lowest price and visiting the store to purchase the item

61)

Which of the below statements is correct? A) Just putting up a website can create tremendous ebusiness value. B) Just putting up a website can create tremendous business buzz. C) Just putting up a website can limit product availability. D) Just putting up a website does not create an ebusiness.

62)

What is the exact pattern of a consumer’s navigation through a site? A) web browsing B) hypertext C) clickstream data D) web data

63)

What is the best way to measure a company’s ebusiness success? A) effective MIS metrics B) interactivity C) clickstream data D) All of the answers are correct.

Version 1

18


64)

Which of the following is an ebusiness marketing technique? A) cookies B) pop-up ad C) banner ad D) All of the answers are correct.

65) Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message’s visibility and effect? A) cookies B) click-through C) viral marketing D) pop-up ad

66) Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle area. Bonnie is highly technical and uses many types of online marketing techniques to increase business. One of her most successful online marketing techniques is to place a box advertising her services along the top of real estate and luxury custom furniture websites. What type of marketing technique is Bonnie using? A) cookie B) banner ad C) pop-up ad D) click-through ad

67) What is the business strategy that lets a company shorten the order process and add value with reduced costs or a more responsive and efficient service, and occurs when a business sells directly to the customer online?

Version 1

19


A) disintermediation B) intermediaries C) freemium D) All of the answers are correct.

68)

Which of the following is an example of a clickstream data metric? A) dates and times of visits B) number of customers with shopping carts C) number of page views D) All of the answers are correct.

69)

What measures the amount of time visitors spend on a website or application? A) freemium B) cookie C) paradigm shift D) stickiness

70)

What is the difference between a business model and an ebusiness model?

A) A business model details how a company creates, delivers, and generates revenue; an ebusiness model does all of the same except on the Internet. B) A business model and an ebusiness model are identical. C) A business model and an ebusiness model are complete opposites. D) An ebusiness model details how a company creates, delivers, and generates revenue; a business model does all the same except on the Internet.

Version 1

20


71)

What are the four main types of ebusiness models?

A) business-to-borrower, business-to-consumer, consumer-to-business, and consumer-toconsumer B) business-to-business, business-to-consumer, consumer-to-business, and consumer-toconsumer C) business-to-business, business collaboration, collective business, and consumer-toconsumer D) ebusiness-to-ebusiness, e business-to-ebusiness, econsumer-to-ebusiness, and econsumer-to-econsumer

72)

What is the difference between a B2C and a C2B?

A) B2C focuses on companies as customers, and C2B focuses on consumers as customers. B) B2C focuses on collaboration, and C2B focuses on consumers. C) B2C focuses on business to consumers, and C2B focuses on consumers to business. D) B2C focuses on consumers as customers, and C2B focuses on companies as customers.

73) What is the ebusiness model that applies to customers offering goods and services to each other over the Internet? A) C2C B) C2B C) B2B D) B2C

Version 1

21


74) What is the ebusiness model that represents 80 percent of all online businesses and is typically more complex, requiring greater security needs? A) consumer-to-consumer B) business-to-consumer C) consumer-to-business D) business-to-business

75) Which of the following represents businesses buying from and selling to each other over the Internet? A) B2B B) B2C C) C2B D) C2C

76) Carfax is an example of a company that sells its products or services directly to its consumers online. Which ebusiness model is Carfax using? A) C2B B) C2C C) B2C D) B2B

77) John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline, where they are allowed to set the price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using?

Version 1

22


A) CBC B) B2B C) C2B D) C2C

78) What type of revenue generation model is Google using when it generates revenue by allowing advertisers to bid on common search terms? A) disintermediation B) personalization C) mass customization D) adwords

79)

What is the practice of artificially inflating traffic statistics for online advertisements? A) click fraud B) hitbots C) affiliate program D) botnets

80) What creates the illusion that a large number of potential customers are clicking the advertiser’s links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser? A) click fraud B) hitbots C) affiliate program D) botnets

Version 1

23


81) What allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant’s website? A) click fraud B) hitbots C) affiliate program D) adwords

82)

What is a business that operates in a physical store without an Internet presence? A) brick-and-mortar business B) click-and-mortar business C) virtual business D) pure-play business

83)

What is a pure-play business? A) a business that operates only on the Internet without a physical store B) a business that sells products only in a physical store C) a business that sells services only in a physical store D) a business that does not have any employees

84)

Which type of ebusiness model does Amazon use?

Version 1

24


A) pure-play B) brick-and-mortar C) click-and-click D) Internet provider

85)

Which type of ebusiness model is Barnes & Noble using? A) pure-play B) brick-and-mortar C) click-and-mortar D) virtual

86)

Which type of ebusiness model best describes Apple? A) pure-play B) brick-and-mortar C) click-and-mortar D) virtual

87) What is a plan that details how a company creates, delivers, and generates revenues on the Internet? A) ebusiness B) ebusiness model C) ecommerce D) ecommerce model

Version 1

25


88) What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave? A) ecommerce model B) eshop sale C) paradigm shift D) Web 1.0

89)

Which of the following represents a brick-and-mortar business? A) The Gap B) Amazon C) Google D) McDonald’s

90)

Which of the following is not a valid form of an ebusiness revenue model? A) transaction fees B) subscription fees C) advertising fees D) service provider

91) For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business, Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual ebusiness that acts like a search engine but only focuses on the real estate industry. The main revenue source for this Perry’s ebusiness will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry’s new business?

Version 1

26


A) transaction fees B) advertising fees C) subscription fees D) All of the answers are correct.

92)

What was the original term for a company operating on the Internet? A) dot-com B) search engine C) search engine ranking D) search engine optimization

93) What is website software that finds other pages based on keyword matching similar to Google? A) dot-com B) search engine C) search engine ranking D) search engine optimization

94) What evaluates variables that search engines use to determine where a URL appears on the list of search results? A) dot-com B) keyword C) search engine D) search engine ranking

Version 1

27


95) What combines art along with science to determine how to make URLs more attractive to search engines, resulting in higher search engine ranking? A) dot-com B) search engine C) search engine ranking D) search engine optimization

96)

What generates revenue each time a user clicks on a link to a retailer’s website? A) pay-per-click B) pay-per-call C) pay-per-conversion D) All of the answers are correct.

97) What generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call? A) pay-per-click B) pay-per-call C) pay-per-conversion D) All of the answers are correct.

98)

What generates revenue each time a website visitor is converted to a customer?

Version 1

28


A) pay-per-click B) pay-per-call C) pay-per-conversion D) All of the answers are correct.

99) What are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages? A) organic search B) pay-per-call C) pay-per-conversion D) adwords

100)

Websites can generate revenue by using which of the following? A) pay-per-click B) pay-per-call C) pay-per-conversion D) All of the answers are correct.

101) What are the unpaid entries in a search engine results page that were derived based on their content’s relevance to the keyword query? A) organic search B) paid search C) keyword D) search engine optimization

Version 1

29


102)

What are links a company paid to have displayed based on a users’ keywords? A) organic search B) paid search C) keyword D) search engine optimization

103)

What is a word used in a performing a search? A) organic search B) paid search C) keyword D) search engine optimization

104)

Which of the following represents adwords?

A) email, instant messaging, podcasting, content management systems, and video and web conferencing B) content providers, infomediaries, online marketplaces, portals, service providers, and transaction brokers C) keywords that advertisers choose to pay for and appear as sponsored links on Google results pages D) advertising fees, license fees, subscription fees, transaction fees, and value-added services fees

105)

Which of the following represents the primary ebusiness revenue models?

Version 1

30


A) email, instant messaging, podcasting, content management systems, and video and web conferencing B) content providers, infomediaries, online marketplaces, portals, service providers, and transaction brokers C) B2B, B2C, C2C, and C2B D) advertising fees, subscription fees, and transaction fees

106)

Which of the following represents the categories for ebusiness models?

A) email, instant messaging, podcasting, content management systems, and video and web conferencing B) content providers, infomediaries, online marketplaces, portals, service providers, and transaction brokers C) B2B, B2C, C2C, C2B D) advertising fees, license fees, subscription fees, transaction fees, and value-added services fees

107)

What is an ISP?

A) An instant service provider is a company that provides access to the Internet for a monthly fee. B) An Internet service provider is a company that provides access to the Internet for a monthly fee. C) An Internet sales provider is a company that provides access to the Internet for a monthly fee. D) An instant sales provider is a company that provides access to the Internet for a monthly fee.

108) Who studies the interaction between humans and technology, observing how technology can shape humans’ lives?

Version 1

31


A) cyborg anthropologist B) cyborg anthropology C) web real-time communications D) telepresence robots

109)

Who is a cyborg anthropologist?

A) an individual who studies the interaction between humans and technology, observing how technology can shape humans’ lives B) a discipline originated at the 1993 annual meeting of the American Anthropological Association C) an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers D) a remote-controlled, wheeled device with a display to enable video chat and videoconferencing

110)

What is cyborg anthropology?

A) an individual who studies the interaction between humans and technology, observing how technology can shape humans’ lives B) a discipline originated at the 1993 annual meeting of the American Anthropological Association C) an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers D) a remote-controlled, wheeled device with a display to enable video chat and videoconferencing

111) What occurs when a system updates information at the same rate it receives the information?

Version 1

32


A) collective intelligence system B) collaboration system C) real-time communication D) knowledge management system

112)

What is the primary business advantage of using email?

A) increasing the speed of order entry B) the ability to inform and communicate with many people simultaneously, immediately, and with ease C) the ability to have friends all over the globe D) increasing the number of computers required in an office

113)

What is another term for instant messaging? A) IMing B) HTML C) Podcasting D) Webbing

114)

What is a service that enables instant or real-time communication between people? A) URL B) instant messaging C) tacit knowledge D) elicit knowledge

Version 1

33


115) What were some of the immediate results businesses found from using instant messaging? A) the ability to transmit messages as fast as naturally flowing conversation B) the ability to easily hold simultaneous IM sessions with multiple people C) the ability to resolve questions or problems immediately D) All of the answers are correct.

116)

What converts an audio broadcast to a digital music player? A) podcasting B) video chat C) photo sharing D) email

117) As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly train her new hires. Exempla employees work at over 40 different locations across the Chicago metropolitan area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement to accomplish all of her training goals? A) IMing B) Video chat C) Blog D) Email

118) What do companies use as marketing communication channels discussing everything from corporate strategies to detailed product overviews?

Version 1

34


A) IMing B) web browsing C) email D) podcasting

119) What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website? A) blog B) taxonomy C) email D) podcast

120) Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone? A) knowledge management system B) podcasting C) email D) ebusiness

121) What is the ebusiness tool that can increase marketing reach and build customer loyalty through audio broadcasting? A) IMing B) email C) taxonomy D) podcasting

Version 1

35


122) Which ebusiness tool plays a crucial role in getting site visitors to view more than just the home page by providing clear navigation choices? A) organic search B) content management system C) open system D) open source

123)

What are the four most common Business 2.0 characteristics? A) content sharing through open source B) user-contributed content C) collaboration inside and outside the organization D) All of the answers are correct.

124) What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system? A) management system B) reputation system C) knowledge system D) open system

125)

What is Mozilla Firefox?

Version 1

36


A) a competitor to Microsoft Word B) a competitor to Microsoft Excel C) a competitor to Adobe Photoshop D) a competitor to Internet Explorer

126) What is an ebusiness model in which companies build, market, sell, and ship their products themselves, without relying on traditional stores or intermediaries? A) showrooming B) direct-to-consumer C) source code D) viral marketing

127) What is a marketing phenomenon that facilitates and encourages people to pass along a marketing message? A) paid search B) direct-to-consumer C) source code D) viral marketing

128)

What are the three main drivers of the direct-to-consumer sales channel? A) customer experience B) data collection C) reduced costs D) All of the answers are correct.

Version 1

37


129) What is software whose source code is available free for any third party to review and modify? A) freemium B) open source C) code source D) network source

130) What is any proprietary software licensed under exclusive legal right of the copyright holder? A) closed source B) open source C) closed system D) open system

131)

What is closed source?

A) any proprietary software licensed under exclusive legal right of the copyright holder B) any software whose source code is made available free for any third party to review and modify C) contains instructions written by a programmer specifying the actions to be performed by computer software D) consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate

132)

What is open source?

Version 1

38


A) any proprietary software licensed under exclusive legal right of the copyright holder B) any software whose source code is made available free for any third party to review and modify C) contains instructions written by a programmer specifying the actions to be performed by computer software D) consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate

133)

What is source code?

A) any proprietary software licensed under exclusive legal right of the copyright holder B) any software whose source code is made available free for any third party to review and modify C) contains instructions written by a programmer specifying the actions to be performed by computer software D) consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate

134)

What is an open system?

A) any proprietary software licensed under exclusive legal right of the copyright holder B) any software whose source code is made available free for any third party to review and modify C) contains instructions written by a programmer specifying the actions to be performed by computer software D) consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate

Version 1

39


135) Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique websites. Many of his daily tasks are heavily technical in nature and require a high level of computer programming and Internet knowledge. Which of the following would Erik primarily use when performing his daily tasks? A) source code B) brick-and-mortar C) information reach D) explicit knowledge

136) Ebusiness was characterized by few companies or users posting content for the masses. What characterizes Business 2.0? A) a select few posting content for high-level executives only B) the masses posting content for a select few C) the masses posting content for the masses D) a select few posting specific content for the masses

137)

What is web content that is created and updated by many users for many users? A) cybermediation contributed content B) user-contributed content C) executive-generated content D) customer-generated content

138) eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called

Version 1

40


A) reputation system. B) knowledge system. C) explicit system. D) tacit knowledge.

139) What is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user’s experience in terms of its content, format, style, or placement? A) reputation system B) knowledge system C) explicit system D) native advertising

140)

What is native advertising?

A) an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user’s experience in terms of its content, format, style, or placement B) buyers posting feedback on sellers C) content created and updated by many users for many users D) the wisdom of the crowd

141)

What is a reputation system?

Version 1

41


A) an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user’s experience in terms of its content, format, style, or placement B) buyers posting feedback on sellers C) content created and updated by many users for many users D) the wisdom of the crowd

142)

What is user-contributed content?

A) an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user’s experience in terms of its content, format, style, or placement B) buyers posting feedback on sellers C) content created and updated by many users for many users D) the wisdom of the crowd

143)

What is crowdsourcing?

A) an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user’s experience in terms of its content, format, style, or placement B) buyers posting feedback on sellers C) content created and updated by many users for many users D) the wisdom of the crowd

144)

What is the most common form of collective intelligence found inside the organization?

Version 1

42


A) crowdsourcing B) tacit management C) knowledge management D) tagging

145)

What is the difference between asynchronous and synchronous communication?

A) asynchronous communication occurs in real time; synchronous communication is oneway technology B) asynchronous communication does not occur at the same time; synchronous communication occurs at the same time C) asynchronous communication includes instant messaging; synchronous communication includes email D) asynchronous communication is fast and instant; synchronous communication is collected at a single point in time

146)

Which of the below is not a characteristic of Business 2.0? A) knowledge management B) collaboration system C) web browser D) explicit knowledge

147) Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?

Version 1

43


A) collaboration system B) collective system C) competitive system D) All of the answers are correct.

148) Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa’s job is to gather industry information, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the following would Lisa use to perform her job? A) interactivity metrics B) source code C) network effect D) collective intelligence

149) Which system supports the capturing, organization, and dissemination of knowledge throughout an organization? A) affiliate program B) knowledge management system C) source code system D) social media system

150)

Which of the following focuses on user-generated content? A) YouTube B) Wikipedia C) LinkedIn D) All of the answers are correct.

Version 1

44


151)

What are the two categories that include intellectual and knowledge-based assets? A) explicit knowledge; tacit knowledge B) efficient knowledge; tacit knowledge C) intelligent knowledge; explicit knowledge D) open knowledge; closed knowledge

152)

What is the type of knowledge that is contained in people’s heads? A) explicit knowledge B) virtual knowledge C) tacit knowledge D) pure knowledge

153) What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet? A) explicit knowledge B) crowdfunding C) tacit knowledge D) crowdsourcing

154) What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of a MIS department?

Version 1

45


A) tacit knowledge B) explicit knowledge C) pure knowledge D) virtual knowledge

155)

What is crowdsourcing?

A) the wisdom of the crowd B) sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet C) collaborating and tapping into the core knowledge of all employees, partners, and customers D) capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

156)

What is crowdfunding?

A) the wisdom of the crowd B) sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet C) collaborating and tapping into the core knowledge of all employees, partners, and customers D) capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

157)

What is collective intelligence?

Version 1

46


A) the wisdom of the crowd B) sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet C) collaborating and tapping into the core knowledge of all employees, partners, and customers D) iCapturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

158)

What is knowledge management?

A) the wisdom of the crowd B) sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet C) collaborating and tapping into the core knowledge of all employees, partners, and customers D) capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

159)

Which of the following is not an example of explicit knowledge? A) patent B) trademark C) employee opinion D) marketing research

160)

What do Netflix and Amazon use to drive their recommendation tools?

Version 1

47


A) Web 1.0 content B) open source content C) virtual content D) user-generated content

161) What are websites that rely on user participation and user-contributed content, such as Facebook, LinkedIn, and YouTube? A) synchronous communication B) social media C) social networking D) asynchronous communication

162) What is the practice of expanding your business and social contacts by constructing a personal network? A) network effects B) tagging C) social taxonomy D) social networking

163) Which of the following represents an example of why an employer would use social media? A) to find potential job candidates via LinkedIn B) to review potential job candidates by viewing their Facebook page C) to attract new job candidates via YouTube D) All of the answers are correct.

Version 1

48


164)

What are the two basic functions that social networking sites provide?

A) the ability to create and publish your own software B) the ability to create and maintain a profile that is your online identity and create connections between other people within the network C) the ability to capture and create URLs and RSSs D) the ability to create URLs and edit RSS software

165)

What is an SNA? A) strong network application B) social needs analysis C) social networking analysis D) steady network areas

166)

What is a social networking analysis?

A) represents the interconnection of relationships in a social network B) maps group contacts, identifying who knows each other and who works together C) describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search D) a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)

167)

What is social tagging?

Version 1

49


A) represents the interconnection of relationships in a social network B) maps group contacts, identifying who knows each other and who works together C) describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search D) a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)

168)

What is a hashtag?

A) represents the interconnection of relationships in a social network B) maps group contacts, identifying who knows each other and who works together C) describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search D) a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)

169)

What maps group contacts, identifying who knows each other and who works together? A) social network effects B) mashup networking analysis C) web network effects D) social networking analysis

170) Many social media websites use ________ or specific keywords or phrases incorporated into website content for means of classification or taxonomy.

Version 1

50


A) conferencing B) tags C) long tails D) categories

171) Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to A) organize it for future navigation. B) organize it for future filtering. C) organize it for future search. D) All of the answers are correct.

172) Cell phone manufacturers often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone? A) cell B) iPhone C) Galaxy D) technology platform

173) What is similar to taxonomy except that crowdsourcing determines the tag or keywordbased classification system? A) podcasting B) network effects C) folksonomy D) social bookmarking

Version 1

51


174)

How do the majority of potential customers find ebusiness websites? A) through radio B) through search terms that match the content C) through magazines D) through newspapers

175)

How would a company like Flickr use social tagging on its website? A) by applying keywords that do not match user content B) by building a tagging game for customers to participate in C) by allowing users to upload images and tag the images with their own keywords D) by selecting the keywords to associate with each image a customer uploads

176) Using the collective power of a community to identify and classify content significantly ________ content categorization costs. A) eliminates B) raises C) lowers D) balances

177) False information about the COVID-19 vaccine or about 5G allegedly causing cancer are two examples of ________ spread through the Internet.

Version 1

52


A) snackable content B) the net neutrality affect C) misinformation D) asynchronous communication

178)

Which of the following is a difference between misinformation and disinformation?

A) Misinformation refers to spreading false information to a few people, while disinformation refers to spreading false information to as many users as possible. B) Misinformation is the result of the network effect, while disinformation is the result of Metcalfe’s law. C) Misinformation is found on the deep web, while disinformation is found on the dark web. D) Misinformation is presented as fact without an intent to deceive, while disinformation is created to deceive the audience intentionally and maliciously.

179) The purpose of ________ is often to promote or discredit a public figure, political movement, or a company. A) fake news B) microblogging C) folksonomy D) crowdsourcing

180)

What is one simplification that has occurred with Business 2.0?

Version 1

53


A) helping online users create anonymity B) limiting the sharing capabilities of devices C) improving access to information D) communicating via email

181) What is an online journal that allows users to post their own opinions, comments, graphics, and video? A) web masters B) folksonomy C) disintermediation D) blog or web log

182)

Why are Fortune 500 companies engaging in blogging? A) to order supplies B) to review favorite Internet providers C) to gather feedback and share ideas D) to pay employees

183)

What type of website is Twitter? A) blog B) search engine C) microblogging D) All of the answers are correct.

Version 1

54


184) What is the practice of sending brief posts of 140-200 characters to a personal blog either publicly or to a private group of subscribers? A) ebusiness model B) tagging C) blogging D) microblog

185) Unlike traditional HTML, which of the following lets writers communicate and readers respond on a regular basis through a simple online journal? A) instant messaging B) HTTP C) blog D) email

186)

What is the difference between a wiki and a blog?

A) A wiki is free and a blog has a subscription fee. B) A wiki user can alter the original content of an article, whereas a blog user can only add information as a comment. C) A wiki is original content, whereas a blog is used sources. D) All of the answers are correct.

187) Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as

Version 1

55


A) reader. B) subject matter expert. C) editor. D) All of the answers are correct.

188)

What is a self-photograph placed on a social media website? A) selfie B) blog C) wiki D) mashup

189) What is an online journal that allows users to post their own comments, graphics, and videos? A) selfie B) blog C) wiki D) mashup

190)

What is a collaborative website that allows users to add, remove, and change content? A) selfie B) blog C) wiki D) mashup

Version 1

56


191)

What is a selfie? A) a self-photograph placed on a social media website B) the practice of sending brief posts to a personal blog C) a web format used to publish frequently updated works D) a magazine published only in electronic form on a computer network

192)

What is microblogging? A) a self-photograph placed on a social media website B) the practice of sending brief posts to a personal blog C) a web format used to publish frequently updated works D) a magazine published only in electronic form on a computer network

193) What describes how products in a network increase in value to users as the number of users increase? A) network effect B) RSS C) mashup editor D) knowledge management

194) Which of the following is one of the largest wikis on the web and one of the 10 most popular web destinations? A) Google B) eBay C) Wikipedia D) Yahoo

Version 1

57


195) Some of the benefits for a company to operate an internal wiki are that they are great tools for all of the following except A) collecting and disseminating knowledge. B) building software applications. C) sharing information between functional business areas. D) distributing information to employees or partners across geographical distances.

196)

Which of the following best describes Web 1.0? A) static text-based information websites B) static electricity and connectivity C) social media D) technology intelligence

197)

Which of the following best describes Web 2.0? A) static websites B) intelligent websites C) social media and user-generated web content D) hypertext markup language

198)

Which of the following best describes Web 3.0?

Version 1

58


A) user-generated online business B) based on “intelligent” web applications using natural language processing C) collaboration and social media D) All of the answers are correct.

199)

What is the large part of the Internet that is inaccessible to conventional search engines? A) deep web B) dark web C) snackable content D) semantic web

200)

What is also referred to as the invisible web? A) deep web B) dark web C) snackable content D) semantic web

201) What is the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser? A) deep web B) dark web C) snackable content D) semantic web

Version 1

59


202)

What is content that is designed to be easy for readers to consume and to share? A) deep web B) dark web C) snackable content D) semantic web

203) What is a component of Web 3.0 that describes things in a way that computers can understand? A) social tagging B) sustaining web C) social web D) semantic web

204)

Which statement below is inaccurate? A) Web 2.0 is a simple static website without any interaction with its users. B) Web 2.0 brings people closer together with information-using machines. C) Web 3.0 brings machines closer together using information. D) Web 3.0 is a rich, “intelligent” understanding and relationships among concept and

topics.

205) What is a component of Web 3.0 that describes things in a way that computers can understand?

Version 1

60


A) social tagging B) sustaining web C) social web D) semantic web

206)

Which statement below is incorrect?

A) the semantic web captures, organizes, and disseminates knowledge (i.e., know-how) throughout an organization B) the semantic web describes the relationships between things C) the semantic web describes the properties of things D) the semantic web is not about links between web pages

207)

Which of the following is not a topic or feature that is included in Web 3.0? A) a worldwide database B) intelligent applications C) social networking D) integration of legacy devices

208) What statement below describes Web 3.0’s feature that ensures the “integration of legacy devices”? A) the ability to use current devices such as iPhones and laptops as credit cards or tickets B) the design of websites and other software so they can be easily integrated and work together C) the ability for software to be distributed and accessed from anywhere D) the design of software to be easily integrated and work together

Version 1

61


209)

Disruptive technology tends to provide us with better, faster, and cheaper products. ⊚ ⊚

true false

210) Disruptive and new technologies typically cut into the low-end of the marketplace and eventually evolve to displace high-end competitors and their reigning technologies. ⊚ ⊚

true false

211) In terms of disruptive technology, what is best for an organization’s current business could ruin it in the long term. ⊚ ⊚

212)

Ebusiness is the buying and selling of goods and services over the Internet. ⊚ ⊚

213)

true false

true false

Ebusiness is something that a business can just go out and buy. ⊚ ⊚

true false

214) Future managers and workers need to understand the benefits MIS and ebusiness can offer a company if it wants to take advantage of sustaining technologies.

Version 1

62


⊚ ⊚

true false

215) A disruptive technology is a new way of doing things that initially does not meet the needs of existing customers. ⊚ ⊚

true false

216) A sustaining technology produces an improved product customers are eager to buy, such as a faster car or larger hard drive. ⊚ ⊚

true false

217) A sustaining technology is a new way of doing things that initially does not meet the needs of existing customers. ⊚ ⊚

true false

218) A disruptive technology produces an improved product customers are eager to buy, such as a faster car or larger hard drive. ⊚ ⊚

true false

219) The universal resource locator (URL) contains the address of a file or resource on the web such as www.apple.com or www.microsoft.com. ⊚ ⊚ Version 1

true false 63


220) The Innovator’s Dilemma, a book by Clayton Christensen, discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders. ⊚ ⊚

true false

221) The Internet provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML. ⊚ ⊚

true false

222) The WWW provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML. ⊚ ⊚

true false

223) The Internet is a massive network that connects computers all over the world and allows them to communicate with one another. ⊚ ⊚

true false

224) Hypertext markup language (HTML) links documents, allowing users to move from one to another simply by clicking on a hot spot or link. ⊚ ⊚

Version 1

true false

64


225) The World Wide Web, such as Internet Explorer or Mozilla’s Firefox, allow users to access organization systems. ⊚ ⊚

true false

226) Hypertext transport protocol (HTTP) is the Internet protocol web browsers use to request and display web pages using universal resource locators. ⊚ ⊚

true false

227) A universal resource locator (URL) identifies a URL address, and apple.com is an example of a domain name. ⊚ ⊚

228)

true false

URLs use domain names to identify particular websites. ⊚ ⊚

true false

229) Domain name hosting (web hosting) is a service that allows the owner of a domain name to maintain a simple website and provide email capacity. ⊚ ⊚

Version 1

true false

65


230) Ecommerce is the buying and selling of goods and services over the Internet. Ecommerce refers only to online transactions. ⊚ ⊚

true false

231) Ecommerce includes ebusiness along with all activities related to internal and external business operations, such as servicing customer accounts, collaborating with partners, and exchanging real-time information. During Web 1.0, entrepreneurs began creating the first forms of ecommerce. ⊚ ⊚

true false

232) A paradigm shift occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave. ⊚ ⊚

true false

233) A few examples of ebusiness advantages can include opening new markets, reducing costs, and expanding global reach. ⊚ ⊚

true false

234) Intermediaries occur when a customer sells directly to another customer online, cutting out the intermediary. ⊚ ⊚

Version 1

true false

66


235) Net neutrality’s founding principle includes the idea that all consumers should be able to use the Internet and its resources. ⊚ ⊚

true false

236) Interactivity measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement. ⊚ ⊚

true false

237) Information richness refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information. ⊚ ⊚

true false

238) Information richness measures the number of people a firm can communicate with all over the world. ⊚ ⊚

true false

239) Mass customization is the ability of an organization to tailor its products or services to the customers’ specifications. For example, customers can order M&Ms in special colors or with customized sayings such as “Marry Me.” ⊚ ⊚

Version 1

true false

67


240) Mass customization occurs when a company knows enough about a customer’s likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions. ⊚ ⊚

true false

241) Cybermediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites and bank account aggregation services. ⊚ ⊚

true false

242) Information reach refers to the number of people a business can communicate with on a global basis. ⊚ ⊚

true false

243) An example of showrooming would include a person finding a book they like at a local book store and then ordering it on Amazon for a cheaper amount. ⊚ ⊚

true false

244) An ebusiness clickstream is a plan that details how a company creates, delivers, and generates revenues. ⊚ ⊚

Version 1

true false

68


245) A business model shows the hierarchy and organization of the employees in a division or company. ⊚ ⊚

true false

246) An ebusiness model is a plan that details how a company creates, delivers, and generates revenues on the Internet. ⊚ ⊚

true false

247) Content providers are companies that generate revenue by providing digital content such as news, music, photos, or videos and examples include Netflix and Spotify. ⊚ ⊚

248)

true false

Transaction brokers process online sales transactions. ⊚ ⊚

true false

249) Business-to-consumer applies to any business that sells its products or services directly to consumers online. ⊚ ⊚

250)

true false

A click-and-mortar business operates on the Internet only, without a physical store.

Version 1

69


⊚ ⊚

true false

251) The majority of eBay’s customers are using a business-to-business (B2B) ebusiness model. ⊚ ⊚

true false

252) A business model is a plan that details how a company creates, delivers, and generates revenues. ⊚ ⊚

253)

true false

Dot-com was the original term for a company operating on the Internet. ⊚ ⊚

true false

254) A search engine is website software that finds other pages based on keyword matching similar to Google. ⊚ ⊚

true false

255) Search engine ranking evaluates variables that search engines use to determine where a URL appears on the list of search results. ⊚ ⊚

Version 1

true false

70


256) Adwords are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages. ⊚ ⊚

true false

257) Search engine optimization are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages. ⊚ ⊚

true false

258) Pay-per-call are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages. ⊚ ⊚

true false

259) Search engine optimization (SEO) combines art along with science to determine how to make URLs more attractive to search engines, resulting in higher search engine ranking. ⊚ ⊚

260)

true false

Pay-per-call generates revenue each time a user clicks on a link to a retailer’s website. ⊚ ⊚

Version 1

true false

71


261) Pay-per-click generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call. ⊚ ⊚

true false

262) Pay-per-conversion generates revenue each time a website visitor is converted to a customer. ⊚ ⊚

true false

263) Many businesses are using instant messaging as a way to answer and resolve questions or problems quickly. ⊚ ⊚

true false

264) An Internet service provider (ISP) is a company that provides access to the Internet for a monthly fee. ⊚ ⊚

true false

265) Real-time communication occurs when a system updates information at the same rate it receives it. ⊚ ⊚

true false

266) Instant messaging (IMing) is a service that enables instant or real-time communication between people. Version 1

72


⊚ ⊚

267)

true false

Instant messaging converts an audio broadcast to a digital music player. ⊚ ⊚

true false

268) Video chat is an online face-to-face, visual communication performed with other Internet users by using a webcam and dedicated software. ⊚ ⊚

true false

269) Web 2.0 is the next generation of Internet that uses a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free cost. ⊚ ⊚

270)

true false

Source code is software made available free for any third party to review and modify. ⊚ ⊚

true false

271) The most common form of collective intelligence found outside the organization is crowdsourcing, or the wisdom of the crowd. ⊚ ⊚

Version 1

true false

73


272) An open system consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. ⊚ ⊚

true false

273) An open system contains instructions written by a programmer specifying the actions to be performed by computer software. ⊚ ⊚

true false

274) Open source refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify. ⊚ ⊚

true false

275) User-contributed content (or user-generated content) is created and updated by many users for many users. ⊚ ⊚

true false

276) User-contributed content is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information. ⊚ ⊚

Version 1

true false

74


277)

Open systems tap into the core knowledge of all employees, partners, and customers. ⊚ ⊚

true false

278) Closed source is any proprietary software licensed under exclusive legal right of the copyright holder. ⊚ ⊚

true false

279) Native advertising is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user’s experience in terms of its content, format, style, or placement. ⊚ ⊚

true false

280) Open source is any proprietary software licensed under exclusive legal right of the copyright holder. ⊚ ⊚

true false

281) Closed source is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user’s experience in terms of its content, format, style, or placement. ⊚ ⊚

Version 1

true false

75


282) Knowledge can be a real competitive advantage for an organization. The most common form of collective intelligence found inside the organization is knowledge management (KM), which involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. ⊚ ⊚

true false

283) Crowdfunding sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. ⊚ ⊚

true false

284) Native advertising sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. ⊚ ⊚

true false

285) The primary objective of knowledge management is to be sure that a company’s knowledge of facts, sources of information, and solutions are readily available to all employees whenever it is needed. ⊚ ⊚

true false

286) A knowledge management system (KMS) supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. KMS can distribute an organization’s knowledge base by interconnecting people and digitally gathering their expertise.

Version 1

76


⊚ ⊚

true false

287) Tacit knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS. Examples of tacit knowledge are assets such as patents, trademarks, business plans, marketing research, and customer lists. ⊚ ⊚

true false

288) Explicit knowledge is the knowledge contained in people’s heads. The challenge inherent in explicit knowledge is figuring out how to recognize, generate, share, and manage knowledge that resides in people’s heads. ⊚ ⊚

true false

289) Social media refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg. ⊚ ⊚

true false

290) Social tagging is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system. ⊚ ⊚

true false

291) A hashtag is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#). For example, the hashtag #sandiegofire helped coordinate emergency responses to a fire. Version 1

77


⊚ ⊚

true false

292) A network effect is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#). ⊚ ⊚

true false

293) A social network is an application that connects people by matching profile information. Providing individuals with the ability to network is by far one of the greatest advantages of Business 2.0. ⊚ ⊚

true false

294) Social networking is the practice of expanding your business and/or social contacts by constructing a personal network. ⊚ ⊚

true false

295) Social media maps group contacts (personal and professional), identifying who knows each other and who works together. In a company, it can provide a vision of how employees work together. ⊚ ⊚

true false

296) Tags are specific keywords or phrases incorporated into website content for means of classification or taxonomy.

Version 1

78


⊚ ⊚

true false

297) Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search. ⊚ ⊚

true false

298) Wiki is a Hawaiian word for “quick” and is a type of a collaborative web page that allows users to add, remove, and change content. ⊚ ⊚

true false

299) Microblogging is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages. ⊚ ⊚

true false

300) The network effect describes how products in a network increase in value to users as the number of users increases. ⊚ ⊚

true false

301) Misinformation refers to false information that is presented as fact without an intent to deceive.

Version 1

79


⊚ ⊚

true false

302) Information about 5G allegedly causing cancer is an example of misinformation spread through the Internet. ⊚ ⊚

true false

303) Disinformation refers to false information that is presented as fact, with an intent to deceive and mislead. ⊚ ⊚

true false

304) The hackings and distribution of information conducted by Russia to mislead and influence the American elections is an example of disinformation. ⊚ ⊚

true false

305) Fake news refers to news stories created to be widely shared or distributed for the purpose of promoting or discrediting a public figure, political movement, or a company. ⊚ ⊚

true false

306) Ads run by the CDC to explain the effectiveness and safety of the COVID 19 vaccine is an example of Fake news. ⊚ ⊚ Version 1

true false 80


307)

A selfie is a self-photograph placed on a social media website. ⊚ ⊚

308)

A hashtag is a self-photograph placed on a social media website. ⊚ ⊚

309)

true false

true false

Web 3.0 refers to static, text-based information websites. ⊚ ⊚

Version 1

true false

81


Answer Key Test name: Chap 03_8e_Baltzan 11) B 12) A 13) D 14) B 15) D 16) A 17) B 18) B 19) B 20) D 21) C 22) A 23) B 24) C 25) B 26) B 27) B 28) C 29) B 30) C 31) B 32) D 33) B 34) D 35) A 36) D Version 1

82


37) B 38) C 39) A 40) B 41) D 42) A 43) A 44) B 45) C 46) D 47) A 48) B 49) C 50) D 51) C 52) D 53) C 54) A 55) B 56) C 57) C 58) B 59) D 60) D 61) D 62) C 63) D 64) D 65) C 66) B Version 1

83


67) A 68) D 69) D 70) A 71) B 72) C 73) A 74) D 75) A 76) C 77) C 78) D 79) A 80) B 81) C 82) A 83) A 84) A 85) C 86) C 87) B 88) C 89) D 90) D 91) C 92) A 93) B 94) D 95) D 96) A Version 1

84


97) B 98) C 99) D 100) D 101) A 102) B 103) C 104) C 105) D 106) C 107) B 108) A 109) A 110) B 111) C 112) B 113) A 114) B 115) D 116) A 117) B 118) D 119) B 120) C 121) D 122) B 123) D 124) D 125) D 126) B Version 1

85


127) D 128) D 129) B 130) A 131) A 132) B 133) C 134) D 135) A 136) C 137) B 138) A 139) D 140) A 141) B 142) C 143) D 144) C 145) B 146) C 147) A 148) D 149) B 150) D 151) A 152) C 153) B 154) B 155) A 156) B Version 1

86


157) C 158) D 159) C 160) D 161) B 162) D 163) D 164) B 165) C 166) B 167) C 168) D 169) D 170) B 171) D 172) D 173) C 174) B 175) C 176) C 177) C 178) D 179) A 180) C 181) D 182) C 183) C 184) D 185) C 186) B Version 1

87


187) D 188) A 189) B 190) C 191) A 192) B 193) A 194) C 195) B 196) A 197) C 198) B 199) A 200) A 201) B 202) C 203) D 204) A 205) D 206) A 207) C 208) A 209) FALSE 210) TRUE 211) TRUE 212) FALSE 213) FALSE 214) FALSE 215) TRUE 216) TRUE Version 1

88


217) FALSE 218) FALSE 219) TRUE 220) TRUE 221) FALSE 222) TRUE 223) TRUE 224) TRUE 225) FALSE 226) TRUE 227) FALSE 228) TRUE 229) TRUE 230) TRUE 231) FALSE 232) TRUE 233) TRUE 234) FALSE 235) TRUE 236) TRUE 237) TRUE 238) FALSE 239) TRUE 240) FALSE 241) TRUE 242) TRUE 243) TRUE 244) FALSE 245) FALSE 246) TRUE Version 1

89


247) TRUE 248) TRUE 249) TRUE 250) FALSE 251) FALSE 252) TRUE 253) TRUE 254) TRUE 255) TRUE 256) TRUE 257) FALSE 258) FALSE 259) TRUE 260) FALSE 261) FALSE 262) TRUE 263) TRUE 264) TRUE 265) TRUE 266) TRUE 267) FALSE 268) TRUE 269) TRUE 270) FALSE 271) TRUE 272) TRUE 273) FALSE 274) TRUE 275) TRUE 276) FALSE Version 1

90


277) FALSE 278) TRUE 279) TRUE 280) FALSE 281) FALSE 282) TRUE 283) TRUE 284) FALSE 285) TRUE 286) TRUE 287) FALSE 288) FALSE 289) TRUE 290) FALSE 291) TRUE 292) FALSE 293) TRUE 294) TRUE 295) FALSE 296) TRUE 297) TRUE 298) TRUE 299) TRUE 300) TRUE 301) TRUE 302) TRUE 303) TRUE 304) TRUE 305) TRUE 306) FALSE Version 1

91


307) TRUE 308) FALSE 309) FALSE

Version 1

92


CHAPTER 4 1)

Explain the ethical issues in the use of information technology.

2)

Identify the six epolicies organizations should implement to protect themselves.

3)

Describe the relationships and differences between hackers and viruses.

4) Describe the relationship between information security policies and an information security plan.

Version 1

1


5) Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

6) Which of the following represents the two fundamental building blocks that protect organizational information? A) security and anti-spam B) confidentiality and security C) ethics and security D) ethics and technology

7) What is the legal protection afforded an expression of an idea, such as a song, book, or video game? A) privacy B) confidentiality C) intellectual property D) copyright

8) What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

Version 1

2


A) intellectual software B) intellectual property C) trademark property D) ethical property

9) Trust between companies, customers, partners, and suppliers is the support structure of which of the following? A) ebusiness B) ediscovery C) antivirus software D) epolicies

10) In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them? A) contentment B) ethical standard C) confidentiality D) firewall security

11) Which of the following represents the principles and standards that guide our behavior toward other people? A) ethics B) intellectual property C) standards of living D) security

Version 1

3


12)

What is the difference between pirated and counterfeit software?

A) Counterfeit software is fake technology products, whereas pirated is invisible technological cameras placed online. B) Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit is software that is manufactured to look like the real thing and sold as such. C) Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated is software that is manufactured to look like the real thing and sold as such. D) Pirated software is stolen and used to hack into a company’s classified material, whereas counterfeit is a fake version of firewall software.

13) Which of the following governs the ethical and moral issues arising from the development and use of information technologies and the creation, collection, duplication, distribution, and processing of information? A) ethical information B) information technology C) information policies D) information ethics

14) Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent? A) safety B) ethical standard C) privacy D) confidentiality

Version 1

4


15) Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between which of the following? A) legal and confidential B) legal and ethical C) legal and technical D) confidential and open

16) What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution? A) digital rights management B) counterfeit software C) privacy D) pirated software

17) Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring it has the types of data or information required to function and grow effectively? A) information code B) information technology C) information management D) information governance

Version 1

5


18) Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game Nintendo After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company. Sophie is unsure about accepting the game because legally it would be considered A) counterfeit software. B) pirated software. C) ethical software. D) governance software.

19)

What is the method or system of government for information management or control? A) information management B) information compliance C) information governance D) information secrecy

20) What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity? A) information management B) information compliance C) information secrecy D) information ethics

21)

Which of the following represents the definition of information property?

Version 1

6


A) an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged B) a method or system of government for information management or control C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

22)

Which of the following represents the definition of information governance?

A) the act of conforming, acquiescing, or yielding information B) a method or system of government for information management or control C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

23)

Which of the following represents the definition of information secrecy?

A) the act of conforming, acquiescing, or yielding information B) a method or system of government for information management or control C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

24)

Which of the following represents the definition of information management?

Version 1

7


A) the act of conforming, acquiescing, or yielding information B) a method or system of government for information management or control C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

25)

Which of the following represents the definition of information compliance?

A) the act of conforming, acquiescing, or yielding information B) a method or system of government for information management or control C) information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

26)

Which of the following represents the definition of information compliance? A) the act of conforming, acquiescing, or yielding information B) the ability to comply with software C) the understanding of technology D) the verbalization of information governance in a company’s policies and procedures

27) Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

Version 1

8


A) confidentiality B) digital information C) privacy policies D) information ethics

28) Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry? A) email privacy policy B) cybersecurity C) ediscovery D) epolicies

29) In the information technology world, which of the following are examples of ethical issues that a company may have to manage? A) employees copying and distributing company-owned software B) employees searching other employees’ private information without their consent C) employees intentionally creating or spreading viruses to confuse IT D) All of the answers are correct.

30) When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants? A) quadrant IV B) quadrant II and III C) quadrant I D) quadrant III

Version 1

9


31)

Which of the following is included in the four quadrants of ethical and legal behavior? A) legal behavior and ethical behavior B) illegal behavior and ethical behavior C) legal behavior and unethical behavior D) All of the answers are correct.

32) What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents? A) ethics B) intellectual property C) privacy D) confidentiality

33)

Which of the following describes privacy?

A) the assurance that messages and data are available only to those who are authorized to view them B) policies and procedures that address the ethical use of computers and the Internet in the business environment C) the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent D) the principles and standards that guide our behavior toward other people

34)

Which of the following is an example of acting ethically?

Version 1

10


A) Individuals copy, use, and distribute software. B) Employees search organizational databases for sensitive corporate and personal information. C) Individuals hack into computer systems to steal proprietary information. D) None of the answers are correct.

35)

Which of the following describes confidentiality?

A) the assurance that messages and information are available only to those who are authorized to view them B) policies and procedures that address the ethical use of computers and the Internet in the business environment C) the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent D) the principles and standards that guide our behavior toward other people

36) What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry? A) ediscovery B) Child Online Protection Act C) digital rights management D) pirated software

37)

What was passed to protect minors from accessing inappropriate material on the Internet?

Version 1

11


A) Rule 41 B) Child Online Protection Act C) digital rights management D) pirated software

38) What is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence? A) ediscovery B) Child Online Protection Act C) Rule 41 D) pirated software

39) Which rule is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence? A) Rule 4 B) Rule 1 C) Rule 41 D) Rule 4.2

40) What is the measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals? A) digital trust B) Child Online Protection Act C) Rule 41 D) digital child

Version 1

12


41) What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution? A) ediscovery B) Child Online Protection Act C) digital rights management D) digital trust

42)

What is the unauthorized use, duplication, distribution, or sale of copyrighted software? A) digital trust B) Child Online Protection Act C) digital rights management D) pirated software

43)

What is ediscovery?

A) the unauthorized use, duplication, distribution, or sale of copyrighted software B) the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C) a law passed to protect minors from accessing inappropriate material on the Internet D) the measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals

44)

What is the Child Online Protection Act?

Version 1

13


A) the unauthorized use, duplication, distribution, or sale of copyrighted software B) the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C) a law passed to protect minors from accessing inappropriate material on the Internet D) the measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals

45)

What is digital rights management?

A) the measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals B) the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C) a law passed to protect minors from accessing inappropriate material on the Internet D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

46)

What is pirated software?

A) the unauthorized use, duplication, distribution, or sale of copyrighted software B) the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C) the measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

47) What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

Version 1

14


A) information systems policy B) epolicies C) technology applied policy D) data scraping

48) Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text? A) information privacy policy B) workplace monitoring policy C) acceptable use policy D) GDPR monitoring policy

49)

Which of the following contains general principles to guide computer user behavior? A) information technology code B) technology policy C) ethical computer use policy D) information systems

50)

Which of the following clauses is typically contained in an acceptable use policy? A) nonrepudiation clause B) digital trust clause C) confidentiality clause D) employee use clause

Version 1

15


51)

Which of the following would not be found in a typical acceptable use policy?

A) not using the service as part of violating any law B) not posting commercial messages to groups where the employee has received user consent C) not performing any nonrepudiation D) not attempting to break the security of any computer network

52) Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions? A) compliance B) noncommittal C) nonrepudiation D) digital trust

53) According to the ethical computer use policy, users should ________ the rules and, by agreeing to use the system on that basis, ________ to abide by the rules. A) be informed of; collaborate B) consent to; be informed C) be informed; consent D) consent to; be informed

54) Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?

Version 1

16


A) acceptable use policy B) social media policy C) information privacy policy D) email privacy policy

55)

Which of the following is not considered an epolicy? A) acceptable use policy B) Internet use policy C) ethical computer use policy D) anti-hacker use policy

56)

Which policy contains general principles regarding information privacy? A) information privacy policy B) acceptable use policy C) Internet use policy D) antispam policy

57) Which of the following represents the classic example of unintentional information reuse? A) phone number B) Social Security number C) address D) driver’s license number

Version 1

17


58)

What is also called web scraping? A) data scraping B) data security C) fair information practices D) biometrics

59) What is the process of extracting large amounts of data from a website and saving it to a spreadsheet or computer? A) data scraping B) data security C) fair information practices D) biometrics

60) What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union? A) Rule 41 B) the right to be forgotten C) fair information practices D) General Data Protection Regulation (GDPR)

61) What occurs when you allow an individual to request to have all content that violates their privacy removed?

Version 1

18


A) data scraping B) the right to be forgotten C) fair information practices D) General Data Protection Regulation

62) What is one of the guidelines an organization can follow when creating an information privacy policy? A) adoption and implementation of an antispam policy B) notice and disclosure C) choice and quality D) None of the answer choices are correct.

63)

What is one of the major problems with email? A) intellectual property B) nonrepudiation C) user’s expectation of privacy D) None of the answer choices are correct.

64)

If an organization implemented only one policy, which one would it want to implement? A) information privacy policy B) acceptable use policy C) Internet use policy D) ethical computer use policy

Version 1

19


65) Jackie is the head teller at ABC Bank, and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem? A) information privacy policy B) email privacy policy C) Internet use policy D) All of the answers are correct.

66)

Which of the below would you find in a typical Internet use policy? A) user ramifications if the policy is violated B) user responsibility for properly handling offensive material C) user responsibility for protecting the company’s good name D) All of the answers are correct.

67) Which of the following policies details the extent to which email messages may be read by others? A) email privacy policy B) email confidential policy C) right to be forgotten policy D) spam policy

68)

Employees need to understand that corporate email is solely owned by the

Version 1

20


A) individual user. B) company. C) human resources department. D) individual user’s department.

69)

Which of the following should a company email privacy policy do?

A) define legitimate email users and explain what happens to accounts after a person leaves the organization B) discourage sending junk email or spam to anyone who doesn’t want to receive it C) inform users that the organization has no control over email once it has been transmitted outside the organization D) All of the answers are correct.

70) What sends massive amounts of email to a specific person or system that can cause that user’s server to stop functioning? A) mail bomb B) spam C) digital trust D) junk mail

71)

What is unsolicited email that plagues employees at all levels and clogs email systems? A) spyware B) spam C) adware D) All of the answers are correct.

Version 1

21


72) What kind of policy can a company implement that can help diminish the activity of sending unsolicited email? A) email privacy policy B) spam policy and procedures C) antispam policy D) information privacy policy

73) To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy. A) Internet use policy B) social media policy C) information use policy D) employee monitoring policy

74) Which policy can protect a company’s brand identity and outlines the corporate principles governing employee online communication? A) Internet workplace policy B) social media policy C) technology information policy D) YouTube policy

75) With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. Which policy informs an employee that the company might track employee’s activities by such measures as keystrokes, error rate, and number of transactions processed?

Version 1

22


A) antispam system B) information intelligence system C) workplace MIS monitoring D) ebusiness monitoring

76)

Which of the following is a common Internet monitoring technology? A) key logger B) hardware key logger C) cookie D) All of the answers are correct.

77) What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard? A) spyware B) web log C) adware D) hardware key logger

78) What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased? A) key logger B) spyware C) clickstream D) web log

Version 1

23


79) Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy? A) be as specific as possible stating when and what will be monitored B) do not state the consequences of violating the policy C) always enforce the policy the same for everyone D) expressly communicate that the company reserves the right to monitor all employees

80)

What is a mail bomb?

A) sending a massive amount of email to a specific person or system, resulting in filling up the recipient’s disk space B) a contractual stipulation to ensure that ebusiness participants do not deny their online actions C) sending a few emails to a specific person or system, resulting in filling up the recipient’s disk space D) a contractual stipulation to ensure that ebusiness participants deny their online actions

81)

Which policy details the extent to which email messages may be read by others? A) acceptable use policy B) email privacy policy C) Internet use policy D) GDPR policy

82) Which of the following measures are included in workplace MIS monitoring that tracks people’s activities?

Version 1

24


A) number of keystrokes B) error rate C) number of transactions processed D) All of the answers are correct.

83)

What program, when installed on a computer, records every keystroke and mouse click? A) key logger software B) spyware C) cookie D) adware

84) What is a small file deposited on a hard drive by a website containing information about customers and their web activities? A) key logger B) hardware key logger C) cookie D) adware

85) What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on a website? A) cyberbullying B) information vandalism C) cookie D) mail bomb

Version 1

25


86)

What is the electronic defacing of an existing website? A) information bullying B) cybervandalism C) cookie D) nonrepudiation

87) What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on a website? A) cyberbullying B) cybervandalism C) click-fraud D) competitive click-fraud

88)

What is the electronic defacing of an existing website? A) cyberbullying B) cybervandalism C) click-fraud D) competitive click-fraud

89) What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?

Version 1

26


A) cyberbullying B) fair information practices C) click-fraud D) bring your own device

90) What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications? A) cyberbullying B) fair information practices C) click-fraud D) bring your own device

91) Which of the following is one of the four basic options included in a bring your own device policy? A) unlimited access for personal devices B) access only to nonsensitive systems and data C) access but preventing local storage of data on personal devices D) All of the answers are correct.

92)

What refers to denying permissions to incoming emails? A) opt out B) opt in C) BYOD D) nonrepudiation

Version 1

27


93)

What refers to choosing to allow permissions to incoming emails? A) opt out B) opt in C) BYOD D) nonrepudiation

94) What is the process of monitoring and responding to what is being said about a company, individual, product, or brand? A) social media monitoring B) social media manager C) social media policy D) antispam policy

95) Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand? A) social media monitoring B) social media manager C) social media policy D) information privacy manager

96) What outlines the corporate guidelines or principles governing employee online communications?

Version 1

28


A) social media monitoring B) social media manager C) social media policy D) information privacy manager

97) What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser? A) cyberbullying B) cybervandalism C) click-fraud D) competitive click-fraud

98) What is a computer crime where a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking on the advertiser’s link? A) cyberbullying B) cybervandalism C) click-fraud D) competitive click-fraud

99)

What is an act or object that poses a danger to assets? A) cyberbullying B) threat C) click-fraud D) competitive click-fraud

Version 1

29


100)

What is cybervandalism?

A) the electronic defacing of an existing website B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser C) a computer crime where a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking on the advertiser’s link D) an act or object that poses a danger to assets

101)

What is click-fraud?

A) the electronic defacing of an existing website B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser C) a computer crime where a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking on the advertiser’s link D) an act or object that poses a danger to assets

102)

What is competitive click-fraud?

A) the electronic defacing of an existing website B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser C) a computer crime where a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking on the advertiser’s link D) an act or object that poses a danger to assets

103)

What is a threat?

Version 1

30


A) the electronic defacing of an existing website B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser C) a computer crime where a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking on the advertiser’s link D) an act or object that poses a danger to assets

104) What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names? A) typosquatting B) website name stealing C) Internet censorship D) teergrubing

105) What is the theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner? A) typosquatting B) website name stealing C) Internet censorship D) teergrubing

106) What is government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens?

Version 1

31


A) typosquatting B) website name stealing C) Internet censorship D) teergrubing

107) What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam? A) cyber duty B) website name stealing C) Internet censorship D) teergrubing

108)

What occurs when a person chooses to deny permission to incoming emails? A) opt out B) website name stealing C) opt in D) digital trust

109)

Which of the following definitions represents typosquatting?

Version 1

32


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names B) the theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens D) an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

110)

Which of the following definitions represents website name stealing?

A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names B) the theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens D) an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

111)

Which of the following definitions represents Internet censorship?

Version 1

33


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names B) the theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens D) an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

112)

Which of the following definitions represents teergrubing?

A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names B) the theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens D) an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

113)

Which of the following definitions represents opt-out?

Version 1

34


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names B) the theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner C) allowing permission to incoming emails D) denying permission to incoming emails

114)

Which of the following definitions represents opt-in?

A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names B) the theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner C) allowing permission to incoming emails D) denying permission to incoming emails

115)

Which of the following defines physical security?

A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names B) tangible protection such as alarms, guards, fireproof doors, fences, and vaults C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens D) denying permission to incoming emails

116)

Which of the following refers to a period of time when a system is unavailable?

Version 1

35


A) downtime B) down MIS C) data down D) downtown

117)

Which of the following is not an example of unplanned downtime? A) power outage B) tornado C) system upgrade D) flood

118)

Which of the following is a cost of downtime in addition to lost revenue? A) legal expenses B) loss in financial performance C) damage to reputation D) All of the answers are correct.

119)

A company should be able to calculate the cost of downtime by which of the following? A) per hour, per day, and per week B) per employee, per computer, and per company C) per stock, per stockholder, and per investment capital D) All of the answers are correct.

Version 1

36


120) Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses? A) fiscal responsibility B) damaged reputation C) other expenses D) regeneration

121) Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen’s new task is to break into the computer system of one of HackersRUs’s top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen? A) cracker B) white-hat hacker C) script bunny D) black-hat hacker

122)

Which of the following defines information security? A) a broad term encompassing the protection of information B) protects information from accidental misuse C) protects information from intentional misuse D) All of the answers are correct.

123) What are experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge known as?

Version 1

37


A) elevation of privilege B) viruses C) hackers D) worms

124) What is a hacker who breaks into other people’s computer systems and may just look around or steal and destroy information? A) script-kiddies B) black-hat hacker C) white-hat hacker D) cracker

125) Which of the following is the correct list of the six different types of hackers listed in your text? A) black-hat, crackers, cyberterrorists, hacktivists, script-kiddies, and white-hat B) black-top, cookie, script-kiddies, environment, web 3.0, and white-top C) black-hat, script-kiddies, script bats, spider crawlers, ad spiders, and white-hat D) All of the answers are correct.

126)

What is software written with malicious intent to cause annoyance or damage? A) elevation of privilege B) spoofing C) sniffer D) virus

Version 1

38


127)

What are malicious attempts to access or damage a computer system? A) cyberattacks B) spoofing C) information attacks D) information ethics

128) What involves prevention, detection, and response to cyberattacks that can have wideranging effects on the individual, organization, community, and at the national level? A) cyberattacks B) cybersecurity C) sniffer D) information attacks

129) What builds the national capacity to defend against cyberattacks and works with the federal government to provide cyber security tools, incident response services, and assessment capabilities to safeguard .gov networks? A) cyberattacks B) data security C) Cybersecurity and Infrastructure Security Agency D) information attacks

130)

What includes a variety of threats such as viruses, worms, and Trojan horses?

Version 1

39


A) malicious code B) hoaxes C) spoofing D) sniffers

131) What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender? A) malicious code B) hoax C) spoofing D) sniffer

132) What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission? A) sniffer B) spyware C) spoofware D) splog

133) What is a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys? A) sniffer B) spyware C) spoofware D) simplelocker

Version 1

40


134)

What is a form of malicious software that infects your computer and asks for money? A) sniffer B) spyware C) spoofware D) ransomware

135)

What is ransomware?

A) a form of malicious software that infects your computer and asks for money B) a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys C) software that allows Internet advertisers to display advertisements without the consent of the computer user D) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission

136)

What is simplelocker?

A) a form of malicious software that infects your computer and asks for money B) a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys C) software that allows Internet advertisers to display advertisements without the consent of the computer user D) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission

137)

What is adware?

Version 1

41


A) a form of malicious software that infects your computer and asks for money B) a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys C) software that allows Internet advertisers to display advertisements without the consent of the computer user D) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission

138)

What is spyware?

A) a form of malicious software that infects your computer and asks for money B) a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys C) software that allows Internet advertisers to display advertisements without the consent of the computer user D) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission

139)

What is the primary difference between a worm and a virus?

A) A worm must attach to something to spread, whereas a virus does not need to attach to anything to spread and can tunnel itself into the computer. B) A virus is copied and spread by a person, whereas a worm takes a string of tag words and deletes websites. C) A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer. D) All of the answers are correct.

140) What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system? Version 1

42


A) elevation of privilege B) packet tampering C) spoofing D) spyware

141) DDoS stands for one of the common forms of viruses that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for? A) data distribution of systems attack B) data denial-of-software attack C) distributed data online systems attack D) distributed denial-of-service attack

142)

Which of the following are all common forms of viruses? A) packet tampering, worms, cakes, and Trojan viruses B) polymorphic, sniffer, splogs, and denial-of-service viruses C) backdoor program, worm, and Trojan-horse viruses D) All of the answers are correct.

143) What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user? A) sploging B) adware C) spygloss D) CPU buzzer

Version 1

43


144)

Who are hackers with criminal intent? A) crackers B) black-hat hackers C) hoaxes D) cyberterrorists

145) Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction? A) white-hat hackers B) black-hat hackers C) cyberterrorists D) script bunnies

146) Which of the following types of viruses spread themselves not just from file to file but also from computer to computer? A) polymorphic virus B) worm C) Trojan-horse virus D) backdoor program

147) What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?

Version 1

44


A) virus B) white-hat hackers C) dumpster diving D) All of the answers are correct.

148)

Which of the following change form as they propagate? A) backdoor programs B) strikers C) polymorphic viruses and worms D) splogs

149) Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network? A) backdoor program B) drive-by hacking C) polymorphic virus or worm D) hacker

150) What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization? A) information security B) physical security C) drive-by hacking D) adware

Version 1

45


151) Who is an expert in technology who uses their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge? A) information spy B) hacker C) spyware D) adware

152) What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network? A) spyware B) hacker C) drive-by hacking D) adware

153) What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission? A) spyware B) hacker C) drive-by hacking D) adware

154) What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?

Version 1

46


A) spyware B) hacker C) drive-by hacking D) adware

155)

What is spyware?

A) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network D) software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

156)

What is adware?

A) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network D) software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

Version 1

47


157)

What is drive-by hacking?

A) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network D) software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

158)

What is a hacker?

A) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network D) software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

159) Which of the following terms refers to groups of many people whose job is to infiltrate message boards and comments sections to advance national aims or seed discord and disharmony?

Version 1

48


A) black-hat hackers B) cyberterrorists C) troll farms D) script bunnies

160) What is it called if a group of people organize and plan to follow a politician’s Twitter account and bombard it with misinformation or extreme opinions? A) troll farms B) botnets C) black-hat hackers D) script bunnies

161)

What is the primary goal of a troll farm? A) infiltrate message boards to create discord B) take control of computer access for ransom C) look through people’s trash to obtain personal information D) deface websites as a form of protest

162)

What is information security?

Version 1

49


A) a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization B) a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network D) software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

163) What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs? A) bug bounty program B) malware C) scareware D) ransomware

164)

What is software that is intended to damage or disable computers and computer systems? A) bug bounty program B) malware C) scareware D) ransomware

165) What is a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software?

Version 1

50


A) bug bounty program B) malware C) scareware D) ransomware

166)

What is a form of malicious software that infects your computer and asks for money? A) bug bounty program B) malware C) scareware D) ransomware

167)

What is a bug bounty program?

A) a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs B) software that is intended to damage or disable computers and computer systems C) a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software D) a form of malicious software that infects your computer and asks for money

168)

What is malware?

A) a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs B) software that is intended to damage or disable computers and computer systems C) a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software D) a form of malicious software that infects your computer and asks for money

Version 1

51


169)

What is scareware?

A) a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs B) software that is intended to damage or disable computers and computer systems C) a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software D) a form of malicious software that infects your computer and asks for money

170)

What is ransomware?

A) a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs B) software that is intended to damage or disable computers and computer systems C) a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software D) a form of malicious software that infects your computer and asks for money

171) What are the first two lines of defense a company should take when addressing security risks? A) technology first, customers second B) technology first, people second C) innovation first, technology second D) people first, technology second

172)

Which of the following represents the biggest problem of information security breaches?

Version 1

52


A) people misusing organizational information B) technology failures C) customers misusing organizational systems D) company departments missing sales goals

173) Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and Social Security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer’s names. This is a classic example of which of the following security breaches? A) social engineer B) insider C) spammer D) dumpster diver

174) What is it called when you use your social skills to trick people into revealing access credentials or other valuable information? A) social engineering B) social media C) social viruses D) social processes

175)

What is it called when a hacker looks through your trash to find personal information?

Version 1

53


A) striker bunny B) dumpster diving C) trash retrieval D) approved consent

176) What is a form of social engineering in which one individual lies to obtain confidential data about another individual? A) dumpster texting B) dumpster diving C) trash retrieval D) pretexting

177) What are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines? A) dumpster texting B) dumpster diving C) trash retrieval D) destructive agents

178)

What is pretexting?

Version 1

54


A) a form of social engineering in which one individual lies to obtain confidential data about another individual B) when a hacker looks through your trash to find personal information C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

179)

What is dumpster diving?

A) a form of social engineering in which one individual lies to obtain confidential data about another individual B) a hacker looking through your trash to find personal information C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

180)

What are insiders?

A) a form of social engineering in which one individual lies to obtain confidential data about another individual B) a hacker looking through your trash to find personal information C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

181)

What are destructive agents?

Version 1

55


A) a form of social engineering in which one individual lies to obtain confidential data about another individual B) hackers looking through your trash to find personal information C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

182) Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month. Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information. He suspects that an internal employee may be causing this. He needs to clarify and establish what type of plan to help reduce further problems? A) information security plan B) ethical information policy C) antivirus plan D) None of the answer choices are correct.

183) eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a digital camera on eBay. Three months later, you might receive an email asking you to log in to the system to update your credit card or PayPal information. This email is not actually from eBay, and as soon as you log in, your information will be stolen. What type of information security breach would you consider this to be? A) an insider B) dumpster diving C) social engineering D) phishing

Version 1

56


184) Which of the following is an example of a way to maintain information security that a company should include in their information security policies? A) requiring computer users to log off before leaving for lunch B) never sharing user or password information with anyone C) changing passwords every 30 to 60 days D) All of the answers are correct.

185) Janet is a financial aid counselor at a local community college, and she shares an office with three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it, Janet is creating the potential for which type of information security breach to occur? A) insiders to hack into the college system B) dumpster diving to find usernames and passwords C) viruses and worms to spread through the college system D) All of the answers are correct.

186) Applications allowed to be placed on the corporate network, such as IM software, and corporate computer equipment used for personal reasons on personal networks are two areas that should be addressed by managers in which of the following company policies? A) information ethics policy B) information security policy C) Information technology plan D) All of the answers are correct.

187) Which of the following represents the three areas where technology can aid in the defense against information security attacks? Version 1

57


A) authentication and authorization, prevention and resistance, prevention and response B) authentication and authorization, prevention and response, detection and response C) analyzing and authenticating, prevention and repositioning, detection and response D) authentication and authorization, prevention and resistance, detection and response

188)

What is the forging of someone’s identity for the purpose of fraud? A) identity crisis B) identity theft C) ediscovery D) All of the answers are correct.

189) What is the use of a false identity to artificially stimulate demand for a product, brand, or service? A) personally identifiable information (PII) B) astroturfing C) sensitive PII D) sock puppet marketing

190)

What includes any data that could potentially identify a specific individual? A) personally identifiable information (PII) B) nonsensitive PII C) astroturfing D) sock puppet marketing

Version 1

58


191) What is information transmitted without encryption and includes information collected from public records, phone books, corporate directories, or websites? A) astroturfing B) nonsensitive PII C) sensitive PII D) sock puppet marketing

192) What is information transmitted with encryption and, when disclosed, results in a breach of an individual’s privacy and can potentially cause the individual harm? A) astroturfing B) nonsensitive PII C) sensitive PII D) sock puppet marketing

193)

What is sensitive PII?

A) any data that could potentially identify a specific individual B) information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc. C) information transmitted with encryption and, when disclosed, results in a breach of an individual’s privacy and can potentially cause the individual harm D) the use of a false identity to artificially stimulate demand for a product, brand, or service

194)

What is nonsensitive PII?

Version 1

59


A) any data that could potentially identify a specific individual B) information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc. C) information transmitted with encryption and, when disclosed, results in a breach of an individual’s privacy and can potentially cause the individual harm D) the use of a false identity to artificially stimulate demand for a product, brand, or service

195)

What is personally identifiable information (PII)?

A) any data that could potentially identify a specific individual B) information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc. C) information transmitted with encryption and, when disclosed, results in a breach of an individual’s privacy and can potentially cause the individual harm D) the use of a false identity to artificially stimulate demand for a product, brand, or service

196)

What is sock puppet marketing?

A) any data that could potentially identify a specific individual B) the practice of artificially stimulating online conversation and positive reviews about a product, service, or brand C) information transmitted with encryption and, when disclosed, results in a breach of an individual’s privacy and can potentially cause the individual harm D) the use of a false identity to artificially stimulate demand for a product, brand, or service

197)

What is astroturfing?

Version 1

60


A) any data that could potentially identify a specific individual B) the practice of artificially stimulating online conversation and positive reviews about a product, service, or brand C) information transmitted with encryption and, when disclosed, results in a breach of an individual’s privacy and can potentially cause the individual harm D) the use of a false identity to artificially stimulate demand for a product, brand, or service

198) Imagine you accidentally mistype the URL for your bank and you are redirected to a fake website that collects your information. What type of identity theft were you just a victim of with this attack? A) pharming B) worm holes C) phishing D) insider hacking

199) What area of information security focuses on preventing identity theft, phishing, and pharming scams? A) prevention and resistance B) detection and authorizing C) detection and response D) authentication and authorization

200) What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

Version 1

61


A) pharming B) authentication C) authorization D) programming

201)

What is a method for confirming users’ identities? A) phishing B) authentication C) authorization D) programming

202) The most secure procedures combine which of the following authentication and authorization techniques? A) something the user knows, such as a user ID and password B) something the user has, such as a smart card or token C) something that is part of the user, such as a fingerprint or voice signature D) All of the answers are correct.

203) A smart card is a device the size of a credit card that contains embedded technology that stores information and small amounts of software and can act as a(n) A) identification instrument. B) form of digital cash. C) data storage device. D) All of the answers are correct.

Version 1

62


204)

The best and most effective way to manage authentication is through A) smart technology card. B) tokens. C) biometrics. D) passwords.

205)

Which of the following is not considered a form of biometrics? A) iris scan B) password C) fingerprint D) handwriting

206)

Which of the following is the main drawback of biometrics? A) it is considered illegal B) it is viewed as an invasion of privacy C) it can be costly and intrusive D) it requires constant monitoring and upgrading

207) How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?

Version 1

63


A) content filtering, encryption, and firewalls B) calculating, locking, and firewalls C) content prohibiting and cookies D) All of the answers are correct.

208) Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information? A) antivirus software B) content filtering C) encryption D) firewalls

209) What prevention technique scrambles information into an alternative form that requires a key or password to decrypt? A) encryption B) content filtering C) firewalls D) antivirus software

210)

What can encryption technology perform? A) switching the order of characters B) replacing characters with other characters C) inserting or removing characters D) All of the answers are correct.

Version 1

64


211) What type of encryption technology uses multiple keys, one for public and one for private? A) private key encryption B) policy key encryption C) public key encryption D) protective key code

212) What is a data file that identifies individuals or organizations online and is comparable to a digital signature? A) digital code B) digital sign C) digital certificate D) digital card

213) Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles’ largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online. Having a third party validating the reviews is critical to CheckMd’s success. What type of authentication technique is VeriSign providing for CheckMD? A) firewall B) certificate authority C) online certificate D) digital content certificate

214) What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?

Version 1

65


A) firewall B) certificate authority C) online certificate D) digital certificate

215) Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware? A) firewall B) digital certificate C) virus software D) antivirus software

216)

What must you do with antivirus software to make it protect effectively? A) never upgrade or change vendors B) download a portable button for it to activate C) frequently update it to protect against viruses D) All of the answers are correct.

217) Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data? A) interconnected data software (IDS) B) intrusion detection software (IDS) C) security information system (SIS) D) Internet detection scanner (IDS)

Version 1

66


218)

What is the most secure type of authentication? A) something the user knows such as a user ID and password B) something the user has such as a smart card or token C) something that is part of the user such as a fingerprint or voice signature D) All of the answers are correct.

219) What is a device that is around the same size as a credit card and contains embedded technologies that can store information and small amounts of software to perform some limited processing? A) token B) password C) smart card D) biometrics

220) What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting? A) smart card B) token C) biometrics D) content filtering

221)

Which of the following is considered a type of biometrics?

Version 1

67


A) voice B) face C) iris D) All of the answers are correct.

222) What is a set of measurable characteristics of a human voice that uniquely identifies an individual? A) voiceprint B) face C) iris D) All of the answers are correct.

223)

What is single-factor authentication?

A) the traditional security process, which requires a username and password B) requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token) C) requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification) D) the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting

224)

What is multifactor authentication?

Version 1

68


A) the traditional security process, which requires a username and password B) requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token) C) requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification) D) the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting

225)

What is two-factor authentication?

A) the traditional security process, which requires a username and password B) requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token) C) requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification) D) the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting

226) What gathers an organization’s computer network traffic patterns to identify unusual or suspicious operations? A) network behavior analysis B) cyber-vigilantes C) cyberterrorism D) cyber-espionage

227) What includes individuals who seek notoriety or want to make a social or political point such as WikiLeaks?

Version 1

69


A) network behavior analysis B) cyber-vigilantes C) cyberterrorism D) cyber-espionage

228) What includes governments that are after some form of information about other governments? A) network behavior analysis B) cyber-vigilantes C) cyberterrorism D) cyber-espionage

229) What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals? A) network behavior analysis B) cyber-vigilantes C) cyberterrorism D) cyber-espionage

230)

What is the traditional security process that requires a username and password? A) single-factor authentication B) two-factor authentication C) multifactor authentication D) counter measures

Version 1

70


231) What requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)? A) single-factor authentication B) two-factor authentication C) multifactor authentication D) counter measures

232) What requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token)? A) single-factor authentication B) two-factor authentication C) multifactor authentication D) counter measures

233) What are actions, processes, devices, or systems that can prevent, or mitigate the effects of, threats to a computer, server, or network? A) single-factor authentication B) two-factor authentication C) multifactor authentication D) counter measures

234)

What are biometrics?

Version 1

71


A) the traditional security process, which requires a username and password B) requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token) C) requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification) D) the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting

235)

Which of the following authentication methods is 100 percent accurate? A) smart card B) fingerprint authentication C) user ID D) No authentication method is 100 percent accurate.

236)

Where do organizations typically place firewalls? A) between a personal computer and the server B) between a personal computer and a printer C) between the server and the content filtering software D) between the server and the Internet

237) What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity? A) information secrecy B) phishing C) phishing expedition D) spear phishing

Version 1

72


238) What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses? A) pharming B) phishing C) phishing expedition D) spear phishing

239)

What is a masquerading attack that combines spam with spoofing? A) pharming B) phishing C) phishing expedition D) spear phishing

240) What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to “confirm” their account information? A) pharming B) phishing C) phishing expedition D) vishing

241)

What reroutes requests for legitimate websites to false websites?

Version 1

73


A) pharming B) phishing C) phishing expedition D) spear phishing

242)

What is information secrecy?

A) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses C) a masquerading attack that combines spam with spoofing D) a phishing expedition in which the emails are carefully designed to target a particular person or organization

243)

What is phishing?

A) reroutes requests for legitimate websites to false websites B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses C) a masquerading attack that combines spam with spoofing D) a phishing expedition in which the emails are carefully designed to target a particular person or organization

244)

What is a phishing expedition?

Version 1

74


A) reroutes requests for legitimate websites to false websites B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses C) a masquerading attack that combines spam with spoofing D) a phishing expedition in which the emails are carefully designed to target a particular person or organization

245)

What is spear phishing?

A) reroutes requests for legitimate websites to false websites B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses C) a masquerading attack that combines spam with spoofing D) a phishing expedition in which the emails are carefully designed to target a particular person or organization

246)

What is vishing?

A) reroutes requests for legitimate websites to false websites B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses C) a masquerading attack that combines spam with spoofing D) a phone scam that attempts to defraud people by asking them to call a bogus telephone number to “confirm” their account information

247)

What is pharming?

Version 1

75


A) reroutes requests for legitimate websites to false websites B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses C) a masquerading attack that combines spam with spoofing D) a phone scam that attempts to defraud people by asking them to call a bogus telephone number to “confirm” their account information

248)

What reroutes requests for legitimate websites to false websites? A) zombie B) zombie farm C) pharming attack D) pharming

249) What is a program that secretly takes over another computer for the purpose of launching attacks on other computers? A) zombie B) zombie farm C) pharming attack D) time bomb

250)

What is a group of computers on which a hacker has planted zombie programs? A) zombie B) zombie farm C) pharming attack D) time bomb

Version 1

76


251) What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack? A) zombie B) zombie farm C) pharming attack D) time bomb

252) What are computer viruses that wait for a specific date before executing their instructions? A) zombies B) zombie farms C) pharming attacks D) time bombs

253) What is a data file that identifies individuals or organizations online and is comparable to a digital signature? A) digital certificate B) encryption C) decryption D) cryptography

254) What scrambles information into an alternative form that requires a key or password to decrypt?

Version 1

77


A) digital certificate B) encryption C) decryption D) cryptography

255)

What decodes information? A) digital certificate B) encryption C) decryption D) cryptography

256) What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them? A) digital certificate B) encryption C) decryption D) cryptography

257)

Ethics and security are two fundamental building blocks for all organizations. ⊚ ⊚

true false

258) Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

Version 1

78


⊚ ⊚

true false

259) Information governance is a method or system of government for information management or control. ⊚ ⊚

true false

260) Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent. ⊚ ⊚

true false

261) Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. ⊚ ⊚

true false

262) The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet. ⊚ ⊚

true false

263) Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software. ⊚ ⊚ Version 1

true false 79


264) Pirated software is software that is manufactured to look like the real thing and sold as such. ⊚ ⊚

true false

265) A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game. ⊚ ⊚

true false

266) Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents. ⊚ ⊚

true false

267) Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor. ⊚ ⊚

true false

268) Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. ⊚ ⊚

Version 1

true false

80


269) Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring it has the types of data/information required to function and grow effectively. ⊚ ⊚

270)

true false

Information compliance is the act of conforming, acquiescing, or yielding information. ⊚ ⊚

true false

271) Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged. ⊚ ⊚

true false

272) Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged. ⊚ ⊚

true false

273) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. ⊚ ⊚

Version 1

true false

81


274) Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. ⊚ ⊚

true false

275) Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment. ⊚ ⊚

true false

276) An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet. ⊚ ⊚

true false

277) Companies do not need a privacy policy for email because an employee’s work email is private and cannot be viewed by the company. ⊚ ⊚

true false

278) A social media policy outlines the corporate guidelines or principles governing employee online communications. ⊚ ⊚

Version 1

true false

82


279) An ethical computer use policy contains general principles to guide computer user behavior. ⊚ ⊚

true false

280) Employee monitoring policies explicitly state how, when, and where the company monitors its employees. ⊚ ⊚

true false

281) Workplace MIS monitoring tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed. ⊚ ⊚

282)

true false

Cybervandalism is the electronic defacing of an existing website. ⊚ ⊚

true false

283) Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names. ⊚ ⊚

Version 1

true false

83


284) Website name stealing is the theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner. ⊚ ⊚

true false

285) Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens. ⊚ ⊚

true false

286) Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website. ⊚ ⊚

true false

287) Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications. ⊚ ⊚

true false

288) Fair information practices are policies that allow employees to use their personal mobile devices and computers to access enterprise data and applications. ⊚ ⊚

Version 1

true false

84


289) Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy. ⊚ ⊚

true false

290) Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy. ⊚ ⊚

true false

291) BYOD policies offer four basic options, including unlimited access for personal devices; access only to nonsensitive systems and data; access, but with IT control over personal devices, apps, and stored data; and access, but preventing local storage of data on personal devices. ⊚ ⊚

true false

292) Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam. ⊚ ⊚

true false

293) Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser. ⊚ ⊚

Version 1

true false

85


294) Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking on the advertiser’s link. ⊚ ⊚

true false

295) A user can opt out of receiving emails by choosing to deny permission to incoming emails. ⊚ ⊚

296)

true false

A user can opt in to receive emails by choosing to allow permissions to incoming emails. ⊚ ⊚

true false

297) A user can opt out of receiving emails by choosing to allow permissions to incoming emails. ⊚ ⊚

298)

true false

A user can opt in to receive emails by choosing to deny permissions to incoming emails. ⊚ ⊚

true false

299) Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.

Version 1

86


⊚ ⊚

true false

300) A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand. ⊚ ⊚

true false

301) A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or brand. ⊚ ⊚

true false

302) Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand. ⊚ ⊚

303)

true false

Cyberbullying is an act or object that poses a danger to assets. ⊚ ⊚

true false

304) Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

Version 1

87


⊚ ⊚

true false

305) The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file. ⊚ ⊚

true false

306) Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. ⊚ ⊚

true false

307) A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites. ⊚ ⊚

true false

308) Information security is a high priority for protection of the company’s information, and it is critical to implement an information security procedure to combat misuse of this information. ⊚ ⊚

true false

309) Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network. ⊚ ⊚ Version 1

true false 88


310) Troll farms are groups of many people whose job is to infiltrate message boards and comments sections to advance national aims or seed discord and disharmony. ⊚ ⊚

true false

311) Botnets are groups of people whose job infiltrate message boards to advance national aims or seed discord and disharmony. ⊚ ⊚

true false

312) Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons. ⊚ ⊚

true false

313) Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network. ⊚ ⊚

true false

314) White-hat hackers break into other people’s computer systems and may just look around or may steal and destroy information. ⊚ ⊚

Version 1

true false

89


315) Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes. ⊚ ⊚

true false

316) Ransomware is a form of malicious software that infects your computer and asks for money. ⊚ ⊚

true false

317) Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys. ⊚ ⊚

318)

A worm is a form of malicious software that infects your computer and asks for money. ⊚ ⊚

319)

true false

A worm spreads itself not only from file to file but also from computer to computer. ⊚ ⊚

320)

true false

true false

Script-kiddies have criminal intent when hacking.

Version 1

90


⊚ ⊚

true false

321) Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. ⊚ ⊚

true false

322) White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest. ⊚ ⊚

true false

323) Script-kiddies or script-bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. ⊚ ⊚

true false

324) The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers. ⊚ ⊚

325)

true false

Backdoor programs change their form as they propagate. ⊚ ⊚

Version 1

true false 91


326)

Backdoor programs open a way into the network for future attacks. ⊚ ⊚

true false

327) A denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site. ⊚ ⊚

true false

328) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders. ⊚ ⊚

true false

329) Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business. ⊚ ⊚

true false

330) Information security policies detail how an organization will implement the information security plan. ⊚ ⊚

Version 1

true false

92


331) Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company’s outside garbage bins and try to gather and steal any valuable company products they can resell on eBay. ⊚ ⊚

true false

332) Organizations address security risks through two lines of defense: The first is people and the second is technology. ⊚ ⊚

true false

333) Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual. ⊚ ⊚

true false

334) Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual. ⊚ ⊚

true false

335) Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information. ⊚ ⊚

Version 1

true false

93


336) Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information. ⊚ ⊚

true false

337) The three primary information security areas are (1) authentication and authorization, (2) policies and rewards, and (3) detection and response. ⊚ ⊚

338)

true false

Tokens are small electronic devices that change user passwords automatically. ⊚ ⊚

true false

339) The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing. ⊚ ⊚

true false

340) A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication. ⊚ ⊚

true false

341) One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

Version 1

94


⊚ ⊚

true false

342) Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. ⊚ ⊚

true false

343) A firewall scrambles information into an alternative form that requires a key or password to decrypt. ⊚ ⊚

344)

true false

Identity theft is the forging of someone’s identity for the purpose of fraud. ⊚ ⊚

true false

345) Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. ⊚ ⊚

true false

346) A phishing expedition is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The emails contain a link to a website that is designed to look exactly like the company’s website. The victim is encouraged to enter his or her username, password, and sometimes credit card information.

Version 1

95


⊚ ⊚

true false

347) Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization. ⊚ ⊚

true false

348) Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to “confirm” their account information. ⊚ ⊚

349)

true false

Phishing reroutes requests for legitimate websites to false websites. ⊚ ⊚

true false

350) A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers. Zombie attacks are almost impossible to trace back to the attacker. ⊚ ⊚

351)

true false

A zombie farm is a group of computers on which a hacker has planted zombie programs. ⊚ ⊚

Version 1

true false

96


352) A pharming attack uses of a zombie farm, often by an organized crime association, to launch a massive phishing attack. ⊚ ⊚

true false

353) Worms are computer viruses that wait for a specific date before executing their instructions. ⊚ ⊚

true false

354) Time bombs are computer viruses that wait for a specific date before executing their instructions. ⊚ ⊚

355)

true false

Decrypting information is to decode it and is the opposite of encrypting. ⊚ ⊚

true false

356) Cryptography is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them. ⊚ ⊚

Version 1

true false

97


357) A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates. ⊚ ⊚

true false

358) A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature. ⊚ ⊚

true false

359) A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature. ⊚ ⊚

true false

360) A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual. These characteristics, which are based on the physical configuration of a speaker’s mouth and throat, can be expressed as a mathematical formula. Unfortunately, biometric authentication such as voiceprints can be costly and intrusive. ⊚ ⊚

true false

361) Single-factor authentication is the traditional security process, which requires a username and password. ⊚ ⊚

Version 1

true false

98


362) Two-factor authentication requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token). ⊚ ⊚

true false

363) Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification). ⊚ ⊚

true false

364) Multifactor authentication is the traditional security process, which requires a username and password. ⊚ ⊚

true false

365) Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification). ⊚ ⊚

true false

366) Single-factor authentication requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token). ⊚ ⊚

Version 1

true false

99


367) The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because if one security level is broken, the attacker will still have to break through additional levels. ⊚ ⊚

Version 1

true false

100


Answer Key Test name: Chap 04_8e_Baltzan 6) C 7) D 8) B 9) A 10) C 11) A 12) B 13) D 14) C 15) B 16) A 17) C 18) B 19) C 20) C 21) A 22) B 23) C 24) D 25) A 26) A 27) B 28) C 29) D 30) C 31) D Version 1

101


32) B 33) C 34) D 35) A 36) A 37) B 38) C 39) C 40) A 41) C 42) D 43) B 44) C 45) D 46) A 47) B 48) D 49) C 50) A 51) B 52) C 53) C 54) A 55) D 56) A 57) B 58) A 59) A 60) D 61) B Version 1

102


62) B 63) C 64) D 65) C 66) D 67) A 68) B 69) D 70) A 71) B 72) C 73) B 74) B 75) C 76) D 77) D 78) C 79) B 80) A 81) B 82) D 83) A 84) C 85) A 86) B 87) A 88) B 89) B 90) D 91) D Version 1

103


92) A 93) B 94) A 95) B 96) C 97) C 98) D 99) B 100) A 101) B 102) C 103) D 104) A 105) B 106) C 107) D 108) A 109) A 110) B 111) C 112) D 113) D 114) C 115) B 116) A 117) C 118) D 119) A 120) C 121) B Version 1

104


122) D 123) C 124) B 125) A 126) D 127) A 128) B 129) C 130) A 131) C 132) B 133) D 134) D 135) A 136) B 137) C 138) D 139) C 140) A 141) D 142) C 143) B 144) A 145) C 146) B 147) A 148) C 149) B 150) A 151) B Version 1

105


152) C 153) A 154) D 155) A 156) D 157) C 158) B 159) C 160) A 161) A 162) A 163) A 164) B 165) C 166) D 167) A 168) B 169) C 170) D 171) D 172) A 173) B 174) A 175) B 176) D 177) D 178) A 179) B 180) C 181) D Version 1

106


182) A 183) D 184) D 185) A 186) B 187) D 188) B 189) D 190) A 191) B 192) C 193) C 194) B 195) A 196) D 197) B 198) A 199) D 200) C 201) B 202) D 203) D 204) C 205) B 206) C 207) A 208) B 209) A 210) D 211) C Version 1

107


212) C 213) B 214) A 215) D 216) C 217) B 218) D 219) C 220) C 221) D 222) A 223) A 224) C 225) B 226) A 227) B 228) D 229) C 230) A 231) C 232) B 233) D 234) D 235) D 236) D 237) A 238) B 239) C 240) D 241) A Version 1

108


242) A 243) B 244) C 245) D 246) D 247) A 248) D 249) A 250) B 251) C 252) D 253) A 254) B 255) C 256) D 257) TRUE 258) FALSE 259) TRUE 260) FALSE 261) TRUE 262) TRUE 263) FALSE 264) FALSE 265) FALSE 266) TRUE 267) FALSE 268) TRUE 269) TRUE 270) TRUE 271) TRUE Version 1

109


272) FALSE 273) TRUE 274) FALSE 275) TRUE 276) TRUE 277) FALSE 278) TRUE 279) TRUE 280) TRUE 281) TRUE 282) TRUE 283) FALSE 284) TRUE 285) FALSE 286) FALSE 287) TRUE 288) FALSE 289) TRUE 290) FALSE 291) TRUE 292) TRUE 293) TRUE 294) TRUE 295) TRUE 296) TRUE 297) FALSE 298) FALSE 299) TRUE 300) TRUE 301) FALSE Version 1

110


302) FALSE 303) FALSE 304) FALSE 305) TRUE 306) TRUE 307) TRUE 308) TRUE 309) TRUE 310) TRUE 311) FALSE 312) TRUE 313) TRUE 314) FALSE 315) FALSE 316) TRUE 317) TRUE 318) FALSE 319) TRUE 320) FALSE 321) TRUE 322) FALSE 323) TRUE 324) TRUE 325) FALSE 326) TRUE 327) TRUE 328) TRUE 329) FALSE 330) FALSE 331) FALSE Version 1

111


332) TRUE 333) TRUE 334) FALSE 335) TRUE 336) FALSE 337) FALSE 338) TRUE 339) TRUE 340) FALSE 341) TRUE 342) TRUE 343) FALSE 344) TRUE 345) FALSE 346) TRUE 347) TRUE 348) FALSE 349) FALSE 350) TRUE 351) TRUE 352) TRUE 353) FALSE 354) TRUE 355) TRUE 356) TRUE 357) TRUE 358) FALSE 359) FALSE 360) TRUE 361) TRUE Version 1

112


362) TRUE 363) TRUE 364) FALSE 365) FALSE 366) FALSE 367) TRUE

Version 1

113


CHAPTER 5 1)

Explain MIS infrastructure and its three primary types.

2)

Identify the three primary areas associated with an information MIS infrastructure.

3)

Describe the characteristics of an agile MIS infrastructure.

4)

Identify the environmental impacts associated with MIS.

Version 1

1


5) Explain the three components of a sustainable MIS infrastructure along with their business benefits.

6)

What is an information MIS infrastructure?

A) identifies where and how important information, such as customer records, is maintained and secured B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals C) identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D) includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets

7)

What is an agile MIS infrastructure?

A) identifies where and how important information, such as customer records, is maintained and secured B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals C) identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D) includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets

8)

What is a sustainable MIS infrastructure?

Version 1

2


A) identifies where and how important information, such as customer records, is maintained and secured B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals C) identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D) includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets

9)

What is an MIS infrastructure?

A) identifies where and how important information, such as customer records, is maintained and secured B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals C) infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D) includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets

10) Who is a person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business? A) MIS Infrastructure manager B) MIS specialist C) enterprise architect D) enterprise manager

11)

Which of the following is a benefit of a solid MIS infrastructure?

Version 1

3


A) reduces costs B) improves productivity C) optimizes business operations D) All of the answers are correct.

12)

What is the difference between hardware and software?

A) Hardware is the physical devices associated with a computer system, whereas software is the instructions the hardware executes to carry out tasks. B) They are both specific forms of clients. C) Hardware executes the instructions to carry out tasks, whereas software is the physical devices associated with a computer system. D) All of the answers are correct.

13)

What consists of the physical devices associated with a computer system? A) hardware B) software C) client D) server

14)

What is the set of instructions the hardware executes to carry out specific tasks? A) hardware B) software C) client D) server

Version 1

4


15) What is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate? A) network B) software C) client D) server

16)

What is a computer designed to request information from a server? A) hardware B) software C) client D) server

17)

What is a computer dedicated to providing information in response to requests? A) hardware B) software C) client D) server

18)

What is hardware?

Version 1

5


A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a computer dedicated to providing information in response to requests

19)

What is software? A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a computer dedicated to providing information in response to requests

20)

What is a network?

A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate

21)

What is a client? A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a computer dedicated to providing information in response to requests

Version 1

6


22)

What is a server? A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a computer dedicated to providing information in response to requests

23) John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John’s tasks include cleaning and replacing motherboards, cables, and internal components such as hard drives. What does John’s role at Internal Computer Specialists focus on fixing? A) hardware B) clients C) backup D) recovery

24) Jessica started her own online company that specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate to ensure the best possible experience for her customers. Which of the following is a critical component in Jessica’s MIS infrastructure? A) hardware and software B) clients C) server D) All of the answers are correct.

25)

What are the three business functions an MIS infrastructure supports?

Version 1

7


A) operations, change, and the environment/sustainability B) operations, customers, and ewaste C) information, clients, and viruses D) information, change, and business continuity planning

26)

Which of the following include the three components of an MIS infrastructure? A) information, aggregated, and sustainable MIS infrastructures B) information, operational, and changing MIS infrastructures C) information, agile, and sustainable MIS infrastructures D) varies depending on the industry

27)

Which characteristics support an agile MIS infrastructure?

A) accessibility, availability, maintainability, portability, reliability, scalability, and usability B) backup and recovery plan, disaster recovery plan, and business continuity planning C) grid computing, cloud computing, and virtualization D) storage, network, and server virtualization

28)

Which characteristics support a sustainable MIS infrastructure?

A) accessibility, availability, maintainability, portability, reliability, scalability, and usability B) backup and recovery plan, disaster recovery plan, and business continuity planning C) grid computing, cloud computing, and virtualization D) storage, network, and server virtualization

Version 1

8


29)

Which characteristics support an information MIS infrastructure?

A) accessibility, availability, maintainability, portability, reliability, scalability, and usability B) backup and recovery plan, disaster recovery plan, and business continuity planning C) grid computing, cloud computing, and virtualization D) storage, network, and server virtualization

30) Grid computing, cloud computing, and virtualization are all elements of a(n) ________ Blank MIS infrastructure. A) agile B) sustainable C) information D) virtualized

31) Accessibility, availability, maintainability, portability, reliability, scalability, and usability are all elements of a(n)________ MIS infrastructure. A) agile B) sustainable C) information D) virtualized

32) Backup and recovery plan, disaster recovery plan, and business continuity planning are all elements of a(n) ________ Blank MIS infrastructure.

Version 1

9


A) agile B) sustainable C) information D) virtualized

33) A(n) ________ Blank MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. A) sustainable B) information C) virtualized D) agile

34) What type of MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured? A) sustainable B) information C) virtualized D) agile

35) What type of MIS infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation? A) information B) virtualized C) agile D) sustainable

Version 1

10


36) Francis works in the human resources division of a large oil and gas company in Texas. Francis’s tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis? A) information MIS infrastructure B) agile MIS infrastructure C) sustainable MIS infrastructure D) virtualized MIS infrastructure

37) for

The information MIS infrastructure supports the day-to-day business operations and plans

A) security breaches and theft. B) floods and earthquakes. C) malicious Internet attacks. D) All of the answers are correct.

38) Each year, businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures? A) backup and recovery plan B) fault tolerance C) failover D) All of the answers are correct.

39) Which of the following describes the difference between a backup plan and a recovery plan?

Version 1

11


A) Recovery is an exact copy of a system’s information, whereas backup is the ability to get a system up and running in the event of a system crash or failure. B) Backup is mandatory, whereas recovery is optional. C) Backup is an exact copy of a system’s information, whereas recovery is the ability to get a system up and running in the event of a system crash or failure. D) Recovery is mandatory, whereas backup is optional.

40) What occurs when a redundant storage server offers an exact replica of the real-time data and, if the primary server crashes, the users are automatically directed to a secondary server? A) failover B) disaster recovery cost curve C) reliability D) maintainability

41) What occurs when a primary machine recovers and resumes operations, taking over from a secondary server? A) failback B) disrupted communications C) warm site D) hot site

42) What has the ability to recover information or systems in the event of catastrophic disasters?

Version 1

12


A) recovery B) disaster recovery C) backup D) failback

43) Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is prone to floods, high winds, and tornados. As the lead enterprise architect on the night shift, Shawn has been asked to suggest ways the company can protect its information MIS infrastructure. Shawn notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and lacks a backup system that can automatically take over without a loss of service to Boise residents. What should Shawn recommend his company implement? A) accessibility B) Moore’s law C) antivirus software D) fault tolerance

44) What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption? A) disaster recovery plan B) disaster recovery cost curve C) business continuity planning D) emergency notification system

45) What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?

Version 1

13


A) failure tolerance B) recovery C) reliability D) capacity planning

46)

What type of backup method does a thumb drive offer? A) low cost, high speed B) low cost, low speed C) high cost, high speed D) All of the answers are correct.

47) What question below would a company need to answer when first establishing a backup and recovery plan? A) What types of storage mechanism will meet the needs of the company? B) How often does the company need to backup its information? C) What types of recovery systems does the company infrastructure need? D) All of the answers are correct.

48) Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane? A) disrupted communications B) damaged physical infrastructures C) halted transportation D) All of the answers are correct.

Version 1

14


49) To combat disasters, a company can create a ________ that details the process for recovering information or a system in the event of a catastrophic disaster. A) disaster recovery plan B) database lookup initiative C) management recovery plan D) tornado threat plan

50) Among the sites that support disaster recovery, a ________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. A) hot site B) cold site C) warm site D) All of the answers are correct.

51) Among the sites that support disaster recovery, a ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. A) hot site B) cold site C) warm site D) disaster site

52) Among the sites that support disaster recovery, a ________ is a separate facility with computer equipment that requires installation and configuration.

Version 1

15


A) hot site B) cold site C) warm site D) disaster site

53)

What is a hot site?

A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C) a separate facility with computer equipment that requires installation and configuration D) a detailed process for recovering information or a system in the event of a catastrophic disaster

54)

What is a cold site?

A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C) a separate facility with computer equipment that requires installation and configuration D) a detailed process for recovering information or a system in the event of a catastrophic disaster

55)

What is a warm site?

Version 1

16


A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C) a separate facility with computer equipment that requires installation and configuration D) a detailed process for recovering information or a system in the event of a catastrophic disaster

56)

What is a disaster recovery plan?

A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C) a separate facility with computer equipment that requires installation and configuration D) a detailed process for recovering information or a system in the event of a catastrophic disaster

57) What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time? A) disaster organizational cost analysis B) disaster recovery improvements C) disaster financial costs D) disaster recovery cost curve

Version 1

17


58) What is a more comprehensive and all-encompassing plan that details how a company recovers and restores critical business operations and systems after a disaster or extended disruption? A) business continuity plan B) database management plan C) incident recovery plan D) emergency recovery plan

59)

What is an infrastructure built for notifying people in the event of an emergency? A) business operational plan B) business continuity plan C) emergency notification service D) emergency continuity plan

60) What are the different options for how an emergency notification service can be deployed? A) through the firm’s own infrastructure B) by an outside service provider on company premises C) by an outside service provider hosted remotely D) All of the answers are correct.

61)

Which of the following is an example of an emergency notification system?

Version 1

18


A) radio stations’ occasional tests of the national alert system B) wireless alerts for promotional discounts C) text messages from your local grocery store D) All of the answers are correct.

62) What is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property? A) emergency B) preparedness C) impact analysis D) technology failure

63) What ensures a company is ready to respond to an emergency in an organized, timely, and effective manner? A) technology success B) emergency preparedness C) business impact analysis D) technology failure

64) What identifies all critical business functions and the effect that a specific disaster may have upon them? A) emergence B) emergency preparedness C) business impact analysis D) technology failure

Version 1

19


65) What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage? A) technology success B) technology preparedness C) business impact analysis D) technology failure

66)

What contains all of the details of an incident? A) technology failure B) incident record C) incident management D) technology recovery strategy

67) What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage? A) technology failure B) incident record C) incident management D) technology recovery strategy

68)

What is the process responsible for managing how incidents are identified and corrected?

Version 1

20


A) technology failure B) incident record C) incident management D) technology recovery strategy

69) What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements? A) technology failure B) incident record C) incident management D) technology recovery strategy

70) Which term refers to the varying levels that define what a user can access, view, or perform when operating a system? A) availability B) accessibility C) usability D) responsibility

71) Enterprise architects require ________ access so they can perform such functions as resetting passwords or deleting accounts. A) functional B) infrastructure C) restricted D) administrator

Version 1

21


72)

Which term refers to the time frames when the system is operational? A) administrator access B) accessibility C) availability D) portability

73)

What is the difference between unavailable and high availability?

A) High availability is when the system is not operating and can’t be used, whereas unavailable is when a system is continuously operating at all times. B) Unavailable only refers to clients, whereas high availability refers to servers. C) Unavailable is when the system is not operating and can’t be used, whereas high availability is when a system is continuously operating at all times. D) High availability only refers to clients, whereas unavailable refers to servers.

74)

What is a widely held but difficult to achieve standard of availability for a system? A) “five 9s” availability B) “1%” minimum availability C) “five’s accessibility” code D) “five 10s” availability

75) Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environmental changes?

Version 1

22


A) maintainability B) scalability C) capacity planning D) portability

76) Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems? A) reliability B) portability C) maintainability D) usability

77)

What does reliability ensure? A) the system has the ability to operate in many different operating systems B) the system is easy to learn and efficient and satisfying to use C) the system is functioning correctly and providing accurate information D) the time frames when the system is operational

78) Which of the following describes how well a system can scale up or adapt to the increased demands or growth? A) flexibility B) scalability C) reliability D) affordability

Version 1

23


79)

What measures how quickly a system performs a process or transaction? A) portability B) capacity planning C) performance D) sustainability

80) What determines future environmental infrastructure requirements that ensure highquality system performance? A) capacity system B) capacity planning C) capacity function D) performance indicators

81)

What is the primary reason a company has a failover system?

A) to use different systems continuously at the same time B) to allow employees to work virtually C) to take down the primary system for maintenance while the secondary system activates to ensure continuous operations D) All of the answers are correct.

82)

What is usability?

Version 1

24


A) the system is easy to learn, efficient, and satisfying to use B) the system functions correctly and provides accurate information C) the system allows varying levels of access D) the system quickly transforms to support environmental changes

83)

What refers to how well a system can adapt to increased demands? A) scalability B) capacity planning C) reliability D) availability

84) What represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents the size or volume? A) capacity B) web accessibility C) web accessibility initiative D) vulnerability

85) What means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web? A) capacity B) web accessibility C) web usability D) vulnerability

Version 1

25


86) What brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities? A) capacity B) web usability C) web accessibility initiative D) vulnerability

87)

What is a system weakness that can be exploited by a threat? A) capacity B) web usability C) web accessibility initiative D) vulnerability

88) Which of the following terms represents how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability or availability? A) capacity B) web accessibility C) serviceability D) vulnerability

89)

What is administrator access?

Version 1

26


A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) time frames when the system is operational D) how quickly a system can transform to support environmental changes

90)

What is accessibility?

A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) time frames when the system is operational D) how quickly a system can transform to support environmental changes

91)

What is availability?

A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) time frames when the system is operational D) how quickly a system can transform to support environmental changes

92)

What is maintainability?

Version 1

27


A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) how quickly a system can transform to support environmental changes D) ability to ensure that a system is functioning correctly and providing accurate information

93)

What is reliability?

A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) how quickly a system can transform to support environmental changes D) ability to ensure that a system is functioning correctly and providing accurate information

94)

What does it mean if a system is unavailable?

A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) how quickly a system performs a process or transaction D) the degree to which a system is easy to learn, efficient, and satisfying to use

95)

What does it mean if an application has portability?

Version 1

28


A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) how quickly a system performs a process or transaction D) the degree to which a system is easy to learn, efficient, and satisfying to use

96)

What is performance?

A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) how quickly a system performs a process or transaction D) the degree to which a system is easy to learn, efficient, and satisfying to use

97)

What is usability?

A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) the degree to which a system is easy to learn, efficient, and satisfying to use D) how well a system can scale up or adapt to the increased demands of growth

98)

What is scalability?

A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) the degree to which a system is easy to learn and efficient and satisfying to use D) how well a system can scale up or adapt to the increased demands of growth

Version 1

29


99)

Gordon Moore, the cofounder of Intel, established which MIS law? A) Intel’s law B) George’s law C) Moore’s law D) Lee’s law

100)

Which of the following reflects Moore’s law?

A) the computer chip performance per dollar doubles every 18 months B) a company’s ability to acquire small amounts of MIS equipment for cheaper cost C) a company’s ability to acquire small amounts of capital for spending on innovative ideas every two years D) the computer chip performance per dollar doubles every 6 months

101) What describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment? A) environmental MIS B) holistic MIS C) green designation for technology D) sustainability or green MIS

102)

Sustainable MIS is a critical part of ________ Blank within a company.

Version 1

30


A) company standard for the Green Initiative B) corporate social responsibility C) social expectations D) societal concerns

103)

Corporate social responsibility is a company’s acknowledged responsibility to A) shareholders. B) employees. C) society. D) governments.

104)

What is a company’s acknowledged responsibility to society? A) corporate social responsibility B) employee social responsibility C) society social responsibility D) government social responsibility

105) Miranda White likes taking old computer parts and remaking them into products such as earrings and clocks. Which of the following represents what Miranda is doing? A) upcycle B) recycle C) ewaste D) sustainable MIS

Version 1

31


106)

What is clean computing?

A) a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment B) built using environment friendly materials and designed to save energy C) reuses or refurbishes ewaste and creates a new product D) a company’s acknowledged responsibility to society

107)

What is a green personal computer?

A) a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment B) built using environment friendly materials and designed to save energy C) reuses or refurbishes ewaste and creates a new product D) a company’s acknowledged responsibility to society

108)

What is upcycle?

A) a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment B) built using environment friendly materials and designed to save energy C) reusing or refurbishing ewaste and creating a new product D) storing, managing, and processing data and applications over the Internet rather than on a personal computer or server

109)

What is corporate social responsibility?

Version 1

32


A) a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment B) a company’s acknowledged responsibility to society C) reusing or refurbishing ewaste and creates a new product D) storing, managing, and processing data and applications over the Internet rather than on a personal computer or server

110)

What is cloud computing?

A) built using environment friendly materials and designed to save energy B) reusing or refurbishing ewaste and creating a new product C) a companies’ acknowledged responsibility to society D) storing, managing, and processing data and applications over the Internet rather than on a personal computer or server

111) What is a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment? A) clean computing B) green personal computer C) upcycle D) corporate social responsibility

112)

What is built using environment friendly materials and designed to save energy? A) clean computing B) green personal computer C) upcycle D) corporate social responsibility

Version 1

33


113)

What reuses or refurbishes ewaste and creates a new product? A) clean computing B) green personal computer C) upcycle D) corporate social responsibility

114)

What is a company’s acknowledged responsibility to society? A) cloud computing B) clean computer C) upcycle D) corporate social responsibility

115) What stores, manages, and processes data and applications over the Internet rather than on a personal computer or server? A) clean computing B) cloud computing C) upcycle D) corporate social responsibility

116) The increased demand in technology devices has caused an increase in discarded devices, a phenomenon known as

Version 1

34


A) ewaste. B) grid computing. C) ergonomic code. D) electronic sustainability.

117)

Which of the following is not contributing to ewaste? A) printer B) coal C) microwave D) computer

118)

What are the three pressures driving sustainable MIS infrastructures? A) decreases in electronic waste, energy waste, and carbon emissions B) increases in ewaste, energy waste, and dynamic scaling C) increases in electronic waste, energy waste, and carbon emissions D) decreases in ewaste, energy waste, and carbon footprints

119)

What is the safe disposal of MIS assets at the end of their life cycle called? A) sustainable MIS disposal B) sustainable device disposal C) sustainable software disposal D) sustainable enterprise disposal

Version 1

35


120) What are the ramifications of improper electronic recycling when analyzing the example of a single desktop computer? A) one computer contains more than 700 chemicals that can be toxic to the environment B) computers in landfills can leak toxic chemicals into our land, water, and air C) computers contain high levels harmful toxins including mercury, lead. and cadmium D) All of the answers are correct.

121) Increased energy consumption poses new and growing sustainable infrastructure pressure. The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by a A) house. B) school. C) car. D) cell phone.

122) Cheap electricity is great for keeping business energy costs down, but this means that we have to rely more on ________ for power. A) cars B) coal C) gasoline D) All of the answers are correct.

123)

What refers to discarded, obsolete, or broken electronic devices?

Version 1

36


A) ewaste B) energy consumption C) carbon emissions D) sustainable MIS

124)

What is the amount of energy consumed by business processes and systems? A) ewaste B) energy consumption C) carbon emissions D) sustainable MIS

125) What includes the carbon dioxide and carbon monoxide in the atmosphere, produced by business processes and systems? A) ewaste B) energy consumption C) carbon emissions D) sustainable MIS

126)

What refers to the safe disposal of MIS assets at the end of their life cycle? A) ewaste B) energy consumption C) carbon emissions D) sustainable MIS

Version 1

37


127) Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem? A) cloud computing B) grid computing C) virtualized computing D) database computing

128) With grid computing, a problem is broken into pieces and distributed to many machines, allowing ________ processing than could occur with a single system. A) more moderate B) slower C) faster D) cleaner

129)

What is storage virtualization? A) combines multiple network storage devices so they appear to be a single storage

device B) combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device C) combines the physical resources, such as servers, processors, and operating systems, from the applications D) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

130)

What is network virtualization?

Version 1

38


A) combines multiple network storage devices so they appear to be a single storage device B) combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device C) combines the physical resources, such as servers, processors, and operating systems, from the applications D) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

131)

What is server virtualization? A) combines multiple network storage devices so they appear to be a single storage

device B) combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device C) combines the physical resources, such as servers, processors, and operating systems, from the applications D) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

132)

What is Disaster Recovery as a Service? A) combines multiple network storage devices so they appear to be a single storage

device B) combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device C) combines the physical resources, such as servers, processors, and operating systems, from the applications D) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

Version 1

39


133) What combines multiple network storage devices so they appear to be a single storage device? A) server virtualization B) network virtualization C) Disaster Recovery as a Service D) storage virtualization

134) What combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device? A) server virtualization B) network virtualization C) Disaster Recovery as a Service D) storage virtualization

135) What combines the physical resources, such as servers, processors, and operating systems, from the applications? A) server virtualization B) network virtualization C) Disaster Recovery as a Service D) storage virtualization

136) What creates a virtual version of computing resources, such as an operating system, server, storage device, or network resource?

Version 1

40


A) community cloud B) virtualized system C) grid computing D) Software as a Service

137)

A virtualized system creates a virtual version of computing resources, including A) network resource. B) server. C) storage device. D) All of the answers are correct.

138) What offers backup services that use cloud resources to protect applications and data from disruption caused by disaster? A) server virtualization B) network virtualization C) Disaster Recovery as a Service D) All of the answers are correct.

139) Grid computing takes advantage of the available 75 percent of unused processing power of a computer and links thousands of individual computers around the world, creating a ________ that can process intensive tasks. A) personal computer B) employee client C) company server D) virtual supercomputer

Version 1

41


140)

Which of the following delivers electricity using two-way digital technology? A) smart grid B) systematic grid C) collective grid D) interactive grid

141) DreamWorks Animation Company used which sustainable infrastructure component to complete many of its films, including Shrek, Madagascar, and Antz? A) agile computing B) grid computing C) cloud computing D) server computing

142)

What is cloud computing services changing? A) the way people access information B) the way people deliver information C) the way people use information D) All of the answers are correct.

143) What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

Version 1

42


A) grid computing B) smart phones C) utility computing D) computing services

144) In what category would you put a cloud computing benefit that allows a customer to store fewer applications on a client computer, freeing up the memory and allowing for increases in performance? A) Internet features B) increased costs C) increased performance D) increased software updates

145) What is a challenge for cloud computing that could cause employee performance to decrease? A) limited Internet features B) required Internet connectivity C) decreased dynamic scaling D) decreased job stability

146) What service delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model? A) Infrastructure as a Service (IaaS) B) Disaster Recovery as a Service (DRaaS) C) Software as a Service (SaaS) D) Platform as a Service (PaaS)

Version 1

43


147)

What is dynamic scaling?

A) the ability for the system to cut back on expenses when needed B) the infrastructure that is fixed and has no surprises C) MIS infrastructure that can be automatically scaled up or down based on needed requirements D) the flexibility to charge more or less, depending on the market

148)

What are the three-cloud computing service delivery models? A) Independent as a Service, Supportive as a Service, and Partnering as a Service B) Infrastructure as a Service, Software as a Service, and Platform as a Service C) Innovation as a Service, Server as a Service, and Platform as a Service D) All of the answers are correct.

149)

Which cloud computing model offers applications on a pay-per-use basis? A) Infrastructure as a Service B) Platform as a Service C) Software as a Service D) Information as a Service

150)

What is a Platform as a Service (PaaS)?

Version 1

44


A) setup and storage systems, including servers, and a database management model B) innovation leads to new programs for business on an ongoing basis C) salesforce.com is an example of PaaS D) the deployment of entire systems including hardware, networking, and applications using pay-per-use revenue model

151) What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple ‘virtual’ machines all on a single computing device? A) virtualization B) innovation C) availability D) viral computing

152) What is a facility used to house management information systems and associated components, such as telecommunications and storage systems? A) call center B) data center C) delivery base D) central center

153)

What does a single instance of a system serving multiple customers mean in the cloud? A) multi-tenancy B) single-tenancy C) noisy neighbor D) rapid elasticity

Version 1

45


154) What occurs when each customer or tenant must purchase and maintain an individual system? A) multi-tenancy B) single-tenancy C) noisy neighbor D) rapid elasticity

155) What offers a pay-per-use revenue model similar to a metered service such as gas or electricity? A) community cloud B) private cloud C) utility computing D) public cloud

156)

What promotes massive, global, industry-wide applications offered to the general public? A) community cloud B) private cloud C) utility computing D) public cloud

157) What serves only one customer or organization and can be located on or off the customer’s premises?

Version 1

46


A) community cloud B) private cloud C) utility computing D) public cloud

158) What serves a specific community with common business models, security requirements, and compliance considerations? A) community cloud B) private cloud C) utility computing D) public cloud

159) What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability? A) community cloud B) private cloud C) utility computing D) hybrid cloud

160) What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high or peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes? A) community cloud B) private cloud C) cloud bursting D) hybrid cloud

Version 1

47


161) What offers backup services that use cloud resources to protect applications and data from disruption caused by disaster? A) Disaster Recovery as a Service (DRaaS) B) Data as a Service (DaaS) C) Software as a Service (SaaS) D) Big Data as a Service (BDaaS)

162) What offers a pay-per-use revenue model similar to a metered service such as gas or electricity? A) Disaster Recovery as a Service (DRaaS) B) Data as a Service (DaaS) C) Software as a Service (SaaS) D) utility computing

163) What facilitates the accessibility of business-critical data in a timely, secure, and affordable manner? A) Disaster Recovery as a Service (DRaaS) B) Data as a Service (DaaS) C) Software as a Service (SaaS) D) Big Data as a Service (BDaaS)

164)

What delivers applications over the cloud using a pay-per-use revenue model?

Version 1

48


A) Disaster Recovery as a Service (DRaaS) B) Data as a Service (DaaS) C) Software as a Service (SaaS) D) Big Data as a Service (BDaaS)

165) What offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas? A) Disaster Recovery as a Service (DRaaS) B) Data as a Service (DaaS) C) Software as a Service (SaaS) D) Big Data as a Service (BDaaS)

166)

What is Disaster Recovery as a Service (DRaaS)?

A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster B) delivers applications over the cloud using a pay-per-use revenue model C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner D) offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas

167)

What is Data as a Service (DaaS)?

Version 1

49


A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster B) delivers applications over the cloud using a pay-per-use revenue model C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner D) offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas

168)

What is Software as a Service (SaaS)?

A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster B) delivers applications over the cloud using a pay-per-use revenue model C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner D) offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas

169)

What is Big Data as a Service (BDaaS)?

A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster B) delivers applications over the cloud using a pay-per-use revenue model C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner D) offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas

170) MIS infrastructure is a communications system created by linking two or more devices and establishing a standard methodology for communication.

Version 1

50


⊚ ⊚

true false

171) Every company, regardless of size, relies on some form of MIS infrastructure, whether it is a few personal computers networked together or many interconnected around the world. ⊚ ⊚

true false

172) Hardware consists of the physical devices associated with a computer system, where software is the set of instructions the hardware executes to carry out specific tasks. ⊚ ⊚

173)

true false

Software is the set of instructions the hardware executes to carry out specific tasks. ⊚ ⊚

true false

174) Software consists of the physical devices associated with a computer system, where software is the set of instructions the hardware executes to carry out specific tasks. ⊚ ⊚

175)

true false

Hardware is the set of instructions the hardware executes to carry out specific tasks. ⊚ ⊚

Version 1

true false

51


176) A network is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate. ⊚ ⊚

177)

A client is a computer designed to request information from a server. ⊚ ⊚

178)

true false

A server is a computer designed to request information from a server. ⊚ ⊚

180)

true false

A server is a computer dedicated to providing information in response to requests. ⊚ ⊚

179)

true false

true false

A client is a computer dedicated to providing information in response to requests. ⊚ ⊚

true false

181) A good way to understand the client-server relationship is when someone uses a web browser (this would be the client) to access a website (this would be a server that would respond with the web page being requested by the client). Version 1

52


⊚ ⊚

true false

182) There are three primary areas where enterprise architects focus when maintaining a firm’s MIS infrastructure, including information MIS infrastructure, agile MIS infrastructure, and sustainable MIS infrastructures. ⊚ ⊚

true false

183) If you want to support business operations, you will focus on building a strong information MIS infrastructure, which identifies where and how important information, such as customer records, is maintained and secured. ⊚ ⊚

true false

184) If you want to support organization change, you will focus on building a strong information MIS infrastructure, which identifies where and how important information, such as customer records, is maintained and secured. ⊚ ⊚

true false

185) If you want to support the environment, you will focus on building a strong, sustainable MIS infrastructure, which identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. ⊚ ⊚

186)

true false

Software is a computer designed to request information from a server.

Version 1

53


⊚ ⊚

187)

true false

Hardware is a computer dedicated to providing information in response to requests. ⊚ ⊚

true false

188) An enterprise architect is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business. ⊚ ⊚

true false

189) The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a failover. ⊚ ⊚

true false

190) Failback occurs when the primary machine recovers and resumes operations, taking over from the secondary server. ⊚ ⊚

191)

true false

Fault tolerance is an exact copy of a system’s information. ⊚ ⊚

Version 1

true false

54


192) The three primary areas of support provided by information infrastructure are backup and recovery, disaster recovery plan, and the business continuity plan. ⊚ ⊚

193)

Failover backs up an exact copy of a system’s information. ⊚ ⊚

194)

true false

true false

A backup is an exact copy of a system’s information. ⊚ ⊚

true false

195) Recovery is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup. ⊚ ⊚

true false

196) Failover is a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real-time data and, if the primary server crashes, the users are automatically directed to the secondary server or backup server. This is a high-speed and highcost method of backup and recovery. ⊚ ⊚

Version 1

true false

55


197) Failover occurs when the primary machine recovers and resumes operations, taking over from the secondary server. ⊚ ⊚

true false

198) Failback is a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real-time data, and, if the primary server crashes, the users are automatically directed to the secondary server or backup server. ⊚ ⊚

true false

199) Disasters such as power outages, fires, floods, hurricanes, and even malicious activities such as hackers and viruses strike companies every day. Disasters can disrupt communications, damage physical infrastructures, halt transportation, and block utilities. ⊚ ⊚

true false

200) A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. ⊚ ⊚

true false

201) A cold site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. ⊚ ⊚ Version 1

true false

56


202) A warm site is a separate facility with computer equipment that requires installation and configuration. ⊚ ⊚

true false

203) A warm site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. ⊚ ⊚

true false

204) A warm site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. ⊚ ⊚

true false

205) A cold site is a separate facility with computer equipment that requires installation and configuration. ⊚ ⊚

true false

206) An emergency is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property. ⊚ ⊚

Version 1

true false

57


207) Emergency preparedness ensures a company is ready to respond to an emergency in an organized, timely, and effective manner. ⊚ ⊚

true false

208) Business impact analysis details how a company recovers and restores critical business operations and systems after a disaster or extended disruption. ⊚ ⊚

true false

209) A business impact analysis identifies all critical business functions and the effect that a specific disaster may have upon them. ⊚ ⊚

true false

210) A business continuity planning identifies all critical business functions and the effect that a specific disaster may have upon them. ⊚ ⊚

true false

211) A business impact analysis occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage. ⊚ ⊚

Version 1

true false

58


212) A cold site can destroy large amounts of vital data, often causing incidents and an unplanned interruption of a service. ⊚ ⊚

213)

true false

An emergency contains all of the details of an incident. ⊚ ⊚

true false

214) Incident management is the process responsible for managing how incidents are identified and corrected. ⊚ ⊚

true false

215) Technology recovery strategies focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements. ⊚ ⊚

true false

216) Accessibility refers to the varying levels that define what a user can access, view, or perform when operating a system. ⊚ ⊚

Version 1

true false

59


217) Top-level MIS employees require administrator access, or unrestricted access to the entire system. Administrator access can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems. ⊚ ⊚

218)

High availability occurs when a system is continuously operational at all times. ⊚ ⊚

219)

true false

Availability refers to the time frames when the system is operational. ⊚ ⊚

220)

true false

true false

A system is called unavailable when it is not operating and cannot be used. ⊚ ⊚

true false

221) Portability refers to the ability of an application to operate on different devices or software platforms, such as different operating systems. ⊚ ⊚

Version 1

true false

60


222) Scalability describes how well a system can scale up or adapt to the increased demands of growth. If a company grows faster than anticipated, it might experience a variety of problems, from running out of storage space to taking more time to complete transactions. Anticipating expected, and unexpected, growth is key to building scalable systems that can support that development. ⊚ ⊚

223)

Reliability means the system functions correctly and provides accurate information. ⊚ ⊚

224)

true false

Maintainability means the system quickly transforms to support environmental changes. ⊚ ⊚

226)

true false

Usability is the degree to which a system is easy to learn, efficient, and satisfying to use. ⊚ ⊚

225)

true false

true false

Performance measures how quickly a system performs a process or transaction. ⊚ ⊚

true false

227) Capacity planning determines future environmental infrastructure requirements to ensure high-quality system performance.

Version 1

61


⊚ ⊚

228)

true false

Vulnerability is a system weakness that can be exploited by a threat. ⊚ ⊚

true false

229) Serviceability is how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability. ⊚ ⊚

true false

230) Capacity represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents the size or volume. ⊚ ⊚

true false

231) Web accessibility means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web. ⊚ ⊚

true false

232) The Web Accessibility Initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities.

Version 1

62


⊚ ⊚

true false

233) Availability refers to the varying levels that define what a user can access, view, or perform when operating a system. ⊚ ⊚

234)

Unavailability occurs when a system is continuously operational at all times. ⊚ ⊚

235)

true false

Accessibility refers to the time frames when the system is operational. ⊚ ⊚

236)

true false

true false

A system is called available when it is not operating and cannot be used. ⊚ ⊚

true false

237) Scalability refers to the ability of an application to operate on different devices or software platforms, such as different operating systems. ⊚ ⊚

Version 1

true false

63


238) Portability describes how well a system can scale up or adapt to the increased demands of growth. ⊚ ⊚

239)

true false

Maintainability means the system functions correctly and provides accurate information. ⊚ ⊚

true false

240) Web accessibility is the degree to which a system is easy to learn and efficient and satisfying to use. ⊚ ⊚

241)

Serviceability means the system quickly transforms to support environmental changes. ⊚ ⊚

242)

true false

true false

Scalability measures how quickly a system performs a process or transaction. ⊚ ⊚

true false

243) Maintainability determines future environmental infrastructure requirements to ensure high-quality system performance. ⊚ ⊚

Version 1

true false

64


244)

Reliability is a system weakness that can be exploited by a threat. ⊚ ⊚

true false

245) Usability is how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability or availability. ⊚ ⊚

true false

246) Flexibility represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents the size or volume. ⊚ ⊚

true false

247) Availability means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web. ⊚ ⊚

true false

248) Administrator access initiative brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities. ⊚ ⊚ Version 1

true false

65


249) Gordon Moore, cofounder of Intel, observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years. ⊚ ⊚

true false

250) Tim Berners-Lee, cofounder of Intel, observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years. ⊚ ⊚

true false

251) Unsustainable, or green, MIS describes the production, management, use, and disposal of technology in a way that maximizes damage to the environment. ⊚ ⊚

true false

252) Sustainable, or green, MIS describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment. ⊚ ⊚

true false

253) Ewaste is discarded electronics and is growing with the growth of innovation; for example, a personal computer has a life expectancy of only three to five years and that of a cell phone is less than two years.

Version 1

66


⊚ ⊚

true false

254) Upcycle refers to discarded electronics and is growing with the growth of innovation; for example, a personal computer has a life expectancy of only three to five years and that of a cell phone is less than two years. ⊚ ⊚

true false

255) Large increases in technology use, by both consumers and businesses, have greatly amplified energy consumption. ⊚ ⊚

true false

256) Sustainable MIS disposal refers to the safe disposal of MIS assets at the end of their life cycle. ⊚ ⊚

true false

257) Unsustainable MIS disposal refers to the safe disposal of MIS assets at the end of their life cycle. ⊚ ⊚

true false

258) Clean computing is a subset of sustainable MIS and refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment.

Version 1

67


⊚ ⊚

true false

259) A green personal computer (green PC) is built using environmentally friendly materials and is designed to save energy. ⊚ ⊚

260)

true false

An upcycle reuses or refurbishes ewaste and creates a new product. ⊚ ⊚

true false

261) Corporate social responsibility is a subset of sustainable MIS and refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment. ⊚ ⊚

true false

262) A black personal computer (black PC) is built using environmentally friendly materials and is designed to save energy. ⊚ ⊚

263)

true false

Ewaste reuses or refurbishes ewaste and creates a new product. ⊚ ⊚

Version 1

true false

68


264)

Corporate social responsibility is a company’s acknowledged responsibility to society. ⊚ ⊚

true false

265) Energy consumption is the amount of energy consumed by business processes and systems. ⊚ ⊚

true false

266) Carbon emissions include the carbon dioxide and carbon monoxide in the atmosphere produced by business processes and systems. ⊚ ⊚

267)

true false

Carbon emission is the amount of energy consumed by business processes and systems. ⊚ ⊚

true false

268) Energy consumption includes the carbon dioxide and carbon monoxide in the atmosphere produced by business processes and systems. ⊚ ⊚

Version 1

true false

69


269) A sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. ⊚ ⊚

true false

270) A smart grid delivers electricity using two-way digital technology and is meant to solve the problem of outdated electrical grids. ⊚ ⊚

true false

271) Grid computing is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem. ⊚ ⊚

true false

272) Cloud computing delivers electricity using two-way digital technology and is meant to solve the problem of outdated electrical grids. ⊚ ⊚

true false

273) Virtualization is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem. ⊚ ⊚

Version 1

true false

70


274) Virtualization creates multiple virtual machines on a single computing device. A good analogy is a computer printer. In the past, you had to purchase a fax machine, copy machine, answering machine, and computer printer separately. This was expensive, required enough energy to run four machines, and created additional amounts of ewaste. ⊚ ⊚

true false

275) Storage virtualization combines multiple network storage devices so they appear to be a single storage device. ⊚ ⊚

true false

276) Network virtualization combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device. ⊚ ⊚

true false

277) Server virtualization combines the physical resources, such as servers, processors, and operating systems, from the applications. ⊚ ⊚

true false

278) Disaster Recovery as a Service (DRaaS) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster. ⊚ ⊚

Version 1

true false

71


279) Network virtualization combines multiple network storage devices so they appear to be a single storage device. ⊚ ⊚

true false

280) Server virtualization combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device. ⊚ ⊚

true false

281) Storage virtualization combines the physical resources, such as servers, processors, and operating systems, from the applications. ⊚ ⊚

true false

282) Virtualization offers backup services that use cloud resources to protect applications and data from disruption caused by disaster. ⊚ ⊚

true false

283) A data center is a facility used to house management information systems and associated components, such as telecommunications and storage systems. ⊚ ⊚

true false

284) Cloud computing stores, manages, and processes data and applications over the Internet rather than on a personal computer or server. Version 1

72


⊚ ⊚

true false

285) Dynamic scaling means the MIS infrastructure can be automatically scaled up or down based on needed requirements. ⊚ ⊚

true false

286) Single-tenancy in the cloud means that a single instance of a system serves multiple customers. In the cloud, each customer is called a tenant, and multiple tenants can access the same system. ⊚ ⊚

true false

287) Multi-tenancy occurs when each customer or tenant must purchase and maintain an individual system. ⊚ ⊚

true false

288) Multi-tenancy in the cloud means that a single instance of a system serves multiple customers. In the cloud, each customer is called a tenant, and multiple tenants can access the same system. ⊚ ⊚

true false

289) Single-tenancy occurs when each customer or tenant must purchase and maintain an individual system.

Version 1

73


⊚ ⊚

true false

290) Cloud computing offers a pay-per-use revenue model similar to a metered service such as gas or electricity. ⊚ ⊚

true false

291) Utility computing offers a pay-per-use revenue model similar to a metered service such as gas or electricity. ⊚ ⊚

true false

292) A public cloud promotes massive, global, industry-wide applications offered to the general public. In a public cloud, customers are never required to provision, manage, upgrade, or replace hardware or software. ⊚ ⊚

true false

293) A private cloud serves only one customer or organization and can be located on or off the customer’s premises. ⊚ ⊚

true false

294) A community cloud serves a specific community with common business models, security requirements, and compliance considerations.

Version 1

74


⊚ ⊚

true false

295) A hybrid cloud includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability. ⊚ ⊚

true false

296) A hybrid cloud serves a specific community with common business models, security requirements, and compliance considerations. ⊚ ⊚

true false

297) Cloud bursting is when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high or peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes. ⊚ ⊚

Version 1

true false

75


Answer Key Test name: Chap 05_8e_Baltzan 6) A 7) B 8) C 9) D 10) C 11) D 12) A 13) A 14) B 15) A 16) C 17) D 18) A 19) B 20) D 21) C 22) D 23) A 24) D 25) A 26) C 27) A 28) C 29) B 30) B 31) A Version 1

76


32) C 33) A 34) B 35) C 36) A 37) D 38) D 39) C 40) A 41) A 42) B 43) D 44) C 45) B 46) B 47) D 48) D 49) A 50) B 51) A 52) C 53) A 54) B 55) C 56) D 57) D 58) A 59) C 60) D 61) A Version 1

77


62) A 63) B 64) C 65) D 66) B 67) A 68) C 69) D 70) B 71) D 72) C 73) C 74) A 75) A 76) B 77) C 78) B 79) C 80) B 81) C 82) A 83) A 84) A 85) B 86) C 87) D 88) C 89) A 90) B 91) C Version 1

78


92) C 93) D 94) A 95) B 96) C 97) C 98) D 99) C 100) A 101) D 102) B 103) C 104) A 105) A 106) A 107) B 108) C 109) B 110) D 111) A 112) B 113) C 114) D 115) B 116) A 117) B 118) C 119) A 120) D 121) C Version 1

79


122) B 123) A 124) B 125) C 126) D 127) B 128) C 129) A 130) B 131) C 132) D 133) D 134) B 135) A 136) B 137) D 138) C 139) D 140) A 141) B 142) D 143) C 144) C 145) B 146) A 147) C 148) B 149) C 150) D 151) A Version 1

80


152) B 153) A 154) B 155) C 156) D 157) B 158) A 159) D 160) C 161) A 162) D 163) B 164) C 165) D 166) A 167) C 168) B 169) D 170) FALSE 171) TRUE 172) TRUE 173) TRUE 174) FALSE 175) FALSE 176) TRUE 177) TRUE 178) TRUE 179) FALSE 180) FALSE 181) TRUE Version 1

81


182) TRUE 183) TRUE 184) FALSE 185) TRUE 186) FALSE 187) FALSE 188) TRUE 189) FALSE 190) TRUE 191) FALSE 192) TRUE 193) FALSE 194) TRUE 195) TRUE 196) TRUE 197) FALSE 198) FALSE 199) TRUE 200) TRUE 201) TRUE 202) TRUE 203) FALSE 204) FALSE 205) FALSE 206) TRUE 207) TRUE 208) FALSE 209) TRUE 210) FALSE 211) FALSE Version 1

82


212) FALSE 213) FALSE 214) TRUE 215) TRUE 216) TRUE 217) TRUE 218) TRUE 219) TRUE 220) TRUE 221) TRUE 222) TRUE 223) TRUE 224) TRUE 225) TRUE 226) TRUE 227) TRUE 228) TRUE 229) TRUE 230) TRUE 231) TRUE 232) TRUE 233) FALSE 234) FALSE 235) FALSE 236) FALSE 237) FALSE 238) FALSE 239) FALSE 240) FALSE 241) FALSE Version 1

83


242) FALSE 243) FALSE 244) FALSE 245) FALSE 246) FALSE 247) FALSE 248) FALSE 249) TRUE 250) FALSE 251) FALSE 252) TRUE 253) TRUE 254) FALSE 255) TRUE 256) TRUE 257) FALSE 258) TRUE 259) TRUE 260) TRUE 261) FALSE 262) FALSE 263) FALSE 264) TRUE 265) TRUE 266) TRUE 267) FALSE 268) FALSE 269) TRUE 270) TRUE 271) TRUE Version 1

84


272) FALSE 273) FALSE 274) TRUE 275) TRUE 276) TRUE 277) TRUE 278) TRUE 279) FALSE 280) FALSE 281) FALSE 282) FALSE 283) TRUE 284) TRUE 285) TRUE 286) FALSE 287) FALSE 288) TRUE 289) TRUE 290) FALSE 291) TRUE 292) TRUE 293) TRUE 294) TRUE 295) TRUE 296) FALSE 297) TRUE

Version 1

85


CHAPTER 6 1)

Explain the four primary traits that determine the value of data.

2)

Describe a database, a database management system, and the relational database model.

3)

Identify the business advantages of a relational database.

4)

Explain blockchain and its advantages over a centralized relational database.

Version 1

1


5) Define a data warehouse and provide a few reasons it can make a manager more effective.

6)

Explain ETL and the role of a data mart in business.

7) Employees need to compare different types of data for what they commonly reveal to make strategic decisions. Which of the following represents the three common types of data found throughout an organization? A) levels, facts, granularities B) levels, facts, data C) levels, formats, granularities D) data, formats, governance

8)

Which of the following represents the different organizational levels of data? A) detail, summary, aggregate B) document, presentation, spreadsheet, database C) individual, department, enterprise D) executives, managers, operational employees

Version 1

2


9)

Which of the following represents the different data formats? A) detail, summary, aggregate B) document, presentation, spreadsheet, database C) individual, department, enterprise D) executives, managers, operational employees

10)

Which of the following represents the different data granularities? A) detail, summary, aggregate B) document, presentation, spreadsheet, database C) individual, department, enterprise D) executives, managers, operational employees

11)

Which of the following is not a primary trait of the value of data? A) governance B) type C) timeliness D) cost

12) What encompasses all of the data contained within a single business process or unit of work and its primary purpose is to support the performing of daily operational tasks?

Version 1

3


A) transactional data B) analytical data C) timeliness D) quality

13) What encompasses all organizational data and its primary purpose is to support the performing of managerial analysis tasks? A) transactional data B) analytical data C) timeliness D) quality

14)

What is immediate, up-to-date data? A) real-time data B) real-time systems C) data granularity D) data governance

15)

What provides real-time data in response to query requests? A) real-time data B) real-time systems C) data level D) data quality

Version 1

4


16)

What is one of the biggest pitfalls associated with real-time data? A) it is only available to high-level executives due to the expense B) it is only available in aggregate levels C) it continually changes D) it rarely changes

17) Which of the following is not one of the five characteristics common to high-quality data? A) accuracy B) completeness C) quantity D) consistency

18)

What is a real-time system? A) provides the same data elements with different values B) provides real-time data in response to query requests C) automates tasks for organizational systems D) provides all of the data contained within a single business process or unit of work

19) Which of the following implies that aggregate or summary data is in agreement with detailed data? A) uniqueness B) completeness C) consistency D) integrity

Version 1

5


20) Which of the following implies that data is current with respect to the business requirement? A) uniqueness B) accuracy C) consistency D) timeliness

21) What is it called when each transaction, entity, and event is represented only once in the data? A) uniqueness B) accuracy C) consistency D) timeliness

22)

Which of the following refers to the extent of detail within the data? A) knowledge data B) data granularity C) data intelligence D) data analytics

23) Which of the following represent the four primary traits that help determine the value of data?

Version 1

6


A) type, timeliness, quality, governance B) statistics, tracking, quality, governance C) type, cost, governance, policy D) timeliness, quality, quantity, governance

24)

What are the two different categories of data type? A) analytical and productive B) analytical and analysis C) transactional and analytical D) transactional and productive

25) Which of the following encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks? A) targeted data B) analytical data C) productive data D) transactional data

26) Which of the following encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks? A) analytical data B) transactional data C) statistical data D) targeted data

Version 1

7


27) Ben works at a top accounting firm in Salt Lake City, and his responsibilities include writing letters, memos, and emails along with generating reports for financial analysis and marketing materials for products. Ben’s duties provide value-added to his company and would be categorized as occurring in different data A) lists. B) formats. C) granularities. D) focuses.

28) Ben works at a top accounting firm in Salt Lake City, and his responsibilities include developing individual and departmental goals and generating financial analysis across departments and the enterprise as a whole for the executive team to review. Ben’s duties provide value-added to his company and would be categorized as occurring in different data A) levels. B) formulas. C) granularities. D) focuses.

29) Ben works at a top accounting firm in Salt Lake City, and his responsibilities include developing reports for each salesperson, product, and part as well as departmental-wide sales reports by salesperson, product, and part. Ben’s duties provide value-added to his company and would be categorized as occurring in different data A) levels. B) formulas. C) granularities. D) focuses.

Version 1

8


30)

Which of the following refers to immediate, up-to-date data? A) daily data B) strategic data C) real-time data D) crisis data

31) Which of the following does not represent a company or group that requires up-to-thesecond data? A) 911 responders B) stock traders C) banks D) construction companies

32)

Which of the following provides real-time data in response to requests? A) sales system B) transactional system C) real-time system D) salary system

33)

Which of the following are examples of transactional data?

Version 1

9


A) airline tickets, sales receipts, packing slips B) trends, sales statistics C) product sales results, grocery receipts, growth projections D) airline tickets, sales growth spreadsheets

34)

Which of the following are examples of analytical data? A) airline tickets, sales receipts, packing slips B) hotel reservations, sales receipts, packing slips C) future growth analysis, sales projections, product statistics D) packing slips, grocery receipts, competitor data

35) Most people request real-time data without understanding that continual ________ is one of its biggest pitfalls. A) improvements B) change C) clustering D) cleansing

36)

Which of the following occurs when the same data element has different values? A) data modeling issue B) data gap analysis issue C) data governance issue D) data inconsistency issue

Version 1

10


37) Which of the following occurs when a system produces incorrect, inconsistent, or duplicate data? A) data inconsistency issue B) data integrity issue C) data cost issue D) data gap analysis issue

38) Which of the following includes all of the five characteristics common to high-quality data? A) accuracy, completeness, strength, support, positive feedback B) accuracy, association, referral, sales, marketing C) accuracy, competition, support, customer service, visibility D) accuracy, completeness, consistency, timeliness, uniqueness

39) Which of the following would not be considered for the complete characteristic of highquality data? A) Is a value missing from the personal data? B) Is each transaction represented only once in the data? C) Is the address incomplete? D) Is the area code missing for the phone data?

40) Which of the following would not be considered for the timely characteristic of highquality data?

Version 1

11


A) Is the zip code missing in the address? B) Is the data current with respect to business needs? C) Is the customer address current? D) Is the data updated weekly or hourly?

41) Which of the following would not be considered for the accurate characteristic of highquality data? A) Is the name spelled correctly? B) Is the email address invalid? C) Do the name and phone values have the exact same data? D) Is aggregate data in agreement with detailed data?

42) Which of the following would not be considered for the unique characteristic of highquality data? A) Are there any duplicate orders? B) Are there any duplicate customers? C) Is aggregate data in agreement with detailed data? D) Is each transaction and event represented only once in the data?

43) Which of the following would not be considered for the consistent characteristic of highquality data? A) Do all sales columns equal the total for the revenue column? B) Is the two-digit state code missing in the data? C) Is all summary data in agreement with detailed data? D) Does the order number match the item and the color options available?

Version 1

12


44)

Which of the following is a reason for low-quality data? A) online customers intentionally enter inaccurate data to protect the privacy B) different systems have different data entry standards and formats C) third-party and external data contains inaccuracies and errors D) All of the answers are correct.

45) Some of the serious business consequences that occur due to using low-quality data to make decisions are all of the following, except A) inability to accurately track customers. B) inability to identify selling opportunities. C) the success of the organization. D) lost revenue opportunities from marketing to nonexistent customers.

46) What is the overall management of the availability, usability, integrity, and security of company data? A) data intelligence B) data governance C) data lake D) data map

47)

What occurs when the same data element has different values?

Version 1

13


A) data inconsistency B) data integrity issues C) data governance D) master data management

48)

What occurs when a system produces incorrect, inconsistent, or duplicate data? A) data inconsistency B) data integrity issues C) data governance D) master data management

49) What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems? A) data inconsistency B) data integrity issues C) data governance D) master data management

50)

What is data inconsistency? A) occurs when the same data element has different values B) occurs when a system produces correct and consistent data C) refers to the overall management of the availability and usability of company data D) the practice of gathering data and ensuring that it is uniform, accurate, and consistent

Version 1

14


51)

What are data integrity issues? A) occur when the same data element has identical values B) occur when a system produces incorrect, inconsistent, or duplicate data C) refer to the overall management of the availability and usability of company data D) the practice of gathering data and ensuring that it is uniform, accurate, and consistent

52)

What role does a data steward fulfill?

A) acts as a liaison between the finance and accounting departments B) ensures policies and procedures are never implemented across the organization C) acts as a liaison between the MIS department and the business and ensures policies and procedures are implemented across the organization D) ensures data is clean and consistent

53) What is the term for the management and oversight of an organization’s data assets to help provide business users with high-quality data that is easily accessible in a consistent manner? A) data steward B) data stewardship C) data master management D) data governance

54) What is the term for the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data?

Version 1

15


A) data steward B) data stewardship C) data validation D) data master management

55)

What is data stewardship?

A) the time it takes for data to be stored or retrieved B) the management and oversight of an organization’s data assets C) the person responsible for ensuring policies and procedures are implemented across the organization D) when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps

56)

What is a data steward?

A) the time it takes for data to be stored or retrieved B) the management and oversight of an organization’s data assets C) the person responsible for ensuring policies and procedures are implemented across the organization D) when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps

57)

What is data validation?

Version 1

16


A) the time it takes for data to be stored or retrieved B) the management and oversight of an organization’s data assets C) the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data D) when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps

58)

What maintains data about various types of objects, events, people, and places? A) database B) data model C) data mart D) data point

59)

What does a database maintain data on? A) inventory B) transactions C) employees D) All of the answers are correct.

60) In the relational database model, what is a person, place, thing, transaction, or event about which data is stored? A) entity B) relationships C) attribute D) foreign key

Version 1

17


61)

Why do relational databases use primary keys and foreign keys? A) create an entity B) create physical relationships C) create logical relationships D) create an attribute

62)

What is a primary key?

A) a field (or group of fields) that uniquely identifies a given entity in a table B) a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables C) a characteristic or property of an entity D) a field (or group of fields) that uniquely identifies a given attribute in a table

63)

What is a foreign key?

A) a field (or group of fields) that uniquely identifies a given entity in a table B) a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables C) a characteristic or property of an entity D) a field (or group of fields) that uniquely identifies a given attribute in a table

64) Which of the following creates, reads, updates, and deletes data in a database while controlling access and security?

Version 1

18


A) database element B) database management system C) data governance D) data master management

65) Which of the following asks users to write lines of code to answer questions against a database? A) structured query language B) relational query language C) structured elements D) data cube

66) What is the primary tool that retrieves data and helps users graphically design the answer to a question? A) data visualization tool B) structured tool C) query-by-example tool D) relational fact tool

67)

What is the smallest or basic unit of data? A) database B) data element C) data model D) data integrity issue

Version 1

19


68) What is a logical data structure that details the relationship among data elements using graphics or pictures? A) data model B) data element C) data cube D) data mart

69)

What compiles all of the metadata about the data elements in the data model? A) data entity B) data element C) data attribute D) data dictionary

70) Which of the following allows users to create, read, update, and delete data in a relational database? A) infographic system B) bitcoin system C) relational database management system D) blockchain

71)

Which of the following illustrates the primary concepts of the relational database model?

Version 1

20


A) ethics, applications, keys, relationships B) entities, attributes, keys, relationships C) endeavor, aspire, control, regulate D) early, after, before, future

72) Which of the following stores data about a person, place, thing, transaction, or event and is usually referred to as a table? A) entity B) extraction C) attribute D) foreign key

73)

What type of keys do you need to use to create a relational database model? A) primary keys, secondary keys B) primary keys, foreign keys C) entity keys, attribute keys D) relational keys, structured keys

74)

What is a field that uniquely identifies a given record in a table? A) foreign key B) primary key C) secondary key D) block key

Version 1

21


75)

What is the role of a foreign key?

A) it is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables B) it is a unique way to identify each record C) it is a field that uniquely identifies a given record in a table D) it supports a secondary key

76) Your textbook discussed a record store example in which one user could perform a query to determine which recordings had a track length of four minutes or more and another user could perform an analysis to determine the distribution of recordings as they relate to the different categories. This is an advantage of which database advantage? A) decreased scalability and performance B) decreased data security C) increased data redundancy D) increased flexibility

77)

Which of the following is not an advantage of database-stored data? A) increased flexibility B) increased performance C) increased data redundancy D) increased data integrity

78)

What is the logical view of data?

Version 1

22


A) deals with the physical storage of data on a storage device such as a hard disk B) deals with the logical storage of data on a storage device such as a hard disk C) focuses on how users logically access data to meet their particular business needs D) focuses on how users physically access data to meet their particular business needs

79)

Which of the following is correct in reference to a database? A) a database can support only one logical view B) a database can support many physical views C) a database can support many logical views D) a database can support up to three logical views

80)

Which of the below is not an advantage of using a relational database? A) increased data quality B) increased flexibility C) decreased data redundancy D) decreased data security

81)

What is the term for the time it takes for data to be stored or retrieved? A) data governance B) data latency C) data validation D) data gap analysis

82)

What is data latency?

Version 1

23


A) the time it takes for data to be stored or retrieved B) the management and oversight of an organization’s data assets C) the person responsible for ensuring policies and procedures are implemented across the organization D) when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps

83)

What is data redundancy? A) duplication of data B) storing the same data in multiple places C) storing duplicate data in multiple places D) All of the answers are correct.

84)

What is the primary problem with redundant data? A) it is difficult to determine which values are the most current. B) it is often inconsistent. C) it is difficult to determine which values are the most accurate. D) All of the answers are correct.

85)

Which of the following is true in regard to the elimination of redundant data? A) uses additional hard disk space B) makes performing data updates harder C) improves data quality D) All of the answers are correct.

Version 1

24


86)

What are the rules that help ensure the quality of data? A) data integrity B) integrity constraints C) relational integrity constraints D) business-critical integrity constraints

87)

What are rules that enforce basic and fundamental information-based constraints? A) data integrity B) integrity constraint C) business-critical integrity constraint D) relational integrity constraint

88) What type of integrity constraint does not allow someone to create an order for a nonexistent customer? A) relational integrity constraint B) business-critical integrity constraint C) data-critical integrity constraint D) mission-critical integrity constraint

89)

Which of the following is a business-critical integrity constraint?

Version 1

25


A) system will not allow an entry for an order for a nonexistent customer B) system will not allow returns of fresh produce after 15 days past delivery C) system will not allow shipping a product to a customer who does not have a valid address D) systems will not allow shipping of a nonexistent product to a customer

90)

What is identity management?

A) enforces business rules vital to an organization’s success B) the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete C) a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system D) when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps

91) What is the term for a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity? A) identity management B) master data management C) data validation D) data latency

92) Which of the following focuses on how individual users logically access data to meet their own particular business needs?

Version 1

26


A) physical view B) logical view C) foreign key view D) business view

93) The book cited www.EllisIsland.org, which generates more than 2.5 billion hits, as a website that offers a database that can easily adjust to handle massive volumes of data. What is this an example of? A) increased scalability and performance B) increased data security C) reduced data redundancy D) increased flexibility

94) One of the primary goals of a database is to eliminate data redundancy by recording each piece of data in only one place in the database. What does the elimination of data redundancy do for a database? A) reduces disk space requirements B) makes updating data easier C) improves data quality D) All of the answers are correct.

95)

What are rules that help ensure the quality of data? A) data integrity B) integrity constraints C) data quality D) data ethics

Version 1

27


96)

What are the rules that enforce basic and fundamental information-based constraints? A) responsibly integrity constraints B) quality constraints C) web integrity constraints D) relational integrity constraints

97)

What is an organized collection of data? A) dataset B) dirty data C) data cube D) data point

98)

What is an individual item on a graph or a chart? A) dataset B) dirty data C) data cube D) data point

99)

What is a central location in which data is stored and managed? A) repository B) data warehouse C) data lake D) data element

Version 1

28


100)

What is a collection of data from various sources for the purpose of data processing? A) repository B) data warehouse C) data aggregation D) data cube

101)

What can compare two or more datasets to identify patterns and trends? A) comparative analysis B) competitive monitoring C) data-driven decision management D) competitive analysis

102) What can help managers keep tabs of competitor’s activities on the web using software that automatically tracks all competitor website activities such as discounts and new products? A) comparative analysis B) competitive monitoring C) data governance D) source data

103)

Which of the following represents the data analysis cycle?

Version 1

29


A) compare, contrast, cost, concept B) collect, analyze, communicate, visualize C) fact, data, information, intelligence D) raw, cooked, source, set

104)

Which of the following is included in the data analysis cycle? A) collect B) analyze C) communicate D) All of the answers are correct.

105)

Which of the following identifies the primary location where data is collected? A) comparative analysis B) competitive monitoring C) data governance D) source data

106)

What includes invoices, spreadsheets, time sheets, and transactions? A) data aggregation B) competitive monitoring C) data compliance D) source data

107)

What is data that has not been processed for use?

Version 1

30


A) raw data B) competitive monitoring C) data cube D) source data

108)

What is another name for raw data that has undergone processing? A) data lake B) cooked data C) data cube D) source data

109) What is a storage repository that holds a vast amount of raw data in its original format until the business needs it? A) data latency B) data lake C) data governance D) data point

110)

What is a data lake?

A) a business that can answer questions using the why approach B) a storage repository that holds a vast amount of raw data in its original format until the business needs it C) a technique for establishing a match, or balance, between the source data and the target data warehouse D) an approach to business governance that values decisions that can be backed up with verifiable data

Version 1

31


111)

What is a data map?

A) a business that can answer questions using the why approach B) a storage repository that holds a vast amount of raw data in its original format until the business needs it C) a technique for establishing a match, or balance, between the source data and the target data warehouse D) an approach to business governance that values decisions that can be backed up with verifiable data

112)

What is data-driven decision management?

A) a business that can answer questions using the why approach B) a storage repository that holds a vast amount of raw data in its original format until the business needs it C) a technique for establishing a match, or balance, between the source data and the target data warehouse D) an approach to business governance that values decisions that can be backed up with verifiable data

113)

What is source data?

A) identifies the primary location where data is collected B) a storage repository that holds a vast amount of raw data in its original format until the business needs it C) a technique for establishing a match, or balance, between the source data and the target data warehouse D) an approach to business governance that values decisions that can be backed up with verifiable data

Version 1

32


114)

What is a data point?

A) identifies the primary location where data is collected B) an individual item on a graph or chart C) a technique for establishing a match, or balance, between the source data and the target data warehouse D) an approach to business governance that values decisions that can be backed up with verifiable data

115) Which of the following questions is an example of how managers can use business intelligence (BI) to answer tough business questions? A) where has the business been? B) where is the business now? C) where is the business going? D) All of the answers are correct.

116) Businesses collect a tremendous amount of ________ data as part of their routine operations. A) operational B) transactional C) aggregate D) comparative

117) Kassandra Young is a business manager at Weith Productions. Although she does not have a background in technology, her job requires her to work with analytical tools to make datadriven decisions. To make her job easier, what can she customize to display data quickly and run custom reports? Version 1

33


A) data point B) data cleansing C) dashboard D) dataset

118)

What is it called when a manager has so much data that they cannot make a decision? A) data rich, information poor B) data rich, content poor C) data rich, communication poor D) data rich, intelligence

119) A data warehouse is a ________ collection of data, gathered from many different ________ databases, that supports business analysis activities and decision-making tasks. A) logical; operational B) physical; operational C) logical; transactional D) physical; transactional

120) Which of the following is incorrect in terms of data warehousing and business intelligence? A) they do not include data from other operational systems B) operational systems are always integrated C) operational data is mainly current D) operational data frequently has quality issues

Version 1

34


121)

What do data warehouses support? A) OLAP and transactional processing B) analytical processing and transactional processing C) online transactional systems D) OLAP and analytical processing

122)

What is the primary purpose of a data warehouse? A) combines strategic data B) organizes departments C) integrates computers and employees D) combines departments

123) The status of a lightbulb can be referred to in many ways (on, off, O/F, 1/0) in a data warehouse. What is the name for ensuring status is referenced in the same way throughout the warehouse? A) data scaling B) streamlining data points C) standardizing data D) standardizing protocols

124)

Why were data warehouses created?

Version 1

35


A) The numbers and types of operational databases increased as businesses grew. B) Many companies had data scattered across multiple systems with different formats. C) Completing reporting requests from numerous operational systems took days or weeks to fulfill. D) All of the answers are correct.

125)

What is extraction, transformation, and loading?

A) It is a process of entering data, tracking data, and loading it into a database. B) It is a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse. C) It is a process that is performed at the end of the data warehouse model prior to putting the data in a cube. D) It is a process that is performed at the beginning of all business processes.

126)

Which of the following are examples of external databases in the data warehouse model? A) marketing, sales, inventory, and billing B) accounting data mart C) competitor and industry data, mailing lists, and stock market analyses D) marketing data, sales data, and stock market analyses

127) Which of the following is an example of data found in an external database in the data warehouse model? A) marketing data B) sales data C) competitor data D) All of the answers are correct.

Version 1

36


128)

Which of the following describes ETL? A) a process that extracts data from internal and external databases B) a process that transforms data using a common set of enterprise definitions C) a process that loads data into a data warehouse D) All of the answers are correct.

129)

Which of the following statements is true regarding customer data? A) Customer data can exist in several operational systems. B) Customer data in each operational system can change. C) Customer data in each operational system can be different. D) All of the answers are correct.

130)

Which of the following occurs during data cleansing? A) cleaning missing records B) cleaning redundant records C) cleaning inaccurate data D) All of the answers are correct.

131)

Which of the following occurs during data cleansing? A) cleaning data marts B) cleaning redundant customer data C) cleaning accurate data D) cleaning correct data

Version 1

37


132) Within the beginning stage of the data warehouse models process, which of the following are included in the internal databases? A) marketing, sales, inventory, and accounting B) All of the answers are correct. C) competitor and industry data, mailing lists, and stock market analyses D) marketing data and stock market analysis numbers

133)

What is the ultimate outcome of a data warehouse? A) data keys B) data relationships C) data point D) data marts

134)

Which of the following contains a subset of data warehouse data? A) data point B) data mart C) data pool D) data lake

135)

What are the primary differences between a data warehouse and a data mart?

Version 1

38


A) data warehouses make quick decisions; data marts make slow decisions B) data warehouses tackle ethical issues; data marts tackle hypothetical issues C) data warehouses have a more organization-wide focus; data marts have a functional focus D) data warehouses have a physical focus; data marts have a logical focus

136) Which of the following is the common term for the representation of multidimensional data? A) block B) square C) column D) cube

137)

What is a data cube? A) multidimensional data B) storage repository C) column in a spreadsheet D) dirty data

138)

What is another term for data cleansing? A) data point B) data scrubbing C) data scrapping D) data aggregation

Version 1

39


139)

What determines the accuracy and completeness of organizational data? A) data quantity audit B) data quality audit C) data intelligence audit D) data cost audit

140)

Which of the following is not a data cleansing activity? A) identifying redundant records B) identifying inaccurate or incomplete data C) identifying missing records or attributes D) identifying sales trends

141)

What is erroneous or flawed data? A) dirty data B) data cleansing C) data scrubbing D) data lake

142)

Which of the following is a problem associated with dirty data? A) duplicate data B) incorrect data C) violates business rules D) All of the answers are correct.

Version 1

40


143)

Which of the following is a problem associated with dirty data? A) duplicate data B) correct data C) accurate data D) All of the answers are correct.

144)

Which of the following is a problem associated with dirty data? A) inaccurate data B) misleading data C) nonformatted data D) All of the answers are correct.

145)

Which of the following is a problem associated with dirty data? A) inaccurate data B) nonintegrated data C) violates business rules D) All of the answers are correct.

146)

Which of the following is a problem associated with dirty data? A) accurate data B) integrated data C) violates business rules D) All of the answers are correct.

Version 1

41


147)

Which of the following is a problem associated with dirty data? A) nonformatted data B) misleading data C) incorrect data D) All of the answers are correct.

148)

Which of the following is a problem associated with dirty data? A) formatted data B) misleading data C) correct data D) All of the answers are correct.

149) Business analysis is difficult to achieve from operational databases. Which of the following is a reason why? A) inconsistent data definitions B) lack of data standards C) All of the answers are correct. D) poor data quality

150)

Which of the following is not a dirty data problem?

Version 1

42


A) duplicate data B) inaccurate data C) specific data D) nonintegrated data

151)

Which of the following is true of data artists? A) are experts at creating a story from any information B) have philosophical and political reasons for breaking into systems C) work at the request of system owners to find system vulnerabilities D) reward individuals for discovering and reporting software bugs

152)

What are the benefits of data artists? A) They help people understand complex data. B) They create music and sculpture from combinations of data. C) They are responsible for ensuring policies and procedures are implemented properly. D) They record classified transactional data.

153) What processes and manages algorithms across many machines in a computing environment? A) distributed computing B) ledger C) blockchain D) immutable

Version 1

43


154)

What records classified and summarized transactional data? A) distributed computing B) ledger C) blockchain D) immutable

155) What is a type of distributed ledger consisting of blocks of data that maintains a permanent and tamper-proof record of transactional data? A) distributed computing B) ledger C) blockchain D) immutable

156)

What simply means unchangeable? A) distributed computing B) ledger C) blockchain D) immutable

157)

What is distributed computing? A) processes and manages algorithms across many machines in a computing environment B) records classified and summarized transactional data C) a type of distributed ledger, consisting of blocks of data D) simply means unchangeable

Version 1

44


158)

What are the three primary components in a blockchain? A) hash B) data C) previous hash D) All of the answers are correct.

159)

What are the three advantages of using blockchain technology? A) immutability B) digital trust C) Internet of Things integration D) All of the answers are correct.

160)

What is a ledger? A) processes and manages algorithms across many machines in a computing environment B) records classified and summarized transactional data C) a type of distributed ledger, consisting of blocks of data D) simply means unchangeable

161)

What is a blockchain? A) processes and manages algorithms across many machines in a computing environment B) records classified and summarized transactional data C) a type of distributed ledger consisting of blocks of data D) simply means unchangeable

Version 1

45


162)

What is immutable? A) processes and manages algorithms across many machines in a computing environment B) records classified and summarized transactional data C) a type of distributed ledger, consisting of blocks of data D) simply means unchangeable

163)

What is proof-of-work?

A) a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain B) a way to validate transactions and achieve a distributed consensus C) a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems; it operates independently of a central bank D) All of the answers are correct.

164)

What is proof-of-stake?

A) a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain B) a way to validate transactions and achieve a distributed consensus C) a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems; it which operates independently of a central bank D) All of the answers are correct.

Version 1

46


165)

What is Bitcoin?

A) a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain B) a way to validate transactions and achieve the distributed consensus C) a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems; it which operates independently of a central bank D) All of the answers are correct.

166) What is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain? A) distributed computing B) proof-of-work C) blockchain D) proof-of-stake

167)

What is a way to validate transactions and achieve a distributed consensus? A) distributed computing B) proof-of-work C) blockchain D) proof-of-stake

168) What a type of digital currency in which a record of transactions is maintained, new units of currency are generated by the computational solution of mathematical problems, and it operates independently of a central bank?

Version 1

47


A) distributed computing B) proof-of-work C) blockchain D) bitcoin

169)

What is the first block created in the blockchain? A) genesis block B) hash C) block D) proof-of-stake

170) What is a function that converts an input of letters and numbers into an encrypted output of a fixed length? A) genesis block B) hash C) block D) proof-of-stake

171) What is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions? A) genesis block B) hash C) immutability D) proof-of-stake

Version 1

48


172)

What are links in a blockchain? A) genesis blocks B) hashes C) proofs-of-work D) bitcoins

173) In a block in a blockchain, what represents the transactional data, sender, receiver, and number of coins? A) data B) hash C) previous hash D) proof-of-stake

174)

In a block in a blockchain, what represents a block’s unique identifier like a fingerprint? A) data B) hash C) previous hash D) proof-of-stake

175)

In a block in a blockchain, what represents the hash of the previous block?

Version 1

49


A) data B) hash C) previous hash D) proof-of-stake

176)

Identify the correct statement about Ethereum. A) a way to validate transactions and achieve a distributed consensus B) the first block created in a blockchain C) the most actively used blockchain D) a block’s unique identifier such as a fingerprint

177)

Which of the following is a feature of a non-fungible token (NFT)? A) unique and irreplaceable B) cannot combine one NFT with another to “breed” a third, unique NFT C) does not contain ownership details D) All of the answers are correct.

178)

What is currently the most common use for NFTs (non-fungible tokens)? A) food and services B) expensive electronic devises C) sharing money amongst peers D) collectibles such as digital artwork

179)

Which of the following allows someone to own a tweet or digital image?

Version 1

50


A) non-fungible token B) Bitcoin token C) digital artist D) data steward

180) Data granularity refers to the extent of detail within the data (fine and detailed or coarse and abstract). ⊚ ⊚

true false

181) Data timeliness refers to the extent of detail within the data (fine and detailed or coarse and abstract). ⊚ ⊚

182)

true false

Organizational data has three primary areas including levels, formats, and granularities. ⊚ ⊚

true false

183) The four primary traits of the value of data include type, timeliness, quality, and governance. ⊚ ⊚

184) type.

true false

The four primary traits of the value of data include levels, formats, granularities, and

Version 1

51


⊚ ⊚

true false

185) There are only two main primary traits that help you determine the value of data: timeliness and quality. ⊚ ⊚

true false

186) If a manager identifies numerous data integrity issues, they should consider the reports generated from that data as invalid and not use them when making decisions. ⊚ ⊚

true false

187) Real-time systems refer to the extent of detail within the data (fine and detailed or coarse and abstract). ⊚ ⊚

188)

Data granularity means immediate, up-to-date data. ⊚ ⊚

189)

true false

true false

Real-time systems provide real-time data in response to requests. ⊚ ⊚

Version 1

true false

52


190) data.

Data integrity issues occur when a system produces incorrect, inconsistent, or duplicate ⊚ ⊚

true false

191) Data governance refers to the overall management of the availability, usability, integrity, and security of company data. ⊚ ⊚

true false

192) Transactional data is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry. ⊚ ⊚

193)

true false

Organizational data comes at the same level, formats, and granularities. ⊚ ⊚

true false

194) Reports for each salesperson, product, and part are examples of detail or fine data granularities. ⊚ ⊚

Version 1

true false

53


195) Master data management (MDM) is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems. MDM is commonly included in data governance. ⊚ ⊚

196)

Accurate data asks if there is an incorrect value in the data. ⊚ ⊚

197)

true false

Timely data asks if the data is current with respect to the business needs. ⊚ ⊚

200)

true false

Consistent data asks if the aggregate or summary data is in agreement with detailed data. ⊚ ⊚

199)

true false

Complete data asks if there is a value missing from the data. ⊚ ⊚

198)

true false

true false

Unique data asks if each transaction and event are represented only once in the data.

Version 1

54


⊚ ⊚

201)

Complete data asks if there is an incorrect value in the data. ⊚ ⊚

202)

true false

Unique data asks if the data is current with respect to the business needs. ⊚ ⊚

205)

true false

Accurate data asks if the aggregate or summary data is in agreement with the detailed ⊚ ⊚

204)

true false

Consistent data asks if there is a value missing from the data. ⊚ ⊚

203) data.

true false

true false

Timely data asks if each transaction and event is represented only once in the data. ⊚ ⊚

Version 1

true false

55


206) Determining if there are any duplicate customers in the data is an example of a unique characteristic of high-quality data. ⊚ ⊚

true false

207) Determining if all total columns equal the true total of the individual item is an example of a consistent characteristic of high-quality data. ⊚ ⊚

true false

208) A data steward is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business. ⊚ ⊚

true false

209) Data stewardship is the management and oversight of an organization’s data assets to help provide business users with high-quality data that is easily accessible in a consistent manner. ⊚ ⊚

true false

210) Data validation includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data. ⊚ ⊚

true false

211) Determining if a name is spelled correctly is an example of an accurate characteristic of high-quality data. Version 1

56


⊚ ⊚

true false

212) Determining if data is updated weekly, daily, or hourly is an example of an accurate characteristic of high-quality data. ⊚ ⊚

true false

213) A foreign key is a field (or group of fields) that uniquely identifies a given entity in a table. ⊚ ⊚

true false

214) The core component of any system, regardless of size, is a database and a database management system. ⊚ ⊚

215)

A foreign key provides details about data. ⊚ ⊚

216)

true false

true false

A data element (or data field) is the smallest or basic unit of data. ⊚ ⊚

Version 1

true false

57


217) Data elements can include a customer’s name, address, email, discount rate, preferred shipping method, product name, quantity ordered, and so on. ⊚ ⊚

true false

218) Data models are logical data structures that detail the relationships among data elements by using graphics or pictures. ⊚ ⊚

true false

219) Metadata provides details about data. For example, metadata for an image could include its size, resolution, and date created. ⊚ ⊚

220)

true false

A data dictionary compiles all of the metadata about the data elements in the data model. ⊚ ⊚

true false

221) Relational database models store data in the form of logically related two-dimensional tables. ⊚ ⊚

Version 1

true false

58


222) Relational database management systems allow users to create, read, update, and delete data in a relational database. ⊚ ⊚

223)

Attributes (also called columns or fields) are the data elements associated with an entity. ⊚ ⊚

224)

true false

true false

A record is a collection of related data elements. ⊚ ⊚

true false

225) A primary key is a field (or group of fields) that uniquely identifies a given record in a table. ⊚ ⊚

true false

226) A foreign key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables. ⊚ ⊚

true false

227) Metadata are logical data structures that detail the relationships among data elements by using graphics or pictures.

Version 1

59


⊚ ⊚

228)

A DBMS provides details about data. ⊚ ⊚

229)

true false

A field is a collection of related data elements. ⊚ ⊚

231)

true false

Entities are the data elements associated with an attribute. ⊚ ⊚

230)

true false

true false

A foreign key uniquely identifies a given record in a table. ⊚ ⊚

true false

232) A primary key is a foreign key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables. ⊚ ⊚

Version 1

true false

60


233) Databases offer many security features including passwords to provide authentication, access levels to determine who can access the data, and access controls to determine what type of access they have to the data. ⊚ ⊚

true false

234) Data redundancy is the duplication of data, or the storage of the same data in multiple places. ⊚ ⊚

true false

235) Relational databases offer many advantages over using a text document or a spreadsheet, which include decreased flexibility and decreased scalability and performance. ⊚ ⊚

236)

true false

The physical view of data deals with the physical storage of data on a storage device. ⊚ ⊚

true false

237) The logical view of data focuses on how individual users logically access data to meet their own particular business needs. ⊚ ⊚

238)

true false

The logical view of data deals with the physical storage of data on a storage device.

Version 1

61


⊚ ⊚

true false

239) The physical view of data focuses on how individual users logically access data to meet their own particular business needs. ⊚ ⊚

true false

240) A business rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer. ⊚ ⊚

true false

241) Data redundancy is the duplication of data, or the storage of the same data in multiple places. ⊚ ⊚

242)

Data integrity is a measure of the quality of data. ⊚ ⊚

243)

true false

true false

Integrity constraints are rules that help ensure the quality of data. ⊚ ⊚

Version 1

true false

62


244) Relational integrity constraints are rules that enforce basic and fundamental informationbased constraints. ⊚ ⊚

245)

Data integrity are rules that help ensure the quality of data. ⊚ ⊚

246)

true false

true false

Data latency is the time it takes for data to be stored or retrieved. ⊚ ⊚

true false

247) Business-critical integrity constraints enforce business rules vital to an organization’s success and often require more insight and knowledge than relational integrity constraints. ⊚ ⊚

248)

true false

One of the advantages found in a relational database is increased data redundancy. ⊚ ⊚

true false

249) Relational integrity constraints are rules that enforce basic and fundamental informationbased constraints. Version 1

63


⊚ ⊚

250)

A comparative analysis can compare two or more datasets to identify patterns and trends. ⊚ ⊚

251)

true false

true false

A dataset is an organized collection of data. ⊚ ⊚

true false

252) The banking industry uses business intelligence to understand customer credit card usage and nonpayment rates. ⊚ ⊚

true false

253) Many organizations find themselves in the position of being data rich and information poor. Even in today’s electronic world, managers struggle with the challenge of turning their business data into business intelligence. ⊚ ⊚

254) rich.

true false

Many organizations find themselves in the position of being data poor and information ⊚ ⊚

Version 1

true false

64


255)

Competitive monitoring can compare two or more datasets to identify patterns and trends. ⊚ ⊚

true false

256) A data lake is a storage repository that holds a vast amount of raw data in its original format until the business needs it. ⊚ ⊚

true false

257) Source data identifies the primary location where data is collected. It can include invoices, spreadsheets, timesheets, transactions, and electronic sources such as other databases. ⊚ ⊚

258)

A data point is an individual item on a graph or chart. ⊚ ⊚

259)

true false

Organizational data includes simple structured data elements in a database. ⊚ ⊚

260)

true false

true false

A dataset is an individual item on a graph or chart.

Version 1

65


⊚ ⊚

261)

true false

A data mart contains a subset of data warehouse data. ⊚ ⊚

true false

262) Data aggregation is the collection of data from various sources for the purpose of data processing. ⊚ ⊚

true false

263) An example of a data aggregation is to gather data about particular groups based on specific variables such as age, profession, or income. ⊚ ⊚

264)

The complete removal of dirty data from a source is practical and possible. ⊚ ⊚

265)

true false

true false

Dirty data is an MIS problem, not a business problem. ⊚ ⊚

Version 1

true false

66


266)

Dirty data is erroneous or flawed data. ⊚ ⊚

267)

A repository is a central location in which data is stored and managed. ⊚ ⊚

268)

true false

true false

A data warehouse is a central location in which data is stored and managed. ⊚ ⊚

true false

269) A data warehouse is a logical collection of data, gathered from many different operational databases, that supports business analysis activities and decision-making tasks. ⊚ ⊚

270)

Data warehouses struggle with combining too much standardized data. ⊚ ⊚

271)

true false

true false

The primary purpose of a data warehouse is to perform transactional processes. ⊚ ⊚

Version 1

true false

67


272)

The primary purpose of a data warehouse is to perform analytical process. ⊚ ⊚

true false

273) Within the data warehouse model, the internal databases could include marketing, sales, inventory, and billing. ⊚ ⊚

274)

A data mart contains a subset of data warehouse data. ⊚ ⊚

275)

true false

ETL, within a data warehouse model, stands for exit, track, and load. ⊚ ⊚

276)

true false

true false

ETL, within a data warehouse model, stands for extraction, transformation, and loading. ⊚ ⊚

true false

277) Within the data warehouse model, the external databases could include competitor data, industry data, and stock market analysis.

Version 1

68


⊚ ⊚

true false

278) Dirty data is erroneous or flawed data. The complete removal of dirty data from a source is impractical or virtually impossible. ⊚ ⊚

true false

279) Data cleansing or scrubbing is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete data. ⊚ ⊚

true false

280) Duplicate data, inaccurate data, misleading data, and incorrect data are all problems associated with dirty data. ⊚ ⊚

true false

281) Many firm’s complete data quality audits to determine the accuracy and completeness of their data. ⊚ ⊚

true false

282) Infographics present the results of data analysis by displaying patterns and relationships in a graphical format. ⊚ ⊚ Version 1

true false 69


283)

Data Artists are experts at creating a story from the information. ⊚ ⊚

284)

true false

Analysis paralysis occurs when there is not enough information to perform an analysis. ⊚ ⊚

true false

285) Data visualization describes technologies that allow users to see or visualize data to transform information into a business perspective. ⊚ ⊚

286)

true false

Data visualization tools are primarily limited to Excel. ⊚ ⊚

true false

287) Distributed computing processes and manages algorithms across many machines in a computing environment. ⊚ ⊚

288)

true false

A ledger records classified and summarized transactional data.

Version 1

70


⊚ ⊚

true false

289) A blockchain is a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data. ⊚ ⊚

true false

290) Proof-of-stake is a way to validate transactions based and achieve the distributed consensus. ⊚ ⊚

true false

291) Proof-of-work is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain. ⊚ ⊚

true false

292) Proof-of-work is a way to validate transactions based and achieve the distributed consensus. ⊚ ⊚

true false

293) Proof-of-stake is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain.

Version 1

71


⊚ ⊚

true false

294) Bitcoin is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems; it operates independently of a central bank. ⊚ ⊚

true false

295) A blockchain is formed by linking together blocks, data structures containing a hash, previous hash, and data. ⊚ ⊚

296)

The genesis block is the first block created in the blockchain. ⊚ ⊚

297)

true false

true false

The hash is the first block created in the blockchain. ⊚ ⊚

true false

298) A hash is a function that converts an input of letters and numbers into an encrypted output of a fixed length. ⊚ ⊚

Version 1

true false

72


299) A genesis block is a function that converts an input of letters and numbers into an encrypted output of a fixed length. ⊚ ⊚

300)

Hashes are the links in the blockchain. ⊚ ⊚

301)

true false

Immutable simply means unchangeable. ⊚ ⊚

302)

true false

true false

Immutable simply means changeable. ⊚ ⊚

true false

303) Immutability is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions. ⊚ ⊚

true false

304) A non-fungible token (NFT) is a digital signature backed by blockchain technology that proves ownership of something. Version 1

73


⊚ ⊚

305)

true false

Just like bitcoins, non-fungible tokens are unique and create scarcity. ⊚ ⊚

true false

306) It is possible to buy an NFT (non-fungible token) that represents physical objects but also digital assets such as a tweet. ⊚ ⊚

true false

307) Much of the current market for NFTs is centered around collectibles, such as digital artwork, sports cards, and rarities. ⊚ ⊚

Version 1

true false

74


Answer Key Test name: Chap 06_8e_Baltzan 7) C 8) C 9) B 10) A 11) D 12) A 13) B 14) A 15) B 16) C 17) C 18) B 19) C 20) D 21) A 22) B 23) A 24) C 25) D 26) A 27) B 28) A 29) C 30) C 31) D 32) C Version 1

75


33) A 34) C 35) B 36) D 37) B 38) D 39) B 40) A 41) D 42) C 43) B 44) D 45) C 46) B 47) A 48) B 49) D 50) A 51) B 52) C 53) B 54) C 55) B 56) C 57) C 58) A 59) D 60) A 61) C 62) A Version 1

76


63) B 64) B 65) A 66) C 67) B 68) A 69) D 70) C 71) B 72) A 73) B 74) B 75) A 76) D 77) C 78) C 79) C 80) D 81) B 82) A 83) D 84) D 85) C 86) B 87) D 88) A 89) B 90) C 91) A 92) B Version 1

77


93) A 94) D 95) B 96) D 97) A 98) D 99) A 100) C 101) A 102) B 103) B 104) D 105) D 106) D 107) A 108) B 109) B 110) B 111) C 112) D 113) A 114) B 115) D 116) B 117) C 118) A 119) A 120) B 121) D 122) A Version 1

78


123) C 124) D 125) B 126) C 127) C 128) D 129) D 130) D 131) B 132) A 133) D 134) B 135) C 136) D 137) A 138) B 139) B 140) D 141) A 142) D 143) A 144) D 145) D 146) C 147) D 148) B 149) C 150) C 151) A 152) A Version 1

79


153) A 154) B 155) C 156) D 157) A 158) D 159) D 160) B 161) C 162) D 163) A 164) B 165) C 166) B 167) D 168) D 169) A 170) B 171) C 172) B 173) A 174) B 175) C 176) C 177) A 178) D 179) A 180) TRUE 181) FALSE 182) TRUE Version 1

80


183) TRUE 184) FALSE 185) FALSE 186) TRUE 187) FALSE 188) FALSE 189) TRUE 190) TRUE 191) TRUE 192) TRUE 193) FALSE 194) TRUE 195) TRUE 196) TRUE 197) TRUE 198) TRUE 199) TRUE 200) TRUE 201) FALSE 202) FALSE 203) FALSE 204) FALSE 205) FALSE 206) TRUE 207) TRUE 208) TRUE 209) TRUE 210) TRUE 211) TRUE 212) TRUE Version 1

81


213) FALSE 214) TRUE 215) FALSE 216) TRUE 217) TRUE 218) TRUE 219) TRUE 220) TRUE 221) TRUE 222) TRUE 223) TRUE 224) TRUE 225) TRUE 226) TRUE 227) FALSE 228) FALSE 229) FALSE 230) FALSE 231) FALSE 232) FALSE 233) TRUE 234) TRUE 235) FALSE 236) TRUE 237) TRUE 238) FALSE 239) FALSE 240) TRUE 241) TRUE 242) TRUE Version 1

82


243) TRUE 244) TRUE 245) FALSE 246) TRUE 247) TRUE 248) FALSE 249) TRUE 250) TRUE 251) TRUE 252) TRUE 253) TRUE 254) FALSE 255) FALSE 256) TRUE 257) TRUE 258) TRUE 259) FALSE 260) FALSE 261) TRUE 262) TRUE 263) TRUE 264) FALSE 265) FALSE 266) TRUE 267) TRUE 268) FALSE 269) TRUE 270) FALSE 271) FALSE 272) TRUE Version 1

83


273) TRUE 274) TRUE 275) FALSE 276) TRUE 277) TRUE 278) TRUE 279) TRUE 280) TRUE 281) TRUE 282) TRUE 283) TRUE 284) FALSE 285) TRUE 286) FALSE 287) TRUE 288) TRUE 289) TRUE 290) TRUE 291) TRUE 292) FALSE 293) FALSE 294) TRUE 295) TRUE 296) TRUE 297) FALSE 298) TRUE 299) FALSE 300) TRUE 301) TRUE 302) FALSE Version 1

84


303) TRUE 304) TRUE 305) FALSE 306) TRUE 307) TRUE

Version 1

85


CHAPTER 7 1)

Which of the following are the three primary network categories? A) LAN, WAN, SAN B) LAN, WAN, MAN C) LAN, SAN, XAN D) LAN, WAN, XAN

2) What is a large computer network usually spanning a city or a specific infrastructure like a college? A) metropolitan area network (MAN) B) local area network (LAN) C) wide area network (WAN) D) secure area network (SAN)

3) What spans a large geographic area such as a state, province, or country, similar to the Internet? A) metropolitan area network (MAN) B) local area network (LAN) C) wide area network (WAN) D) All of the answers are correct.

4) What connects a group of computers in close proximity, such as in a school or office setting?

Version 1

1


A) metropolitan area network (MAN) B) local area network (LAN) C) wide area network (WAN) D) All of the answers are correct.

5)

Which of the below offers a common example of a local area network? A) college campus B) home office C) city library D) All of the answers are correct.

6)

Which of the below offers an example of a wide area network? A) the Internet B) Microsoft’s main campus in Washington C) the city of Denver’s court and police departments D) All of the answers are correct.

7)

Which of the below is an example of a wide area network? A) home office B) business office C) college dorm room D) the Internet

Version 1

2


8) What is the maximum amount of data that can pass from one point to another in a unit of time? A) bandwidth B) frequency C) wide area network D) All of the answers are correct.

9) Which of the following terms refers to the smallest element of data and has a value of either 0 or 1? A) bit B) bandwidth C) local area network D) metropolitan area network

10)

What measures bandwidth in terms of numbers transferred or received per unit of time? A) All of the answers are correct. B) Wi-Fi C) wide area network D) bit rate

11) What is the maximum amount of data that can pass from one point to another in a unit of time?

Version 1

3


A) bandwidth B) bit rate C) bit D) wireless fidelity

12)

What is the smallest element of data and has a value of either 0 or 1? A) bandwidth B) bit rate C) bit D) wireless fidelity

13)

What is the number of bits transferred or received per unit of time? A) bandwidth B) bit rate C) bit D) wireless fidelity

14) What includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal? A) Wi-Fi infrastructure B) bit rate C) bit D) wireless fidelity

Version 1

4


15) What is a technology that connects individual devices to other parts of a network through radio connections? A) radio area network B) wide area network C) metropolitan area network D) All of the answers are correct.

16) What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks? A) 5G B) WiMAX C) Wi-Fi 6 D) All of the answers are correct.

17)

What is the next generation of Wi-Fi expected to operate at 9.6 Gbps? A) 2G B) Wi-Fi 6 C) radio area network D) bandwidth

18) What is the ability to purchase goods and services through a wireless Internet-enabled device?

Version 1

5


A) bandwidth B) mobile business C) All of the answers are correct. D) Wi-Fi 6

19)

Which two terms are synonymous but have different meanings? A) mobile and wireless B) bit and Wi-Fi 6 C) LAN and WAN D) All of the answers are correct.

20) What means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device? A) mobile B) wireless C) ebusiness D) radio access network

21) What refers to any type of operation accomplished without the use of a hard-wired connection? A) digital divide B) wireless C) actor D) bad actor

Version 1

6


22)

Which of the following is a type of bandwidth speed? A) megabit B) wireless C) local area network D) radio access network

23) What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves? A) Bluetooth B) wireless fidelity (Wi-Fi) C) wide area network (WAN) D) wireless data centers

24) What is a wireless network that provides communication over a short distance that is intended for use with devices that are owned and operated by a single user? A) professional area network B) All of the answers are correct. C) personal area network D) political area network

25) What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices?

Version 1

7


A) laptop B) digital divide C) Bluetooth D) camera

26) Which network uses radio signals to transmit and receive data over distances of a few hundred feet? A) wireless MAN B) wireless WAN C) All of the answers are correct. D) wireless LAN

27)

What are areas around access points where users can connect to the Internet via Wi-Fi? A) hotspots B) wireless WAN C) smart phone D) WiMax

28) A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data? A) hotspots B) kilobytes C) digital divide D) radio signals

Version 1

8


29)

Which of the following is the correct definition for the acronym WiMAX? A) Worldwide Interoperability for Microwave Access B) World Interconnected through Mobile Awareness C) All of the answers are correct. D) Wide International for Misinformation Access

30) What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred? A) streaming B) smart phone C) networking D) wireless

31) What is data that is generated continuously by thousands of data sources, which typically send in the data records simultaneously, and in small sizes (order of kilobytes)? A) streaming data B) smart phone C) networking D) wireless

32) What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area?

Version 1

9


A) Wi-Fi B) satellite C) digital divide D) streaming data

33)

What is Bluetooth?

A) means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device B) refers to any type of operation accomplished without the use of a hard-wired connection C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices D) All of the answers are correct.

34)

What is a personal area network (PAN)?

A) All of the answers are correct. B) refers to any type of operation accomplished without the use of a hard-wired connection C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices D) provides communication for devices owned by a single user that work over a short distance

35)

What is an access point (AP)?

Version 1

10


A) the computer or network device that serves as an interface between devices and the network B) refers to any type of operation accomplished without the use of a hard-wired connection C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices D) All of the answers are correct.

36)

What is a wireless MAN?

A) a metropolitan area network that uses radio signals to transmit and receive data B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves D) All of the answers are correct.

37)

What is worldwide interoperability for microware access (WiMAX)?

A) a metropolitan area network that uses radio signals to transmit and receive data B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves D) All of the answers are correct.

38)

What is wireless fidelity (Wi-Fi)?

Version 1

11


A) a metropolitan area network that uses radio signals to transmit and receive data B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves D) All of the answers are correct.

39)

What is war chalking?

A) All of the answers are correct. B) the practice of tagging pavement with codes displaying where Wi-Fi access is available C) deliberately searching for Wi-Fi signals while driving by in a vehicle D) remotely controls smart phones and tablets, ensuring data security

40)

What is war driving?

A) All of the answers are correct. B) the practice of tagging pavement with codes displaying where Wi-Fi access is available C) deliberately searching for Wi-Fi signals while driving by in a vehicle D) remotely controls smart phones and tablets, ensuring data security

41) What is data that is generated continuously by thousands of data sources, which typically send in the data records simultaneously, and in small sizes?

Version 1

12


A) streaming data B) Wi-Fi 6 C) voice over IP D) protected WiMax

42)

What is wired equivalent privacy (WEP)?

A) a metropolitan area network that uses radio signals to transmit and receive data B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves D) an encryption algorithm designed to protect wireless transmission data

43) What is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private? A) secure sockets layer B) SSL certificate C) secure hypertext transfer protocol D) wired equivalent privacy

44) What is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company? A) secure sockets layer B) SSL Certificate C) secure hypertext transfer protocol D) wired equivalent privacy

Version 1

13


45) What is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server? A) secure sockets layer B) SSL Certificate C) secure hypertext transfer protocol D) wired equivalent privacy

46)

What is an encryption algorithm designed to protect wireless transmission data? A) secure sockets layer B) SSL certificate C) secure hypertext transfer protocol D) wired equivalent privacy

47)

What is deliberately searching for Wi-Fi signals while driving by in a vehicle? A) war chalking B) war driving C) actor D) bad actor

48) What is the practice of tagging pavement with codes displaying where Wi-Fi access is available?

Version 1

14


A) war chalking B) war driving C) actor D) bad actor

49)

What is an entity that is capable of participating in an action or a network? A) war chalking B) war driving C) actor D) bad actor

50)

What is an entity that is participating with ill-intentions? A) war chalking B) war driving C) actor D) bad actor

51)

What is an actor? A) the blending of personal and business use of technology devices and applications B) the science and art of making an illustrated map or chart C) an entity that is capable of participating in an action or a network D) an entity that is participating with ill-intentions

52)

What is a bad actor?

Version 1

15


A) the blending of personal and business use of technology devices and applications B) the science and art of making an illustrated map or chart C) an entity that is capable of participating in an action or a network D) an entity that is participating with ill-intentions

53)

What is IT consumerization? A) the blending of personal and business use of technology devices and applications B) the science and art of making an illustrated map or chart C) an entity that is capable of participating in an action or a network D) an entity that is participating with ill-intentions

54) What is the blending of personal and business use of technology devices and applications? A) IT consumerization B) pervasive computing C) enterprise mobility management D) containerization

55) What is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user’s needs to interact with computers as computers? A) IT consumerization B) pervasive computing C) enterprise mobility management D) containerization

Version 1

16


56) What is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets? A) IT consumerization B) pervasive computing C) enterprise mobility management D) containerization

57)

What isolates corporate applications from personal applications on a device? A) IT consumerization B) pervasive computing C) enterprise mobility management D) containerization

58)

What are the three primary areas of an enterprise mobility management strategy? A) mobile device management B) mobile application management C) mobile information management D) mobile pervasive management

59) What is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets?

Version 1

17


A) mobile device management B) mobile application management C) mobile information management D) enterprise mobility management

60) What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets? A) mobile device management B) mobile application management C) mobile information management D) enterprise mobility management

61) What is a security strategy that administers and enforces corporate epolicies for applications on mobile devices? A) mobile device management B) mobile application management C) mobile information management D) enterprise mobility management

62) What is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it? A) mobile device management B) mobile application management C) mobile information management D) enterprise mobility management

Version 1

18


63)

Which policy allows employees to use their own device? A) bring your own device B) choose your own device C) company-issued, personally-enabled D) ePolicy

64)

Which policy allows employees to choose a company approved and configured device? A) bring your own device B) choose your own device C) company-issued, personally-enabled D) ePolicy

65)

Which policy provides employees with corporate devices? A) bring your own device B) choose your own device C) company-issued, personally-enabled D) ePolicy

66)

What isolates corporate applications from personal applications on a device? A) containerization or application sandboxing B) dual personal technology C) accelerometer D) fast data

Version 1

19


67) What is another name for containerization, which isolates corporate applications from personal applications on a device?

A) application sandboxing B) dual persona technology C) accelerometer D) fast data

68) What creates two completely separate user interfaces one the same device, one for work and one for personal use? A) containerization B) dual personal technology C) accelerometer D) fast data

69) What is a device that can measure the force of acceleration, whether caused by gravity or by movement? A) containerization B) dual personal technology C) accelerometer D) fast data

70) What is a website that looks and behaves as if it is a mobile application, but it is just a normal website?

Version 1

20


A) containerization B) dual personal technology C) accelerometer D) progressive web application

71)

Which of the following is a characteristic of mobile application management? A) containerization B) accelerometer C) dual personal technology D) All of the answers are correct.

72) What is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value? A) fast data B) data in motion C) data at rest D) data in use

73)

What refers to all data in computer storage? A) fast data B) data in motion C) data at rest D) data in use

Version 1

21


74) What is a stream of data that is moving or being transported between locations within or between computer systems? A) fast data B) data in motion C) data at rest D) data in use

75)

What is another term for data in motion? A) fast data, slow data B) transit data, flight data C) All of the answers are correct. D) big data, data analytics

76) What is data that is currently being updated, processed, erased, accessed, or read by a system? A) fast data B) data in motion C) data at rest D) data in use

77)

Which of the below is experiencing rapid growth due to wireless technology? A) radio-frequency identification B) global positioning systems C) geographic information systems D) All of the answers are correct.

Version 1

22


78) Which business application uses electronic tags and labels to identify objects wirelessly over short distances? A) radio-frequency identification B) global positioning systems C) geographic information systems D) location-based services

79) Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content? A) radio-frequency identification B) global positioning systems C) geographic information systems D) location-based services

80) Which business application is a satellite-based navigation system providing extremely accurate position, time, and speed information? A) radio-frequency identification B) global positioning systems C) geographic information systems D) location-based services

81) Which business application consists of hardware, software, and data that provide location information for display on a multidimensional map?

Version 1

23


A) radio-frequency identification B) global positioning systems C) geographic information systems D) location-based services

82)

Which of the following is not a primary use of GIS? A) finding what is nearby from a specific location B) mapping densities C) routing information D) ensuring safety equipment is on an airplane before a flight

83)

What uses GPS tracking to track vehicles? A) automatic vehicle location B) geographic information system C) cartography D) All of the answers are correct.

84) What stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica? A) automatic vehicle location B) geographic information system C) cartography D) All of the answers are correct.

Version 1

24


85) What is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps? A) automatic vehicle location B) geographic information system C) cartography D) dual persona technology

86) What identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more? A) automatic vehicle location B) geographic information system C) cartography D) spatial data

87) What is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)? A) geocoding B) geocache C) geocoin D) All of the answers are correct.

88) Who are certified in geocoding practices to ensure industry standards are met when classifying spatial data?

Version 1

25


A) GIS professionals B) enterprise architects C) database engineers D) All of the answers are correct.

89) What is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find? A) geocoding B) geocache C) geocoin D) All of the answers are correct.

90)

What is a round coin-sized object, is uniquely numbered and hidden in geocache? A) geocoding B) geocache C) geocoin D) All of the answers are correct.

91) What is the time of day of an expected arrival at a certain destination and is typically used for navigation applications? A) estimated time of arrival B) estimated time enroute C) wireless MAN D) wireless LAN

Version 1

26


92) What is the time remaining before reaching a destination using the present speed and is typically used for navigation applications? A) estimated time of arrival B) estimated time enroute C) wireless MAN D) wireless WAN

93)

What is an RFID tag? A) an electronic identification device that is made up of a chip and antenna B) a transmitter/receiver that reads the contents of RFID tags in the area C) does not have a power source D) have their own transmitter and a power source (typically a battery)

94)

What is an RFID reader (RFID interrogator)? A) an electronic identification device that is made up of a chip and antenna B) a transmitter/receiver that reads the contents of RFID tags in the area C) does not have a power source D) have their own transmitter and a power source (typically a battery)

95)

What is asset tracking?

Version 1

27


A) occurs when a company places active or semipassive RFID tags on expensive products or assets to gather data on the items’ location with little or no manual intervention B) All of the answers are correct. C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds D) a satellite-based navigation system providing extremely accurate position, time, and speed

96)

What is a global positioning system (GPS)?

A) occurs when a company places active or semipassive RFID tags on expensive products or assets to gather data on the items’ location with little or no manual intervention B) All of the answers are correct. C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds D) a satellite-based navigation system providing extremely accurate position, time, and speed information

97)

What is automatic vehicle location (AVL)?

A) uses GPS tracking to track vehicles B) All of the answers are correct. C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds D) a satellite-based navigation system providing extremely accurate position, time, and speed information

98)

What is geocache?

Version 1

28


A) All of the answers are correct. B) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find C) a north/south measurement of position D) an east/west measurement of position

99)

What is a geocoin?

A) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds B) an east/west measurement of position C) a north/south measurement of position D) a round coin-sized object, is uniquely numbered and hidden in geocache

100)

What is estimated time of arrival (ETA)?

A) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds B) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find C) a north/south measurement of position D) the time of day of an expected arrival at a certain destination and is typically used for navigation applications

101)

What is estimated time enroute?

Version 1

29


A) the time remaining before reaching a destination using the present speed and is typically used for navigation applications B) the time of day of an expected arrival at a certain destination and is typically used for navigation applications C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds D) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find

102)

What is a geographic information system (GIS)? A) a north/south measurement of position B) an east/west measurement of position C) stores, views, and analyzes geographic data, creating multidimensional charts or maps D) a round coin-sized object, is uniquely numbered and hidden in geocache

103)

What is cartography? A) an east/west measurement of position B) the science and art of making an illustrated map or chart C) stores, views, and analyzes geographic data, creating multidimensional charts or maps D) a round coin-sized object, is uniquely numbered and hidden in geocache

104)

What is a GIS map?

Version 1

30


A) links business assets to a centralized system where they can be tracked and monitored over time B) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more C) stores, views, and analyzes geographic data, creating multidimensional charts or maps D) a round coin-sized object, is uniquely numbered and hidden in geocache

105)

What is spatial data?

A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more B) links business assets to a centralized system where they can be tracked and monitored over time C) stores, views, and analyzes geographic data, creating multidimensional charts or maps D) a round coin-sized object, is uniquely numbered and hidden in geocache

106)

What is geocoding?

A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more B) links business assets to a centralized system where they can be tracked and monitored over time C) in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category) D) a round coin-sized object, is uniquely numbered and hidden in geocache

107)

What do both GPS and GIS use?

Version 1

31


A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more B) links business assets to a centralized system where they can be tracked and monitored over time C) in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category) D) both use location-based services (LBS) applications that use location information to provide a service

108) A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. ⊚ ⊚

true false

109) A wide area network (WAN) spans a large geographic area such as a state, province, or country. ⊚ ⊚

true false

110) A wide area network (WAN) connects a group of computers in close proximity, such as in an office building, school, or home. ⊚ ⊚

true false

111) A metropolitan area network (MAN) is a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN. Version 1

32


⊚ ⊚

112)

true false

A local area network (LAN) is a large computer network usually spanning a city. ⊚ ⊚

true false

113) A wide area network (WAN) spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet. ⊚ ⊚

true false

114) Wi-Fi infrastructure includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal. ⊚ ⊚

true false

115) A radio access network (RAN) is a technology that connects individual devices to other parts of a network through radio connections. ⊚ ⊚

true false

116) 5G is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks. ⊚ ⊚ Version 1

true false 33


117) Mobile business (or mbusiness, mcommerce) is the ability to purchase goods and services through a wireless Internet-enabled device. ⊚ ⊚

118)

Mobile business is also called low latency business or 5G. ⊚ ⊚

119) 1.

true false

true false

A bit (short for binary digit) is the smallest element of data and has a value of either 0 or ⊚ ⊚

true false

120) Bandwidth is measured in terms of bit rate (or data rate), the number of bits transferred or received per unit of time. ⊚ ⊚

true false

121) Bandwidth is the maximum amount of data that can pass from one point to another in a unit of time. ⊚ ⊚

Version 1

true false

34


122) Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks. ⊚ ⊚

true false

123) A personal area network (PAN) provides communication for devices owned by a single user that work over a short distance. ⊚ ⊚

true false

124) Bluetooth is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices. ⊚ ⊚

true false

125) A wireless LAN (WLAN) is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet. ⊚ ⊚

true false

126) An access point (AP) is the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network. ⊚ ⊚

Version 1

true false

35


127) A wireless access point (WAP) enables devices to connect to a wireless network to communicate with each other. ⊚ ⊚

128)

true false

Hotspots are designated locations where Wi-Fi access points are publicly available. ⊚ ⊚

true false

129) A wireless MAN (WMAN) is a metropolitan area network that uses radio signals to transmit and receive data. ⊚ ⊚

true false

130) A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data. ⊚ ⊚

true false

131) Streaming is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred. ⊚ ⊚

true false

132) A satellite is a space station that orbits the Earth, receiving and transmitting signals from Earth-based stations over a wide area.

Version 1

36


⊚ ⊚

133)

true false

Wi-Fi protected access (WPA) a wireless security protocol to protect Wi-Fi networks. ⊚ ⊚

true false

134) A Wi-Fi network is a space station that orbits the Sun, receiving and transmitting signals from Mars-based stations over a wide area. ⊚ ⊚

true false

135) Wi-Fi protected access (WAP) is an encryption algorithm designed to protect wireless transmission data. ⊚ ⊚

true false

136) Wired equivalent privacy (WEP) is a wireless security protocol to protect Wi-Fi networks. ⊚ ⊚

true false

137) Wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless transmission data. ⊚ ⊚

Version 1

true false

37


138) War Wi-Fi is the practice of tagging pavement with codes displaying where Wi-Fi access is available. ⊚ ⊚

139)

true false

War chalking is deliberately searching for Wi-Fi signals while driving by in a vehicle. ⊚ ⊚

true false

140) War chalking is the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured. ⊚ ⊚

141)

true false

War driving is deliberately searching for Wi-Fi signals while driving by in a vehicle. ⊚ ⊚

true false

142) Pervasive computing is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user’s needs to interact with computers as computers. ⊚ ⊚

Version 1

true false

38


143) Enterprise mobility management (EMM) is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets. ⊚ ⊚

true false

144) Enterprise mobility management (EMM) is an enterprisewide security strategy to enforce war chalking and war driving. ⊚ ⊚

true false

145) Mobile application management (MAM) is a security strategy that administers and enforces corporate epolicies for applications on mobile devices. ⊚ ⊚

true false

146) Dual persona technology creates two completely separate user interfaces one the same device, one for work and one for personal use. ⊚ ⊚

true false

147) Mobile application development is the set of processes and procedures involved in writing software for use on wireless devices. ⊚ ⊚

Version 1

true false

39


148) Mobile information management is the set of processes and procedures involved in writing software for use on wireless devices. ⊚ ⊚

true false

149) Progressive web application (PWA) is a website that looks and behaves as if it is a mobile application, but it is just a normal website. ⊚ ⊚

true false

150) Mobile information management (MIM) is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. ⊚ ⊚

true false

151) An accelerometer is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. ⊚ ⊚

152)

true false

Data at rest refers to all data in computer storage. ⊚ ⊚

Version 1

true false

40


153)

Data in motion refers to all data in computer storage. ⊚ ⊚

true false

154) Data in motion (also known as transit or flight) is a stream of data that is moving or being transported between locations within or between computer systems. ⊚ ⊚

true false

155) Data in use is data that is currently being updated, processed, erased, accessed, or read by a system. ⊚ ⊚

true false

156) Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances. ⊚ ⊚

true false

157) A global positioning system (GPS) consists of only hardware that provides location information for display on a multidimensional map. ⊚ ⊚

true false

158) A geographic information system (GIS) stores, views, and analyzes geographic data, creating multidimensional charts or maps.

Version 1

41


⊚ ⊚

true false

159) A global positioning system (GPS) is a satellite-based navigation system providing extremely accurate position, time, and speed information. ⊚ ⊚

true false

160) A great GIS example, Google Earth, combines satellite imagery, geographic data, and Google’s search capabilities to create a virtual globe that users can download to a computer or mobile device. ⊚ ⊚

true false

161) GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications. ⊚ ⊚

true false

162) Asset tracking occurs when a company places active or semipassive RFID tags on expensive products or assets to gather data on the items’ location with little or no manual intervention. ⊚ ⊚

163)

true false

RFID tag is an electronic identification device that is made up of a chip and antenna.

Version 1

42


⊚ ⊚

true false

164) RFID reader (RFID interrogator) is a transmitter/receiver that reads the contents of RFID tags in the area. An RFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas. ⊚ ⊚

165)

true false

Automatic vehicle location (AVL) uses GPS tracking to track vehicles. ⊚ ⊚

true false

166) Geographic information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS is monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica. ⊚ ⊚

true false

167) Cartography is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps. ⊚ ⊚

true false

168) GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.

Version 1

43


⊚ ⊚

true false

169) Spatial data (geospatial data or geographic information) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data. ⊚ ⊚

true false

170) Wi-Fi is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). Wi-Fi professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data. ⊚ ⊚

171)

true false

A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache. ⊚ ⊚

true false

172) Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications. ⊚ ⊚

true false

173) Estimated time enroute (ETE) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications. Version 1

44


⊚ ⊚

174)

true false

LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory. ⊚ ⊚

true false

175) With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices. ⊚ ⊚

Version 1

true false

45


Answer Key Test name: Chap 07_8e_Baltzan 1) B 2) A 3) C 4) B 5) D 6) D 7) D 8) A 9) A 10) D 11) A 12) C 13) B 14) A 15) A 16) A 17) B 18) B 19) A 20) A 21) B 22) A 23) B 24) C 25) C 26) D Version 1

46


27) A 28) D 29) A 30) A 31) A 32) B 33) C 34) D 35) A 36) A 37) B 38) C 39) B 40) C 41) A 42) D 43) A 44) B 45) C 46) D 47) B 48) A 49) C 50) D 51) C 52) D 53) A 54) A 55) B 56) C Version 1

47


57) D 58) D 59) D 60) A 61) B 62) C 63) A 64) B 65) C 66) A 67) A 68) B 69) C 70) D 71) D 72) A 73) C 74) B 75) B 76) D 77) D 78) A 79) D 80) B 81) C 82) D 83) A 84) B 85) C 86) D Version 1

48


87) A 88) A 89) B 90) C 91) A 92) B 93) A 94) B 95) A 96) D 97) A 98) B 99) D 100) D 101) A 102) C 103) B 104) A 105) A 106) C 107) D 108) TRUE 109) TRUE 110) FALSE 111) TRUE 112) FALSE 113) TRUE 114) TRUE 115) TRUE 116) TRUE Version 1

49


117) TRUE 118) FALSE 119) TRUE 120) TRUE 121) TRUE 122) TRUE 123) TRUE 124) TRUE 125) TRUE 126) TRUE 127) TRUE 128) TRUE 129) TRUE 130) TRUE 131) TRUE 132) TRUE 133) TRUE 134) FALSE 135) FALSE 136) FALSE 137) TRUE 138) FALSE 139) FALSE 140) TRUE 141) TRUE 142) TRUE 143) TRUE 144) FALSE 145) TRUE 146) TRUE Version 1

50


147) TRUE 148) FALSE 149) TRUE 150) TRUE 151) FALSE 152) TRUE 153) FALSE 154) TRUE 155) TRUE 156) TRUE 157) FALSE 158) TRUE 159) TRUE 160) TRUE 161) FALSE 162) TRUE 163) TRUE 164) TRUE 165) TRUE 166) TRUE 167) TRUE 168) TRUE 169) TRUE 170) FALSE 171) TRUE 172) TRUE 173) TRUE 174) FALSE 175) TRUE

Version 1

51


CHAPTER 8 1)

Explain integrations and the role they play in connecting a corporation.

2)

Describe supply chain management along with its impact on business.

3) Identify the three components of supply chain management along with the technologies that are reinventing the supply chain.

4)

Explain operational and analytical customer relationship management.

Version 1

1


5)

Identify the core and extended areas of enterprise resource planning.

6) What allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems? A) integration B) chatbot C) hybrid ERP D) logistics

7) What takes information entered into a given system and sends it automatically to all downstream systems and processes? A) forward integration B) data interchange C) backward integration D) application interchange

8) What takes information entered into a given system and sends it automatically to all upstream systems and processes?

Version 1

2


A) forward integration B) data interchange C) backward integration D) application interchange

9)

What integrates data from multiple sources and provides a unified view of all data? A) forward integration B) data interchange C) data integration D) application interchange

10)

What integrates a company’s existing management information systems? A) application integration B) data interchange C) data integration D) application interchange

11) What provides enterprisewide support and data access for a firm’s operations and business processes? A) enterprise systems B) enterprise application integration C) middleware D) application integration

Version 1

3


12) What connects the plans, methods, and tools aimed at integrating separate enterprise systems? A) data integration B) enterprise application integration C) middleware D) order entry system

13) What are several different types of software that sit between and provide connectivity for two or more software applications? A) data integration B) enterprise application integration C) middleware D) order entry system

14)

What is an application integration?

A) the integration of a company’s existing management information systems B) the integration of data from multiple sources, which provides a unified view of all data C) sending information entered into a given system automatically to all downstream systems and processes D) sending information entered into a given system automatically to all upstream systems and processes

15)

What is data integration?

Version 1

4


A) the integration of a company’s existing management information systems B) the integration of data from multiple sources, which provides a unified view of all data C) sending information entered into a given system automatically to all downstream systems and processes D) sending information entered into a given system automatically to all upstream systems and processes

16)

What is forward integration?

A) the integration of a company’s existing management information systems B) the integration of data from multiple sources, which provides a unified view of all data C) sending information entered into a given system automatically to all downstream systems and processes D) sending information entered into a given system automatically to all upstream systems and processes

17)

What is backward integration?

A) the integration of a company’s existing management information systems B) the integration of data from multiple sources, which provides a unified view of all data C) sending information entered into a given system automatically to all downstream systems and processes D) sending information entered into a given system automatically to all upstream systems and processes

18)

What are enterprise systems?

Version 1

5


A) the integration of a company’s existing management information systems B) the integration of data from multiple sources, which provides a unified view of all data C) sending information entered into a given system automatically to all downstream systems and processes D) enterprisewide support and data access for a firm’s operations and business processes

19)

What is enterprise application integration (EAI)?

A) connects the plans, methods, and tools aimed at integrating separate enterprise system B) the integration of data from multiple sources, which provides a unified view of all data C) sending information entered into a given system automatically to all downstream systems and processes D) enterprisewide support and data access for a firm’s operations and business processes

20)

What does middleware accomplish?

A) the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources B) the integration of data from multiple sources, which provides a unified view of all data C) the translation of information between disparate systems D) packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors

21)

Which of the following is not an example of a primary enterprise system? A) supply chain management B) customer relationship management C) reputation management system D) enterprise resource planning

Version 1

6


22)

What is supply chain management (SCM)?

A) the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability B) a means of taking information entered into a given system and sending it automatically to all downstream systems and processes C) a means of managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization’s profitability D) a means of connecting the plans, methods, and tools aimed at integrating separate enterprise system

23)

What is enterprise resource planning (ERP)?

A) the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability B) a means of integrating all departments and functions throughout an organization into a single MIS system (or integrated set of MIS systems) so employees can make decisions by viewing enterprisewide information about all business operations C) a means of managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization’s profitability D) a means of connecting the plans, methods, and tools aimed at integrating separate enterprise system

24)

What is customer relationship management (CRM)?

Version 1

7


A) the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability B) a means of integrating all departments and functions throughout an organization into a single MIS system (or integrated set of MIS systems) so employees can make decisions by viewing enterprisewide information about all business operations C) a means of managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization’s profitability D) a means of connecting the plans, methods, and tools aimed at integrating separate enterprise system

25) In which of the five basic supply chain activities do you prepare to manage all resources required to meet demand? A) plan B) source C) deliver D) return

26) In which of the five basic supply chain activities do you build relationships with suppliers to procure raw materials? A) plan B) source C) deliver D) return

27) In which of the five basic supply chain activities do you manufacture products and create production schedules?

Version 1

8


A) plan B) source C) deliver D) make

28) In which of the five basic supply chain activities do you plan for the transportation of goods to customers? A) plan B) source C) deliver D) return

29) In which of the five basic supply chain activities do you support customers and product returns? A) plan B) source C) deliver D) return

30)

Where would you find the customer’s customer in a typical supply chain? A) upstream B) downstream C) in the middle D) not in the supply chain

Version 1

9


31)

Where would you find the supplier’s suppler in a typical supply chain? A) upstream B) downstream C) in the middle D) not in the supply chain

32)

Where would you find the manufacturer and distributor in a typical supply chain? A) upstream B) downstream C) in the middle D) not in the supply chain

33) Walmart and Procter & Gamble (P&G) implemented a tremendously successful SCM system. The system linked Walmart’s ________ centers directly to P&G’s ________ centers. A) manufacturing; distribution B) distribution; manufacturing C) stores; distribution D) distribution; stores

34) What can effective and efficient supply chain management systems enable an organization to accomplish?

Version 1

10


A) increase the power of its buyers B) increase its supplier power C) increase switching costs to increase the threat of substitute products or services D) All of the answers are correct.

35) Which of the following is not one of the five basic components of supply chain management? A) plan B) source C) cost D) deliver

36) Which of the following is not one of the five basic components of supply chain management? A) plan B) source C) analyze D) deliver

37) Which of the following is not one of the five basic components of supply chain management? A) plan B) source C) sale D) deliver

Version 1

11


38) What is it called when distorted product-demand information ripples from one partner to the next throughout the supply chain? A) bullwhip effect B) source effect C) supply chain effect D) All of the answers are correct.

39)

Which of the following represents the bullwhip effect?

A) organizations know about employee events triggered downstream in the supply chain B) customers receive distorted product-demand information regarding sales information C) distorted product-demand information ripples from one partner to the next throughout the supply chain D) the ability exists to view all areas up and down the supply chain

40)

What is the ability to view all areas up and down the supply chain in real time? A) bullwhip effect B) outbound logistics C) supply chain visibility D) inventory cycle time

41) Which of the following metrics represents an unfilled customer order for a product that is out of stock?

Version 1

12


A) back order B) inventory cycle time C) customer order cycle time D) inventory turnover

42) Which of the following metrics represents the time it takes to manufacture a product and deliver it to the retailer? A) back order B) inventory cycle time C) customer order cycle time D) inventory turnover

43) Which of the following metrics represents the agreed-upon time between the purchase of a product and the delivery of the product? A) back order B) inventory cycle time C) customer order cycle time D) inventory turnover

44)

Which of the following metrics represents the frequency of inventory replacement? A) back order B) inventory cycle time C) customer order cycle time D) inventory turnover

Version 1

13


45)

What is a back order?

A) an unfilled customer order for a product that is out of stock B) the time it takes to manufacture a product and deliver it to the retailer C) the agreed-upon time between the purchase of a product and the delivery of the product D) the frequency of inventory replacement

46)

What is inventory cycle time?

A) an unfilled customer order for a product that is out of stock B) the time it takes to manufacture a product and deliver it to the retailer C) the agreed-upon time between the purchase of a product and the delivery of the product D) the frequency of inventory replacement

47)

What is customer order cycle time?

A) an unfilled customer order for a product that is out of stock B) the time it takes to manufacture a product and deliver it to the retailer C) the agreed-upon time between the purchase of a product and the delivery of the product D) the frequency of inventory replacement

48)

What is inventory turnover?

Version 1

14


A) an unfilled customer order for a product that is out of stock B) the time it takes to manufacture a product and deliver it to the retailer C) the agreed-upon time between the purchase of a product and the delivery of the product D) the frequency of inventory replacement

49)

Which of the following is one of the business areas of supply chain management? A) logistics B) procurement C) materials management D) All of the answers are correct.

50)

What is the purchasing of goods and services to meet the needs of the supply chain? A) procurement B) logistics C) materials management D) bullwhip effect

51) What includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain? A) procurement B) logistics C) materials management D) bullwhip effect

Version 1

15


52) What includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing? A) procurement B) logistics C) materials management D) bullwhip effect

53)

What is procurement?

A) the purchasing of goods and services to meet the needs of the supply chain B) includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain C) includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing D) occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain

54)

What is logistics?

A) the purchasing of goods and services to meet the needs of the supply chain B) includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain C) includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing D) occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain

55)

What is materials management?

Version 1

16


A) the purchasing of goods and services to meet the needs of the supply chain B) includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain C) includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing D) occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain

56) What acquires raw materials and resources and distributes them to manufacturing as required? A) inbound logistics B) outbound logistics C) logistics D) procurement

57)

What distributes goods and services to customers? A) inbound logistics B) outbound logistics C) logistics D) procurement

58) What includes the increasingly complex management of processes, information, and communication to take a product from cradle to grave?

Version 1

17


A) procurement B) outbound logistics C) logistics D) cradle-to-grave

59)

Which of the following questions can logistics help a company answer? A) What quantity of raw materials should we purchase to minimize spoilage? B) How can we guarantee that our raw materials meet production needs? C) At what price can we purchase materials to guarantee profitability? D) What path should the vehicles follow when delivering the goods?

60)

Which of the following questions can materials management help a company answer? A) What are our current inventory levels? B) What items are running low in the warehouse? C) What items are at risk of spoiling in the warehouse? D) All of the answer choices are correct.

61)

Which of the following questions can materials management help a company answer? A) How do we dispose of spoiled items? B) What laws need to be followed for storing hazardous materials? C) Which items must be refrigerated when being stored and transported? D) All of the answers are correct.

62)

What is 3D printing?

Version 1

18


A) a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model B) uses electronic tags and labels to identify objects wirelessly over short distances C) unmanned aircraft that can fly autonomously, or without a human D) a focus on creating artificial intelligence devices that can move and react to sensory input

63)

What is RFID?

A) a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model B) the use of electronic tags and labels to identify objects wirelessly over short distances C) unmanned aircraft that can fly autonomously, or without a human D) a focus on creating artificial intelligence devices that can move and react to sensory input

64)

What are drones?

A) a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model B) the use of electronic tags and labels to identify objects wirelessly over short distances C) unmanned aircraft that can fly autonomously, or without a human D) a focus on creating artificial intelligence devices that can move and react to sensory input

65)

What is robotics?

Version 1

19


A) a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model B) the use of electronic tags and labels to identify objects wirelessly over short distances C) unmanned aircraft that can fly autonomously, or without a human D) creating artificial intelligence devices that can move and react to sensory input

66) What is a process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model? A) 3D printing B) robotics C) drones D) RFID

67) What focuses on creating artificial intelligence devices that can move and react to sensory input? A) 3D printing B) robotics C) drones D) RFID

68)

What is unmanned aircraft that can fly autonomously, or without a human? A) 3D printing B) robotics C) drones D) RFID

Version 1

20


69)

What uses electronic tags and labels to identify objects wirelessly over short distances? A) 3D printing B) robotics C) drones D) RFID

70)

What is computer-aided design?

A) software used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations B) a cultural trend that places value on an individual’s ability to create things C) a community center that provides technology, manufacturing equipment, and educational opportunities to the public D) software and machinery to facilitate and automate manufacturing processes

71)

What is computer-aided manufacturing?

A) software used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations B) a cultural trend that places value on an individual’s ability to create things C) a community center that provides technology, manufacturing equipment, and educational opportunities to the public D) software and machinery to facilitate and automate manufacturing processes

72)

What is the maker movement?

Version 1

21


A) software used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations B) a cultural trend that places value on an individual’s ability to be a creator of things as well as a consumer of things C) a community center that provides technology, manufacturing equipment, and educational opportunities to the public D) software and machinery to facilitate and automate manufacturing processes

73)

What is a makerspace?

A) software used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations B) a cultural trend that places value on an individual’s ability to be a creator of things as well as a consumer of things C) a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable D) software and machinery to facilitate and automate manufacturing processes

74) What is a cultural trend that places value on an individual’s ability to be a creator of things as well as a consumer of things? A) maker movement B) computer-aided manufacturing C) makerspace D) computer-aided design

75) What is a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable?

Version 1

22


A) computer-aided design B) computer-aided manufacturing C) makerspace D) RFID

76) What is a low-cost, credit card–sized computer that plugs into a computer monitor or TV and uses a standard keyboard and mouse? A) Raspberry Pi B) digital supply chain C) drone D) robotics

77) What fully capitalizes on connectivity, system integration, and the information-producing capabilities of smart devices? A) Raspberry Pi B) digital supply chain C) drone D) robotics

78)

Which of the following represents the three primary capabilities of a drone? A) sensors B) navigation C) stabilization D) All of the answers are correct.

Version 1

23


79) Which of the following is not a valid source from which a CRM system can collect information? A) accounting system B) order fulfillment system C) inventory system D) customer’s personal computer

80)

Which of the following is not one of the three phases in the evolution of CRM? A) reporting B) analyzing C) processing D) predicting

81)

What is a person or company that is unknown to your business? A) lead B) account C) contact D) sales opportunity

82) What is an existing business relationship that includes customers, prospects, partners, and competitors?

Version 1

24


A) lead B) account C) contact D) sales opportunity

83)

Who is a specific individual representing an account? A) lead B) accountant C) contact D) sales opportunity

84) What is an opportunity that exists for a potential sale of goods or services related to an account or contact? A) lead B) account C) contact D) sales opportunity

85) What is a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products? A) lead analysis B) RFM analysis C) uplift modeling D) sales opportunity

Version 1

25


86)

What helps an organization identify its customers across applications? A) CRM reporting technologies B) CRM analyzing technologies C) CRM processing technologies D) CRM predicting technologies

87) What is an organization using when it asks questions such as “why was customer revenue so high”? A) CRM reporting technologies B) CRM analyzing technologies C) CRM processing technologies D) CRM predicting technologies

88) What is an organization using when it asks questions such as “which customers are at risk of leaving”? A) CRM reporting technologies B) CRM analyzing technologies C) CRM processing technologies D) CRM predicting technologies

89)

Which question below represents a CRM reporting technology example?

Version 1

26


A) Why did sales not meet forecasts? B) What customers are at risk of leaving? C) What is the total revenue by customer? D) All of the answers are correct..

90)

Which question below represents a CRM analyzing technology question? A) Why did sales not meet forecasts? B) What customers are at risk of leaving? C) What is the total revenue by customer? D) All of the answers are correct..

91)

Which question below represents a CRM predicting technology question? A) Why did sales not meet forecasts? B) What customers are at risk of leaving? C) What is the total revenue by customer? D) All of the answers are correct..

92) Which of the following operational CRM technologies does the sales department typically use? A) campaign management, contact management, opportunity management B) sales management, contact management, contact center C) sales management, call scripting, opportunity management D) sales management, contact management, opportunity management

Version 1

27


93) Which of the following operational CRM technologies does the marketing department typically use? A) contact center, web-based self-service, call scripting B) contact center, cross-selling and up-selling, web-based self-service C) list generator, opportunity management, cross-selling and up-selling D) list generator, campaign management, cross-selling and up-selling

94) Which of the following operational CRM technologies does the customer service department typically use? A) contact center, web-based self-service, call scripting B) sales management, contact management, opportunity management C) list generator, opportunity management, cross-selling and up-selling D) list generator, campaign management, cross-selling and up-selling

95) What CRM technology compiles customer information from a variety of sources and segments the information for different marketing campaigns? A) sales opportunity B) cross-selling C) up-selling D) list generator

96) What CRM technology guides users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis?

Version 1

28


A) campaign management system B) cross-selling C) up-selling D) list generator

97) What was McDonald’s performing when it asked its customers if they would like to super-size their meals? A) uplift modeling B) cross-selling C) up-selling D) down-selling

98)

Which of the following represents sales force automation? A) helping an organization identify its customers across applications B) selling additional products or services to a customer C) a system that automatically tracks all of the steps in the sales process D) selling larger products or services to a customer

99) What automates each phase of the sales process, helping individual sales representatives coordinate and organize all of their accounts? A) sales management CRM system B) contact management CRM system C) opportunity management CRM system D) All of the answers are correct.

Version 1

29


100) What maintains customer contact information and identifies prospective customers for future sales? A) sales management CRM system B) contact management CRM system C) opportunity management CRM system D) All of the answers are correct.

101)

What targets sales opportunities by finding new customers or companies for future sales? A) sales management CRM system B) contact management CRM system C) opportunity management CRM system D) sales force automation CRM system

102) Which of the following was one of the first CRM components built to address the overwhelming amount of customer account information sales representatives were required to maintain and track? A) sales management system B) opportunity management system C) sales force automation system D) contact management system

103) Which of the following is where customer service representatives answer customer inquiries and respond to problems through a number of different customer touchpoints?

Version 1

30


A) contact center B) web-based self-service C) call scripting D) uplift modeling

104) What allows customers to use the web to find answers to their questions or solutions to their problems? A) contact center B) web-based self-service C) call scripting D) uplift modeling

105) What accesses organizational databases that track similar issues or questions and automatically generates the details to the customer service representative who can then relay them to the customer? A) contact center B) web-based self-service C) call scripting D) uplift modeling

106)

What is automatic call distribution?

Version 1

31


A) a technology that automatically dials outbound calls and when someone answers, the call is forwarded to an available agent B) a technology that directs customers to use touch-tone phones or keywords to navigate or provide information C) a phone switch that routes inbound calls to available agents D) an attempt to increase the amount of a sale

107)

What is interactive voice response?

A) a technology that automatically dials outbound calls and when someone answers, the call is forwarded to an available agent B) a technology that directs customers to use touch-tone phones or keywords to navigate or provide information C) a phone switch that routes inbound calls to available agents D) an attempt to increase the amount of a sale

108)

What is predictive dialing?

A) a technology that automatically dials outbound calls and when someone answers, the call is forwarded to an available agent B) a technology that directs customers to use touch-tone phones or keywords to navigate or provide information C) a phone switch that routes inbound calls to available agents D) an attempt to increase the amount of a sale

109)

What is a contact center or call center?

Version 1

32


A) a place where customer service representatives answer customer inquiries and solve problems, usually by email, chat, or phone B) a technology that allows customers to use the web to find answers to their questions or solutions to their problems C) a technology that gathers product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer D) a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products

110)

What is web-based self-service?

A) a place where customer service representatives answer customer inquiries and solve problems, usually by email, chat, or phone B) a technology that allows customers to use the web to find answers to their questions or solutions to their problems C) a technology that gathers product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer D) a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products

111)

What is call scripting?

A) a place where customer service representatives answer customer inquiries and solve problems, usually by email, chat, or phone B) a technology that allows customers to use the web to find answers to their questions or solutions to their problems C) a technology that gathers product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer D) a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products

Version 1

33


112)

What is uplift modeling?

A) a place where customer service representatives answer customer inquiries and solve problems, usually by email, chat, or phone B) a technology that allows customers to use the web to find answers to their questions or solutions to their problems C) a technology that gathers product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer D) a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products

113) What divides a market into categories that share similar attributes such as age, location, gender, habits, and so on? A) contact center B) customer segmentation C) customer center D) uplift modeling

114)

Which of the following is a common customer service CRM metric? A) number of new prospective customers B) number of marketing campaigns C) average time to resolution D) revenue generated by marketing campaigns

115) What is properly addressing the customer’s need the first time they call, thereby eliminating the need for the customer to follow up with a second call?

Version 1

34


A) first call resolution B) contact center C) average time to resolution D) call center

116)

Which of the following is a common marketing CRM metric? A) number of new prospective customers B) average number of service calls per day C) average time to resolution D) cost per interaction by marketing campaign

117) What is a part of operational CRM that automates service requests, complaints, product returns, and information requests? A) cross-selling B) first call resolution C) campaign management system D) customer service and support

118) What guides users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis? A) cross-selling B) first call resolution C) campaign management system D) customer service and support

Version 1

35


119)

What is selling additional products or services to an existing customer? A) cross-selling B) first call resolution C) campaign management system D) customer service and support

120)

What is increasing the value of the sale? A) up-selling B) first call resolution C) campaign management system D) customer service and support

121) What is properly addressing the customer’s need the first time they call, thereby eliminating the need for the customer to follow up with a second call? A) first call resolution B) data integration C) customer profitability D) customer lifetime value

122)

What measures the customer’s worth over a specific period of time?

Version 1

36


A) chatbot B) click-to-talk C) customer profitability D) customer lifetime value

123) What is a metric that represents the total net profit a company makes from any given customer? A) intelligent virtual agent B) click-to-talk C) customer profitability D) customer lifetime value

124) What an artificial intelligence program that simulates interactive human conversation by using key precalculated user phrases and auditory or text-based signals? A) chatbot B) intelligent virtual agent C) customer profitability D) customer lifetime value

125) What is an animated, humanlike graphical chat bot commonly displayed on website home pages and advertisement landing pages? A) chatbot B) intelligent virtual agent C) customer profitability D) customer lifetime value

Version 1

37


126)

What is the key word in ERP? A) enterprise B) resource C) intelligence D) business

127)

What is enterprise resource planning?

A) the analysis and redesign of workflow within and between enterprises B) a standardized set of activities that accomplish as specific task, such as processing a customer’s order C) a process that integrates all departments and functions throughout an organization into a single MIS system so that employees can make decisions by viewing enterprisewide information on all business operations D) a process involving managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization’s profitability

128) Which of the following is a component ERP vendor offer to differentiate themselves in the marketplace? A) accounting B) CRM C) sales D) human resources

129) Which of the following is not one of the three most common core ERP components focusing on internal operations?

Version 1

38


A) accounting and finance B) production and materials management C) business intelligence D) human resources

130)

Which activities do accounting and finance components perform?

A) track employee information including payroll, benefits, compensation, performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities B) handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control C) manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management D) All of the answers are correct.

131)

Which activities do production and materials management components perform?

A) track employee information including payroll, benefits, compensation, performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities B) handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control C) manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management D) All of the answers are correct.

132)

Which activities do human resource components perform?

Version 1

39


A) track employee information including payroll, benefits, compensation, performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities B) handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control C) manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management D) All of the answers are correct.

133)

Which component is a credit-management feature typically included in? A) accounting and finance component B) production and managerial management component C) human resource component D) production and materials management component

134) Which component can help an organization determine such things as the identification of individuals who are likely to leave the company unless additional compensation or benefits are provided? A) accounting and finance component B) production and managerial management component C) human resource component D) production and materials management component

135)

Which of the following is an extended ERP component?

Version 1

40


A) business intelligence B) ebusiness C) customer relationship management D) All of the answers are correct.

136) Which extended ERP component collects information used throughout an organization, organizes it, and applies analytical tools to assist managers with decisions? A) business intelligence B) ebusiness C) customer relationship management D) supply chain management

137)

Which of the following describes ERP systems?

A) ERP systems provide a foundation for collaboration between departments. B) ERP systems enable people in different business areas to communicate. C) ERP systems have been widely adopted in large organizations to store critical knowledge used to make the decisions that drive the organization’s performance. D) All of the answer choices are correct.

138)

What is at the heart of any ERP system? A) network B) employees C) customers D) database

Version 1

41


139) Which of the following occurs when everyone involved in sourcing, producing, and delivering the company’s product works with the same information? A) eliminating redundancies B) cutting down on wasted time C) removing misinformation D) All of the answers are correct.

140)

Who are the primary users of SCM systems? A) sales, marketing, and customer service B) accounting, finance, logistics, and production C) customers, resellers, partners, suppliers, and distributors D) All of the answers are correct.

141)

What are the primary business benefits of an ERP system?

A) sales forecasts, sales strategies, and marketing campaigns B) market demand, resource and capacity constraints, and real-time scheduling C) forecasting, planning, purchasing, material management, warehousing, inventory, and distribution D) sales system

142)

Who are the primary users of ERP systems?

Version 1

42


A) sales, marketing, and customer service B) accounting, finance, logistics, and production C) customers, resellers, partners, suppliers, and distributors D) sales system

143) Which application’s primary business benefits include sales forecasts, sales strategies, and marketing campaigns? A) customer relationship management B) supply chain management C) enterprise resource planning D) marketing system

144) Which application’s primary business benefits include market demand, resource and capacity constraints, and real-time scheduling? A) customer relationship management B) supply chain management C) enterprise resource planning D) human resource system

145) Which application’s primary business benefits include forecasting, planning, purchasing, material management, warehousing, inventory, and distribution? A) customer relationship management B) supply chain management C) enterprise resource planning D) accounting system

Version 1

43


146)

What modifies existing software according to the business’s or user’s requirements? A) software customization B) data integration C) application integration D) sales system

147) Integrations allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems. ⊚ ⊚

true false

148) Integrations provide enterprisewide support and data access for a firm’s operations and business processes. ⊚ ⊚

149)

true false

Middleware translates information between disparate systems. ⊚ ⊚

true false

150) Data integration is the integration of a company’s existing management information systems. ⊚ ⊚

Version 1

true false

44


151) Application integration is the integration of data from multiple sources, which provides a unified view of all data. ⊚ ⊚

true false

152) Application integration is the integration of a company’s existing management information systems. ⊚ ⊚

true false

153) Data integration is the integration of data from multiple sources, which provides a unified view of all data. ⊚ ⊚

true false

154) A forward integration takes information entered into a given system and sends it automatically to all downstream systems and processes. ⊚ ⊚

true false

155) A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes. ⊚ ⊚

Version 1

true false

45


156) A backward integration takes information entered into a given system and sends it automatically to all downstream systems and processes. ⊚ ⊚

true false

157) A forward integration takes information entered into a given system and sends it automatically to all upstream systems and processes. ⊚ ⊚

true false

158) Integrations are achieved using middleware —several types of software that sit between and provide connectivity for two or more software applications. Middleware translates information between disparate systems. ⊚ ⊚

159)

true false

The customer’s customer is upstream in the supply chain. ⊚ ⊚

true false

160) Plan, source, make, deliver, and return are the five basic supply chain management components. ⊚ ⊚

Version 1

true false

46


161) Plan, source, give, get, and return are the five basic supply chain management components. ⊚ ⊚

true false

162) In the basic supply chain, source refers to building relationships with suppliers to procure raw materials. ⊚ ⊚

163)

In the basic supply chain, give refers to planning for transportation of goods to customers. ⊚ ⊚

164)

true false

true false

In the basic supply chain, return refers to supporting customers and product returns. ⊚ ⊚

true false

165) In the basic supply chain, make refers to manufacturing products and create production schedules. ⊚ ⊚

Version 1

true false

47


166) In the basic supply chain, return refers to prepare to manage all resources required to meet demands. ⊚ ⊚

true false

167) In the basic supply chain, plan refers to preparing to manage all resources required to meet demand. ⊚ ⊚

true false

168) In the basic supply chain, deliver refers to planning for transportation of goods to customers. ⊚ ⊚

169)

true false

A back order is an unfilled customer order for a product that is out of stock. ⊚ ⊚

true false

170) Inventory cycle time is the time it takes to manufacture a product and deliver it to the retailer. ⊚ ⊚

true false

171) Customer order cycle time is the agreed-upon time between the purchase of a product and the delivery of the product.

Version 1

48


⊚ ⊚

172)

Inventory turnover is the frequency of inventory replacement. ⊚ ⊚

173)

true false

true false

Inventory turnover is an unfilled customer order for a product that is out of stock. ⊚ ⊚

true false

174) Customer order cycle time is the time it takes to manufacture a product and deliver it to the retailer. ⊚ ⊚

true false

175) Information technology’s primary role in supply chain management is creating the integrations or tight process and information linkages between functions within a firm—such as marketing, sales, finance, manufacturing, and distribution—and between firms. ⊚ ⊚

true false

176) Effective and efficient supply chain management systems can enable an organization to decrease the power of its buyers. ⊚ ⊚

Version 1

true false

49


177)

Supply chain visibility is the ability to view all areas up and down the supply chain. ⊚ ⊚

true false

178) Electronic data interchange (EDI) is a standard format for the electronic exchange of information between supply chain participants. ⊚ ⊚

true false

179) The bullwhip effect occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain. ⊚ ⊚

true false

180) The bullwhip effect is a standard format for the electronic exchange of information between supply chain participants. ⊚ ⊚

true false

181) Electronic data interchange occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain. ⊚ ⊚

Version 1

true false

50


182) Procurement is the purchasing of goods and services to meet the needs of the supply chain. ⊚ ⊚

true false

183) Procurement can help a company answer the following question: What quantity of raw materials should we purchase to minimize spoilage? ⊚ ⊚

true false

184) Logistics includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain. ⊚ ⊚

true false

185) Inbound logistics acquires raw materials and resources and distributes them to manufacturing as required. ⊚ ⊚

186)

true false

Outbound logistics distributes goods and services to customers. ⊚ ⊚

true false

187) Logistics controls processes inside a company (warehouse logistics) and outside a company (transport logistics) and focuses on the physical execution part of the supply chain.

Version 1

51


⊚ ⊚

true false

188) Materials management is the purchasing of goods and services to meet the needs of the supply chain. ⊚ ⊚

true false

189) Logistics can help a company answer the following question: What quantity of raw materials should we purchase to minimize spoilage? ⊚ ⊚

true false

190) Logistics includes the increasingly complex management of processes, information, and communication to take a product from cradle to grave. Cradle-to-grave provides logistics support. ⊚ ⊚

true false

191) Materials management includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing. ⊚ ⊚

true false

192) The process of 3D printing (additive manufacturing) builds—layer by layer in an additive process—a three-dimensional solid object from a digital model.

Version 1

52


⊚ ⊚

true false

193) 3D printing is a process that builds—layer by layer in an additive process—a threedimensional solid object from a digital model. ⊚ ⊚

true false

194) Drones include a process that builds—layer by layer in an additive process—a threedimensional solid object from a digital model. ⊚ ⊚

195)

3D printing supports procurement. ⊚ ⊚

196)

true false

RFID uses electronic tags and labels to identify objects wirelessly over short distances. ⊚ ⊚

197)

true false

true false

RFID supports logistics. ⊚ ⊚

Version 1

true false

53


198)

RFID supports procurement. ⊚ ⊚

199)

Drones are unmanned aircraft that can fly autonomously, or without a human. ⊚ ⊚

200)

true false

Drones support logistics. ⊚ ⊚

202)

true false

3D printing is unmanned aircraft that can fly autonomously, or without a human. ⊚ ⊚

201)

true false

true false

Drones support materials management. ⊚ ⊚

true false

203) Robotics focuses on creating artificial intelligence devices that can move and react to sensory input. ⊚ ⊚

Version 1

true false

54


204)

Robotics supports materials management. ⊚ ⊚

205)

Robotics supports procurement. ⊚ ⊚

206)

true false

true false

RFID systems are used to create digital designs and then manufacture the products. ⊚ ⊚

true false

207) The maker movement is a cultural trend that places value on an individual’s ability to be a creator of things as well as a consumer of things. ⊚ ⊚

true false

208) The robotics movement is a cultural trend that places value on an individual’s ability to be a creator of things as well as a consumer of things. ⊚ ⊚

true false

209) Makerspaces are community centers that provide technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable. Version 1

55


⊚ ⊚

true false

210) RFID’s electronic product code (RFID EPC) promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag. ⊚ ⊚

true false

211) A drone is an unmanned aircraft that can fly autonomously, or without a human. Amazon.com is piloting drone aircraft for package deliveries. ⊚ ⊚

true false

212) The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its suppliers. ⊚ ⊚

213)

Back-office operations deal directly with the customer. ⊚ ⊚

214)

true false

true false

RFM stands for regency, frequency, and monetary. ⊚ ⊚

Version 1

true false

56


215)

The evolution of CRM is reporting, analyzing, and predicting. ⊚ ⊚

216)

true false

List generators fall in the category of the sales department’s CRM tools. ⊚ ⊚

true false

217) Contact management falls in the category of the customer service department’s CRM tools. ⊚ ⊚

true false

218) Customer service and support (CSS) is a part of operational CRM that automates service requests, complaints, product returns, and information requests. ⊚ ⊚

true false

219) Opportunity management CRM systems target sales opportunities by finding new customers or companies for future sales. ⊚ ⊚

Version 1

true false

57


220) Call scripting occurs when customer service representatives answer customer inquiries and solve problems by email and IMing. ⊚ ⊚

true false

221) Call scripting systems gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer. ⊚ ⊚

true false

222) Web-based self-service systems allow customers to use the web to find answers to their questions or solutions to their problems. ⊚ ⊚

true false

223) Click-to-talk functions allow customers to click on a button and talk with a representative via the Internet. ⊚ ⊚

true false

224) CRM predicting technologies help organizations identify their customers across other applications. ⊚ ⊚

true false

225) CRM analysis technologies help organizations segment their customers into categories such as best and worst customers. Version 1

58


⊚ ⊚

true false

226) CRM predicting technologies help organizations predict customer behavior, such as which customers are at risk of leaving. ⊚ ⊚

true false

227) Analytical CRM supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers. ⊚ ⊚

true false

228) Operational CRM supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers. ⊚ ⊚

true false

229) List generators compile customer information from a variety of sources and segment it for different marketing campaigns. ⊚ ⊚

true false

230) Campaign management systems guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis. ⊚ ⊚ Version 1

true false 59


231)

Up-selling is selling additional products or services to an existing customer. ⊚ ⊚

232)

true false

Cross-selling is increasing the value of the sale. ⊚ ⊚

true false

233) Call scripting systems gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer. ⊚ ⊚

true false

234) Uplift modeling is a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products. ⊚ ⊚

235)

true false

Automatic call distribution routes inbound calls to available agents. ⊚ ⊚

true false

236) Predictive dialing automatically dials outbound calls and forwards answered calls to an available agent. Version 1

60


⊚ ⊚

true false

237) Interactive voice response automatically dials outbound calls and forwards answered calls to an available agent. ⊚ ⊚

true false

238) When a user enters or updates information in one ERP module, it is immediately and automatically updated throughout the entire system. ⊚ ⊚

true false

239) Core ERP components are the traditional components included in most ERP systems and primarily focus on internal operations. ⊚ ⊚

true false

240) Core ERP components are the extra components that meet organizational needs not covered by the core components and primarily focus on external operations. ⊚ ⊚

true false

241) Accounting and finance ERP components manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management.

Version 1

61


⊚ ⊚

true false

242) Production and materials management ERP components handle production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting, and quality control. ⊚ ⊚

243)

Business intelligence is both a core and extended ERP component. ⊚ ⊚

244)

true false

true false

SCM, CRM, and ERP are all extended ERP components. ⊚ ⊚

true false

245) Software customization modifies existing software according to the business’s or user’s requirements. ⊚ ⊚

true false

246) A two-tier ERP architecture allows an organization to have an on-premises ERP system along with cloud ERP applications. ⊚ ⊚

Version 1

true false

62


247) The goal of ERP is to integrate all of the organizational systems into one fully functioning, high-performance system that is capable of meeting all business needs and user requirements. Of course, this goal is incredibly difficult to achieve because businesses and technologies experience rapid change, and ERP must support mobility, cloud, SaaS, and tiered architectures. ⊚ ⊚

true false

248) The primary concern with mobile ERP is security of sensitive data, including trade secrets, financial data, and customer data. ⊚ ⊚

Version 1

true false

63


Answer Key Test name: Chap 08_8e_Baltzan 6) A 7) A 8) C 9) C 10) A 11) A 12) B 13) C 14) A 15) B 16) C 17) D 18) D 19) A 20) C 21) C 22) A 23) B 24) C 25) A 26) B 27) D 28) C 29) D 30) B 31) A Version 1

64


32) C 33) B 34) B 35) C 36) C 37) C 38) A 39) C 40) C 41) A 42) B 43) C 44) D 45) A 46) B 47) C 48) D 49) D 50) A 51) B 52) C 53) A 54) B 55) C 56) A 57) B 58) C 59) D 60) D 61) D Version 1

65


62) A 63) B 64) C 65) D 66) A 67) B 68) C 69) D 70) A 71) D 72) B 73) C 74) A 75) C 76) A 77) B 78) D 79) D 80) C 81) A 82) B 83) C 84) D 85) C 86) A 87) B 88) D 89) C 90) A 91) B Version 1

66


92) D 93) D 94) A 95) D 96) A 97) C 98) C 99) A 100) B 101) C 102) C 103) A 104) B 105) C 106) C 107) B 108) A 109) A 110) B 111) C 112) D 113) B 114) C 115) A 116) D 117) D 118) C 119) A 120) A 121) A Version 1

67


122) C 123) D 124) A 125) B 126) A 127) C 128) B 129) C 130) C 131) B 132) A 133) A 134) C 135) D 136) A 137) D 138) D 139) D 140) C 141) C 142) B 143) A 144) B 145) C 146) A 147) TRUE 148) FALSE 149) TRUE 150) FALSE 151) FALSE Version 1

68


152) TRUE 153) TRUE 154) TRUE 155) TRUE 156) FALSE 157) FALSE 158) TRUE 159) FALSE 160) TRUE 161) FALSE 162) TRUE 163) FALSE 164) TRUE 165) TRUE 166) FALSE 167) TRUE 168) TRUE 169) TRUE 170) TRUE 171) TRUE 172) TRUE 173) FALSE 174) FALSE 175) TRUE 176) TRUE 177) TRUE 178) TRUE 179) TRUE 180) FALSE 181) FALSE Version 1

69


182) TRUE 183) TRUE 184) TRUE 185) TRUE 186) TRUE 187) TRUE 188) FALSE 189) FALSE 190) TRUE 191) TRUE 192) TRUE 193) TRUE 194) FALSE 195) TRUE 196) TRUE 197) TRUE 198) FALSE 199) TRUE 200) FALSE 201) TRUE 202) FALSE 203) TRUE 204) TRUE 205) FALSE 206) FALSE 207) TRUE 208) FALSE 209) TRUE 210) TRUE 211) TRUE Version 1

70


212) FALSE 213) FALSE 214) FALSE 215) TRUE 216) FALSE 217) FALSE 218) TRUE 219) TRUE 220) FALSE 221) TRUE 222) TRUE 223) TRUE 224) FALSE 225) TRUE 226) TRUE 227) FALSE 228) FALSE 229) TRUE 230) TRUE 231) FALSE 232) FALSE 233) TRUE 234) TRUE 235) TRUE 236) TRUE 237) FALSE 238) TRUE 239) TRUE 240) FALSE 241) TRUE Version 1

71


242) TRUE 243) FALSE 244) FALSE 245) TRUE 246) TRUE 247) TRUE 248) TRUE

Version 1

72


CHAPTER 9 1)

Describe the seven phases of the systems development life cycle.

2)

Explain the term technical review, when it occurs, and explain its importance.

3)

Summarize the different software development methodologies.

4) Explain project management and the role the triple constraints play when managing a project.

Version 1

1


5) Describe the project stakeholder’s and executive sponsor’s roles in choosing strategic projects.

6)

Describe the two primary diagrams most frequently used in project planning.

7) Identify the three primary areas a project manager must focus on managing to ensure success.

8) In which phase does the firm analyze its end-user business requirements and refine project goals into defined functions and operations of the intended system?

Version 1

2


A) analysis phase B) design phase C) development phase D) testing phase

9) What are the specific business requests the system development effort must meet to be successful? A) legacy system B) conversion C) business requirements D) sign-off

10)

What is the process of transferring information from a legacy system to a new system? A) off-the-shelf software B) conversion C) business requirements D) sign-off

11)

What modifies software to meet specific user or business requirements? A) software customization B) conversion C) business requirements D) sign-off

Version 1

3


12) Which software supports general business processes and does not require any specific software customization to meet the organization’s needs? A) systems development life cycle B) customized software C) off-the-shelf application software D) application software

13) What is the overall process for developing information systems, from planning and analysis through implementation and maintenance? A) systems development life cycle B) software customization C) off-the-shelf application software D) legacy system

14) Which phase establishes a high-level plan of the intended project and determines project goals? A) testing phase B) analysis phase C) maintenance phase D) planning phase

15) What is a person or event that is the catalyst for implementing major changes for a system to meet business changes?

Version 1

4


A) change controller B) change over C) change management D) change agent

16) What is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted? A) brainstorming B) change agent C) test conditions D) bugs

17) What is the process of managing changes to the business requirements throughout the project? A) requirements documentation B) requirements management C) requirements definition document D) change agent

18) Which document prioritizes all of the business requirements by order of importance to the company? A) requirements documentation B) requirements management C) requirements definition document D) change agent

Version 1

5


19) What contains the users’ actual signatures indicating they approve all of the business requirements? A) change agent B) requirements management C) requirements definition document D) sign-off

20) Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? A) testing phase B) analysis phase C) development phase D) planning phase

21) What is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools? A) software B) software testing C) software engineering D) software customization

22) What do software engineers use as tools to provide automated support for the development of the system?

Version 1

6


A) software B) software engineer C) iterative development D) computer-aided software engineering (CASE)

23)

What languages are programming languages that look similar to human languages? A) extreme programming B) object-oriented languages C) fourth-generation languages D) pseudocodes

24) What refers to a unique set of keywords along with a special syntax for organizing program instructions that execute computer commands? A) programming language B) database C) design document D) testing document

25) Which phase brings all the project pieces together into a special testing environment to eliminate errors and bugs, and verify that the system meets all the business requirements defined in the analysis phase? A) testing phase B) analysis phase C) development phase D) planning phase

Version 1

7


26)

What are defects in the code of an information system? A) testing B) bugs C) insects D) programming language

27) What details the steps the system must perform along with the expected result of each step in the implementation phase the organization places the system into production so users can begin to perform actual business operations with it? A) testing phase B) testing documentation C) test conditions D) bugs

28) What is created for users to highlight how to use the system and troubleshoot issues or problems? A) user documentation B) requirements definition document C) scope document D) development document

29)

What is provided for the system users and can be online or in a classroom?

Version 1

8


A) training B) testing C) implementation phase D) testing phase

30) What runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace? A) online training B) workshop training C) help desk D) corrective maintenance

31)

What is held in a classroom environment and led by an instructor? A) online training B) workshop training C) help desk D) corrective maintenance

32)

What is a group of people who respond to users’ questions? A) online training B) workshop training C) help desk D) corrective maintenance

Version 1

9


33)

What assesses whether the entire system meets the design requirements of the users? A) alpha testing B) development testing C) integration testing D) system testing

34)

What occurs when programmers test the system to ensure it is bug-free? A) alpha testing B) development testing C) integration testing D) system testing

35) What verifies that separate systems can work together passing data back and forth correctly? A) alpha testing B) development testing C) integration testing D) system testing

36)

What verifies that the units or pieces of code function correctly when integrated together? A) alpha testing B) development testing C) integration testing D) system testing

Version 1

10


37)

What determines if the system satisfies the user and business requirements? A) alpha testing B) development testing C) integration testing D) user acceptance testing

38)

What tests individual units or pieces of code for a system? A) unit testing B) development testing C) integration testing D) user acceptance testing

39) Which implementation uses both the legacy system and new system until all users verify that the new system functions correctly? A) parallel implementation B) plunge implementation C) pilot implementation D) phased implementation

40) Which implementation discards the legacy system completely and immediately migrates all users to the new system?

Version 1

11


A) parallel implementation B) plunge implementation C) pilot implementation D) phased implementation

41) Which implementation is a small group of people using the new system until it is verified that it works correctly, then the remaining users migrating to it? A) parallel implementation B) plunge implementation C) pilot implementation D) phased implementation

42) Which implementation installs the new system in phases (for example by department) until it is verified that it works correctly? A) parallel implementation B) plunge implementation C) pilot implementation D) phased implementation

43) What makes system changes to repair design flaws, coding errors, or implementation issues? A) corrective maintenance B) preventative maintenance C) pilot implementation D) phased implementation

Version 1

12


44)

What makes system changes to reduce the chance of future system failure? A) corrective maintenance B) preventative maintenance C) pilot implementation D) phased implementation

45) Which reports present data that is distributed inside the organization and is intended for employees within an organization? A) internal reports B) detailed internal reports C) summary internal reports D) exception reports

46) Which internal reports present information with little or no filtering or restrictions of the data? A) internal reports B) detailed internal reports C) summary internal reports D) exception reports

47)

Which internal reports organize and categorize data for managerial perusal?

Version 1

13


A) internal reports B) detailed internal reports C) summary internal reports D) exception reports

48) Which reports highlight situations occurring outside of the normal operating range for a condition or standard? A) internal reports B) detailed internal reports C) summary internal reports D) exception reports

49)

Which of the following is a business-related consequence of successful software? A) increased revenue B) damage to brand reputation C) increased liabilities D) increased expenses

50)

Which of the following is a business-related consequence of failing software? A) decrease productivity B) damage to brand reputation C) increased liabilities D) All of the answers are correct.

Version 1

14


51)

What is the systems development life cycle?

A) a process that involves establishing a high-level plan of the intended project and determining project goals B) a process that involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system C) a process that involves describing the desired features and operations of the system D) the overall process for developing information systems from planning and analysis through implementation and maintenance

52) What is the overall process for developing information systems from planning and analysis through implementation and maintenance? A) systems development life cycle B) project management C) systems management D) project development life cycle

53)

Which of the following represents the phases in the SDLC? A) plan, analysis, design, test, maintain, develop, implement B) analysis, plan, design, test, develop, maintain, implement C) plan, analysis, design, develop, test, implement, maintain D) analysis, plan, develop, design, test, implement, maintain

54)

What is the analysis phase in the SDLC?

Version 1

15


A) involves establishing a high-level plan of the intended project and determining project goals B) involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system C) involves describing the desired features and operations of the system D) involves placing the system into production so users can begin to perform actual business operations with the system

55)

Which phase of the SDLC gathers business requirements? A) plan B) analysis C) test D) design

56) What is a session in which employees meet, sometimes for several days, to define or review the business requirements for the system? A) joint application development B) requirements management C) process modeling D) data flow diagram

57)

What is a business requirement? A) a nonspecific business request the system must meet to be successful B) a specific business request the system must meet to be successful C) the nonspecific methodology the system must meet to be successful D) the specific methodology the system must meet to be successful

Version 1

16


58)

What is the design phase in the SDLC? A) involves establishing a high-level plan of the intended project and determining project

goals B) involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system C) involves describing the desired features and operations of the system D) involves placing the system into production so users can begin to perform actual business operations with the system

59)

What is the implementation phase in the SDLC? A) involves establishing a high-level plan of the intended project and determining project

goals B) involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system C) involves describing the desired features and operations of the system D) involves placing the system into production so users can begin to perform actual business operations with the system

60) What is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges? A) project plan B) methodology C) waterfall D) agile

61)

What is a project manager?

Version 1

17


A) an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget B) the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project C) a formal, approved document that manages and controls the entire project D) a graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment

62)

What is the project scope?

A) an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget B) the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project C) a formal, approved document that manages and controls the entire project D) a graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment

63)

What is a project plan?

A) an illustration of the movement of information between external entities and the processes and data stores within the system B) software suites that automate systems analysis, design, and development C) a formal, approved document that manages and controls the entire project D) a graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment

64)

What is process modeling?

Version 1

18


A) an illustration of the movement of information between external entities and the processes and data stores within the system B) software suites that automate systems analysis, design, and development C) a formal, approved document that manages and controls the entire project D) a graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment

65)

What is a data flow diagram (DFD)?

A) an illustration of the movement of information between external entities and the processes and data stores within the system B) software suites that automate systems analysis, design, and development C) a formal, approved document that manages and controls the entire project D) a graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment

66)

What are computer-aided software engineering (CASE) tools?

A) an illustration of the movement of information between external entities and the processes and data stores within the system B) software suites that automate systems analysis, design, and development C) a formal, approved document that manages and controls the entire project D) a graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment

67) What involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment?

Version 1

19


A) data flow diagram B) computer-aided software engineering (CASE) tools C) systems development life cycle D) process modeling

68) What illustrates the movement of information between external entities and the processes and data stores within the system? A) data flow diagram B) computer-aided software engineering (CASE) tools C) systems development life cycle D) process modeling

69)

What are software suites that automate systems analysis, design, and development? A) data flow diagram B) computer-aided software engineering (CASE) tools C) systems development life cycle D) process modeling

70)

Which machine language is difficult for people to understand? A) first-generation machine language B) fifth-generation machine language C) third-generation machine language D) fourth-generation machine language

Version 1

20


71)

Which assembly language is difficult for people to understand? A) fifth-generation machine language B) second-generation machine language C) third-generation machine language D) fourth-generation machine language

72)

Which high-level programming language uses C+ and Java? A) first-generation machine language B) second-generation machine language C) third-generation machine language D) fourth-generation machine language

73)

What is the term used to refer to people who write programs that operate computers? A) coders B) testers C) analysts D) designers

74)

Which programming language looks similar to human languages? A) first-generation machine language B) second-generation machine language C) third-generation machine language D) fourth-generation machine language

Version 1

21


75)

Which programming language is for artificial intelligence and neural network? A) fifth-generation machine language B) second-generation machine language C) third-generation machine language D) fourth-generation machine language

76)

Which of the following is a purpose of a technical review? A) to detail the steps a system must perform along with the expected result of each step B) to provide an in-depth analysis of project results C) to eliminate errors and bugs from a system D) to verify that the system meets all the business requirements defined in the analysis

phase

77)

Which of the following is an issue related to the waterfall methodology? A) flaws in accurately defining and articulating the business problem B) managing costs, resources, and time constraints C) assumes users can specify all business requirements in advance D) All of the answers are correct.

78)

What consists of a series of tiny projects?

Version 1

22


A) waterfall methodology B) iterative development C) scope creep parking lot D) scope creep

79) Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements? A) rad methodology B) agile methodology C) waterfall methodology D) extreme programming

80)

Which of the following describes agile methodology? A) fast and efficient B) small and nimble C) lower cost D) All of the answers are correct.

81)

Which of the following is not a primary form of agile methodology? A) RAD B) SDLC C) RUP D) scrum

Version 1

23


82) What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance? A) RAD methodology B) agile methodology C) waterfall methodology D) extreme programming

83) What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process? A) RAD methodology B) agile methodology C) waterfall methodology D) extreme programming

84) What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete? A) RAD methodology B) agile methodology C) waterfall methodology D) extreme programming

85)

What is the success rate for a project using the waterfall methodology?

Version 1

24


A) 1 in 10 B) 2 in 10 C) 4 in 10 D) 8 in 10

86)

Which of the following is a fundamental of the RAD methodology?

A) focus initially on creating a prototype that looks and acts like the desired system B) actively involve system users in the analysis, design, and development phases C) accelerate collecting the business requirements through an interactive and iterative construction approach D) All of the answers are correct.

87) Which methodology provides a framework for breaking down the development of software into four gates? A) scrum B) XP C) RAD D) RUP

88)

Which of the following is not one of the four gates in the RUP methodology? A) inception B) collaboration C) construction D) transition

Version 1

25


89) Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it? A) inception B) elaboration C) construction D) All of the answers are correct.

90)

Which gate in the RUP methodology includes building and developing the project? A) inception B) elaboration C) construction D) All of the answers are correct.

91)

Which methodology is owned by IBM? A) scrum B) All of the answers are correct. C) RAD D) RUP

92) Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal?

Version 1

26


A) scrum B) XP C) All of the answers are correct. D) RAD

93) Which methodology ends or begins each day with a stand-up meeting to monitor and control the development effort? A) scrum B) XP C) RUP D) RAD

94)

How many days is a typical sprint in the scrum methodology? A) 1 days B) 100 days C) 30 days D) 90 days

95) Which gate ensures that all stakeholders have a shared understanding of the proposed system and what it will do? A) gate one B) gate two C) gate three D) gate four

Version 1

27


96) Which gate expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it? A) gate one B) gate two C) gate three D) gate four

97)

Which gate includes building and developing the product? A) gate one B) gate two C) gate three D) gate four

98) Which gate answers primary questions addressing ownership of the system and training of key personnel? A) gate one B) gate two C) gate three D) gate four

99)

Which gate is inception?

Version 1

28


A) gate one B) gate two C) gate three D) gate four

100)

Which gate is elaboration? A) gate one B) gate two C) gate three D) gate four

101)

Which gate is transition? A) gate one B) gate two C) gate three D) gate four

102)

Which gate is construction? A) gate one B) gate two C) gate three D) gate four

103)

What are the three primary variables (or triple constraints) in any project?

Version 1

29


A) time, cost, expense B) time, expense, requirements C) time, cost, scope D) time, cost, quality

104)

What is the number one reason that IT projects fall behind schedule or fail? A) change in business goals during the project B) lack of support from business management C) poor planning or poor project management D) change in technology during the project

105)

Which of the following is a characteristic of a successful project? A) delivered on time B) delivered within budget C) meets the business’s requirements D) All of the answers are correct.

106)

What is a project?

A) a temporary activity undertaken to create a unique product, service, or result B) the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project C) any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project D) key dates when a certain group of activities must be performed

Version 1

30


107)

What are project deliverables?

A) a temporary endeavor undertaken to create a unique product or service B) the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project C) any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project D) key dates when a certain group of activities must be performed

108)

What is a project manager?

A) the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project B) any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project C) key dates when a certain group of activities must be performed D) an individual who is an expert in project planning and management

109)

Which of the following does a project manager perform? A) defines and develops the project plan B) tracks the plan to ensure all key project milestones are completed on time C) expert in project planning and management D) All of the answers are correct.

110)

What is an internal department that oversees all organizational projects?

Version 1

31


A) project deliverables B) project scope C) project management office D) All of the answers are correct.

111) The Project Management Institute (PMI) develops procedures and concepts necessary to support the profession of project management. Which of the following is not one of the three areas it focuses on? A) the distinguishing characteristics of a practicing professional (ethics) B) content and structure of the profession’s body of knowledge (standards) C) change in business goals during project planning (management) D) recognition of professional attainment (accreditation)

112) Who are the individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion? A) project managers B) project stakeholders. C) executive sponsors D) All of the answers are correct.

113)

Who is the person or group who provides the financial resources for the project? A) project manager B) project stakeholders C) executive sponsor D) project team

Version 1

32


114) What defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations? A) communication plan B) executive sponsor C) project assumptions D) project deliverable

115)

What are factors considered to be true, real, or certain without proof or demonstration? A) project plan B) project constraints C) project assumptions D) project deliverable

116) What are specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies? A) project objectives B) project constraints C) project assumptions D) project deliverables

117) What is any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project?

Version 1

33


A) project milestone B) project objective C) project assumption D) project deliverable

118)

What represents key dates when a certain group of activities must be performed? A) project milestones B) project objectives C) project assumptions D) project deliverables

119)

What are quantifiable criteria that must be met for the project to be considered a success? A) project milestones B) project objectives C) project assumptions D) project deliverables

120) What defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts? A) project milestones B) project objectives C) project requirements document D) project deliverables

Version 1

34


121)

What statement links the project to the organization’s overall business goals? A) project milestones B) project objectives C) project scope statement D) project deliverables

122) Who are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion? A) project stakeholders B) project managers C) project planners D) project testers

123) role?

What defines all project roles and indicates what responsibilities are associated with each

A) communication plan B) responsibility matrix C) project assumptions D) project deliverables

124)

What are intangible benefits?

Version 1

35


A) benefits that are difficult to quantify or measure B) benefits that are easy to quantify and typically measured to determine the success or failure of a project C) the gains attributable to your project that are reportable D) periodic reviews of actual performance versus expected performance

125)

What are tangible benefits?

A) benefits that are difficult to quantify or measure B) benefits that are easy to quantify and typically measured to determine the success or failure of a project C) the gains attributable to your project that are reportable D) periodic reviews of actual performance versus expected performance

126)

What is feasibility? A) difficult to quantify or measure B) easy to quantify and typically measured to determine the success or failure of a project C) the measure of the tangible and intangible benefits of an information system D) a periodic review of actual performance versus expected performance

127)

What is economic feasibility?

A) a measure of the cost-effectiveness of a project B) a measure of how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities C) a measure of the project time frame to ensure that it can be completed on time D) a measure of the practicality of a technical solution and the availability of technical resources and expertise

Version 1

36


128)

What is operational feasibility?

A) a measure of the cost-effectiveness of a project B) a measure of how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities C) a measure of the project time frame to ensure that it can be completed on time D) a measure of the practicality of a technical solution and the availability of technical resources and expertise

129)

What is schedule feasibility?

A) a measure of the cost-effectiveness of a project B) a measure of how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities C) a measure of the project time frame to ensure that it can be completed on time D) a measure of the practicality of a technical solution and the availability of technical resources and expertise

130)

What is technical feasibility?

A) a measure of the cost-effectiveness of a project B) a measure of how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities C) a measure of the project time frame to ensure that it can be completed on time D) a measure of the practicality of a technical solution and the availability of technical resources and expertise

131)

What is political feasibility?

Version 1

37


A) a measure of how well the solution will be accepted in a given opportunity B) a measure of how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities C) a measure of the project time frame to ensure that it can be completed on time D) a measure of the practicality of a technical solution and the availability of technical resources and expertise

132)

What is legal feasibility?

A) a measure of how well the solution will be accepted in a given opportunity B) a measure of how well a solution can be implemented within existing legal and contractual obligations C) a measure of the project time frame to ensure that it can be completed on time D) a measure of the practicality of a technical solution and the availability of technical resources and expertise

133)

What measures the cost-effectiveness of a project? A) economic feasibility B) operational feasibility C) schedule feasibility D) technical feasibility

134) What measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities?

Version 1

38


A) economic feasibility B) operational feasibility C) schedule feasibility D) technical feasibility

135)

What measures the project time frame to ensure that it can be completed on time? A) economic feasibility B) operational feasibility C) schedule feasibility D) technical feasibility

136) What measures the practicality of a technical solution and the availability of technical resources and expertise? A) economic feasibility B) operational feasibility C) schedule feasibility D) technical feasibility

137)

What measures how well the solution will be accepted in a given opportunity? A) political feasibility B) operational feasibility C) schedule feasibility D) legal feasibility

Version 1

39


138) What measures how well a solution can be implemented within existing legal and contractual obligations? A) political feasibility B) operational feasibility C) schedule feasibility D) legal feasibility

139)

What is a status report? A) difficult to quantify or measure B) easy to quantify and typically measured to determine the success or failure of a project C) the measure of the tangible and intangible benefits of an information system D) a periodic review of actual performance versus expected performance

140)

Which of the following are tangible benefits? A) improved decision making B) improved community service C) improved goodwill D) increased quantity or sales

141)

Which of the following are intangible benefits? A) improved decision making B) decreased expenses C) decreased response time D) increased quantity or sales

Version 1

40


142)

What are project constraints?

A) specific factors that can limit options B) factors that are considered to be true, real, or certain without proof or demonstration C) quantifiable criteria that must be met for the project to be considered a success D) a document issued by the project initiator or sponsor that formally authorizes the existence of a project and provides the project manager with the authority to apply organizational resources to project activities

143)

What are project assumptions?

A) specific factors that can limit options B) factors that are considered to be true, real, or certain without proof or demonstration C) quantifiable criteria that must be met for the project to be considered a success D) a document issued by the project initiator or sponsor that formally authorizes the existence of a project and provides the project manager with the authority to apply organizational resources to project activities

144)

What is a project charter?

A) specific factors that can limit options B) factors that are considered to be true, real, or certain without proof or demonstration C) quantifiable criteria that must be met for the project to be considered a success D) a document issued by the project initiator or sponsor that formally authorizes the existence of a project and provides the project manager with the authority to apply organizational resources to project activities

145) An organization must identify what it wants to do and how it is going to do it. What does the “what” part of this question focus on? Version 1

41


A) justification of the project B) definition of the project C) expected results of the project D) All of the answers are correct.

146) An organization must identify what it wants to do and how it is going to do it. What does the “how” part of this question focus on? A) justification of the project B) definition of the project C) analysis of project risks D) expected results of the project

147)

What is project scope?

A) quantifiable criteria that must be met for the project to be considered a success B) products, services, or processes that are not specifically a part of the project C) any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project D) definition of the work that must be completed to deliver a product with the specified features and functions

148)

What are project objectives?

Version 1

42


A) quantifiable criteria that must be met for the project to be considered a success B) products, services, or processes that are not specifically a part of the project C) any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project D) definition of the work that must be completed to deliver a product with the specified features and functions

149)

What does SMART criteria for successful objective creation include? A) specific, metrics, agreed-upon, real, time-valued B) specific, measurable, agreed-upon, realistic, time-framed C) specific, measurable, accurate, real, time-valued D) specific, metrics, agreed-upon, realistic, time-framed

150)

Which of the following is a characteristic of a well-defined project plan? A) easy to read B) appropriate to the project’s size C) communicated to all key participants D) All of the answers are correct.

151)

What is the most important part of the project plan? A) slack B) specification C) communication D) scope creep

Version 1

43


152) What is a graphical network model that depicts a project’s tasks and the relationships between those tasks? A) Gantt chart B) PERT chart C) dependency D) work breakdown structure

153) What is the logical relationship that exists between the project tasks or between a project task and a milestone? A) resource B) task C) dependency D) activity

154)

What is a simple bar chart that depicts project tasks against a calendar? A) Gantt chart B) PERT chart C) dependency D) work breakdown structure

155)

What type of chart typically displays the critical path?

Version 1

44


A) Gantt chart B) PERT chart C) work breakdown structure D) three interdependent variables

156)

What is the critical path? A) the path from resource to task that passes through all critical components of a project

plan B) the path between tasks to the project’s finish that passes through all critical components of a project plan C) the series of activities that determine the earliest time by which the project can be completed D) the path from start to finish that passes through all the tasks that are critical to completing the project in the longest amount of time

157) The critical path is a series of activities that determine the ________ time by which the project can be completed. A) latest B) between C) earliest D) slack

158) In a Gantt chart, tasks are listed ________, and the project’s time frame is listed ________.

Version 1

45


A) vertically; horizontally B) horizontally; vertically C) vertically; vertically D) horizontally; horizontally

159)

What is a concise written description of the project’s intended work? A) project charter B) kill switch C) dependency D) work breakdown structure

160) What is the amount of time an activity may be delayed without delaying a succeeding activity or the project finish date? A) project charter B) kill switch C) dependency D) slack

161) What is the tendency to permit changes that exceed a project’s scope and may wreak havoc on the schedule, work quality, and budget? A) scope creep B) kill switch C) dependency D) slack

Version 1

46


162) What is a plan that breaks down a project’s goals into the many deliverables required to achieve it? A) work breakdown structure B) project scope C) prototyping D) technical review

163)

What subdivides complex activities into their most manageable units? A) work breakdown structure B) project scope C) prototyping D) technical review

164)

What question is asked repeatedly when creating a work breakdown structure? A) What will have to be done to accomplish X? B) Can we afford to add additional features? C) What will scope creep look like? D) Will we need outsourcing?

165)

Which of the following includes a common reason why change occurs?

Version 1

47


A) a misunderstanding of the initial scope B) shifts in planned technology that force unexpected and significant changes to the business C) an omission in defining initial scope D) All of the answers are correct.

166) What is the outsourcing option that includes the most remote location and indirect customer control? A) onshore outsourcing B) nearshore outsourcing C) offshore outsourcing D) All of the answers are correct.

167) What is the outsourcing option that includes the closest location and direct customer control? A) onshore outsourcing B) nearshore outsourcing C) offshore outsourcing D) All of the answers are correct.

168) What is a common approach using the professional expertise within an organization to develop and maintain the organization’s information technology systems? A) in-sourcing B) outsourcing C) business process outsourcing D) offshore outsourcing

Version 1

48


169) What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house? A) in-sourcing B) outsourcing C) business process outsourcing D) offshore outsourcing

170) What is it called when a company uses organizations from developing countries to write code and develop systems? A) in-sourcing B) outsourcing C) business process outsourcing D) offshore outsourcing

171) A joint application development session is where employees meet, sometimes for several days, to define or review the business requirements for the system. ⊚ ⊚

true false

172) Business requirements are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort. ⊚ ⊚

Version 1

true false

49


173) Business requirements include the process of transferring information from a legacy system to a new system. ⊚ ⊚

174)

true false

Conversion modifies software to meet specific user or business requirements. ⊚ ⊚

true false

175) Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization’s needs. ⊚ ⊚

true false

176) The systems development life cycle (SDLC) is the overall process for developing information systems, from planning and analysis through implementation and maintenance. ⊚ ⊚

true false

177) The planning phase establishes a high-level plan of the intended project and determines project goals. ⊚ ⊚

true false

178) Conversion occurs when a person or event is the catalyst for implementing major changes for a system to meet business changes.

Version 1

50


⊚ ⊚

true false

179) Brainstorming is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted. ⊚ ⊚

true false

180) Requirements management is the process of managing changes to the business requirements throughout the project. ⊚ ⊚

true false

181) Projects are typically dynamic in nature, and change should be expected and anticipated for successful project completion. ⊚ ⊚

true false

182) A requirements definition document prioritizes all of the business requirements by order of importance to the company. ⊚ ⊚

true false

183) Sign-off is the users’ actual signatures indicating they approve all of the business requirements.

Version 1

51


⊚ ⊚

true false

184) The analysis phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation. ⊚ ⊚

true false

185) The design phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation. ⊚ ⊚

true false

186) The testing phase takes all the detailed design documents from the design phase and transforms them into the actual system. ⊚ ⊚

true false

187) Software engineering is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools. ⊚ ⊚

true false

188) Software engineers use computer-aided software engineering (CASE) software tools that provide automated support for the development of the system.

Version 1

52


⊚ ⊚

true false

189) Fourth-generation languages (4GL) are programming languages that look similar to human languages. For example, a typical 4GL command might state, “FIND ALL RECORDS WHERE NAME IS ‘SMITH’.” ⊚ ⊚

true false

190) The development phase brings all the project pieces together into a special testing environment to eliminate errors and bugs, and verify that the system meets all the business requirements defined in the analysis phase. ⊚ ⊚

191)

true false

Bugs are defects in the code of an information system. ⊚ ⊚

true false

192) Test conditions detail the steps the system must perform along with the expected result of each step in the implementation phase the organization places the system into production so users can begin to perform actual business operations with it. ⊚ ⊚

true false

193) User documentation is created to highlight how to use the system and how to troubleshoot issues or problems.

Version 1

53


⊚ ⊚

194)

Training is also provided for the system users and can be online or in a workshop. ⊚ ⊚

195)

true false

Coders refer to people who write programs that operate computers. ⊚ ⊚

196)

true false

true false

Testers are people who write programs that operate computers. ⊚ ⊚

true false

197) Online training runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace. ⊚ ⊚

198)

Workshop training is held in a classroom environment and led by an instructor. ⊚ ⊚

199)

true false

true false

A help desk is a group of people who respond to users’ questions.

Version 1

54


⊚ ⊚

true false

200) Development testing assesses if the entire system meets the design requirements of the users. ⊚ ⊚

201)

true false

Alpha testing occurs when programmers test the system to ensure it is bug-free. ⊚ ⊚

true false

202) Development testing verifies that separate systems can work together passing data back and forth correctly. ⊚ ⊚

true false

203) Integration testing verifies that the units or pieces of code function correctly when integrated together. ⊚ ⊚

true false

204) User acceptance testing (UAT) determines if the system satisfies the user and business requirements. ⊚ ⊚

Version 1

true false

55


205)

User acceptance testing tests individual units or pieces of code for a system. ⊚ ⊚

true false

206) Unit testing uses both the legacy system and new system until all users verify that the new system functions correctly. ⊚ ⊚

true false

207) Plunge implementation discards the legacy system completely and immediately migrates all users to the new system. ⊚ ⊚

true false

208) Pilot implementation involves a small group of people using the new system until it is verified that it works correctly, then the remaining users migrate to it. ⊚ ⊚

true false

209) Pilot implementation installs the new system in phases (for example by department) until it is verified that it works correctly. ⊚ ⊚

Version 1

true false

56


210) Corrective maintenance makes system changes to repair design flaws, coding errors, or implementation issues. ⊚ ⊚

true false

211) Corrective maintenance makes system changes to reduce the chance of future system failure. ⊚ ⊚

true false

212) Internal reports present data that is distributed inside the organization and is intended for employees within an organization. Internal reports typically support day-to-day operations monitoring that supports managerial decision making. ⊚ ⊚

true false

213) Detailed internal reports present information with little or no filtering or restrictions of the data. ⊚ ⊚

214)

true false

Exception reports organize and categorize data for managerial perusal. ⊚ ⊚

true false

215) Summary internal reports highlight situations occurring outside of the normal operating range for a condition or standard. Version 1

57


⊚ ⊚

true false

216) Information system control reports ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or record keeping of actions and transactions. ⊚ ⊚

true false

217) Information systems audit reports assess a company’s information system to determine necessary changes and to help ensure the information systems’ availability, confidentiality, and integrity. ⊚ ⊚

true false

218) Post-implementation reports are formal reports or audits of a project after it is up and running. ⊚ ⊚

true false

219) Preventative maintenance makes system changes to reduce the chance of future system failure. ⊚ ⊚

220)

true false

Encouraging liabilities is a business-related consequence of failed software.

Version 1

58


⊚ ⊚

true false

221) The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system. ⊚ ⊚

true false

222) Process modeling involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment. ⊚ ⊚

true false

223) A data flow diagram (DFD) illustrates the movement of information between external entities and the processes and data stores within the system. ⊚ ⊚

true false

224) A data flow diagram involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment. ⊚ ⊚

true false

225) Process modeling illustrates the movement of information between external entities and the processes and data stores within the system. ⊚ ⊚ Version 1

true false 59


226) Computer-aided software engineering (CASE) tools are software suites that automate systems analysis, design, and development. ⊚ ⊚

227)

Coders are software suites that automate systems analysis, design, and development. ⊚ ⊚

228)

true false

First-generation machine language is difficult for people to understand. ⊚ ⊚

229)

true false

true false

Second-generation assembly language is difficult for people to understand. ⊚ ⊚

true false

230) Third-generation high-level programming languages, such as C+ and Java, are high-level programming languages. ⊚ ⊚

231)

true false

Fourth-generation programming languages look similar to human languages.

Version 1

60


⊚ ⊚

true false

232) Fifth-generation programming languages are used for artificial intelligence and neural networks. ⊚ ⊚

true false

233) A supervised review is a meeting in which the project team provides an in-depth analysis of project results to ensure that the work was done accurately. ⊚ ⊚

true false

234) A technical review is a meeting in which an independent team of experts provides an indepth analysis of project results to ensure that team members did the work accurately, completely, and to the right quality standard. ⊚ ⊚

true false

235) The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance. ⊚ ⊚

true false

236) Scrum is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.

Version 1

61


⊚ ⊚

true false

237) A prototype is a smaller-scale representation or working model of the users’ requirements or a proposed design for an information system. ⊚ ⊚

true false

238) A methodology is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges. ⊚ ⊚

true false

239) Plunge implementation is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges. ⊚ ⊚

true false

240) The oldest and the best-known software development methodology is the waterfall methodology, a sequence of phases in which the output of each phase becomes the input for the next. ⊚ ⊚

true false

241) The oldest and the best-known software development methodology is the agile methodology, a sequence of phases in which the output of each phase becomes the input for the next.

Version 1

62


⊚ ⊚

true false

242) Prototyping is a modern design approach by which the designers and system users use an iterative approach to build the system. ⊚ ⊚

true false

243) Iterative development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies. ⊚ ⊚

true false

244) Waterfall development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies. ⊚ ⊚

true false

245) An agile methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. ⊚ ⊚

true false

246) Rapid application development (RAD) methodology (also called rapid prototyping) emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.

Version 1

63


⊚ ⊚

true false

247) Extreme programming (XP) methodology, like other agile methods, breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete. ⊚ ⊚

true false

248) The rational unified process (RUP) methodology, owned by IBM, provides a framework for breaking down the development of software into four gates. ⊚ ⊚

true false

249) The scrum methodology uses small teams to produce small pieces of software using a series of sprints, or 30-day intervals, to achieve an appointed goal. ⊚ ⊚

true false

250) Project miles are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. ⊚ ⊚

true false

251) Project deliverables represent key dates when a certain group of activities must be performed.

Version 1

64


⊚ ⊚

true false

252) Rational unified process (RUP) methodology, owned by IBM, provides a framework for breaking down the development of software into four “gates.” ⊚ ⊚

true false

253) Scrum methodology, uses small teams to produce small pieces of software using a series of “sprints,” or 30-day intervals, to achieve an appointed goal. ⊚ ⊚

true false

254) A communication plan defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations. ⊚ ⊚

true false

255) The executive sponsor is the person or group who provides the financial resources for the project. ⊚ ⊚

true false

256) Project constraints are factors considered to be true, real, or certain without proof or demonstration. ⊚ ⊚ Version 1

true false 65


257) Project assumptions are specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies. ⊚ ⊚

true false

258) A project objective is any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. ⊚ ⊚

true false

259) The project management office (PMO) is an internal department that oversees all organizational projects. ⊚ ⊚

true false

260) Project assumptions represent key dates when a certain group of activities must be performed. ⊚ ⊚

true false

261) Project objectives are quantifiable criteria that must be met for the project to be considered a success. ⊚ ⊚

Version 1

true false

66


262) The project requirements document defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts. ⊚ ⊚

true false

263) The project scope statement links the project to the organization’s overall business goals. It describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project. ⊚ ⊚

true false

264) The project managers are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion. ⊚ ⊚

true false

265) The responsibility matrix defines all project roles and indicates what responsibilities are associated with each role. ⊚ ⊚

266)

true false

Status reports are periodic reviews of actual performance versus expected performance. ⊚ ⊚

Version 1

true false

67


267) A kill switch is a trigger that enables a project manager to close the project before completion. ⊚ ⊚

true false

268) A Gantt chart is a graphical network model that depicts a project’s tasks and the relationships between them. ⊚ ⊚

true false

269) A dependency is a logical relationship that exists between the project tasks or between a project task and a milestone. ⊚ ⊚

true false

270) A dependency is a trigger that enables a project manager to close the project before completion. ⊚ ⊚

true false

271) A kill switch is a logical relationship that exists between the project tasks or between a project task and a milestone. ⊚ ⊚

Version 1

true false

68


272)

Gantt charts define dependency between project tasks before those tasks are scheduled. ⊚ ⊚

true false

273) A critical path for a project is the series of activities that determine the earliest time by which the project can be completed. ⊚ ⊚

true false

274) A PERT chart is a simple bar chart that lists project tasks vertically against the project’s time frame, listed horizontally. ⊚ ⊚

true false

275) In the past, outsourcing was often used tactically, as a quick-fix, short-term solution to a particular need or problem that did not form part of an overall business strategy. ⊚ ⊚

true false

276) Outsourcing is a common approach using the professional expertise within an organization to develop and maintain the organization’s information technology systems. ⊚ ⊚

Version 1

true false

69


277) In-sourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house. ⊚ ⊚

true false

278) Offshore outsourcing is using organizations from developing countries to write code and develop systems. ⊚ ⊚

true false

279) In-sourcing (in-house development) uses the professional expertise within an organization to develop and maintain its information technology systems. In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better-quality workforce combining both technical and business skills. ⊚ ⊚

true false

280) In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better-quality workforce combining both technical and business skills. ⊚ ⊚

true false

281) Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house. ⊚ ⊚

Version 1

true false

70


282) Onshore outsourcing occurs when engaging another company within the same country for services. ⊚ ⊚

true false

283) Nearshore outsourcing occurs when contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country. ⊚ ⊚

true false

284) Offshore outsourcing occurs when using organizations from developing countries to write code and develop systems. In offshore outsourcing, the country is geographically far away. ⊚ ⊚

true false

285) Offshore outsourcing occurs when engaging another company within the same country for services. ⊚ ⊚

true false

286) Onshore outsourcing occurs when contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country. ⊚ ⊚

true false

287) Nearshore outsourcing occurs when using organizations from developing countries to write code and develop systems. In offshore outsourcing, the country is geographically far away. Version 1

71


⊚ ⊚

288)

true false

Human resources are the most common outsourced function. ⊚ ⊚

Version 1

true false

72


Answer Key Test name: Chap 09_8e_Baltzan 8) A 9) C 10) B 11) A 12) C 13) A 14) D 15) D 16) A 17) B 18) C 19) D 20) C 21) C 22) D 23) C 24) A 25) A 26) B 27) C 28) A 29) A 30) A 31) B 32) C 33) A Version 1

73


34) B 35) C 36) D 37) D 38) A 39) A 40) B 41) C 42) D 43) A 44) B 45) A 46) B 47) C 48) D 49) A 50) D 51) D 52) A 53) C 54) B 55) B 56) A 57) B 58) C 59) D 60) B 61) A 62) B 63) C Version 1

74


64) D 65) A 66) B 67) D 68) A 69) B 70) A 71) B 72) C 73) A 74) D 75) A 76) B 77) D 78) B 79) B 80) D 81) B 82) C 83) A 84) D 85) A 86) D 87) D 88) B 89) B 90) C 91) D 92) A 93) A Version 1

75


94) C 95) A 96) B 97) C 98) D 99) A 100) B 101) D 102) C 103) C 104) C 105) D 106) A 107) C 108) D 109) D 110) C 111) C 112) B 113) C 114) A 115) C 116) B 117) D 118) A 119) B 120) C 121) C 122) A 123) B Version 1

76


124) A 125) B 126) C 127) A 128) B 129) C 130) D 131) A 132) B 133) A 134) B 135) C 136) D 137) A 138) D 139) D 140) D 141) A 142) A 143) B 144) D 145) D 146) C 147) D 148) A 149) B 150) D 151) C 152) B 153) C Version 1

77


154) A 155) B 156) C 157) C 158) A 159) A 160) D 161) A 162) A 163) A 164) A 165) D 166) C 167) A 168) A 169) B 170) D 171) TRUE 172) TRUE 173) FALSE 174) FALSE 175) TRUE 176) TRUE 177) TRUE 178) FALSE 179) TRUE 180) TRUE 181) TRUE 182) TRUE 183) TRUE Version 1

78


184) FALSE 185) TRUE 186) FALSE 187) TRUE 188) TRUE 189) TRUE 190) FALSE 191) TRUE 192) TRUE 193) TRUE 194) TRUE 195) TRUE 196) FALSE 197) TRUE 198) TRUE 199) TRUE 200) FALSE 201) FALSE 202) FALSE 203) FALSE 204) TRUE 205) FALSE 206) FALSE 207) TRUE 208) TRUE 209) FALSE 210) TRUE 211) FALSE 212) TRUE 213) TRUE Version 1

79


214) FALSE 215) FALSE 216) TRUE 217) TRUE 218) TRUE 219) TRUE 220) FALSE 221) FALSE 222) TRUE 223) TRUE 224) FALSE 225) FALSE 226) TRUE 227) FALSE 228) TRUE 229) TRUE 230) TRUE 231) TRUE 232) TRUE 233) FALSE 234) TRUE 235) TRUE 236) FALSE 237) TRUE 238) TRUE 239) FALSE 240) TRUE 241) FALSE 242) TRUE 243) TRUE Version 1

80


244) FALSE 245) TRUE 246) TRUE 247) TRUE 248) TRUE 249) TRUE 250) FALSE 251) FALSE 252) TRUE 253) TRUE 254) TRUE 255) TRUE 256) FALSE 257) FALSE 258) FALSE 259) TRUE 260) FALSE 261) TRUE 262) TRUE 263) TRUE 264) FALSE 265) TRUE 266) TRUE 267) TRUE 268) FALSE 269) TRUE 270) FALSE 271) FALSE 272) FALSE 273) TRUE Version 1

81


274) FALSE 275) TRUE 276) FALSE 277) FALSE 278) TRUE 279) TRUE 280) TRUE 281) TRUE 282) TRUE 283) TRUE 284) TRUE 285) FALSE 286) FALSE 287) FALSE 288) FALSE

Version 1

82


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.