TEST BANK for Fundamentals of Information Systems 9th Edition by Ralph Stair and George Reynolds.

Page 1


TEST BANK for Fundamentals of Information Systems 9th Edition Ralph Stair; George Reynolds Chapter 1: An Introduction to Information Systems in Organizations 1. Information is simply a collection of raw facts such as an employee number or the total hours worked in a week. a. True

*b. False

2. Data represents real-world things including raw facts such as imageand

audio data. *a. True b. False

3. A set of random or unrelated tasks performed to achieve a definite

outcome is called a process. a. True

*b. False

4. The term data is used to label raw facts such as height and weightof a

patient. *a. True b. False

5. Reengineering and continuous improvement have the same definition. a. True

*b. False

6. A sustaining innovation is one that initially provides a lower levelof

performance than the marketplace has grown to accept. a. True

*b. False


7. The concept of a value chain is not significant to organizations

unless they manufacture products. a. True

*b. False

8. Over time, disruptive innovation tends to become less attractive tousers

in a new market. a. True

*b. False 9. Perceived usefulness and ease of use of a system influence an

individual’s attitude toward the system. *a. True b. False

10. The diffusion of innovation theory states that adoption of any

innovation happens all at once for all members of the targeted population. a. True

*b. False

11. The diffusion of innovation theory can be useful in planning the

rollout of a new information system. *a. True b. False

12. The activities that lead to getting the right product into the right

consumer's hands in the right quantity at the right time at theright cost are known as value chain management. a. True

*b. False

13. Opportunities in information systems are available to people from

different parts of the world.


*a. True b. False

14. The role of a systems analyst is narrowly defined and seldom

involves communications with others. a. True

*b. False 15. The information systems operations group is responsible for the

day-to-day running of IS hardware to process the organization’s information systems workload. *a. True b. False 16. The successful implementation for change only happens when people accept the need for change and believe that it will improve factors such as productivity and/or customer satisfaction. *a. True b. False

17. "Adapting" is the second stage in Lewin's Change Model, which

involves learning new work methods, behaviors, and systems. a. True

*b. False

18. According to Lewin's Change Model, an organization must

deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job. *a. True b. False

19. Today, many organizations can function and compete effectively

without computer-based information systems. a. True

*b. False


20. For someone to be a good CIO, technical ability is the most

important characteristic. a. True

*b. False

21. One of the primary roles of a senior IS manager is to communicate

with other areas of the organization to determine changing business needs. *a. True b. False 22. A feedback mechanism is an optional component of an information

system. a. True

*b. False

23. An organization's technology infrastructure includes all of the

hardware, software, databases, networks, people, and procedures that are configured to collect, manipulate, store, and process data into information. *a. True b. False

24. Cole has just landed a job as a sales representative in a department

store. Nina is teaching him the set of steps he should follow to ring up, take payment for, and bag a purchase for a customer.Cole is learning a procedure. *a. True b. False 25. The process of defining relationships among data to create useful

information requires . a. an information system b. a formal education

*c. knowledge


d. intuition 26. A clothing store chain tracks the sale of each product at each location.

Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is . *a. flexible b. economical c. relevant d. verifiable 27. The value of information is directly linked to how it helps decision

makers achieve their organization’s . a. cost/profit target

*b. goals c. cost reduction initiatives d. customer satisfaction levels 28. In terms of information systems, Wikipedia would be an example of

.

a. a personal IS

*b. a group IS c. an enterprise IS d. an organizational complement 29. Which of the following is NOT an organizational complement? a. well-trained workers b. system support c. new decision rights

*d. familiar processes 30. To keep information beyond reach of unauthorized users is to keep the

information *a. secure b. economical c. simple d. verifiable

.


31. Harrison works at a nationally known grocery store chain. He is

analyzing sales data from the past five years to determine which lowselling products should be discontinued. Harrison is most likely a(n) . *a. data scientist b. end user c. knowledge worker d. top executive

32. Providing value to a

is the primary goal of any organization.

*a. stakeholder b. product c. competitor d. service 33. In a manufacturing organization, the supply chain is a key value

chain whose primary activities include all of the following EXCEPT: a. inbound logistics

*b. finance and accounting c. marketing and sales d. customer service 34. The idea of

is a form of innovation that constantly seeks ways to improve business processes and add value to products and services. a. reengineering b. process redesign c. disruptive change *d. continuous improvement 35. The performance levels of radically new 'high-tech' products usually

improve with newer versions. Such types of products are known as a. sustaining innovations b. continuous improvement

*c. disruptive innovations d. business reengineering 36. Which of the following theories explains how a new idea or product

gains acceptance and spreads through a specific population or subset of an


organization? *a. diffusion of innovation theory b. contingency theory c. public choice theory d. two-factor theory 37. In a supply chain,

involve the transformation, movement, and storage of supplies and raw materials. a. virtual flows b. matrix flows c. information flows

*d. physical flows is a visa program that allows skilled employees from foreign lands into the United States. 38.

a. L-1B

*b. H-1B c. 4F d. G-5 are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, and preparing input and output. 39.

a. Data-entry operators

*b. System operators c. Web operators d. Local area network operators 40. encompasses all the activities required to get the right product into the right consumer’s hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. *a. Supply chain management b. Value chain management c. Inventory management d. Customer management 41. Suppose you are assigned to manage a virtual team. Which of the

following will you NOT do? a. define goals, and set expectations


b. be aware of team members cultural sensitivity c. ensure the team members are familiar with each other at a personal

level *d. hold team meetings regularly - whether the team members like it or not 42. Suppose, you need to advise someone about getting a certification.

Which of the following will be appropriate advice? a. Getting certification is a sure way of improving your income

*b. Certifications are vendor-specific c. Certifications are the same as courses offered at universities d. You need a college degree before you can take a certification exam 43. All of the following are positive driving forces that influence chance

according to Lewin's Theory of Force Field Analysis, EXCEPT: a. beliefs

*b. past performance c. expectations d. cultural norms 44. According to the diffusion innovation theory, are the risk takers,

always the first to try new products and ideas. a. early majority b. late majority c. early adopters

*d. innovators 45. Which of the following is NOT one of the four main components in

Leavitt's Diamond? a. people *b. systems c. tasks d. technology 46. Positive outcomes of continuous improvement include a. increased customer loyalty b. increased customer satisfaction c. protection against competitors

*d. all of these

.


47. According to Lewin and Schein's 3-stage model of organizational

change, which of the following tasks would be found in the 'unfreezing' stage? a. Monitor progress against success criteria b. Establish controls to ensure change is occurring c. Establish processes and systems to institutionalize change

*d. Assign leaders and implementation team

48. Suppose you work at a business unit that has group of people who

would rather wait to try a new technique. They listen to and follow the opinion leaders. They would be classified as the . a. innovators b. early adopters

*c. early majority d. late majority 49. You might be an information systems worker if you . a. prefer a slow-paced environment, where technology rarely changes b. prefer to work only on the computer and are not interested in the

business *c. enjoy learning new techniques and enjoy working with people d. are good in book-keeping, like an accountant 50. In most large organizations, the IS department is divided into the

following functions . a. operations and development

*b. operations, development, and support c. operations and support d. systems, operations, and development 51. Important functions of the chief information officer include a. employing an IS department's equipment and staff to help the

organization reach its goals b. monitoring the financial considerations of the IS department, such as return on investment c. ensuring the organization complies with laws and regulations


*d. all of these 52. In a large IS organization, the professional who is responsible for

maintaining the security and integrity of the organization's systems and data is . a. the data center manager b. the data security manager c. the system security operator

*d. the information systems security analyst 53. Which of the following is NOT a task typically associated with the

systems analyst role? a. conveying system requirements to software developers and network

architects b. troubleshooting problems after implementation

*c. collaborating with others to build a software product from scratch d. choosing and configuring hardware and software 54. One method an IS professional might use to find a new job would be a. seeking referrals from colleagues, friends, and family members b. searching and applying for open positions on Internet job sites c. networking through an IS professionals' organization

*d. all of these 55. Which of the following is NOT one of the functions of a

computer-based information system? a. collect data b. store data

*c. apply data d. process data 56. Calligraph Publishing Inc.'s information system allows its customers to

access the system to retrieve information on new releases, inventory levels, and more. This must be a .

.


a. personal IS b. group IS

*c. enterprise IS d. none of these answers is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision. 57.

Correct Answer(s): a. Knowledge

58. For each type of IS (personal, group, enterprise), there are that must

be in place to ensure successful implementation and use of the system. Correct Answer(s): a. organizational complements

59. An information system that improves the productivity of individual

users in performing stand-alone tasks is called a(n). Correct Answer(s): a. personal IS

60. A manufacturing facility has a series of activities that converts the

raw materials into valuable products. Such a series of activities make up the organization's chain. Correct Answer(s): a. value

61. A(n)

is a group of individuals whose members are distributed geographically, but who collaborate and complete work through the use of information systems technology. Correct Answer(s): a. virtual team

62. In any organization,

such as raw materials, labor, facilities,


equipment, and knowledge, are needed to transform them to outputs in a way that increases the input's value. Correct Answer(s): a. inputs

63. The radical redesign of business processes, organizational structures,

information systems, and values of an organization to achieve a breakthrough in business results is known as Correct Answer(s): a. reengineering

.

is a theory that proposes that every organizational system is made up of four main components—people, tasks, structure, and technology—with an interaction among the four components so that any change in one of these elements will necessitate a change in the other three elements. 64.

Correct Answer(s): a. Leavitt’s diamond

65. The attitude towards using an information system depends on its

perceived ease-of-use and perceived . Correct Answer(s): a. usefulness

66. In the technology acceptance model (TAM),

is defined as the degree to which individuals believe that use of the system will improve their performance. Correct Answer(s): a. perceived usefulness

67. Sarah, as the head of a business division, wants to set up a network

access account for a new employee. She should call the to get this done. Correct Answer(s): a. LAN administrator or b. Network administrator


68. A(n)

is a professional in a developmental group of an information systems department who assists in choosing and configuring hardware and software, matching technology to users’ needs, monitoring and testing the system in operation, and troubleshooting problems after implementation. Correct Answer(s): a. systems analyst design and set up databases to meet an organization’s needs.

69.

Correct Answer(s): a. Database administrators b. DBAs c. database administrators 70. The

group of a typical information systems organization is responsible for the day-to- day running of IS hardware to process the organization’s information systems workload. Correct Answer(s): a. operations

convert a program design developed by a systems analyst or software developer using one of many computer languages. 71.

Correct Answer(s): a. Programmers b. programmers

is a process for testing skills and knowledge, which results in a statement by the certifying authority that confirms an individual is capable of performing particular tasks. 72.

Correct Answer(s): a. Certification b. certification

73. Process redesign, which is also known as

, involves the radical redesign of business processes, organizational structures, information systems, and values. Correct Answer(s): a. business process reengineering


74. "Kaizen" is the Japanese word for

.

Correct Answer(s): a. continuous improvement 75. The

theory was developed by E.M. Rogers to explain how a new idea or product gains acceptance and diffuses (or spreads) through a specific population or subset of an organization. Correct Answer(s): a. diffusion of innovation

76. The first stage of Lewin's change model,

, means ceasing old habits and creating a climate that is receptive to change. Correct Answer(s): a. unfreezing

77. According to Leavitt's theory, in one aspect of the information system

element will necessitate changes in other elements also. Correct Answer(s): a. change

78. Laptops are a good example of

because they are gradually displacing desktop computers due to new and better performance characteristics. Correct Answer(s): a. disruptive innovation

79. Of the five categories of innovation adopters, are always the first

to try new products and ideas. Correct Answer(s): a. innovators

is the term used to describe the information systems and solutions built and deployed by departments other than the information 80.


systems department. Correct Answer(s): a. Shadow IT b. shadow IT c. Shadow Information Technology d. shadow information technology

81. Briefly distinguish among data, information, and knowledge.

Correct Answer: Data consists of raw facts, such as employee number or total hours worked in a week, an inventory part number, or the number of units produced on a production line.Information is a collection of facts organized and processed so that they have additional value beyond the value of individual facts. For example, a sales manager may want individual sales data summarized to see the total sales for the month. Providing information to customers can also help companies increase revenues and profits. Knowledge is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision. Having knowledge means understanding relationships in information. 82. Define the term value chain and briefly discuss the purpose of the supply chain component in a manufacturing organization. Correct Answer: The value chain is a series (chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased. In a manufacturing organization, the supply chain is a key value chain whose primary activities include inbound logistics, operations, outbound logistics, marketing and sales, and service. These primary activities are directly concerned with the creation and/or delivery of the product or service. There are also four main areas of support activities, including technology infrastructure, human resource management, accounting and finance, and procurement.

83. Explain the difference between sustaining and disruptive

innovation. Correct Answer: Sustaining innovation results in enhancements to existing products, services, and ways of operating. Such innovations are important as they enable an


organization to continually increase profits, lower costs, and gain market share. A disruptive innovation is one that initially provides a lower level of performance than the marketplace has grown to accept. Over time, however, the disruptive innovation is improved to provide some new performance characteristics and becomes more attractive to users in a new market. As it continues to improve and begins to provide a higher level of performance, it eventually displaces the former product or way of doing things.

84. Discuss the roles, functions, and careers in information systems(IS).

Correct Answer: Information systems (IS) offer many exciting and rewarding careers. Professionals with careers in information systems can work in an IS department or outside a traditional IS department as Web developers, computer programmers, systems analysts, computer operators, and many other positions. There are also opportunities for IS professionals in the public sector. In addition to technical skills, IS professionals need skills in written and verbal communication, an understanding of organizations and the way they operate, and the ability to work with people and in groups. Most medium to large organizations manage information resources through an IS department. In smaller businesses, one or more people might manage information resources, with support from outsourced services.

85. Describe both of Lewin's theories—change model and force field

analysis—and explain how they are related. Correct Answer: Lewin's change model proposes that organizational change goes through three stages: Unfreezing, which means ceasing old habits and creating a climate that is receptive to change; moving, which involves learning new work methods, behaviors, and systems; and refreezing, which involves reinforcing changes to make the new process accepted. Lewin went on to identify two types of forces that can influence these stages, which are explained in his theory of force field analysis. Driving (positive) forces are beliefs, expectations, and cultural norms that encourage change, while restraining (negative) forces make change difficult to accept or implement.


Chapter 2: Hardware and Software 1. Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time. *a. True b. False

2. RAM stands for random access memory; a form of memory that holds

itscontents even if the current is turned off or disrupted. a. True

*b. False

3. You have lots of images on your hard drive totaling 500 million

bytes. A 2 Gigabyte storage device will be adequate to store those photos *a. True b. False

4. Massively parallel processing systems are a form of multiprocessing

that speeds processing by linking hundreds or thousands of processors to operate at the same time. *a. True b. False

5. Secondary storage can store large amounts of data, instructions, and

information more permanently than allowed with main memory. *a. True b. False

6. Virtual tape technology can decrease data access time, lower the total

cost of ownership, and reduce the amount of floor space consumedby tape operations. *a. True b. False


7. In a typical computer configuration, secondary storage has a

much larger capacity than the volatile random access memory. *a. True b. False 8. Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips. a. True

*b. False

9. A liquid crystal display (LCD) functions by exciting organic

compounds with electric current to produce bright and sharp images. a. True

*b. False

10. Bioprinting, which uses 3D printers to build human parts and organs

from actual human cells, is widely considered to be unethical. a. True

*b. False

11. When dealing with large multinational or global organizations,

vendors often sell their software programs to the organizations butthen outsource the technical support to local, third-party distributors. *a. True b. False

12. The need for additional data storage capacity is one of the factors

driving the growth in data centers. *a. True b. False

13. Thin client computers are a type of portable single-user computers. a. True

*b. False


14. As the difference among computer manufacturers in the areas of price

and performance narrows, support for green computing is emergingas a new business strategy for these companies to distinguish themselves from the competition. *a. True b. False 15. The scope of green computing is limited to the efficient and environmentally responsible design and manufacture of all types of computers. a. True

*b. False

16. Some smartphones allow you to take notes and to "write" emails or text

messages by speaking into the phone. These are examples of speechrecognition technology. *a. True b. False 17. Depending on the brand of tablet you purchase, you may be able to

enter data by typing on a keyboard, writing on the screen with a stylus, or speaking into the tablet's microphone. *a. True b. False

18. An operating system is a set of programs that controls the computer

hardware and acts as an interface with applications. *a. True b. False

19. The operating system converts a basic user request into the set of

detailed instructions that the computer hardware requires, thus acting as an intermediary between the application and the hardware. *a. True b. False


20. The operating system’s application programming interface

(API) provides software developers with tools they use to build application software without needing to understand the inner workingsof the operating system and hardware. *a. True b. False

21. A

command-based user interface employs icons and menus that peopleuse to send commands to the computer system. a. True

*b. False 22. Most operating systems support virtual memory which allocates space

on the hard disk to supplement the immediate, functional memory capacity of RAM. *a. True b. False 23. If 10 users can run programs at the same time on the same computer,it

is known as multi-tasking. a. True

*b. False

24. Your friend has a Mac that runs OS X. If she needs to run a

Windows app on it, she can set it to run Windows also. *a. True b. False

25. Corporate executives often object to the use of open-source

software because it lacks formal technical support, even though information and solutions regarding the software are usually readily available online. *a. True b. False


26. An embedded system is a computer system that is implanted in and

dedicated to the control of another device. *a. True b. False 27. Utility programs help to perform maintenance, correct problems,

merge and sort sets of data, keep track of computer jobs, and compressdata files. *a. True b. False

28. The primary function of application software is to apply the power of

the computer to enable people, workgroups, and the entire enterpriseto solve problems and perform specific tasks. *a. True b. False 29. Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals. a. True

*b. False 30. Software as a Service (SaaS) allows businesses to subscribe to Web-

delivered business application software by paying a monthly service charge or a per use fee. *a. True b. False

31. Software as a Service (SaaS) refers to the use of computing resources,

including software and data storage, on the Internet ratherthan local computers. a. True

*b. False

32. A software suite is a collection of programs packaged together as a


bundle and typically includes a word processor, spreadsheet program, graphics program, and more. *a. True b. False 33. Suppose your friend, who is a small business owner, wants to

computerize her business functions such as accounting, payroll, and inventory management. She would need to purchase separate software to meet each functional requirement. a. True

*b. False

34. Each programming language has a set of rules, called the program

code of the language. a. True

*b. False

35. A single computer can be used by a single user or by multiple,

simultaneous users. *a. True b. False 36. An example of a common hardware function performed by the

operatingsystem is presenting information on a monitor or printer. *a. True b. False

37. Operating systems provide a measure of security by allowing usersto

access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial. a. True

*b. False

38. Utility programs are used to perform system maintenance, such as

repairing errors on a hard drive, improving system security, and optimizing sluggish system processes.


*a. True b. False

39. If a large organization wants software that will benefit the entire

organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required. a. True

*b. False

40. The use of virtual servers is growing rapidly because virtualization

can save millions of dollars per year in capital andoperating expenses. *a. True b. False

41. Software can be divided into two types: operating software and

application software. a. True

*b. False

Software that allows an individual to create a to-do list, take notes, and organize tasks in a database would be classified as having apersonal sphere of influence. 42.

*a. True b. False

43. A

is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services. a. data mart b. data warehouse

*c. data center d. data mine


44. A type of memory whose contents are not lost if the power is turned

off or interrupted is said to be . a. unarbitrary

*b. nonvolatile c. inaccessible d. nonadjacent is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem. 45.

a. Cloud computing

*b. Grid computing c. Parallel computing d. Web computing is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products. 46.

*a. Green computing b. Grid computing c. Cloud computing d. Utility computing 47. The component of a computer that provides the CPU with a

working storage area for program instructions and data is called the *a. main memory b. input/output device c. bus d. processor

.


48. Carson's supervisor has asked him to review a variety of portable

computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying? a. laptops b. notebooks

*c. nettops d. tablets 49.

is a storage technology that is primarily used only for backups. a. Magnetic disk b. Compact disc

*c. Magnetic tape d. Cache memory 50. 3D printing is

.

a. printing illusions on paper

*b. used to make solid products c. for kids to play with d. the same as 2D printing 51. A(n)

device provides data and instructions to the computer and receives results from it. a. back-side b. expansion c. internal

*d. input/output are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections. 52.

a. Magnetic Ink Character Recognition (MICR) devices

*b. Optical mark recognition (OMR) systems c. Speech recognition devices d. Optical character recognition (OCR) systems 53. Helen is 72 years old and is a retired school teacher on a fixed income.

She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is


that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) . a. smartphone b. e-book c. desktop *d. nettop are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor. 54.

a. Desktops b. Netbooks

*c. Workstations d. Notebooks 55. A

is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities. a. nettop computer b. cloud computer

*c. thin client d. workstation are the most powerful computers with the fastest processing speed and highest performance. 56.

a. Blade servers b. Workstations c. Mainframe computers

*d. Supercomputers 57. CPU clock speed is the

at a predetermined rate.

a. number of instructions processed

*b. number of electronic pulses created c. number of files created d. number of memory pages loaded 58. Which of the following types of credit cards is currently diminishing in

popularity and being replaced by the other three types?


*a. magnetic stripe b. chip card c. smart card d. contactless payment card 59. Which of the following is NOT an example of a common use of a

point-of-sale (POS) device? a. A server in a restaurant uses a POS to communicate a diner's order

to the kitchen. b. A nurse in a hospital uses a POS to enter a patient's vital signs into his records. c. A barrista in a coffee store uses a POS to record a sale of some bakery items. *d. A teller in a bank uses a POS to withdraw money for a customer. 60. An information system that operates in the

sphere of influence supports two or more people who work together to achieve a common goal. a. personal

*b. workgroup c. enterprise d. social 61. An operating system with capabilities allows a user to run more than

one program concurrently. a. networking b. hardware independence c. memory management

*d. multitasking 62. The

is the heart of the operating system and controls its most critical processes. a. user interface b. register

*c. kernel d. cache is an open-source operating system whose source code is freely available to everyone. 63.


*a. Linux b. Mac OS X c. Chrome d. Unix 64. Which of the following statements is NOT true about a mainframe

computer? *a. A single computer with a single user istypical of a mainframe computer. b. A mainframe computer provides the computing and storage

capacity to meet massive data processing requirements. c. A mainframe computer offers users high performance and excellent system availability. d. A wide range of application software has been developed to run in the mainframe environment.

65. New cars come with an onboard computer that controls anti-

lock brakes, air bag deployment, fuel injection, etc. The software is known as . a. a multi-user system

*b. an embedded system c. an enterprise system d. mobile application software 66. Today’s mobile phones and some PCs use a touch user interface

called a allow people to control the personal computer.

to

a. multiprocessing user interface b. command-based user interface c. speech recognition user interface

*d. natural user interface 67. One of the disadvantages of proprietary software is that

.

a. it is hard to control results even if one is involved in the

development of software *b. it can take a long time and significant resources to develop the required software features c. it does not allow modification of featuresthat one might need


to counteract an initiative by competitors d. it is difficult to achieve what is required in terms of features and reports 68. One of the advantages of off-the-shelf software is that

.

a. an organization does not have to pay for features that are not

required and never used b. the software always matches current work processesand data standards *c. the initial cost is lower because the software firm can spread the development costs over many customers d. the software contains important features, thuseliminating the need for future modification and customization 69. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called . a. cloud computing b. rapid application development

*c. service-oriented architecture d. Software as a Service 70. One advantage of proprietary software versus off-the-shelf software is

that

.

a. the initial cost is lower b. the software is likely to meet the basic business needs that

are common across organizations c. the software is likely to be of high quality because many customer firms have tested the software and helped identify its bugs *d. the software provides a company a competitive advantage by solving problems in a unique manner

is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. 71.

a. Word processing b. Desktop Publishing (DTP)


*c. Spreadsheet d. Graphics 72. A global positioning system (GPS) device uses a(n) to help people

find their way around town or more remote areas. a. user software b. integrated development environment c. personal productivity software

*d. embedded system 73. All of the following are examples of someone using personal productivity

software EXCEPT

.

a. Shawna creating an electronic to-do list for the weekend b. Mark entering appointments into his online calendar

*c. Callie entering a customer's order into a restaurant's ordering system d. Brandon recording the number of miles he's run each day on his exercise tracker 74. All of the following are examples of activities performed by an operating system EXCEPT . a. allowing a user to manage system memory b. allowing a user to control common computer hardware functions c. allowing a user to manage files

*d. allowing a user to do word processing 75. Kendra is taking a class in Finance and she has been asked to give a

speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides? a. word processing b. database c. spreadsheet analysis

*d. presentation graphics 76. Globally, spending on now exceeds other categories of IT expenditures. a. hardware


*b. software c. servers d. operating systems 77. Which of the following is a smart way to reduce the impact of

software bugs on your own computing? a. Register the software programs you buy so that you receive

bug alerts, fixes, and patches. b. Install the latest software updates c. Check the read-me files or online support Web site for patches and other solutions. *d. All of these answers 78. Clock speed of the central processing unit (CPU) is often measured

in billions of cycles per second also known as

.

Correct Answer(s): a. gigahertz

79. The ability to increase the processing capability of a computer system

so that it can handle more users, more data, or more transactions in a given period is known as . Correct Answer(s): a. scalability

80. Key to the success of grid computing is a(n)

that acts as a grid

leader and traffic monitor. Correct Answer(s): a. central server

81. Eight bits together form a(n)

.

Correct Answer(s): a. byte

82. A(n)

is a direct access storage device that is used to store and retrieve data from rapidly rotating disks coated with magnetic material. Correct Answer(s):


a. hard disk drive (HDD)

83. A universal serial bus (USB)

drive is one example of a commonly used solid state secondary storage device (SSD). Correct Answer(s): a. flash

84. Optical mark recognition (OMR) and optical character recognition

(OCR) are the two categories of a(n) . Correct Answer(s): a. optical data reader

is the simultaneous execution of the same task on multiple processors to obtain results faster. 85.

Correct Answer(s): a. Parallel computing b. parallel computing

is a technology that employs a microchip with an antenna to broadcast its unique identifier and location to receivers. 86.

Correct Answer(s): a. Radio frequency identification (RFID) b. RFID c. radio frequency identification

87. If you would like a portable computer that has a roughly 13-inch

screen, keyboard, and a pointing device, choose a computer. Correct Answer(s): a. laptop

88. A(n)

is a climate-and-access-controlled building, or set of buildings, that houses the computer hardware that delivers an organization’s data and information services. Correct Answer(s): a. data center


input devices, such as Nintendo's Wii remote and PlayStation's Move game controllers, have become very popular in the gaming industry. 89.

Correct Answer(s): a. Motion-sensing b. motion-sensing

90. One common use of a

is in engineering design, when designers need to make a prototype, or model, of the object they're designing. Correct Answer(s): a. 3D printer

91. For most companies, the spheres of influence are

, workgroup, and

enterprise. Correct Answer(s): a. personal

92. A(n)

is a defect in a computer program that keeps it from performing as its users expect it to perform. Correct Answer(s): a. software bug b. bug

programming language is the precursor to languages such as C++, C#, and Java. Correct Answer(s): a. C 93.

94. A(n)

is a set of programming instructions and standards for one software program to access and use the services of another software program. Correct Answer(s): a. application programming interface (API)


95. Being able to develop software without concern for the specific

underlying hardware is referred to as . Correct Answer(s): a. hardware independence

works by swapping programs or parts of programs between memory and one or more disk drives. 96.

Correct Answer(s): a. Virtual memory

software addresses the needs that are common across businesses, organizations, or individuals. 97.

Correct Answer(s): a. Off-the-shelf b. Off the shelf c. Package d. Packaged e. Mass-produced f. Mass produced

98. Your business manager wants to be able to integrate multiple

business applications. The integration software is typically known as . Correct Answer(s): a. Middleware 99. Office workers have the need for a word processor, spreadsheet

program, database program, and graphic presentations software. A package that combines all these software programs is known as a(n) . Correct Answer(s): a. software suite b. office suite c. application suite


100.

is a set of rules associated with a programming language. Correct Answer(s): a. Syntax

101. Mac users can set up their computers to run both Windows and Mac

OS X and select the platform they want to work with when they boot their computers. This is called dual . Correct Answer(s): a. booting

102. Organizations that run hundreds or even thousands of servers in a

server farm are naturally concerned about for low-cost, renewable energy sources.

, which is why they're looking

Correct Answer(s): a. power usage b. power c. performance per watt

103. The ethical imperative that "care must be taken when recycling or

destroying electronic devices to avoid contaminating the environment" is associated with . Correct Answer(s): a. green computing

104. Lara recently purchased the Microsoft Office Suite for her own use on

her laptop. She has not really purchased the software but rather a

.

Correct Answer(s): a. single-user license

105. Explain the primary difference between random access

memory(RAM) and read-only memory (ROM). Correct Answer: RAM chips are volatile storage devices, meaning they lose their contents if


the current is turned off or disrupted (as happens in a power surge, brownout, or electrical noise generated by lightning or nearby machines). ROM is nonvolatile meaning that its contents are not lost if the power is turned off or interrupted. 106. What is grid computing? How does it work?

Correct Answer: Grid computing is the use of a collection of computers, often owned by many people or organizations, to work in a coordinated manner to solve a common problem. Key to the success of grid computing is a central server that acts as a grid leader and traffic monitor. This controlling computer divides the computing task into subtasks and assigns the work to computers on the grid that have (at least temporarily) surplus processing power. The central server also monitors the processing, and if a member of the grid fails to complete a subtask, it will restart or reassign the task. When all the tasks are completed, the controlling server combines the results and advances to the next task until the whole job is completed.

107. Distinguish between systems software and applications software.

Correct Answer: Systems software is the set of programs designed to coordinate the activities and functions of the hardware and various programs throughout the computer system. Applications software consists of programs that help users solve particular computing problems.

108. What is the sphere of influence? Identify three spheres of

influence. Correct Answer: One useful way of classifying the many potential uses of information systems is to identify the scope of the problems and opportunities that the system is designed to address. This scope is called the sphere of influence. For most companies, the spheres of influence are personal, workgroup, and enterprise. The personal sphere of influence concerns the needs of individual users. The workgroup sphere of influence addresses the needs of two or more people who work together to achieve a common goal. The enterprise sphere of influence supports a firm in its interaction with customers, suppliers, shareholders, competitors, special-interest groups, the financial community, and government agencies.


109. Distinguish between multitasking and multithreading.

Correct Answer: Multitasking allows more than one program to run concurrently on an operating system. Multithreading allows different threads of a single program to run concurrently. A thread is a set of instructions within an application that is independent of other threads.

110. Discuss three disadvantages of using proprietary software.

Correct Answer: It can take a long time and significant resources to develop the required features. In-house system developers may become hard pressed to provide the required level of ongoing support and maintenance because of pressure to move on to other new projects. The features and performance of software that has yet to be developed presents potential risk. 111. Discuss the growth in mobile application software.

Correct Answer: The number of applications (apps) for smartphones and other mobile devices has exploded in recent years. Besides the valuable mobile apps that come with these devices, hundreds of thousands of applications have been developed by third parties. For example, iPhone users can download and install thousands of apps using Apple’s App Store. Over 1 million mobile apps are available at the Google Play site for users of Android handsets. Microsoft and other software companies are also investing in mobile apps for devices that run on their software.


Chapter 3: Database Systems and Big Data 1. A database, a database management system, and the application programs that use the data, make up a database environment. *a. True b. False

2. A field is typically a name, number, or combination of charactersthat

describes an aspect of a business object. *a. True b. False

3. A collection of data fields that are all related to one object,activity,

or individual is called a file. a. True

*b. False

4. An attribute is a general class of people, places, or things forwhich

data is collected, stored, and maintained. a. True

*b. False

5. If "color" is an attribute, then "green" is a data item.

*a. True b. False

6. Two sets of fields can have a common primary key. a. True

*b. False 7. The database approach to managing data is superior to the file-based

approach. *a. True b. False


8. Today, most organizations use the traditional approach to data

management, where multiple information systems share a pool of related data. a. True

*b. False 9. DBMSs are used primarily for modeling data. a. True

*b. False

10. A database must reflect the business processes of an organization.

*a. True b. False

11. Two of the major challenges business users face when using big data

are finding the information they need to make decisions and knowing that the data they have is valid. *a. True b. False

12. An enterprise data model is created only for documentation, but is

otherwise inconsequential. a. True

*b. False

13. The relational model describes data using a standard tabular format; all

data elements are placed in three-dimensional tables calledrelations, which are the logical equivalent of files. a. True

*b. False

14. A relational model splits the information up into many two

dimensional data structures.


*a. True b. False

15. In the context of the relational database model, selecting involves

combining two or more tables. a. True

*b. False

16. In the context of the relational database model, projecting

involves eliminating columns in a table. *a. True b. False

17. One of the primary advantages of a relational database is that it allows

tables to be linked to reduce data redundancy and allow data tobe organized more logically. *a. True b. False 18. The relational database model is currently the most widely used.

*a. True b. False

19. A database management system (DBMS) serves as an interface

betweenan application program and a database. *a. True b. False

20. Some of the key factors in database design are content, access,

structure, archiving, and security. *a. True b. False


21. A database administrator (DBA) is an important nontechnical

position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases inan organization. a. True

*b. False

22. A database administrator (DBA) must have a clear understanding of

the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. *a. True b. False

23. Unstructured data comes from sources such as word-

processing documents and scientific research. *a. True b. False

24. Suppose a manager wishes to analyze historical trends in sales. He

would use the online transaction processing (OLTP) system. a. True

*b. False

25. For each data item, a data dictionary usually contains informationsuch

as the name of the data item, the range of values that can be used, and the amount of storage needed for the item. *a. True b. False

26. Data modeling usually involves setting a specific business goal andthen

analyzing the data and information needed to reach that goal. a. True


*b. False

27. Carlos is working with an existing database, but he wants to

eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database. *a. True b. False

28. Sometimes a database can contain "bad data," meaning incomplete,

incorrect, inaccurate, or irrelevant records, which can be corrected ordeleted through data cleansing. *a. True b. False

29. Organizations can collect many types of data from a wide variety of

sources, but typically they only collect structured data that fits neatly into traditional relational database management systems. a. True

*b. False

30. Which of the following statements is true of a database? a. It is accessed primarily for use by an organization’s database

administrator and data administrator. b. It provides an essential foundation for an organization’s knowledge management and artificial intelligence systems. c. It is a collection of unstructured data. *d. It helps companies analyze information to open new market opportunities. 31. The smallest piece of data used by a computer is a(n) a. entity b. byte

*c. bit d. character

.


32. A database is a collection of integrated and related

.

a. fields b. attributes c. records

*d. files 33. A collection of fields all related to a single object, activity, or individual

is a(n)

.

*a. record b. file c. attribute d. character 34. A(n)

is a field or set of fields in a record that uniquely identifies the

record. a. attribute b. entity

*c. primary key d. data item is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization. 35.

a. Data selecting

*b. Enterprise data modeling c. Data cleansing d. Social graph analysis 36. Each attribute in a relational database model can be constrained to a range of allowable values called a . a. bandwidth b. scope c. slot

*d. domain 37. The action of including only some columns for output while retrieving

data is known as .


a. selecting b. joining

*c. projecting d. linking 38. For the

operation, it is required that the the two tables have a common

attribute. a. delete b. select c. project

*d. join 39. In the

process, all of the data from various sources is converted into a single format suitable for processing. *a. extract b. transform c. load d. consolidate is a special-purpose programming language for accessing and manipulating data stored in a relational database. 40.

a. Query by Example (QBE) b. Access

*c. Structured Query Language (SQL) d. Java 41. Suppose you wish to find what tables are in a database, what fields they

have, and how they are related you would review the

.

a. SQL commands b. attributes

*c. schema d. sample data 42. A

is a collection of instructions and commands used to define and describe data and relationships in a specific database. a. data dictionary b. schema

*c. data definition language


d. data manipulation language 43. The position of a

is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization. a. data analyst

*b. data administrator c. database administrator d. data owner 44. You would use Query by Example, if

.

*a. you wish to use a visual approach to query building b. you build a query from an example c. you use a template for reports d. wish teach SQL with examples , the database is stored on a service provider’s server and accessed by the client over a network, typically the Internet. 45. With

a. Internet access

*b. Database as a Service c. Software as a Service d. Oracle is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling. 46.

a. Data warehouse b. Data mart

*c. Big data d. Knowledge base 47. Starting from monthly sales data, if you wish to get weekly sales data, use the feature. a. roll up

*b. drill down c. slice and dice d. extract data


48. A

is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making. a. data dictionary b. data model

*c. data mart d. data mine 49. Suppose a new tech startup wants to define the data model. They would

then

.

a. collect and cleanse the data b. define user access privileges

*c. create the entity-relationship model d. acquire a new database management system 50. After entering data into a relational database, users can make all of the

following basic data manipulations except: a. projecting

*b. organizing c. selecting d. joining 51. To ensure reliability and integrity, SQL databases conform to four

specific properties. Which of the following is NOT one of those four properties? a. atomicity b. durability c. isolation

*d. currency 52. Haley's employer has asked her to review tens of thousands of social

media posts about their company's products and compile this data into a database. In terms of the characteristics of big data, Haley is dealing with a. volume

*b. variety

.


c. velocity d. veracity 53. Kyle works for National Sporting Goods, where he manages critical

data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a . *a. data steward b. data administrator c. database administrator d. data manager 54. At Coast-to-Coast Moving and Van Lines, Ryan is responsible for

managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in . a. data stewardship

*b. data lifecycle management c. database administration d. data management 55. Most of the data that an organization must deal with is

data,

meaning that it is not organized in any predefined manner. Correct Answer(s): a. unstructured

56. mySQL is a popular

.

Correct Answer(s): a. Database management system b. DBMS c. database program d. database software

57. Together, bits, characters, fields, records, files, and databases form the

Correct Answer(s): a. hierarchy of data

58. If you wish to develop expertise in database management, you must

learn popular language known as

.

.


Correct Answer(s): a. SQL b. Structured query language c. system query language

59. A(n)

is a field or set of fields that uniquely identify a record.

Correct Answer(s): a. primary key

60. The

model database makes it easy to develop queries that involve joining two tables. Correct Answer(s): a. relational

61. Data modeling done at the level of an entire enterprise is called

.

Correct Answer(s): a. enterprise data modeling

use basic graphical symbols to show an organization of and relationships between data. 62.

Correct Answer(s): a. Entity-relationship (ER) diagrams

63. The

model has become the most popular database model.

Correct Answer(s): a. relational

64. In the relational database model, each row of a table represents a(n)

Correct Answer(s): a. entity b. entity instance

65. Oracle, IBM DB2, Microsoft SQL Server, Microsoft Access,

MySQL, and Sybas are databases based on the

model.

.


Correct Answer(s): a. relational 66. In a relational database model, the range of allowable values for a data attribute is called its . Correct Answer(s): a. domain

67. In a relational database model,

involves combining two or more tables.

Correct Answer(s): a. joining

is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database. 68.

Correct Answer(s): a. Data cleansing

69. Suppose we have a table that stores student data. In that table we have a

field - Student ID - that uniquely identifies each student. This field is known as the . Correct Answer(s): a. primary key b. key field

70. A(n)

is a collection of instructions and commands used to define and describe data and relationships in a specific database. Correct Answer(s): a. data definition language (DDL)

71. A(n)

is a detailed description of all data used in a database.

Correct Answer(s): a. data dictionary

72.

is a method of dealing with a situation in which two or more


users or applications need to access the same record at the same time. Correct Answer(s): a. Concurrency control

73. A

provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases. Correct Answer(s): a. noSQL database

74. The

is a specific language, provided with a database management system (DBMS) that allows users to access and modify the data, to make queries, and to generate reports. Correct Answer(s): a. data manipulation language (DML)

75. A major advantage of NoSQL databases is the ability to spread data

over multiple servers so that each server contains only a subset of the total data, a characteristic that is known as

Correct Answer(s): a. horizontal scaling capability

76. A(n)

is an individual responsible for defining and implementing consistent principles for a variety of data issues. Correct Answer(s): a. data administrator

77. In the context of a database management system (DBMS), a(n)

interacts with other programs or applications and only indirectly interacts with people or users. Correct Answer(s): a. back-end application

78. A(n)

is a database management system that stores the entire


database in random access memory (RAM). Correct Answer(s): a. in-memory database (IMDB)

79. While building a data warehouse, you are converting dates to months.

This second step in the ETL process is known as . Correct Answer(s): a. Transform b. transformation

80. If an organization is taking a "store everything" approach to data, it will

save all the data in its raw and unaltered form in a . Correct Answer(s): a. data lake

is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. 81.

Correct Answer(s): a. Hadoop

82. Briefly describe the hierarchy of data.

Correct Answer: Data is generally organized in a hierarchy that begins with the smallest piece of data used by computers (a bit) and progresses through the hierarchy to a database. A bit (a binary digit) represents a circuit that is either on or off. Bits can be organized into units called bytes. A byte is typically eight bits. Each byte represents a character, which is the basic building block of most information. Characters are put together to form a field. A field is typically a name, number, or combination of characters that describes an aspect of a business object or activity. A collection of data fields all related to one object, activity, or individual is called a record. A collection of related records is a file. At the highest level of the data hierarchy is a database, a collection of integrated and related files. Together, bits, characters, fields, records, files, and databases form the hierarchy of data.


83. Briefly describe the relational database model.

Correct Answer: The relational database model describes data using a standard tabular format; all data elements are placed in two-dimensional tables called relations, which are the logical equivalent of files. The tables in relational databases organize data in rows and columns, simplifying data access and manipulation. In the relational model, each row of a table represents a data entity or record. Each column represents an attribute or field. After entering data into a relational database, users can make inquiries and analyze data through use of the selecting, projecting, and joining functions. Selecting involves removing rows according to certain criteria. Projecting involves eliminating columns in a table. Joining involves combining two or more tables.

84. Explain entity-relationship (ER) diagrams.

Correct Answer: Entity-relationship (ER) diagrams use basic graphical symbols to show an organization of and relationships between data. In other words, ER diagrams show data items in tables (entities) and the ways they are related. ER diagrams help ensure that the relationships among the data entities in a database are correctly structured so that any application programs developed are consistent with business operations and user needs. In addition, ER diagrams can serve as reference documents after a database is in use. If changes are made to the database, ER diagrams help design them. 85. Define the role of a database administrator and of a data

administrator, and explain the difference between the two. Correct Answer: Based on their understanding of business users' needs, database administrators apply database programming languages to craft a set of databases to meet those needs. Database administrators are also responsible for testing, evaluating, changing, improving, securing, monitoring, and maintaining those databases. DBAs focus on creating and maintaining databases, while the data administrator, on the other hand, focuses on how the databases are used within the organization. A data administrator defines and implements consistent principles for a variety of data issues, and works with managers to identify who is able to read and update the databases.

86. Define the terms data management and data governance, and explain


how organizations are using them to address the challenges of big data. Correct Answer: Big data presents many challenges to organizations trying to use this information to make sound business decisions. There is a tremendous volume of data now available, and it comes from a variety of structured and unstructured sources. Many people are concerned about the ethical and legal issues related to acquiring and retaining so much data—much of it very personal in nature— as well as the security risks involved. Organizations are now expected to comply with a lot of new legislation related to big data. As a result, many organizations have placed a high priority on data management, meaning the integrated set of functions that defines the processes by which data is obtained, certified, stored, secured, and processed. The goal is to ensure accessibility, reliability, and timeliness. Data governance is the core component of data management, as it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization. Data governance puts people in place who are responsible for fixing and preventing issues with data.


Chapter 4: Networks and Cloud Computing 1. The United States has high Internet penetration among its population constituting the majority of people online. a. True

*b. False

2. The Internet is the infrastructure on which the Web exists.

*a. True b. False

3. Sensors that can monitor and report on data about traffic and parking

conditions are part of a network of physical objects known asthe Internet of Technology. a. True

*b. False

4. The Transmission Control Protocol (TCP) is responsible for managing

IP addresses and Internet domain names. a. True

*b. False 5. Cascading Style Sheets (CSS) use special Hypertext Markup Language

(HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a Web page. *a. True b. False

6. Like other programs, Java software can run only on specific types of

computers. a. True

*b. False

7. Organizations that are concerned about the security of their data

should not use public cloud computing.


*a. True b. False

8. JavaScript can be used to validate data entry in a Web form.

*a. True b. False


9. Twitter is a microblogging service.

*a. True b. False

10. A podcast is a video broadcast over the Internet. a. True

*b. False

11. Video content can be placed on the Internet using the same approach as

a blog. *a. True b. False

12. There is no way a manufacturing firm would implement an Internet of

Things because the risk of hacking is far too high. a. True

*b. False

13. Businesses and organizations that manage a local area network (LAN)

connect to the Internet via a Web browser. a. True

*b. False

14. The Internet is a hyperlink-based system that uses a

client/server model. a. True

*b. False

15. In a Hypertext Markup Language (HTML), the markers are codes

thattell the browser how to format the text or graphics that will be displayed.


a. True

*b. False

16. A telecommunications protocol is any material substance that

carries an electronic signal to support communications between a sending and receiving device.


a. True

*b. False

17. The Institute of Electrical and Electronics Engineers (IEEE) is a

leading standards-setting organization whose IEEE network standards are the basis for many telecommunications devices and services. *a. True b. False

18. 4G will deliver 3 to 20 times the speed of 3G networks for mobile

devices. *a. True b. False

19. A personal area network (PAN) is a wireless network that connects

information networking devices within a small area, such as an office, home, or several floors of a building. a. True

*b. False 20. A wide area network (WAN) is a telecommunications network that

connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits. a. True

*b. False

21. A client is any computer on a network that sends messages

requesting services from the servers on the network. *a. True b. False

22. Network management software is a system software that controls the

computer systems and devices on a network and allows them to communicate with each other.


a. True

*b. False 23. A virtual private network (VPN) supports a secure, encrypted

connection between a company’s employees and remote users through athird-party service provider.


*a. True b. False

24. When you use your lab computer to access a printer, you are usingthe

local area network (LAN). *a. True b. False

25. When you point the remote control to turn on/off the TV, the remoteis

using radio frequency. *a. True b. False

26. The ancestor of the Internet was . a. TCP/IP

*b. the ARPANET c. Telnet d. Web 1.0 is a communication standard that enables computers to route communications traffic from one network to another as needed. 27.

a. The ARPANET b. A Uniform Resource Locator (URL)

*c. The Internet Protocol (IP) d. A Wi-Fi 28. The fiber-optic cables that span the globe over land and under sea make

up the Internet . a. ultrastructure

*b. backbone c. layer d. protocol 29. The Internet is migrating to Internet Protocol version 6 (IPv6), which

uses addresses to provide for many more devices.


a. 32-bit b. 64-bit

*c. 128-bit


d. 256-bit

consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. 30.

*a. The Web b. A tag c. A cache d. The motherboard 31. Which of the following is a markup language for defining the visual

design of a Web page or group of pages? a. JavaScript

*b. Cascading Style Sheets (CSS) c. Java d. Extensible Markup Language (XML) 32. The Internet Corporation for Assigned Names and Numbers

(ICANN) uses companies called registering domain names.

to handle the business of

a. registry operators

*b. accredited domain name registrars c. network information centers d. independent domain name registries 33. Domain names must always have at least

parts, with each part

separated by a dot (period). *a. two b. three c. four d. five refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. 34.

a. Grid computing b. Distributed computing c. Utility computing


*d. Cloud computing


is the standard page description language for Web pages.

35.

a. Extensible Markup Language (XML) b. JavaScript c. .NET

*d. Hypertext Markup Language (HTML) 36.

is a markup language designed to transport and store data on the Web. a. Standard Generalized Markup Language (SGML)

*b. Extensible Markup Language (XML) c. Hypertext Markup Language (HTML) d. Hypermedia/Time-based Structuring Language (HyTime)

consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes. 37.

a. Web browsers

*b. Web services c. Hyperlinks d. Web forms 38. Java allows small programs, called

, to be embedded with an Hypertext Markup Language (HTML) document. a. cookies b. subroutines

*c. applets d. packets 39. A

is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. a. cookie b. server c. Web portal

*d. search engine 40. Web client software, such as Chrome, Firefox, Internet Explorer,


Safari, and Opera, that are used to view Web pages are known as a. Web portals

*b. Web browsers

.


c. Web analytics software d. search engines is a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results. 41.

a. Web content streaming

*b. Search engine optimization c. Tunneling d. Internet censorship is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards. 42.

a. Microwave transmission b. Wireless mesh

*c. Near field communication (NFC) d. Wi-Fi 43. In a

, all network devices are connected to a common backbone that serves as a shared communications medium. a. star network

*b. bus network c. ring network d. mesh network 44. The area covered by one or more interconnected wireless access points

is commonly called a(n) . a. reception area

*b. hot spot c. coverage zone d. access area 45. A

satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles. a. very small aperture terminal (VSAT) b. microwave

*c. low earth orbit (LEO) d. geostationary


46. A

network is one in which all network devices are connected to one another through a single central device called the hub node. a. mesh b. personal c. bus

*d. star 47. A

is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. *a. metropolitan area network (MAN) b. local area network (LAN) c. wide area network (WAN) d. personal area network (PAN) 48. Which of the following statements is true of network-management

software? a. One of the disadvantages of network-management software is

the large amount of time spent on routine tasks. *b. With network-management software, a manager on a networked personal computer can scan for viruses. c. Network-management software allows software to be copied, modified, or downloaded legally or illegally. d. Network-management software complicates the process of updating files and programs on computers on the network.

49. When you connect your computer to a printer using , the distance

between them cannot be longer than 30 feet. *a. Bluetooth b. Wi-Fi c. near field communication d. infrared 50. When you are looking for a 'hotspot', you are searching for .

*a. a wireless access point b. bluetooth signals c. free charging stations


d. strong satellite signals

51. Which of the following systems can help identify your geolocation?


a. Geographic information systems b. Extranets c. VPNs

*d. GPS 52. If your home air conditioner has an IP address, it is part of the

.

a. satellite communication network b. virtual private network

*c. Internet of Things d. satellite communication network 53. Suppose a business wishes to have access to servers, and storage

devices, but does not want to buy them. What is their best choice? a. Internet of Things

*b. cloud computing - infrastructure as a service c. cloud computing - software as a service d. cloud computing - platform as a service 54. You wish to learn a programming language that can be used on

any computer. What language would it be? a. php b. JavaScript

*c. Java d. ASP.Net 55. Liesel is an entrepreneur, and she'd like to publish a website for her small

business. Liesel . a. will need her own server and IT people to run the server

*b. can use hosting services c. will need to learn Java d. will need to run her own web server on leased servers 56. Social journalism or citizen journalism . a. is accurate most of the time

*b. may not be as reliable as mainstream media sources c. is where everyone gets their news feeds d. is a good source for mostly facts


57.

is a good site to develop your professional network. *a. LinkedIn b. Facebook c. Google d. Twitter

58. The world-wide-web uses protocol for transmitting content.

*a. hyper-text transfer b. mail transfer c. uniform resource location d. domain name server is the control or suppression of the publishing or accessing of information on the Internet. 59.

Correct Answer(s): a. Internet censorship

60. The ARPANET was eventually broken into two networks: , which

included all military sites, and a new, smaller ARPANET, which included all the nonmilitary sites. Correct Answer(s): a. MILNET

61. Messages on the Internet are typically sent through one or more

to reach their destination. Correct Answer(s): a. routers

is the process by which virtual private networks (VPNs) transfer information by encapsulating traffic in Internet Protocol (IP) packets over the Internet. 62.

Correct Answer(s): a. Tunneling


63. The

is the primary method for interacting with the Internet.

Correct Answer(s): a. Hypertext Transfer Protocol (HTTP)


b. Hypertext Transfer Protocol c. HTTP

computing refers to deployments in which service providers offer their cloud-based services to the general public. 64.

Correct Answer(s): a. Public cloud

65. A(n) is an HTML code that tells the Web browser how to format

text—such as a heading, as a list, or as body text—and whether images, sound, and other elements should be inserted. Correct Answer(s): a. tag

is a popular programming language for client-side applications that enable a user to create interactive Web pages that respond to user actions. 66.

Correct Answer(s): a. JavaScript

67. Using

, Web users can jump between Web pages stored on various Web servers, creating the illusion of interacting with one big computer. Correct Answer(s): a. hyperlinks

68. The Uniform Resource Locator (URL) www.cengage.com is an

example of a(n) that identifies the Internet host site. Correct Answer(s): a. domain name

69. Web

such as Adobe Flash and Real Player, provide additional features to standard Web sites. Correct Answer(s):


a. plug-ins

is a method of transferring large media files over the Internet so that the data stream of voice and pictures plays more or less continuously as the file is being downloaded. 70.


Correct Answer(s): a. Content streaming

71. A(n)

is a Website that people can create and use to write about their observations, experiences, and opinions on a wide range of topics. Correct Answer(s): a. Web log b. blog

72. The Web, as a computing platform that supports software

applications and the sharing of information among users, is referred to as . Correct Answer(s): a. Web 2.0

is online, real-time communication between two or more people who are connected to the Internet. 73.

Correct Answer(s): a. Instant messaging

74. The use of social media in business is called

.

Correct Answer(s): a. Enterprise 2.0

75. The computers and devices on a network are also known as

Correct Answer(s): a. network nodes

76. A(n)

is a telecommunications network that connects large geographic areas. Correct Answer(s): a. wide area network (WAN) b. wide area network

.


c. WAN

77. Usually measured in bits per second (bps),

which data is exchanged. Correct Answer(s): a. channel bandwidth

refers to the rate at


78. Online

vendors use digital rights management to prevent illegal

copying. Correct Answer(s): a. music b. audio file c. media file

79. The browsers are the in the worldwide web, whereas the web servers are

the servers. Correct Answer(s): a. clients b. client machines c. client computers d. client solftware e. client f. client programs

80. George is in charge of ordering supplies for his employer, and he

usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system so that he can see if they have what he needs without contacting the salesperson. George is using an . Correct Answer(s): a. extranet

81. Briefly explain the passing of packets over the Internet.

Correct Answer: The various telecommunications networks that are linked to form the Internet work much the same way—they pass data around in chunks called packets, each of which carries the address of its sender and its receiver along with other technical information. The set of conventions used to pass packets from one host to another is the Internet Protocol (IP). Many other protocols are used in connection with IP. The best known is the Transmission Control Protocol (TCP). After a network following these standards links to the Internet’s backbone, it becomes part of the worldwide Internet community.


82. Explain the rules that apply to using domain names.

Correct Answer: Domain names always have at least two parts, with each part separated by a dot (period). For some Internet addresses, the far right part of the domain name is the country code, such as au for Australia, ca for Canada, dk for Denmark, fr for France, de (Deutschland) for Germany, and jp for Japan.. Many Internet addresses have a code denoting affiliation categories, such as com for business sites and edu for education sites. The far left part of the domain name identifies the host network or host provider, which might be the name of a university or a business.


83. Define cloud computing and identify the business benefits of cloud

computing. Correct Answer: Cloud computing refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. By outsourcing business information systems to the cloud, a business saves on system design, installation, and maintenance. The New York Stock Exchange (NYSE), for example, is starting to offer cloudcomputing applications that let customers pay for the services and data they use on Euronext—a European market for stocks, bonds, and other investments.

84. Briefly describe how a Wi-Fi network operates.

Correct Answer: With a Wi-Fi wireless network, a user’s computer, smartphone, or cell phone has a wireless adapter that translates data into a radio signal and transmits it using an antenna. A wireless access point, which consists of a transmitter with an antenna, receives the signal and decodes it. The access point then sends the information to the Internet over a wired connection. When receiving data, the wireless access point takes the information from the Internet, translates it into a radio signal, and sends it to the device’s wireless adapter.

85. How is the Internet of Things different from the world-wide web?

Correct Answer: Internent of Things (IoT) is a collection of objects that send information over the internet to servers, applications or humans. Whereas the worldwide web is made up of servers that serve web pages written in HTML to client browsers.


Chapter 5: Electronic Commerce and Enterprise Systems 1. A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market. *a. True b. False

2. The Asia-Pacific region has overtaken North America as the region with

the largest B2C sales and now accounts for over one-third of total worldwide B2C sales. *a. True b. False 3. The market for m-commerce in North America is maturing much

earlierthan in Western Europe and Japan. a. True

*b. False

4. Conversion to an e-commerce or m-commerce system enables

organizations to increase the accuracy of order processing and order fulfillment. *a. True b. False

5. Lack of trust in online sellers is one of the most frequently citedreasons

that some consumers are not willing to purchase online. *a. True b. False

6. An electronic exchange is an electronic forum where manufacturers,

suppliers, and competitors buy and sell goods, trade market information, and run back-office operations. *a. True b. False


7. In the past, market segmentation has been easy for B2B marketers

because firmographic data was easy to obtain. a. True

*b. False

8. Consortium-operated exchanges are open to any set of buyers

and sellers within a given market.


a. True

*b. False 9. In spite of the recent economic downturn, Website operators have

shunned the idea of bartering for goods and services. a. True

*b. False 10. Consumers who have enrolled in mobile banking and downloaded

the mobile application to their cell phones can check their credit cardbalances before making major purchases. *a. True b. False

11. Bartering is a technique used by advertisers to recapture shopperswho

abandoned a Website without making a purchase. a. True

*b. False

12. Smart card use is restricted to data associated with financial

transactions. a. True

*b. False

13. PayPal enables any person or business with an e-mail address to

securely, easily, and quickly send and receive payments online. *a. True b. False

14. Smart cards are less protected from misuse that conventional credit,

charge, and debit cards because the smart card information isnot encrypted. a. True


*b. False

15. Smart cards can be used for a variety of purposes, including storing a

user’s financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can alsostore monetary values for spending.


*a. True b. False

16. If you abandon an online shopping cart, the seller does not carewhat

you were shopping for. a. True

*b. False

17. With an online transaction processing (OLTP) system, each

transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions. a. True

*b. False

18. When there is a delay between an event and the eventual processingof

the data, it is called batch processing. *a. True b. False

19. The main difference between batch processing and online transaction

processing is in the timely update of data. *a. True b. False

20. It is acceptable to for transaction processing systems to capture

inaccurate data. a. True

*b. False

21. Small and medium size organizations do not employ enterprise

systems. a. True

*b. False


22. An enterprise system ensures that information can be shared withall

authorized users in different functional areas. *a. True b. False


23. If an organization is using several separate systems, they can be

replaced with a single integrated set of applications for the entire enterprise. *a. True b. False

24. An integrated database for the entire organization makes it easierto

share data among different business units. *a. True b. False

25. Implementation of an enterprise resource planning (ERP) system

provides an organization with an opportunity to also upgrade the information technology that it uses. *a. True b. False

26. A customer relationship management (CRM) system helps a company

toplan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. a. True

*b. False 27. Product lifecycle management (PLM) typically includes customer

relationship management (CRM) software. a. True

*b. False

28. Customer support, sales management, and contact management are

keyfeatures of a customer relationship management (CRM) system. *a. True b. False


29. External users of product lifecycle management (PLM) software

include design partners and raw material suppliers. *a. True b. False


30. Organizations frequently need to customize a vendor's enterprise

resource planning (ERP) software to integrate other business systems. *a. True b. False

31. The ability to capture and analyze all customer interactions,

generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns is known as contact management. a. True

*b. False

32. Using the hosted software model implies that a small business firm

needs to employ a full-time IT person to maintain key business applications. a. True

*b. False

33. XYZ Inc. assigned a part-time mid-level manager to supervise the

implementation of an enterprise resource planning (ERP) system. The project has a high risk of failure. *a. True b. False

34. Legacy systems typically run on the latest hardware. a. True

*b. False

35. Cultural differences, language barriers, and currency variationsare

all challenges that e-commerce and m-commerce merchants must address when selling to a global marketplace. *a. True b. False


36. In terms of e-commerce infrastructure, the Web server's required

amount of storage capacity and computing power depends primarily on two things: the software that must run on the server and the quantity of content on the e-commerce site. a. True

*b. False


37. When implementing a new enterprise system, keeping the scope of the

project fluid and flexible will ease the transition and yield the best results. a. True

*b. False

38. Which of the following forms of e-commerce is more likely to offer

a more customized product offering? a. Business-to-government (B2G) e-commerce b. Business-to-business (B2B) e-commerce c. Consumer-to-consumer (C2C) e-commerce

*d. Business-to-consumer (B2C) e-commerce 39. The elimination of organizations that operate between the producer

and the consumer is called

.

a. market segmentation b. downsizing

*c. disintermediation d. personalization is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. 40.

a. Business-to-business (B2B) e-commerce b. Business-to-consumer (B2C) e-commerce c. Consumer-to-business (C2B) e-commerce

*d. Consumer-to-consumer (C2C) e-commerce 41. A reason for the growth in business-to-consumer (B2C) e-commerce

is that online B2C shoppers have the ability to design a product. a. standardized b. universal c. generic

*d. personalized divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics. 42.


a. Disintermediation b. Social networking


*c. Market segmentation d. Market augmentation 43. Which of the following forms of e-commerce has created an

opportunity for many people to make a living out of selling items on auction Websites? a. Business-to-business (B2B) e-commerce

*b. Consumer-to-consumer (C2C) e-commerce c. Consumer-to-business (C2B) e-commerce d. Business-to-consumer (B2C) e-commerce 44. Which of the following statements is true of retargeting? a. It is targeted at approximately 50% of Website visitors who shop

using smartphone applications. *b. It employs personalized ads to direct shoppers back to a retailer’s Website they previously abandoned. c. It attempts to change buying habits of Web shoppers to get them to consider products they have never considered purchasing before. d. It attempts to change buying habits of Web shoppers by getting them to visit Websites they have not visited before. 45. The number of mobile Websites worldwide is expected to grow rapidly

because of . a. the availability of more costly handsets b. typically uniform product offerings c. advances in artificial intelligence technologies

*d. the development of new and useful applications 46. The

is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards. a. Address Verification System b. Advanced Authorization c. Payment Card Industry security standard

*d. Card Verification Number 47.

is a standard that spells out measures and security procedures to


safeguard a card issuer, a cardholder, and a merchant. a. Secure Sockets Layer (SSL) b. Card Verification Number c. Virtual private network (VPN)


*d. Payment Card Industry (PCI) 48. Which of the following is NOT one of the key website performance

measures commonly used by online retailers? a. response time

*b. total sales c. transaction success rate d. system availability 49. Authentication technologies are used by many organizations to

.

a. verify the accuracy of their product descriptions and prices b. secure sensitive data during e-commerce c. confirm the uniform resource locator (URL) of their suppliers'

Websites *d. confirm the identity of a user requesting access to information or assets 50. Conversion to an e-commerce or m-commerce system enables

organizations to *a. improve the level of customer service b. implement an enterprise resource planning (ERP) system c. increase the cost of doing business d. reinforce consumer-to-consumer (C2C) e-commerce 51. Through e-government, . a. only government agencies can interact with one another b. only businesses can interact with the government c. only individual citizens can interact with the government

*d. any government unit, business or individual can interact with the government

52. A(n)

is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business. a. transaction processing system

*b. enterprise system c. procurement system d. batch processing system

.


53. The information about invoices to customers is tracked by system. a. supply chain management


b. product lifecycle management

*c. transaction processing system d. value chain system 54. With

, business transactions are accumulated over a period of time for processing in a single unit. a. online transaction processing systems b. real-time transaction processing systems c. on-demand processing systems

*d. batch processing systems 55. In batch processing systems, data processing is done data capture. a. immediately after

*b. some time later than c. immediately before d. some time before 56. Which of the following types of processing is essential for businesses

that require access to current data such as airlines, ticket agencies, and stock investment firms? a. Batch processing b. Multiple unit processing c. Business intelligence processing

*d. Online transaction processing 57. Which of the following transactions definitely require online

transaction processing and cannot work on batch processing approach? a. Payroll b. Vendor payments c. Customer billing

*d. Stock investments 58. In the context of purchasing systems involved in the traditional

transaction processing systems, when a(n) arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. a. order b. pick list


*c. invoice d. request for quotation


59. As an organization’s purchasing systems generate purchase orders and

the items ordered are received, information is sent to the system to manage the amounts owed by the organization. a. accounts receivable

*b. accounts payable c. invoicing d. inventory control 60. A small business is currently using a paper-based system for billing,

which is slow and error-prone. Which system upgrade will make the process faster and have fewer errors? a. Manual entry of data into spreadsheet system

*b. Source data automation c. Scanning hand-written bills d. Enterprise resource planning system 61.

involves reentering data that was not typed or scanned correctly. a. Data editing

*b. Data correction c. Data manipulation d. Data encryption 62. In the context of enterprise resource planning (ERP) systems, the

most efficient and effective ways to complete a business process are called . a. current approaches b. streamlined processes

*c. best practices d. process improvements 63. Payroll transactions and billing are typically done via a. grid processing b. online transaction processing (OLTP) c. online analytical processing (OLAP)

*d. batch processing

.


64. According to the classification of enterprise resource planning (ERP)

vendors, vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations.


a. Tier III

*b. Tier II c. Tier IV d. Tier I 65. A key feature of an enterprise system is that . a. it helps a business function isolate information other functions

and other levels of management. b. it is exclusive to small and medium-sized enterprises (SMEs) *c. it employs a database of key operational and planning data that can be shared by all d. it is only used by large organizations includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers. 66.

a. Maintenance, repair and operations (MRO) b. Materials requirement planning (MRP) c. Customer relationship management (CRM)

*d. Supply chain management (SCM) 67. A customer relationship management (CRM) system helps a company in

managing a. material sourcing and procurement b. product development and manufacturing

*c. distribution and accounting d. human resources and finance 68. Which of the following statements is true of product lifecycle

management (PLM) software? a. It distributes data only to the employees of an organization.

*b. It provides documents required for FDA and environmental compliance. c. It secures data so that changes cannot be made early in the product design process. d. It is frequently employed by non-manufacturing organizations. 69. Which of these is an advantage of the hosted software model?

.


a. Consistent reliability b. Data security

*c. Faster system start-up d. Increased total cost of ownership


70. Suppose a business with annual sales revenue of $30 million wishes to

use an ERP solution. Which ERP vendor will have the most appropriate solution for them? a. Tier I vendors such as SAP or Oracle. b. Tier II vendors such as Epicor or Lawson.

*c. Tier III vendors such as Abas or Bluebee software. d. Vendors from all three tiers would be appropriate. 71. Suppose a small business is using the hosted model for its enterprise

software. Which of the following will not be an issue they will he worried about? a. promoting and selling their products and services b. managing the hiring processes

*c. employing full-time IT professionals to manage its resources d. designing of their products and services 72. Tom's Art Supplies used to sell art supplies through mail order

catalogs, but the company's order takers often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an online e-commerce site, Tom's has been able to solve this problem, allowing the company to enjoy the advantage of: a. reaching new customers b. reducing costs

*c. increasing accuracy d. improving customer service 73. You design and make women's jewelry, which you sell through an e-

commerce site. Based on feedback from potential customers, you have decided to make a few changes to your site, such as developing a loyalty program, publishing customer testimonials, and including your Better Business Bureau Online accreditation logo. These steps are designed to address potential customers' . a. privacy concerns

*b. lack of trust c. language challenges d. all of these answers


74. You have been put in charge of implementing a new enterprise system.

You should do all of the following EXCEPT: a. allow sufficient time to transition from the old way of doing things

to the new system and processes. b. allocate sufficient time and money for training staff.


c. define metrics that you'll use to assess project progress and

identify project-related risks. *d. provide access to the new system only to your immediate team to avoid conflict and confusion.

75. Which of the following is an obstacle to the successful implementation

of a new enterprise system? a. cost and long time frame b. employees' fear of change and frustration with new systems c. integration with other systems

*d. all of these answers 76.

is the conducting of business activities electronically over computer networks. Correct Answer(s): a. Electronic commerce (e-commerce) b. Electronic commerce c. E-commerce

77.

is a subset of e-commerce where all the participants are organizations. Correct Answer(s): a. Business-to-business (B2B) e-commerce b. Business-to-business e-commerce c. B2B e-commerce

is a form of e-commerce in which customers deal directly with an organization and avoid intermediaries. 78.

Correct Answer(s): a. Business-to-consumer (B2C) e-commerce b. Business-to-consumer e-commerce c. B2C e-commerce

electronic commerce applications support transactions between governments such as the federal government and state or local governments. 79.

Correct Answer(s): a. Government-to-government (G2G)


b. Government-to-government c. G2G

is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government. 80.

Correct Answer(s): a. E-government

exchanges are owned and operated by a single company.

81.

Correct Answer(s): a. Private

exchanges are open to any set of buyers and sellers within a given market and provide services and a common technology platform to their members. 82.

Correct Answer(s): a. Independent

83. One of the main measures of success of a mobile ad is CTR, which stands

for

.

Correct Answer(s): a. click through rate

84.

is the process of tailoring Web pages to specifically target individual consumers. Correct Answer(s): a. Personalization

exchanges are run by a group of traditionally competing companies with common procurement needs. 85.

Correct Answer(s): a. Consortium-operated

86. The identification of specific markets to target them with tailored


advertising messages is referred to as . Correct Answer(s): a. market segmentation

is an amount of money that is computerized, stored, and used as cash for e-commerce transactions. Correct Answer(s): a. Electronic cash 87.

88. All credit card customers are protected by law from paying more than

for fraudulent transactions. Correct Answer(s): a. $50

89. A(n)

is an attachment to an email message or data embedded in a Website that verifies the identity of a sender or Website. Correct Answer(s): a. digital certificate

90. The

is a credit card-sized device with an embedded microchip to provide electronic memory and processing capability. Correct Answer(s): a. smart card

91. A(n)

is responsible for guaranteeing that the people or organizations who are granted unique digital certificates are in fact who they claim to be. Correct Answer(s): a. certificate authority (CA) b. certificate authority c. CA 92. Mobile commerce destinations, used to place orders and conduct

business through mobile devices, are designated with a domain ending in .


Correct Answer(s): a. .mobi b. mobi

93. If you have classified your customers as 'college-grads', 'young

parents', or 'singles,' you used a technique known as market

.

Correct Answer(s): a. segmentation

94. For m-commerce to work effectively, the interface must be so good

that it is nearly as easy to make a purchase on a or desktop computer.

device as it is on a laptop

Correct Answer(s): a. mobile b. wireless

95. Many organizations employ

which capture and process the detailed data necessary to update records about the fundamental business operations of an organization. Correct Answer(s): a. transaction processing systems (TPSs) b. transaction processing systems c. TPSs

96. With

, transactions are accumulated for as long as necessary to meet the needs of the users of a system. Correct Answer(s): a. batch processing systems

97. In a transaction processing system (TPS), the system is sometimes

referred to as the lifeblood of an organization. Correct Answer(s): a. order processing

98. In a transaction processing system (TPS), a(n) must track the flow of

data related to all the cash flows that affect an organization.


Correct Answer(s): a. accounting system

99. In business, SME stands for

.

Correct Answer(s): a. small and medium-sized enterprises

100. In a transaction processing cycle, capturing data at its source and

recording it accurately in a timely fashion with minimal manual effort and in an electronic or digital form so that it can be directly entered into the computer is known as . Correct Answer(s): a. source data automation 101. In a transaction processing cycle, involves updating one or more databases in an organization with new transactions. Correct Answer(s): a. Data storage

102. Results from one TPS would become

to other systems.

Correct Answer(s): a. input b. inputs

103. In the context of enterprise resource planning (ERP) system, a(n)

is a set of coordinated and related activities that takes one or more types of input and creates an output of value to the customer of that process. Correct Answer(s): a. business procedure

104. Implementation of an enterprise resource planning (ERP) system

ensures good work processes that are based on

.

Correct Answer(s): a. best practices b. the most efficient and effective ways to complete a business


process c. best standards d. best industry standards is a set of integrated programs that manage a company’s vital business operations for an entire organization; even a complex, multi-site, global organization. 105.

Correct Answer(s): a. Enterprise resource planning (ERP) b. Enterprise resource planning c. ERP

is used primarily by people in the sales, marketing, accounting, and service functions to capture and view data about customers and to improve communications. 106.

Correct Answer(s): a. Customer relationship management (CRM) b. Customer relationship management c. CRM 107. In a customer relationship management (CRM) system, the ability to track data on individual customers and sales leads and then access that data from any part of an organization is known as . Correct Answer(s): a. contact management

108. Suppose two businesses (Alpha Inc. and Beta Inc.) are undertaking

ERP implementation projects. Alpha Inc. has a host of other applications that need integration with the new ERP. Beta Inc. has users who are showing resistance to the new ERP system. Among these, the Inc. project is more likely to become a failure. Correct Answer(s): a. Alpha 109. The most successful e-commerce solutions are designed to be highly

so that they can be upgraded to meet unexpected user traffic. Correct Answer(s): a. scalable


110. Define electronic commerce and identify its various subsets.

Correct Answer: Electronic commerce (e-commerce) is the conducting of business activities (e.g., distribution, buying, selling, marketing, and servicing of products or services) electronically over computer networks. It includes any business transaction executed electronically between companies (business-tobusiness), companies and consumers (business-to-consumer), consumers and other consumers (consumer-to-consumer), public sector and business (government-to-business), the public sector to citizens (government-tocitizen), and public sector to public sector (government- to-government). Business activities that are strong candidates for conversion to e-commerce are ones that are paper based, time consuming, and inconvenient for customers.

111. Identify and briefly discuss three key challenges to e-commerce.

Correct Answer: Three key challenges include: 1) dealing with consumer privacy concerns, 2, overcoming consumers' lack of trust, and 3) overcoming global issues. While two-thirds of U.S. Internet users have purchased an item online and most Internet users say online shopping saves them time, about one-third of all adult Internet users will not buy anything online because they have privacy concerns or lack trust in online merchants. Global issues include cultural challenges, language challenges, time and distance challenges, infrastructure challenges, currency challenges, and state, regional, and national law challenges.

112. A small business owner is sceptical about online transactions. Sheis

worried that information may be stolen in transmission or that the


party on the other end may be a bogus one. Also, she is worried aboutthe security of financial transactions online. What can be done to allay those fears? Correct Answer: She could use encryption and digital certificate technologies. The data can be encrypted before transmission. Only the intended recipient of the transmission will be able to decrypt and use it. In addition, she could sign up to use digital certification service to ensure the authenticity of the other party. The standards for processing financial transactions quite strict enough to ensure safeguarding the interests of the card issuer, the carholder and the merchant.

113. Briefly describe the transaction processing cycle.

Correct Answer: The business data goes through a transaction processing cycle that includes data collection, data editing, data correction, data processing, data storage, and document production. Capturing and gathering all data necessary to complete the processing of transactions is called data collection. Data editing involves checking data for validity and completeness to detect any problems. A data correction involves reentering data that was not typed or scanned properly. Data processing refers to performing calculations and other data transformations related to business transactions. Data storage involves updating one or more databases with new transactions. Document production involves generating output records, documents, and reports.

114. What is the goal of a customer relationship management (CRM)

system? Discuss the benefits of CRM software. Correct Answer: The goal of CRM is to understand and anticipate the needs of current and potential customers to increase customer retention and loyalty while optimizing the way that products and services are sold. CRM is used primarily by people in the sales, marketing, distribution, accounting, and service organizations to capture and view data about customers and to improve communications. Businesses implementing CRM systems report benefits such as improved customer satisfaction, increased customer retention, reduced operating costs, and the ability to meet customer demand. CRM software automates and integrates the functions of


sales, marketing, and service in an organization. The objective is to capture data about every contact a company has with a customer through every channel and to store it in the CRM system so that the company can truly understand customer actions. CRM software helps an organization build a database about its customers that describes relationships in sufficient detail so that management, salespeople, customer service providers, and even customers can access information to match customer needs with product plans and offerings, remind them of service requirements, and report on the other products the customers have purchased.

115. Describe product lifecycle management (PLM) software and identify

the type of data stored in such a system. Correct Answer: Product lifecycle management (PLM) software provides a means for managing the data and processes associated with the various phases of the lifecycle of a product, including sales and marketing, research and development, concept development, product design, prototyping and


testing, manufacturing process design, production and assembly, delivery and product installation, service and support, and product retirement and replacement. As products advance through these stages, product data is generated and distributed to various groups both within and outside the manufacturing firm. This data includes design and process documents, bill of material definitions, product attributes, product formulations, and documents needed for FDA and environmental compliance. PLM software provides support for the key functions of configuration management, document management, engineering change management, release management, and collaboration with suppliers and original equipment manufacturers (OEMs).

116. Discuss the advantages and disadvantages of hosted software model.

Correct Answer: Hosted software offers a decreased total cost of ownership. It has a faster system start-up. Hosted software also offers a lower implementation risk. The management of systems is outsourced to experts. However, hosted software has its share of problems as well. There are potential issues regarding availability and reliability. There are also data security issues. In addition, there are potential problems integrating the hosted products of different vendors. And while the management of systems is outsourced to experts, the savings anticipated from outsourcing may be offset by the increased effort to manage vendors.

117. Suppose you are tasked with determining the risks of failure of anERP

implementation project. What organizational characteristics will you focus on? Correct Answer: I would focus on these organizational characteristics. First, I would look at the number of business applications that will be integrated with the new ERP system. Next, I would see how open and welcoming its employees are to the new ERP system. Next, I would assess how much modification or customization is sought in the new ERP system. Finally, I would look at effectiveness of the training of its employees to start using the new ERP system.


CHAPTER 06 9e

1. Business analytics can be used only for forecasting future business

results. a. True

*b. False

2. The data for BI (business intelligence) comes from many sources.

*a. True b. False

3. A marketing manager who does not have deep knowledge of

informationsystems or data science, will NOT be able to use BI tools a. True

*b. False

4. Some insurance companies can detect fraudulant claims using BI

software. *a. True b. False

5. A vehicle routing optimization system helps in maximizing the number

of drivers being assigned. a. True

*b. False

6. Data scientists do not need much business domain knowledge. a. True

*b. False

7. Suppose you are good in math and statistics. Adding programming to

your skill-set will be necessary if you want to be a data scientist. *a. True b. False


CHAPTER 06 9e

8. For an organization to get real value from its BI efforts, it musthave a

solid data management program.

*a. True b. False


CHAPTER 06 9e

9. Creative data scientists - a key component of BI efforts in an

organization - are people who are primarily focused on coming up with novel ways of analyzing data. a. True

*b. False

10. Data governance involves identifying people who are responsible for

fixing and preventing issues with data. *a. True b. False

11. In OLAP data cubes, you would likely find numeric measures

categorized by time and geography. *a. True b. False

12. Online analytical processing is another name for enterprise

application. a. True

*b. False

13. Data cubes can be created on an ad hoc basis. There is no need to

create them ahead of time. a. True

*b. False

14. During drill-down, you go from high-level summary data to detailed

levels of data. *a. True b. False

15. In linear regression, you are to find a line that best fits thedata.


CHAPTER 06 9e

Sometimes the line may be curved. a. True

*b. False


CHAPTER 06 9e

16. Data mining is used to explore large amounts of data, looking for

hidden patterns that can be used to predict future trends and behaviors. *a. True b. False

17. In the regression line Y = a+ bX + e, Y is the value of the

independent variable. a. True

*b. False

18. In the regression line Y = a+ bX + e, a is the slope of the

regression line. a. True

*b. False 19. Linear regression is useful when you wish to predict the value of a

quantitative variable based on a another quantitative variable. *a. True b. False

20. Suppose your university administrators wish to summarize student

GPA on Major, Gender, High School, Home City and ZIP Code dimensions.This cannot be done with one data cube. a. True

*b. False

21. Suppose you are viewing a database of your monthly expenses,

categorized under broad headings such as food, entertainment and accommodation. If you have drill down ability, you are able to view details under each category. *a. True b. False

22. Excel's scenario manager can be used to solve optimization-type


CHAPTER 06 9e

problems. a. True

*b. False


CHAPTER 06 9e

23. Power Pivot and Power Query are components of Microsoft's Power

BItool. *a. True b. False

24. To solve the product mix problem that will maximize the profits,you

can use Excel's Solver add-in. *a. True b. False

25. Users still need help from the IT function of the organization tocreate

customer reports using modern reporting tools. a. True

*b. False

26. A conversion funnel is a visual depiction of a set of words thathave

been grouped together because of the frequency of their occurrence. a. True

*b. False

27. If you wish to have a visual depiction of relative frequencies ofwords

in a document, a word cloud would be an appropriate option. *a. True b. False

28. Which of the following is NOT considered business intelligence

practice? a. Data extraction b. Visualization c. Analysis

*d. Transaction processing

29. One of the goals of business intelligence is to .


CHAPTER 06 9e

*a. present the results in an easy to understand manner b. educate the users about business statistics c. ensure the transaction data is properly stored d. use the most sophisticated techniques

30. Which of the following is NOT a characteristic of a data scientist?


CHAPTER 06 9e

a. strong business acumen b. a deep understanding of analytics c. a healthy appreciation of the limitations of their data

*d. business leadership skills

31. What is the projected shortage of data scientists in the USA, according

to a McKinsey & Co. report? a. 100,000 or less

*b. 100,000 to 200,000 c. 200,000 to 500,000 d. more than 500,000

32. Mastery over which subject is NOT required for being a data scientist? a. Computer science b. Mathematics c. Statistics

*d. English

33. Suppose your employer has four manufacturing units, each with its

own data operations. They are considering using BI tools. Which of the following is a valid recommendation regarding the BI initiative? a. Automate data entry at the factories for reduction in error rates b. Implement BI tools in each factory separately

*c. Create a data warehouse so that data from the factories are combined for BI analysis d. None of these answers

34. Which of the following is NOT a core process associated with data

management? a. process for obtaining data b. process for certifying it fit for use

*c. process for gathering BI requirements d. process for storage

35. You are to advise XYZ so that their BI efforts are fruitful. Which


CHAPTER 06 9e

among the following is the most crucial advice of all? a. You need good data management practices

*b. There must be strong commitment from the management c. You need good data governance practices d. You need creative data scientists


CHAPTER 06 9e

36. Which of the following is NOT a component of a KPI (key performance

indicator)? a. direction b. measure c. time frame

*d. format 37. Which of the following will be a 'fact' measure in a data cube

used at a chain retail business? *a. Sales revenue b. Month name c. Product category d. City name

38. Which of the following is NOT true about linear regression? a. both of the variables must be quantitative variables b. the line minimizes the sum of the squared errors of prediction

*c. the technique implies causality between the independent and the dependent variables d. consists of finding the best-fitting straight line through a set of observations

39. The coefficient of determination, r squared, is . a. the same as the error term in a linear regression

*b. a number that indicates how well data fits the statistical model c. a number that must be close to zero to be useful d. the same as the slope of the linear regression

40. Which of these analysis methods describes neural computing? a. a specialized set of algorithms sorts through data and forms

statistical rules about relationships among the items *b. historical data is examined for patterns that are then used to make predictions c. historical if-then-else cases are used to recognize patterns d. a mathematical procedure to predict the value of a dependent variable based on a single independent variable


CHAPTER 06 9e

41. Suppose management wishes to start a BI project at your new job.

Which of following will you recommend as the first step? a. Understand the data b. Prepare the data

*c. Clarify business goals and design a project plan


CHAPTER 06 9e

d. Create and apply analytical modeling techniques

42. Data within the data cube has been

by specific dimensional values.

a. correlated

*b. summarized c. regressed d. drilled into

43.

is used to explore large amounts of data for hidden patterns to predict future trends. a. Data governance

*b. Data mining c. Linear regression d. Drill down

44. During modeling of the CRISP-DM method, we would

.

a. clarify business goals for the data mining project b. select a subset of data to be used and prepare it c. assess if the model achieves business goals

*d. apply selected modeling techniques

45.

is the last phase of the six-phase CRISP-DM method. a. Evaluation b. Modeling c. Business understanding

*d. Deployment

46. Which of the following is NOT considered a BI and analytics tool? a. Data visualization b. Drill-down analysis

*c. Online transaction processing d. Data mining

47. Suppose you have access to quantitative data on populations by ZIP

code and crime rates. You wish to determine if there is a relationship


CHAPTER 06 9e

between the two variables and display the results in a graph. Which BI tool will be most useful? a. Word cloud tool b. Querying tool c. Reporting tool

*d. Data visualization tool


CHAPTER 06 9e

48. To analzye various alternative scenarios, a manager would use

.

*a. the spreadsheet's 'what-if' capability b. the graphing features of spreadsheet software c. the reporting feature of a BI tool d. a data visualization tool 49. Which of the following is NOT a key capability of BI tools? a. ability to create graphs of results b. ability to zoom in to view various levels of details

*c. ability to provide advice to the user on which model best suits the data d. ability to link disparate data to gain various levels of insights

50. The graphical representation that summarizes the steps a consumer

takes in making the decision to buy your product and become a customer is called . a. a word cloud

*b. a conversion funnel c. a scatter diagram d. a pivot chart 51. What determines the size of words in a word cloud? a. length of the word or phrase b. difficulty in pronouncing the word or phrase c. whether the word is a pronoun

*d. frequency of occurrence of the word in source documents

52. Which of the following is IBM's BI product? a. Power BI b. Business objects

*c. Cognos d. Hyperion

53. From which vendor is the BI product Business Objects available?


CHAPTER 06 9e

a. IBM

*b. SAP c. Google d. Microsoft


CHAPTER 06 9e

encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. 54.

a. Easy access to a degree in Statistics

*b. Self-service analytics c. Seeking expert opinions d. Outsourcing BI tasks

55. Which of the following is a potential disadvantage with self-service BI? a. Accelerates and improves decision making.

*b. Can lead to over spending on unapproved data sources and business analytics tools. c. Encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. d. Gets valuable data into the hands of the people who need it the most—end users.

56. The goal of business intelligence is to

.

a. provide access to novel tools to the users b. reduce the cost of data processing

*c. support and improve decision making d. improve employee morale

57. Which of the following is NOT a commonly used BI tool? a. data visualization b. linear regression c. drill-down analysis

*d. automated customer service

58. Without real time data, generating reports will take

time than with real

time data. Correct Answer(s): a. more

59. Business intelligence includes technologies for extraction, integration and


CHAPTER 06 9e

visualization of . Correct Answer(s): a. data b. patterns


CHAPTER 06 9e

60. Business users access BI applications via the Web or through

organizational and extranets. Correct Answer(s): a. intranets b. internal networks c. local area networks

61. Grocery stores can use BI tools to better

the demands, so that

stock outs are reduced. Correct Answer(s): a. predict b. forecast c. determine d. estimate e. calculate f. compute 62. The goal of the data scientist is to

valuable insights that will

influenceorganizational decisions. Correct Answer(s): a. uncover b. discover c. find

63. Petroleum companies use BI tools that advise the refineries and oil

traders on the mix of products to produce, buy, and sell in order to profit. Correct Answer(s): a. maximize

64. Data

is the core component of data management; it defines the roles,responsibilities, and processes for ensuring that data can be trusted. Correct Answer(s): a. governance 65. For BI to be successful, the

in the organization must be strongly committed to data-driven decision making.


CHAPTER 06 9e

Correct Answer(s): a. management b. executives c. top-brass


CHAPTER 06 9e

d. senior management e. upper management

is the the interactive examination of high-level summary data in increasing detail to gain insight into certain elements. 66.

Correct Answer(s): a. Drill-down b. drill down c. drilldown

67.

is the first phase of the cross-industry process for data mining (CRIPS-DM). Correct Answer(s): a. Business understanding b. Planning

68. Similar to what you find in a car, a business

provides rapid access to information, in an easy-to-interpret and concise manner, which helps organizations run more effectively and efficiently. Correct Answer(s): a. dashboard b. dashboards

69. Metrics that track progress in executing strategies to attain

organizational objectives are also known as (KPIs). Correct Answer(s): a. Key performance indicators

70. Often times, information on dashboards are color coded, using the

color problem areas.

Correct Answer(s): a. red

for


CHAPTER 06 9e

71. Suppose you wish to predict the value of shopping cart contents (order

total), based on the amount of time the customer spent at the online store site. In a linear regression model, you will use order total as the variable.


CHAPTER 06 9e

Correct Answer(s): a. Y b. Response c. dependent

72. Suppose the r2 (r squared) value for the linear regression is 0.85.

You can state that the linear regression accounts for variation in the dependent variable.

percent of the

Correct Answer(s): a. 85 73. Data

tools can take raw data and immediately provide a rich

visualimage. Correct Answer(s): a. visualization

74. A

is a visual depiction of a set of words that have been grouped together because of the frequency of their occurrence.

Correct Answer(s): a. word cloud

tools can present data in an easy-to-understand fashion via formatteddata, graphs, and charts. 75.

Correct Answer(s): a. reporting b. querying c. reporting and querying

76. The presentation of data in a pictorial or graphical format is called

Correct Answer(s): a. data visualization

77.

is the most popular spreadsheet program. Correct Answer(s):

.


CHAPTER 06 9e

a. MS Excel b. Excel c. Microsoft Excel


CHAPTER 06 9e

78. If you wish to present traffic trends on your company's Website,

a

format is preferable to tabular formats. Correct Answer(s): a. graphical

79. With the help of

analytics tools, users work independently to access dataand perform their own analyses. Correct Answer(s): a. self-service 80. A

is an individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making. Correct Answer(s): a. data scientist

81. In what ways can a BI system be useful to a grocery store?

Correct Answer: The BI tool can be useful determining the demand for products by studying past transactions, and customer feedback. The users can run 'what-if' analyses on different scenarios and prepare to have adequate stocks of items. These capabilities would help the store management to stock adequate amounts of items, while keeping the inventory expenses low.

82. You are to advise a business on how to ensure success with their BI

initiatives. List four distinct strategies they must implement to succeed. Correct Answer: First, they must have good data management practices. Second, they need to ensure that good data government practices are in place. Third, they must have creative data scientists who can identify opportunities for applying BI techniques on. Lastly, and most importantly, they must have good commitment from the upper management to embrace data driven decision making.


CHAPTER 06 9e

83. Suppose you are to develop a data cube for a student organizationon

campus that wishes to study the effects of membership drives. Describe what dimension variables and fact variables you will use.

Correct Answer:


CHAPTER 06 9e

For fact variable, we could use the number of members or amount of memberships collected or attendance figures at the student organization's events. We can use 'membership drive', gender, major, semester, and student status (fulltime or partime), student residence (on-campus or off campus) as dimension variables.

84. Suppose you wish to study the relationship between the number of

'likes' on Facebook and the number of 'friends' one has on Facebook. Describe the statistical technique you would use. Correct Answer: I would the linear regression technique to study the relationship between number of 'likes' one gets and the number of friends one has on Facebook. The number of friends will be the independent or predictor variable. The number of likes will be the dependent variable. We expect a positive association between the two variable and we can expect a positive slope in the the linear regression. I would like to see an r-squared value of 0.70 or higher to ensure that at least 70% of the variability in the dependent variable is described by the linear regression.

85. Suppose you are tasked with collecting customer comments on

products and services and analyzing the data. What techniques will you employ and why? Correct Answer: I would use an analysis tool that can take in textual data as input and outputs quantitative data. A tool that can create word frequencies and word clould will be a starting point. Based on the quantitative data, we can run additional analyses such as summary statistics, frequency counts etc. The tool should also have the capability to summarize the comments.


CHAPTER 07 9e

1. Many organizations actively attempt to convert explicit knowledge to

tacit knowledge. a. True

*b. False

2. A group of people with common interests who come together to

create, store, and share knowledge of a specific topic is known as a community of practice. *a. True b. False 3. Artificial intelligence involves the development of machines and

computer systems that can simulate human intelligence processes. *a. True b. False

4. A perceptive system allows a machine to approximate the way a person

sees, hears, and feels objects. *a. True b. False

5. Although computers excel at numerical calculations, they are not as

good at dealing with symbols and three-dimensional objects. *a. True b. False

6. Expert systems, robotics, vision systems, natural language processing,

learning systems, and neural networks are all part of thebroad field of artificial intelligence. *a. True b. False

7. Robotics involves developing mechanical or computer devices that can

paint cars, make precision welds, and perform tasks that require a high


CHAPTER 07 9e

degree of precision or are tedious or hazardous for humans. *a. True b. False

8. Vision systems include hardware and software that permit computers

to capture, store, and process visual images.


CHAPTER 07 9e

*a. True b. False 9. Learning systems allow a computer to change how it reacts to

situations based on the feedback it receives. *a. True b. False

10. A genetic algorithm can be used to search the vast resources of the

Internet to find information on any topic. a. True

*b. False

11. A neural network relies on massively parallel processing to enablea

computer to simulate the function of a human brain. *a. True b. False

12. Expert systems use heuristics to arrive at conclusions or make

recommendations. *a. True b. False

13. The overall purpose of an inference engine is to seek informationand

relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would. *a. True b. False

14. An expert system can use a case-based solution process to develop the

solution to a problem by finding cases stored in the knowledge basethat are similar to the problem at hand and then modifying the solutionto the cases to fit the current problem.


CHAPTER 07 9e

*a. True b. False

15. An expert system, using the explanation facility, can indicate allthe

facts and rules that were used in reaching a conclusion. *a. True


CHAPTER 07 9e

b. False

16. A user interface makes an expert system easier to develop and use.

*a. True b. False

17. The domain expert is the person with the expertise the expert

system is trying to capture. *a. True b. False

18. Expert system shells lessen the burden of programming, allowing

nonprogrammers to develop and benefit from the use of expert systems. *a. True b. False

19. When audio files are played while they are being downloaded from

the Internet, it is called streaming audio. *a. True b. False

20. Virtual reality simulations require special interface devices that

transmit the sights, sounds, and sensations of the simulated world to the user. *a. True b. False

21. Assistive technology systems help people overcome disabilities and

perform various tasks. *a. True b. False

22. Bioinformatics has been used to help map the human genome


CHAPTER 07 9e

andconduct research on biological organisms. *a. True b. False 23. If Stan and Marcus, a new trainee at the manufacturing plant, are

working together to resolve an issue on the line, they would be using


CHAPTER 07 9e

joint problem solving as a means of transferring Stan's tacit knowledgeto Marcus. *a. True b. False

24. The first step in implementing a knowledge management project is to

identify the most valuable pieces of tacit knowledge to capture. a. True

*b. False

25. In some cases, metadata—the data that describes other data—is more

important than the data itself. *a. True b. False

26. To avoid potential bottlenecks and delays in accurately applyingand

implementing changes in business rules, many organizations use business rule management software. *a. True b. False

27. Namaste Yoga Studio's website is a great example of multimedia

because it uses text, photos, graphics, and video to communicate the message of the studio's owners. *a. True b. False

28. While gathering requirements for a system that assists tech support

people, you create a list of conditions and the recommended responses. This list of conditions and responses can form the basis of a knowledgebase for a robotics system. a. True

*b. False


CHAPTER 07 9e 29. Suppose you have an accounting background and you are considered an

expert in the field of discovering errors in electronic spreadsheets. You are considered a knowledge engineer if you are part of a team thatis developing an expert system to discover errors in spreadsheets. . a. True

*b. False


CHAPTER 07 9e

knowledge is hard to measure and document and typically is not objective or formalized. 30.

*a. Tacit b. Shared c. Technical d. Explicit 31. Knowing the best way to negotiate with a foreign government

about a volatile hostage situation is an example of knowledge. a. implied

*b. tacit c. explicit d. definitive 32. A

is a group of people with common interests who come together to create, store, and share knowledge of a specific topic. *a. community of practice (COP) b. social network c. professional learning community (PLC) d. personal network

include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction. 33.

a. Assistive technology systems b. Intelligence agents

*c. Artificial intelligence systems d. Virtual reality systems

34. Sophisticated computer systems require an extension of

understanding visual images. This is called a a. robotic

*b. perceptive c. learning d. virtual reality

system.


CHAPTER 07 9e

35.

can process many pieces of data at the same time and learn to recognize patterns.


CHAPTER 07 9e

a. Voice recognition systems b. Natural language processing systems c. Learning systems

*d. Neural networks 36. A genetic algorithm is an approach to solving problems based on the

.

*a. theory of evolution b. theory of relativity c. Compton Effect d. Complementarity Principle 37. A

is a conditional statement that links conditions to actions or outcomes. a. simulation b. case

*c. rule d. genetic algorithm 38. The

stores all relevant information, data, rules, cases, and relationships that an expert system uses. a. inference engine

*b. knowledge base c. user interface d. data warehouse 39. In an expert system, the is the component that delivers the expert advice.

*a. inference engine b. knowledge acquisition facility c. user interface d. explanation facility 40. The

allows an expert system user to understand how the system arrived at its results. a. inference engine b. knowledge base

*c. explanation facility d. knowledge acquisition facility


CHAPTER 07 9e 41. An expert system's knowledge acquisition facility serves as an interface

between

.


CHAPTER 07 9e

a. the end users and the inference engine

*b. the experts and the knowledge base c. the inference engine and the knowledge base d. the inference engine and the explanation facility 42.

do not need any previous training in computers or expert systems. a. Domain experts

*b. Knowledge users c. Knowledge engineers d. Intelligent agents is a popular and sophisticated software package that can be used to edit photographs and other visual images. 43.

a. PowerPoint b. Microsoft Silverlight

*c. Adobe Photoshop d. Autodesk 44. When video files are played while being downloaded from the Internet, it

is called a. video compression b. virtual reality

*c. streaming video d. file conversion 45. The haptic interface relays the sense of in the virtual world. a. sight b. sound

*c. touch d. smell has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position. 46.

a. Immersive virtual reality b. Telepresence

*c. Augmented reality

.


CHAPTER 07 9e

d. Location reality


CHAPTER 07 9e

is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing. 47.

*a. Assistive technology b. Virtual reality c. Forensics software d. Bioinformatics is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints. 48.

a. Parrondo's paradox b. Bioinformatics

*c. Game theory d. Chainstore paradox is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society. 49.

*a. Informatics b. Heuristics c. Assistive technology d. Informetrics 50. Which of the following is NOT one of the factors that have caused

many organizations to establish knowledge management programs? a. expansion of the services sector

*b. economic fluctuations c. emergence of new information technologies d. globalization

51. Kelly has just been hired as a server at a seafood restaurant. Since this is

her first job as a server, her manager has instructed her to follow Mark, an experienced server, for an entire shift to learn how to do the job. Kelly is: . a. observing

*b. shadowing c. copying


CHAPTER 07 9e

d. mimicing 52. Executives at Southwestern Construction have noticed that the

company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas,


CHAPTER 07 9e

Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system? a. fostering innovation through a free flow of ideas

*b. leveraging the expertise of people across the organization c. capturing the expertise of key individuals d. all of these answers 53. Executives at Southwestern Construction have noticed that the

company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. As a means of convincing the other teams to adopt the new methods, they develop an incentive program that allows team members to earn a percentage of the money they save on each project. This is related to which phase of knowledge management project implementation? a. connecting the KM to goals and objectives b. starting with a small pilot and enthusiastic participants c. identifying valuable tacit knowledge

*d. getting employees to buy in 54. Best Value Hardware Stores, a national chain, has established strict

policies about the conditions under which a customer can return merchandise. These policies are an example of: . a. customer service b. an operational system

*c. a business rule d. a business rule management system 55. An international package shipping company like FedEx needs to be

able to track the location of every package at every stage in the process, from pick-up to delivery. Which specific type of software would be useful in this situation? a. business rule management

*b. enterprise search c. knowledge management


CHAPTER 07 9e

d. none of these answers 56. You

joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions "do not reinvent the wheel". It means . a. do not bring new ideas, since this is an old company


CHAPTER 07 9e

*b. before starting any new project, try to build on expertise and knowledge of others in the organization c. the wheels of innovation have already been created in the organization d. currently there is not adequate budget to explore new ideas

57. You work for a manufacturing business. Your employer uses a

model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation? a. Install a more advanced email system. b. Install a social network interface to the customer relationship

management system.

c. Install better teleconferencing systems for anytime, anywhere

teleconferencing with the suppliers. *d. Install a Business Rules management system and interface it to the Supply chain management system.

58. A(n)

is an organized collection of people, procedures, software, databases, and devices used to create, store, share, and use the organization’s knowledge and experience. Correct Answer(s): a. knowledge management system (KMS)

59.

knowledge is objective and can be measured and documented. Correct Answer(s): a. Explicit

60. Knowing that the Hennessey Venom GT, with a top speed of 270

mph, is the fastest car in the world, is an example of having

knowledge.

Correct Answer(s): a. explicit

61. A judge evaluating evidence against a criminal based on his prior

experiences is an example of exhibiting

knowledge.


CHAPTER 07 9e

Correct Answer(s): a. tacit

62. The

attempts to determine whether a computer can successfully impersonate a human. Correct Answer(s): a. Turing Test


CHAPTER 07 9e

are rules of thumb arising from experience.

63.

Correct Answer(s): a. Heuristics

are mechanical or computing devices that perform tasks requiring a high degree of precision or that are tedious or hazardous for humans. 64.

Correct Answer(s): a. Robots

include hardware and software that permit computers to capture, store, and process visual images. 65.

Correct Answer(s): a. Vision systems

involves a computer understanding, analyzing, manipulating, and/or generating linguistic communication. 66.

Correct Answer(s): a. Natural language processing

is a system involving sequential decisions with learning taking place between each decision. 67.

Correct Answer(s): a. Reinforcement learning

is a process where a computer makes a decision, analyzes the results, and then makes a better decision based on the analysis. 68.

Correct Answer(s): a. Dynamic programming

69. A

is a computer system that can act like or simulate the functioning of a human brain.


CHAPTER 07 9e

Correct Answer(s): a. neural network

70. A(n)

is an approach to solving large, complex problems in which many repeated operations or models change and evolve until the best one emerges.


CHAPTER 07 9e

Correct Answer(s): a. genetic algorithm

71. A(n)

consists of programs and a knowledge base used to perform a specific task for a person, a process, or another program. Correct Answer(s): a. intelligent agent

72.

statements are rules that suggest certain conclusions based on certain conditions. Correct Answer(s): a. IF-THEN

73. The purpose of a(n) is to seek information and relationships from the

knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would. Correct Answer(s): a. inference engine

74. The main purpose of the is to provide a convenient and efficient means

of capturing and storing all components of the knowledge base. Correct Answer(s): a. knowledge acquisition facility

is text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals. 75.

Correct Answer(s): a. Multimedia

76. A(n)

is a system that enables one or more users to move and react in a computer- simulated environment. Correct Answer(s): a. virtual reality system


CHAPTER 07 9e

77. If an organization wants to document and measure flows of information

among various sources, such as individuals, workgroups, organizations, and web sites, it should engage in . Correct Answer(s): a. organizational network analysis


CHAPTER 07 9e b. ONA c. organizational network analysis (ONA)

78. If a multimedia file is very large, it might be necessary to

it so

that it can be downloaded or emailed. Correct Answer(s): a. compress

79. One of your colleagues has temporarily lost the ability to use his

hands and fingers due to a rare medical condition. He would like to continue to interact with the computers at work. A solution based on would help him. Correct Answer(s): a. natural language processing b. voice recognition

80. You have been contacted to suggest a solution for creating a digital

mockup of a machine to be used at a factory. The users would like to be able to view and interact with the layout of the controls of the machine, even before the actual machine is built. A(n) system will be an appropriate choice for this kind of problem. Correct Answer(s): a. virtual reality

81. Define artificial intelligence system and list the characteristicsof

intelligent behavior. Correct Answer: Artificial intelligence systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that demonstrate characteristics of human intelligence. The characteristics of intelligent behavior include the ability to: 1) learn from experience and apply the knowledge acquired from experience, 2) handle complex situations, 3) solve problems when important information is missing, 4) determine what is important, 5) react quickly and correctly to a new situation, 6) understand visual images, 7) process and manipulate symbols, and 8) be creative and imaginative.


CHAPTER 07 9e 82. Identify and briefly define several specialty areas of artificial

intelligence. Correct Answer: Expert systems consist of hardware and software that store knowledge and make inferences, enabling a novice to perform at the level of an expert. Robotics involves developing mechanical or computer devices that can paint cars, make precision welds, and perform other tasks that require a high degree of precision or that are tedious or hazardous for humans. Vision systems include hardware and software that permit computers to capture, store, and manipulate visual images. Natural language processing allows a computer to understand and react to statements and


CHAPTER 07 9e

commands made in a natural language. Learning systems are a combination of software and hardware that allows a computer to change how it functions or reacts to situations based on feedback that it receives. A neural network is a computer system that can act like or simulate the functioning of the human brain.

83. Briefly describe the role of the inference engine and the

explanation facility components of an expert system. Correct Answer: The overall purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would. The explanation facility allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. The expert system, using the explanation facility, can indicate all the facts and rules that were used in reaching the conclusion.

84. Discuss some of the factors that go into designing a multimedia

application. Correct Answer: Designing multimedia applications requires careful thought and a systematic approach. Multimedia applications can be printed on beautiful brochures, placed into attractive corporate reports, uploaded to the Internet, or displayed on large screens for viewing. Because these applications are typically more expensive than preparing documents and files in a wordprocessing program, it is important to spend time designing the best possible multimedia applications. Designing a multimedia application requires that the end use of the document or file be carefully considered. Because different computers and Web browsers display information differently, it is a good idea to select styles, fonts, and presentations based on computers and browsers that are likely to display the multimedia application. Because large files can take much longer to load into a Web page, smaller files are usually preferred for Web-based multimedia applications.

85. Human nature can make establishing a new KM program

challenging,but there are best practices for successfully implementing such a program. Identify and explain the four steps recommended for implementing a KM project.


CHAPTER 07 9e

Correct Answer: The first step in successfully implementing a knowledge management project is to connect the project to the organization's goals and objectives. By clearly defining the benefits and purpose of the project, the organizer will confirm the project is worthwhile and be able to elicit the support and enthusiasm of others in the organization. The second step is to involve enthusiasts within the organization to develop a small pilot program in order to work out issues, determine needed resources, and gain support. Since there is probably too much tacit knowledge to capture, organizers should identify the most valuable pieces of tacit knowledge needed in the third step of the process. Finally, in the fourth stage, the value and benefits of the project must be explained to employees throughout the organization in order to get their buy-in.


CHAPTER 08 9e

1. Pressure to increase profitability and improve operational efficiencies

often drives organizations to implement new approaches andtechnology. *a. True b. False

2. The purpose of studying a system is to identify the strengths and

weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance. *a. True b. False 3. Joint application development (JAD) sessions with a cross section of

users and stakeholders in a project are an effective way to define system requirements. *a. True b. False

4. Security and control considerations are a negligible part of theentire

system development process. a. True

*b. False

5. A data flow diagram (DFD) does not provide any information about

process timing. *a. True b. False

6. Feasibility analysis assesses the technical, economic, legal,

operational, and schedule feasibility of a project. *a. True b. False

7. The disaster recovery plan focuses on technology recovery and


CHAPTER 08 9e

identifies the people or the teams that are responsible to take actionin the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes. *a. True b. False


CHAPTER 08 9e

8. All members of a system investigation team must be co-located to

ensure a successful start to a project. a. True

*b. False

9. Operational feasibility takes into account the need to meet certain

system performance requirements that are considered important to system users and stakeholders. *a. True b. False

10. The primary outcome of systems analysis is a prioritized list of

system requirements and a recommendation of how to proceed with a project. *a. True b. False

11. System testing is often done by independent testers who are not

involved in developing program code. *a. True b. False

12. Even if unit testing is successful, developers cannot assume theycan

combine individual components into a working system without any problems. *a. True b. False

13. While discussing the preliminary feasibility of a project, your

colleague insists that figures used in economic feasibility be very accurate down to the last cent. His claim is appropriate and not uncommon. a. True

*b. False


CHAPTER 08 9e

14. User acceptance testing (UAT) is a critical activity that must be

completed successfully before newly developed software can be rolled out to the market. *a. True b. False


CHAPTER 08 9e

15. The eventual success of any system solely depends on how users work

with it. a. True

*b. False

16. Unit testing uncovers any defects in the interface between

individual components of an information system. a. True

*b. False 17. Perceived usefulness and perceived ease of use do not have any

influence in determining whether someone will use an information system. a. True

*b. False

18. For a small system, site preparation can be as simple as rearranging

the furniture in an office to make room for a computer. *a. True b. False

19. Parallel start-up involves running a complete new system for one

group of users while the rest of the users still run an old system. a. True

*b. False

20. One of the significant drawbacks to building a custom system is the

high cost compared to off-the-shelf software. *a. True b. False

21. Monitoring is the process of analyzing systems to make sure theyare


CHAPTER 08 9e

operating as intended. a. True

*b. False

22. Suppose your business is using software that was written using

FORTRAN 77. They wish to modify it to accommodate new requirements. It


CHAPTER 08 9e

is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), ratherthan modify the current software. *a. True b. False

23. A slipstream upgrade is a minor upgrade—typically a code adjustment

or minor bug fix. *a. True b. False

24. Waterfall and agile are the two types of software development

processes available to organizations. a. True

*b. False 25. Agile is better suited for developing larger information systemsthan

smaller ones. a. True

*b. False

requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. 26.

a. Causal analysis b. Creative analysis

*c. Critical analysis d. Data flow analysis 27. A scrum team usually consists of

*a. less than a dozen people b. twelve to fifteen people c. fifteen to twenty people d. more than twenty people

.


CHAPTER 08 9e

28. The Pareto principle is also known as the a. result rule b. cause rule c. 50-50 rule

.


CHAPTER 08 9e

*d. 80-20 rule 29. In the context of data-flow diagrams (DFDs), a(n)

shows either

the source or destination of the data. a. data-flow line

*b. entity symbol c. process symbol d. data store symbol

30. Tara and Zach are leading a systems development project and they

want the investigation phase to go smoothly and quickly. They decide to use because it will also help with the analysis and design phases. a. direct observation b. agile systems development c. functional decomposition

*d. joint application development

31. Laura is carefully estimating the time required for each phase of a

proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on . a. technical feasibility

*b. schedule feasibility c. deadline feasibility d. economic feasibility determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. 32.

*a. Economic feasibility b. Technical feasibility c. Legal feasibility d. Operational feasibility 33. A

is a description of the logical and physical structure of data and the relationships among the data for each user. a. data dictionary b. process


CHAPTER 08 9e

*c. schema d. cold site


CHAPTER 08 9e

creates a complete set of technical specifications that can be used to construct an information system. 34.

*a. Systems design b. Systems investigation c. Systems analysis d. Systems development 35. In the context of data-flow diagrams (DFDs), the

includes

arrows that show the direction of data movement. a. process symbol b. entity symbol

*c. data-flow line d. data store symbol 36. Once new software has been selected, implementation will include all of

these tasks EXCEPT . a. customizing any aspects of the solution needed

*b. consulting with stakeholders to establish future needs c. training end users d. configuring all of the software's capabilities and options to meet requirements involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. 37.

a. Integration testing

*b. System testing c. Volume testing d. User acceptance testing 38. The goals of

are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. a. unit testing b. user acceptance testing

*c. volume testing


CHAPTER 08 9e

d. integration testing


CHAPTER 08 9e

explains the purpose of every major piece of computer code and also identifies and describes key variables. 39.

a. Agile documentation

*b. Technical documentation c. Systems documentation d. User documentation

40. Your new software project manager is OK with requirements that are

not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the approach to software development. a. Waterfall b. outsourced

*c. Agile d. packages solution 41. The process of switching from an old information system to a

replacement system is called . a. installation b. conversion c. site preparation

*d. cutover 42. You are part of the team to implement new software at XYZ Inc. The

employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation? a. Direct cutover b. Phase-in approach c. Pilot startup

*d. Parallel start up 43. You are part of a testing team at a software business. Your job is to see

how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing testing.


CHAPTER 08 9e a. system testing

*b. volume testing c. acceptance testing d. integration testing


CHAPTER 08 9e

44. Which of the following statements is true of user acceptance testing

(UAT)? a. UAT involves linking individual components together and testing

them as a group to uncover any defects in the interface. b. A goal of UAT is to determine the work load at which systems performance begins to degrade. c. UAT is often done by independent testers who were not involved in developing program code. *d. UAT must be completed successfully before newly developed software can be rolled out to the market.

45.

involves running a complete new system for one group of users rather than all users. a. Phase-in approach b. Parallel start-up c. Cutover

*d. Pilot start-up 46.

involves using a new or modified system under all kinds of operating conditions. *a. Systems operation b. System construction c. Systems review d. Systems modification

is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months. 47.

a. Prototyping b. Object-oriented development c. Individual development

*d. Agile development

48. After the software is implemented, some modification is done on the

software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a . a. patch


CHAPTER 08 9e b. slipstream upgrade c. version

*d. release 49. A new

features.

is a major program change, typically encompassing many new


CHAPTER 08 9e

a. release b. patch c. slipstream upgrade

*d. version 50.

is the process of analyzing systems to make sure they are operating as intended. *a. System review b. System operation c. System maintenance d. System construction

51. Phil has been working on a new version of his company's best-selling

sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for . a. gamma testing b. beta testing c. delta testing

*d. alpha testing

52. At County Hospital, doctors and nurses must be able to access patient's

records immediately and at all times in order to perform surgeries, provide medication, and cure patients' illnesses. Accessing records is a process. Correct Answer(s): a. mission-critical b. mission critical

53.

are factors that are essential to the success of a functional area of an organization. Correct Answer(s): a. Critical success factors (CSFs) b. Critical success factors c. CSFs

54. A(n)

is a computer environment that includes rooms, electrical service, telecommunications links, data storage devices, and the like.


CHAPTER 08 9e

Correct Answer(s): a. cold site


CHAPTER 08 9e

55. The last time you backed up your computer's files was a week ago. You

should perform a(n) . Correct Answer(s): a. incremental backup

56. One advantage of the waterfall system development process is that

formal reviews at the end of each phase allows maximum

control.

Correct Answer(s): a. management

57. Maria has been revising a new app, so at the end of the day she recorded

her changes in a(n) .

Correct Answer(s): a. image log

58. A(n)

is a detailed description of all data used in a database.

Correct Answer(s): a. data dictionary 59. Hector and his team have received several requests for information

from software development vendors, so now they are deciding how to go about analyzing the proposals and contacting several customers of each of the vendors. In other words, they are developing a plan for their .

Correct Answer(s): a. final evaluation

60. A(n)

is a comparison of vendor options conducted in a computing environment and with a workload that matches its intended operating conditions.


CHAPTER 08 9e

Correct Answer(s): a. performance evaluation test

61. Isabella's manager has asked her to write up a that describes their

company's interest in developing a custom software solution for processing orders and asks vendors to estimate the cost and time needed to create the software.


CHAPTER 08 9e

Correct Answer(s): a. request for information b. RFI

62. In the context of data flow diagrams (DFDs), a(n)

reveals a storage

location for data. Correct Answer(s): a. data store symbol

63. In a user interface design, most systems provide a(n)that requires

identification numbers, passwords, and other safeguards to improve security and prevent unauthorized use. Correct Answer(s): a. sign-on procedure

64. In a user interface design with a(n)

system, users select what they

want to do from a list of alternatives. Correct Answer(s): a. menu-driven 65. Determining the involves an analysis of existing and future laws to

determine the likelihood of legal action against a systems development project and possible consequences of such action. Correct Answer(s): a. legal feasibility

66. A(n)

is a diagram used during both the analysis and design phases of a systems development life cycle (SDLC) to document the processes of the current system or to provide a model of a proposed new system. Correct Answer(s): a. data-flow diagram (DFD) b. data-flow diagram c. DFD

67.

is the stage of systems development that answers the


CHAPTER 08 9e

question, "How will the information system solve a problem?" Correct Answer(s): a. Systems design


CHAPTER 08 9e

involves linking all individual components together and testing them as a group to uncover any defects between individual components. 68.

Correct Answer(s): a. Integration testing

includes written details that computer operators follow to execute a program and that analysts and programmers use to solve problems or modify the program. 69.

Correct Answer(s): a. Technical documentation

70. A(n)

is a formal agreement that a user signs stating that a phase of the installation or the complete system is approved. Correct Answer(s): a. user acceptance document

71. The

specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage. Correct Answer(s): a. technology acceptance model (TAM) b. technology acceptance model c. TAM

72. You've just purchased some new software for your laptop, but you

can't seem to figure out how to install it correctly. When you call tech support, you're calling the company's . Correct Answer(s): a. help desk

involves those activities that ensure the orderly dissolution of a system, including disposing of all equipment in an environmentally friendly manner, closing out contracts, and safely migrating information from the system to another system or archiving it in accordance with applicable records management policies. 73.


CHAPTER 08 9e

Correct Answer(s): a. System disposal

is a method employed to keep the agile system development effort focused and moving quickly. 74.

Correct Answer(s): a. Scrum


CHAPTER 08 9e

is an approach to writing code that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements. 75.

Correct Answer(s): a. Extreme programming (XP) b. Extreme programming c. XP

76.

is the process of analyzing systems to make sure they are operating as intended. Correct Answer(s): a. Systems review

77. Before National Bank rolled out its new online banking system, it held

numerous training sessions with managers and employees. It also executed a massive campaign to convince its customers of the benefits of the new system and to educate them on using it. These activities were all part of the bank's . Correct Answer(s): a. user preparation

proposes that every organizational system is made up of people, tasks, structure, and technology with an interaction among the four components so that any change in one of these elements will necessitate a change in the other three elements. 78.

Correct Answer(s): a. Leavitt’s Diamond

79. Kumar and Jodie have purchased a new computer system for the

company where they work. After unpacking all of the new equipment and putting the components in place, they will have to test the new system to make sure it's operational before they can consider the to be complete. Correct Answer(s): a. installation


CHAPTER 08 9e

involves measuring system performance by tracking the number of errors encountered, the amount of memory required, the amount of processing or CPU time needed, and other performance indicators. 80.

Correct Answer(s): a. Monitoring


CHAPTER 08 9e

81. Briefly describe the various types of project feasibility that mustbe

evaluated. Correct Answer: Technical feasibility examines whether a project is feasible within the current limits of available technology. Determining the technical feasibility is critical when new technology is first being considered for use within an organization, prior to its widespread use. Economic feasibility determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. Legal feasibility determines whether laws or regulations may prevent or limit a systems development project. Legal feasibility involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and the possible consequences of such action. Operational feasibility is concerned with how the system will be accepted by people and how well it will meet various system performance expectations. Schedule feasibility determines whether a project can be completed in a reasonable amount of time. This process involves balancing the time and resource requirements of the project with other projects.

82. Briefly explain the difference between system testing and user

acceptance testing (UAT). Correct Answer: System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. System testing is often done by independent testers who were not involved in developing program code. They attempt to make the system fail. They frequently employ testing called black box testing because it requires no specific knowledge of an application’s code and internal logic. In other words, a system tester is aware of what the software is supposed to do but is not aware of how it does it. During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is also known as beta testing, application testing, and end-user testing. Unlike system testing, which ensures that the system itself works, UAT determines whether the system meets its intended business needs.


CHAPTER 08 9e

83. What is system maintenance? List the reasons for systems

maintenance. Correct Answer: Systems maintenance is a stage of systems development that involves changing and enhancing a system to make it more useful in achieving user and organizational goals. Some of the reasons for program maintenance are the following:1. Poor system performance such as slow response time for frequent transactions 2. Changes in business processes 3. Changes in the needs of system stakeholders, users, and managers


CHAPTER 08 9e

4. Bugs or errors in the program 5. Technical and hardware problems 6. Corporate mergers and acquisitions 7. Changes in government regulations 8. Changes in the operating system or hardware on which the application runs

84. Discuss the advantages and disadvantages of agile development.

Correct Answer: Like any other approach, agile development has its advantages and disadvantages. For appropriate projects, this approach puts an application into production sooner than any other approach. On the other hand, this intense systems development life cycle (SDLC) can burn out systems developers and other project participants. In agile development, documentation is produced as a by-product of completing project tasks, but this approach requires systems analysts and users to be skilled in agile systems development tools and agile techniques. Agile forces teamwork and lots of interaction between users and stakeholders; however, it requires a larger percentage of stakeholders' and users' time than other approaches.

85. System investigation is the initial phase in the development of anew

or modified business information system. What is the purpose of this phase, and what questions are typically explored during the investigation? Correct Answer: The purpose of system investigation is to gain a clear understanding of the specifics of the problem to solve or the opportunity to address. Questions typically asked during this phase are: What is the scope of the problem? Who is affected and how? How often does this occur? After gaining a good understanding of the problem, the next question is, “Is the problem worth addressing?” What are the potential costs, both the one-time initial costs and recurring costs? What risks are associated with the project? If successful, what benefits, both tangible and intangible, will the system provide? Given that organizations have limited resources—people and money—these questions deserve careful attention.


CHAPTER 09 9e

1. As the complexity of a network increases, the possibility of

security breaches decreases. a. True

*b. False

2. An attack that takes place before the security community and/or

software developers become aware of and fix a security vulnerability is called the 'zero-day attack.' *a. True b. False 3. It is not uncommon for computer users to share their login ID and

password with coworkers. *a. True b. False

4. Discovery of a vulnerability in a software program can potentiallybe

sold to the government. *a. True b. False

5. You see a deceptive pop-up that says your computer is infected and

that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware. *a. True b. False

6. Macro viruses are called so because they are written using a macro

language. *a. True b. False

7. Even legitimate organizations sometimes use email spam for promoting

products.


CHAPTER 09 9e

*a. True b. False 8. Spam emails make up only a small proportion (<10%) of emails. a. True


CHAPTER 09 9e

*b. False

9. Spam emails do not add to costs because nobody reads them anyways. a. True

*b. False

10. There are bots that can sign up for thousands of email accounts.

*a. True b. False

11. A zombie computer would send requests to access to the target site

again and again. *a. True b. False

12. Educational institutions' Websites are the most commonly targeted

sites by phishers a. True

*b. False

13. When you receive a text message that there is a problem with your

bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack. a. True

*b. False

14. Spear-phishing is when the phisher sends fraudulent emails to a

certain organization’s employees. *a. True b. False

15. The computer is running, but not responding to your keyboard

inputs. You find that the network activities are running very slowly.You have probably been hit by a rootkit.


CHAPTER 09 9e

*a. True b. False

16. Downloading games from unknown websites can be risky. The

softwaremay be a Trojan horse.


CHAPTER 09 9e

*a. True b. False 17. You work at a call center of a large bank where you answer credit card

services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiateda call. There can be a scam in progress. *a. True b. False

18. Transmitting a program, code, or command that causes harm to a

computer is a crime. *a. True b. False

19. Those convicted of cyberterrorism are subject to a prison term of 6

months to 1 year. a. True

*b. False

20. A strong security program begins by assessing the backgrounds of

the employees in the organization. a. True

*b. False

21. Default usernames and passwords should always be changed.

*a. True b. False

22. An employee who is marked for a lay-off sent threatening emails tohis

boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act. *a. True


CHAPTER 09 9e

b. False

23. A 'virus signature' contains the email ID of the virus developer. a. True

*b. False


CHAPTER 09 9e

24. Any Internet traffic that is not explicitly permitted into theinternal

network is denied entry through a firewall. *a. True b. False

25. A virus can reside in a file (or many files) on the hard drive, butit

would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive. a. True

*b. False

26. Whenever there is a computer security incident, it is not

recommended that the organization reveal all they know in public forums. *a. True b. False

27. There are laws that require businesses to prove that their data issecure.

*a. True b. False

28. Most organizations do not hesitate to conceal information about a

data loss event if there is a fear of bad publicity and loss of customers. a. True

*b. False

29. If an attack is dangerous enough, it may warrant shutting down or

disconnecting critical systems from the network. *a. True b. False

30. Suppose your computer network was compromised in a large scale

virus attack last Thursday. Most of the data files got corrupted beyond


CHAPTER 09 9e

repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place. a. True

*b. False


CHAPTER 09 9e

31. Someone who violates computer or Internet security maliciously

or for illegal personal gain is known as a(n) . *a. black hat hacker b. industrial spy c. hacktivist d. cyberterrorist 32. A hacktivist is someone who . a. attempts to gain financially and/or disrupt a company’s

information systems and business operations *b. hacks computers or Web sites in an attempt to promote a political ideology c. attempts to destroy the infrastructure components of governments d. violates computer or Internet security maliciously or for illegal personal gain

33. These days, the biggest threats to IT security are from

.

a. “geeks” working on their own and motivated by the desire to

gain some degree of notoriety b. international drug cartels c. terrorist organizations *d. organized groups that have ample resources, including money and sophisticated tools, to support their efforts

34. This harmful malware is triggered by a specific event, such as Friday the

13th. a. Virus b. Worm

*c. Logic bomb d. Trojan bomb

35. Your business has a web server that has suddenly become

unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of .


CHAPTER 09 9e a. a CAPTCHA issue

*b. a denial-of-service attack c. too many Spam emails d. a logic bomb

36. A botnet is a

.


CHAPTER 09 9e

a. network of robots that control an assembly line at a factory b. network of servers that exchange traffic data c. network of devices that are used for managing security

*d. network of computers that send out access requests to servers repeatedly

37. Once a

is installed, the attacker can gain full access to the computer.

*a. botnet b. zombie c. worm d. rootkit

38. The purpose of Advanced Persistent Threat (APT) usually is to

.

a. steal money b. interrupt service

*c. steal data d. annoy the users

39. On the back of a credit card the three-digit number above the signature

panel is used to . a. verify the identity of the credit card holder

*b. verify the card is legitimate and not a stolen card number c. enter your account into a raffle d. track your transactions for rewards program purposes

40. The US-CERT incident reporting system is used to

.

a. alert the bank about stolen credit cards b. alert the government about missing computers c. alert the Border Patrol about undocumented workers

*d. alert the Department of Homeland Security about information security incidents

41. The second phase of an Advanced Persistent Threat attack is a. capture b. reconnaissance

*c. incursion

.


CHAPTER 09 9e

d. discovery 42. In a denial-of-service (DDoS) attack, the perpetrator .

*a. instructs the zombie computers to send simple access requests to target computers


CHAPTER 09 9e b. sends out a huge number of spam emails to all of those in your

contacts list

c. changes the configuration information of the infected computers d. refuses to accept any email from any sender

43. You had used an online service to apply for a credit card. As part of the

process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of . a. cyberterrorism b. ransomware

*c. identity theft d. cyber espionage

44. A company's risk assessment process can include numerous threats

to the computers and networks. Which of the following can be considered an adverse event? a. Distributed denial-of-service attack b. Email attachment with harmful worm c. Harmful virus

*d. All of the above

45. Which of the following laws covers false claims regarding unauthorized

use of credit cards? a. Computer Fraud and Abuse Act

*b. Fraud and Related Activity in Connection with Access Devices Statute c. Identity Theft and Assumption Deterrence Act d. Stored Wire and Electronic Communications and Transactional Records Access Statutes 46. Which of the following subject areas does the USA Patriot Act cover?

*a. Cyberterrorism b. Identity theft c. Credit card fraud d. Transmitting virus programs


CHAPTER 09 9e 47. Which of these organizations offers guidelines on developing security

policies? a. DHS

*b. SANS c. IBM d. CISCO


CHAPTER 09 9e

48. You have been hired as the new Information Security consultant at

XYZ Inc. Which of these employee behaviors would be a top security concern? *a. Leaving laptop computers unattended in public spaces b. Using office computers for personal e-mails c. Drinking water or coffee while working on computers d. Banging on the keyboard, when the computer is running slow

49. Which of the following is the correct description of a firewall? a. It is a software that deletes viruses from attachments. b. It is hardware that prevents unauthorized data to enter the private

network. *c. It is a software and hardware combination that limits the incoming and outgoing Internet traffic. d. It is a concept used in developing security policies.

50. Which of the following is NOT a popular vendor of firewall software?

*a. Red Hat b. Check Point c. Kaspersky d. Total Defense

51. You work for a company that is growing. Originally, all the users in

all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk? a. Install a two-step login procedure, where the user has to key in

additional information for logging in b. Install and provide stronger anti-virus software on the users' computers c. Tweak the firewall parameters so that outgoing traffic can be better controlled *d. Assign roles and privileges to users so that only job-relevant data is accessible to the user.

52. Which

of the following shortcoming may be revealed during an IT security audit? a. whether the IT budget is adequate or not


CHAPTER 09 9e b. whether the users are satisfied with IT services or not

*c. whether only a limited number of people have access to critical data or not d. whether the firewall is tall enough

53. Assume your organization is experiencing an intruder attack.

You have an intrusion detection system (IDS) set up. Which of the following events occurs first? a. Messages from the IDS are routed to the network security team b. The IDS warns the firewall of suspicious traffic


CHAPTER 09 9e

*c. The network router sends traffic to the firewall as well as to the IDS d. Network security team decides to block traffic from that IP address

54. Which of the following security incidents is least costly to fix? a. theft of program source code b. alteration of corporate database c. theft of trade secrets

*d. defacing of web pages

55. There has been a data breach at your business and the business has

lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events? *a. activate the forensics analysis team and prepare documentation b. meet with your lawyers to prepare to counter-sue the customers c. settle with the customers, however much it may cost d. none of these answers

56. You wish to use your personal laptop computer at work. However, the

IT department folks are unwilling to allow you. The likely reason is . a. you will use your laptop for non-work related activity b. your productivity could not be measured correctly

*c. your non-work related use of the laptop could increase vulnerability d. your activities could not be monitored 57. Which of the following is a vendor of popular anti-virus software? a. Microsoft

*b. Symantec c. McDonald's d. Bayer

58. In computing, an attack on an information system that takes

advantage of a particular system vulnerability is called a(n) Correct Answer(s): a. exploit

.


CHAPTER 09 9e 59. Someone who attempts to destroy the infrastructure

components ofgovernments is known as a.


CHAPTER 09 9e

Correct Answer(s): a. cyberterrorist often creates a “backdoor” on a computer that enables an attacker to gain access to the system and compromise confidential or private information. 60. A

Correct Answer(s): a. trojan horse

61. The purpose of

is to use email messages to make the recipients

reveal personal data. Correct Answer(s): a. phishing

62. The

is the agency tasked with the goal of providing for a safer, more secure America, making it resilient against terrorism and other potential threats. Correct Answer(s): a. The DHS b. DHS c. Department of Homeland Security

63. When the data about Target's customers was stolen, it was an example of

a(n)

.

Correct Answer(s): a. data breach is similar to SMiShing except that the victims receive a voice mailmessage telling them to call a phone number or access a Web site. 64.

Correct Answer(s): a. Vishing

is software that generates and grades tests that humans can pass; however, all but the most sophisticated computer programs cannot. 65.

Correct Answer(s): a. CAPTCHA


CHAPTER 09 9e

is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. 66.

Correct Answer(s): a. Virus


CHAPTER 09 9e

67. A(n)

is an individual who captures trade secrets and attempts to gain an unfair competitive advantage. Correct Answer(s): a. industrial spy

try, on a daily basis, to gain unauthorized access to a number of important and sensitive sites, such as the computers at the British, French, Israeli,and United States foreign intelligence agencies. 68.

Correct Answer(s): a. Cyberterrorists

69. You are starting to see unexpected messages on the screen. Some

programs that used to work do not work any longer. You find some key files missing. Your computer has been infected by a(n) . Correct Answer(s): a. virus

70. You recently installed a game that you got for free. After a few days,

you find that your computer's log has entries of logins that were not initiated by you. The perpetrator was most likely logging in using a . Correct Answer(s): a. backdoor

71. The concept of

, in connection with IS security, recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. Correct Answer(s): a. reasonable assurance defines an organization’s security requirements, as well as thecontrols and sanctions needed to meet those requirements. 72. A

Correct Answer(s):


CHAPTER 09 9e a. security policy

73. The primary security threat for mobile devices continues to be

device.

of the


CHAPTER 09 9e

Correct Answer(s): a. loss b. theft

74. Your ex-colleague was apprehended based on the "Fraud and

Related Activity in Connection with Access Devices Statute" Act. He was caught using unauthorized or stolen . Correct Answer(s): a. credit cards

75. Suppose you wish to inspect the packets of data that are coming in

from the Internet into your organization's network. You should use

.

Correct Answer(s): a. next-generation firewall

76. Many organizations use

to provide a comprehensive display of all vital data related to an organization’s security defenses, including threats, exposures, policy compliance, and incident alerts. Correct Answer(s): a. security dashboard software 77. It is crucial that antivirus software be continually

with the latest

virus signatures. Correct Answer(s): a. updated

78. The US-CERT newsletter has alerted you about vulnerabilities in some

software installed in your organization. To detect if there is any attempt at exploiting this vulnerability, you would employ -based intrusion detection system. Correct Answer(s): a. knowledge

79. Some businesses outsource their security management to MSSPs. MSSP


CHAPTER 09 9e

stands for . Correct Answer(s): a. managed security service provider


CHAPTER 09 9e

80. Computer

is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. Correct Answer(s): a. forensics

81. You are being consulted for recommendation on software for sales

report management. There are two choices. Choice #1 is a product from an industry leader that costs more than $1,000 per license per year. The second choice is a free open-source software that is free to download and install. The free software is in a language that your programmers do not have expertise in. You may be able to convince management to hire the right programmer to install the free and open source software. Considering the importance of data security, what solution would you recommend, and why? Correct Answer: I would recommend choosing the product from the industry leader. Since the software is from the industry leader, it is likely to have fewer vulnerabilities, and will be less risky. The second reason is that the large user base would have created reliable forums for troubleshooting. Thirdly, finding expertise for installation with this product will be easier. The open source software may have vulnerabilities that may not be discovered yet. For these reasons, I would recommend the first solution—to purchase the software license from the industry leader.

82. Pam, your new marketing manager, is exploring the purchase of tensof

thousands of email addresses, from a legitimate source, for the purpose of sending product information to the masses. She has asked your opinion. Would you agree or disagree with her idea? Why or why not? Correct Answer: I would not agree with her idea to buy tens of thousands of email addresses and send mass emails to them. It will be considered spam and potentially marked as spam by the email filters. The email filters are quite sophisticated these days. Those emails may not make it to the inboxes of the intended audience. Given the general opinion that spam is not welcome, the email


CHAPTER 09 9e

marketing campaign is not destined make any net positive impact on the potential audience minds. In addition, having received 'junk email' from our business would leave a not-so-good impression on people. They may reject any future genuine emails from our business. For these reasons, I would not agree with Pam.

83. You have been invited to speak to senior citizens about the

Internet in general and email in particular. What topics would you choose to talk about to benefit your audience the most?


CHAPTER 09 9e

Correct Answer: Knowing that many of the victims of phishing attacks often tend to be unsuspecting senior citizens, I would caution them against phishing attacks. I would explain what phishing is, and how to identify those emails. I would show them samples of phishing emails and show them what happens if they respond to those mails. I would also demonstrate how following a link from the email can lead to websites with malicious codes. I would give them some guidelines on what to do in case they become victims of phishing attacks.

84. Your company has acquired Joggers PLC, a smaller company. The

integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safeand lead to a secure system. What advice would you give your manager regarding information security policies? Correct Answer: I would ensure Joggers' infrastructure is well protected by firewalls, antivirus software, and updated applications. I would enforce a password policy to make guessing the passwords improbable. I would recommend they institute a data backup policy that will make daily, weekly, and monthly backups of all the data. I would also make data access restricted to users' roles.

85. You have been called in to collect information regarding a recent data

breach at your organization. What specific information would you collect and for what reasons would you seek that information? Correct Answer: First, I would identify what actions or inactions led to the data breach. This will help in reducing or preventing such attacks in future. Second, I would identify the vulnerabilities that were exploited in this attack so that those vulnerabilities can be addressed. Third, I would review the capabilities of the intrusion detection system and recommend updates, modifications, or replacement so that similar intrusions can be detected sooner.


CHAPTER 10 9e

1. Computer-related mistakes include organizations operating

unintegrated information systems and acquiring redundant systems. a. True

*b. False

2. Organizations continue to operate their businesses using integrated

information systems that lead to missed opportunities, increased costs,and lost sales. a. True

*b. False 3. In order to protect the privacy of employees, email messages that

have been erased from hard disks cannot be retrieved. a. True

*b. False 4. The use of e-mail among public officials might violate “open

meeting” laws. *a. True b. False

5. Posting information to the Internet using anonymous email accountsor

screen names makes it impossible to identify a libeler. a. True

*b. False

6. A job that requires sitting at a desk and using a computer for many

hours a day qualifies as a sedentary job. *a. True b. False

7. A job that requires sitting at a desk for many hours a day can

significantly reduce the risk of type 2 diabetes.


CHAPTER 10 9e a. True

*b. False

8. Two primary causes of computer-related health problems are a poorly

designed work environment and failure to take regular breaks to stretchthe muscles and rest the eyes.


CHAPTER 10 9e

*a. True b. False

9. If an activity is defined as legal then it is ethical. a. True

*b. False

10. IS professionals believe that their field offers few opportunitiesfor

unethical behavior. a. True

*b. False 11. One idea for reducing cyberloafing is to develop software that

recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit. *a. True b. False

12. Training and incentives are the keys to the successful acceptance and

implementation of policies and procedures governing waste and error prevention. a. True

*b. False

13. Deepak's team is in charge of conducting a review of their

company's waste/mistake prevention policies and procedures. Part ofthis review should also evaluate how upcoming changes in information systems will affect business activities. *a. True b. False

14. Laws and regulations have thoroughly addressed concerns about

privacy and data management in private organizations and federal agencies. a. True


CHAPTER 10 9e

*b. False 15. It is illegal for companies to buy and sell personal data collected

through marketing and sales efforts. a. True


CHAPTER 10 9e

*b. False

16. In the U.S., there is some debate over privacy between those who favor

data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by theConstitution and the Bill of Rights. *a. True b. False

17. Many workers claim their right to privacy trumps their employers'

right to monitor employee use of IS resources. *a. True b. False

18. Some companies offer health and wellness programs that require

employee participants to share personal data. This data is protectedunder the same HIPAA privacy regulations as data shared with health insurance companies and doctors. a. True

*b. False

19. U.S. federal law permits employers to monitor email sent and

received by employees. *a. True b. False

20. Never send sensitive personal data such as credit card numbers,

bank account numbers, or passwords via text or IM; only send them by email. a. True

*b. False

21. Amy is doing some online research for a term paper. She'd like to

access some information on a particular website, but the website is asking


CHAPTER 10 9e

her to put in her email address before allowing her to view theinformation. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used. a. True

*b. False


CHAPTER 10 9e

22. It's safe for you to input personal data into your Facebook profile

because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason. a. True

*b. False

23. Children and young adults under 18 can easily become the victims of

crimes due to their use of social media, but adults are entirely safe in using social media. a. True

*b. False 24. Software developers have created filtering software that blocks

children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating asimilar software for use in the workplace. a. True

*b. False

25. The U.S. Congress has made several attempts to pass and maintain

legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional. a. True

*b. False

26. The Federal Commerce Commission is responsible for enforcing

consumer protection laws that prevent fraud, deception, and unfair business practices. a. True

*b. False

27. The use of computers in the workplace is a double-edged sword for

workers. While they help to increase productivity and efficiency, theycan also raise concerns about privacy and health issues.


CHAPTER 10 9e

*a. True b. False

28. If a worker is seated at a desk using a keyboard, the height of the

surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight. *a. True


CHAPTER 10 9e

b. False

29. The term "ethics" refers to an individual's personal beliefs about right

and wrong, whereas the term "morals" describes standards or codesof behavior expected of an individual by a group, such as a nation, organization, or profession. a. True

*b. False

30. The pages on a university's website are maintained by individual

departments and organizational units. It is a useful policy to requirethat every change a user makes to his department pages be reviewed and approved.

*a. True b. False

31. As a Google user, your search history data can be accessed by the

NSA and the FBI without obtaining court orders. *a. True b. False

32. Which of the following is a useful policy to minimize waste and

mistakes? a. Changes to HTML and URLs should be documented and authorized

by end users. b. System report titles should be as brief as possible and should simply indicate the report number. *c. Users should implement proper procedures to ensure correct input data. d. Tight control should be avoided over critical tables. involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. 33.


CHAPTER 10 9e

a. Vishing b. Slander

*c. Libel d. Phishing 34. Which of the following is a computer-related mistake? a. Operating unintegrated information systems.


CHAPTER 10 9e

*b. Mishandling computer outputs. c. Acquiring redundant systems. d. Exhausting information system resources. 35. The

requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use. *a. Gramm-Leach-Bliley Act of 1999 b. E-Government Act of 2002 c. USA Patriot Act of 2001 d. Sarbanes-Oxley Act of 2002

36. The

requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation. a. Cable Act of 1992 b. Electronic Communications Privacy Act of 1986 c. Gramm-Leach-Bliley Act of 1999

*d. USA Patriot Act of 2001 37. Which of the following statements is true of the E-Government Act of

2002? a. It renews the U.S. government's authority to monitor electronic

communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA). *b. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people. c. It restricts government access to certain records held by financial institutions. d. It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power. 38. A job that requires sitting at a desk and using a computer for many hours

a day can lead to . a. undesirable weight loss


CHAPTER 10 9e

*b. formation of blood clots c. inflammation of the gum tissue d. sleep disorders 39.

is is an inflammation of the nerve that connects the forearm to the palm of the wrist. *a. Carpal tunnel syndrome (CTS)


CHAPTER 10 9e

b. Seated immobility thromboembolism (SIT) c. Chronic idiopathic mylofibrosis d. Behcet's syndrome

40. Heavy computer users who experience red, dry, itchy eyes should

*a. consider the use of artificial tears b. consider the use of older, but more human friendly CRT monitors c. keep their focus on their screens for long hours d. avoid blinking often states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior. 41.

*a. Code of ethics b. Code of conduct c. Code of civil procedure d. Code of criminal procedure 42. In a recent survey of 2100 human resource professionals, which two

activities were listed as the biggest "productivity killers" in the workplace? *a. personal cell phone use and Internet surfing b. personal cell phone use and online game play c. Internet surfing and online game play d. online shopping and online game play 43. A recent study conducted by the University of Nevada revealed that

cyberloafing (wasting time online) costs U.S. businesses more than annually. a. $25 billion b. $45 billion c. $65 billion

*d. $85 billion 44. To minimize waste and mistakes, organizations often develop and

implement policies and procedures which focus on:

.

a. the use of data editing to ensure data accuracy and completeness b. the assignment of clear responsibility for data accuracy within

each information system c. the implementation of source data automation

.


CHAPTER 10 9e

*d. all of these answers


CHAPTER 10 9e

45. Which legislation is designed to combat the growing crime of identity

theft? a. E-Government Act of 2002 b. USA Freedom Act of 2015 c. USA Patriot Act of 2001

*d. Fair and Accurate Credit Transactions Act of 2003 46. In today's workplace, most employers issue a policy stating that they

will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails? a. about one-fourth

*b. about half c. about three-quarters d. nearly all 47. In one court case, a hospital employee, who had been fired for showing

coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why? a. The employee won the case because the court stated that he

had a reasonable expectation of privacy. b. The employee won the case because the court stated that viewing sexually explicit photos is not illegal. *c. The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work. d. The hospital won the case because the court stated that all employers have the right to monitor their employees' behavior at all times.

48. Federal law permits employers to monitor their employees' use

of company-owned computer equipment, specifically a. e-mails b. instant messages c. website views

*d. all of these answers

.


CHAPTER 10 9e 49. RFID chips embedded in objects generate radio transmissions that

allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted . a. in children to enable parents to find them if lost b. in criminals to allow law enforcement agents to find them if needed


CHAPTER 10 9e

c. in all humans to give medical professionals instant access to

medical records and conditions *d. all of these answers 50. Harold is thinking about setting up profiles on Facebook and

Twitter. Which of the following categories of data should he avoid sharing on these social media platforms? a. his location b. his religious and political affiliations c. his health conditions

*d. all of these answers 51. Which of the following is NOT one of the four most common issues

related to the storage and use of personal data? *a. notice b. security c. knowledge d. consent 52. Anne and Jordan have two pre-teen sons and they're concerned about

what their kids might see and share on the Internet. They should probably invest in . a. Internet licensing

*b. filtering software c. security passwords d. privacy screening 53. Although Roberta had signed a form preventing her doctor from

sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the . *a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act c. Gramm-Leach-Bliley Act d. none of these answers


CHAPTER 10 9e 54. In order to be accredited by the Better Business Bureau, a business is

required to publish a privacy notice on its website that includes all of the following elements EXCEPT . a. choice

*b. sharing and selling


CHAPTER 10 9e

c. access d. updates 55. Miranda works at a small-batch soda pop manufacturing plant. For

eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with . *a. a repetitive strain injury b. carpal tunnel syndrome c. a thromboembolism d. none of these answers 56. Flexibility is a major component of ergonomic design, mainly because: . a. people come in a wide range of shapes and sizes b. people have their own preferences c. people need to be able to position equipment in different ways for

best results *d. all of these answers 57. Graydon noticed Jack, his friend and classmate, cheating on a physics

exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decisionmaking process is Graydon? a. gathering information b. developing a problem statement c. identifying options

*d. weighing options 58. While giving her students a physics exam, Professor Thompson noticed

that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?


CHAPTER 10 9e

*a. gathering information b. developing a problem statement c. identifying options d. weighing options 59. During a recent brainstorming session, one of Franklin's co-workers

suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for


CHAPTER 10 9e

the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics? a. Avoid harm to others. b. Be honest and trustworthy. c. Honor property right.s

*d. Respect the privacy of others. 60. Suppose you have been receiving unsolicited phone calls from

telemarketers. Which agency should you contact to prevent these 'junk' calls? *a. The Federal Trade Commission b. Better Business Bureau c. your local police department d. The Department of Justice

61. Your cousin works at her desktop computer for prolonged period of

time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with in mind. a. privacy b. productivity c. economics

*d. ergonomics is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them. 62.

Correct Answer(s): a. Ergonomics 63. The

is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old. Correct Answer(s): a. Children's Online Privacy Protection Act (COPPA) b. Children's Online Privacy Protection Act c. COPPA


CHAPTER 10 9e 64. A party offended by a libel can file what is known as a(n)

lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.


CHAPTER 10 9e

Correct Answer(s): a. John Doe

65. The hazardous activities associated with unfavorable working

conditions are collectively referred to as

.

Correct Answer(s): a. work stressors

66. Liam, a specialist in , has designed a desk that uses hydraulic lifts to

raise and lower the desk to the perfect height for any worker to use comfortably, whether sitting or standing. Correct Answer(s): a. ergonomics

67.

issues deal with what is generally considered right or wrong. Correct Answer(s): a. Ethical

68. Employees at a small publishing company were dissatisfied with their

project tracking system because it didn't allow them to record enough detail. To solve the problem, they created another system that recorded some of the same information, but allowed them to add even more detail about the schedules and budgets. As a result, the company had systems. Correct Answer(s): a. redundant

69. Kay should have been inputting data into her employer's database, but

instead she was , meaning she was surfing the Internet, online shopping, and playing games. Correct Answer(s): a. cyberloafing

70. In terms of information systems, issues of privacy relate to the

collection and use or misuse of .


CHAPTER 10 9e

Correct Answer(s): a. data

71. When a U.S. citizen applies for health insurance through the federally-

operated Healthcare Marketplace, workers for the Marketplace then contact the IRS for data about that citizen's income and tax records. This crossreferencing of data is regulated by the Computer and Privacy Act of 1988.


CHAPTER 10 9e

Correct Answer(s): a. Matching b. matching

72. The

Amendment protects individuals against unreasonable searches and seizures by requiring warrants to be issued only upon probable cause. Correct Answer(s): a. Fourth b. fourth

73. Sending an email message is like having an open conversation in

public—many people can listen to your messages, especially if they are not . Correct Answer(s): a. encrypted

, which means sending sexually explicit texts and/or photos, is illegal in some states, even if it is consensual. 74.

Correct Answer(s): a. Sexting b. sexting

is a means of acquiring data about a group of people (such as location, noise level, and pollution levels) through sensor-enhanced mobile devices. 75.

Correct Answer(s): a. Mobile crowd sensing (MCS) b. Mobile Crowd Sensing c. MCS

76. Some people believe that consumers should have the ability to

correct errors in their personal data stored in corporate database systems, which is an issue of . Correct Answer(s): a. control


CHAPTER 10 9e

77. Some parents use

as a means of controlling what their children see or

access on the Internet. Correct Answer(s): a. filtering software


CHAPTER 10 9e

78. According to the Better Business Bureau, a business's privacy notice

should include some method of , which means providing a customer a course of action to take if the business does not meet its' own privacy policy in some way. Correct Answer(s): a. redress

79. A system of rules that tells us what we can and cannot do is referred to as

. Correct Answer(s): a. law b. laws

80. There are federal laws that permit your employer to monitor your

email communications, hence your

is not protected.

Correct Answer(s): a. privacy b. right of privacy c. rights of privacy d. privacy rights

81. Outline six useful policies to minimize computer-related waste and

mistakes. Correct Answer: Some useful policies to minimize waste and mistakes include the following:1. Changes to critical tables, HTML, and URLs should be tightly controlled, with all changes documented and authorized by responsible owners. 2. A user manual should be available covering operating procedures

and documenting the management and control of the application. 3. Each system report should indicate its general content in its title and

specify the time period covered. 4. The system should have controls to prevent invalid and unreasonable data

entry. 5. Controls should exist to ensure that data input, HTML, and URLs are

valid, applicable, and posted in the right time frame.


CHAPTER 10 9e 6. Users should implement proper procedures to ensure correct input data.

82. Identify and briefly discuss two primary causes of computer-related

health problems. Correct Answer:


CHAPTER 10 9e

Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes. The computer screen can be hard to read because of glare and poor contrast. Desks and chairs can also be uncomfortable. Keyboards and computer screens might be fixed in place or difficult to move. The hazardous activities associated with these unfavorable conditions are collectively referred to as work stressors. Although these problems might not be of major concern to casual users of computer systems, continued stressors such as repetitive motion, awkward posture, and eye strain can cause more serious and long-term injuries. If nothing else, these problems can severely limit productivity and performance.

83. In the modern workplace where many employees are using their

employer's computer technology for business, there are often two differing viewpoints regarding privacy: the organization's and the employees'. Describe each party's viewpoint and state your own opinionon this issue. Correct Answer: The right to privacy at work is also an important issue. Employers are using technology and corporate policies to manage worker productivity and protect the use of IS resources. Employers are mostly concerned about inappropriate web surfing, with over half of employers monitoring the web activity of their employees. Organizations also monitor employees’ email, with more than half retaining and reviewing messages. Statistics such as these have raised employee privacy concerns. In many cases, workers claim their right to privacy trumps their companies’ rights to monitor employee use of IS resources. However, most employers today have a policy that explicitly eliminates any expectation of privacy when an employee uses any company-owned computer, server, or email system. The Fourth Amendment protects individuals against unreasonable searches and seizures and requires that warrants be issued only upon probable cause and specifying the place to be searched and the persons or things to be seized. The courts have ruled that, without a reasonable expectation of privacy, there is no Fourth Amendment protection for the employee. Students' opinions will vary.

84. Imagine that you own your own business, and you have decided to

write your own code of ethics. List at least five "imperatives," or guidelines, that you would like to include in your company's code of ethics. Correct Answer:


CHAPTER 10 9e

Students' answers should include some of the following or similar statements:1. contribute to society and human well-being. 2.

avoid harm to others.

3.

be honest and trustworthy.

4.

be fair and take action not to discriminate.

5.

honor property rights including copyrights and patents.

6.

give proper credit for intellectual property.

7.

respect the privacy of others.

8.

honor confidentiality.


CHAPTER 10 9e

85. Imagine that you are faced with an ethical dilemma at work, and you must determine the "right," or ethical, course of action. List the eight steps you will go through to make this decision, including some of the questions you'll ask yourself at each step in the process. Correct Answer: Questions to Consider Step 1: Gather information • Have you spoken to everyone directly involved and gathered all

the factsnecessary to define the problem? • Have you avoided assuming facts, motivations, or actions for which there is no evidence? Step 2: Develop a problem statement • Do you know the answers to the following questions:  What do people observe that causes them to think there is a problem?  Who is directly affected by the problem?  Is anyone else affected?  How often does the problem occur?  What is the impact of the problem?  How serious is the problem?  What are the ethical issues involved?  When is a solution needed?

• Have you shared the problem statement with the stakeholders, and

do they concur? Step 3: Consult those involved as well as other appropriate resources • Have you discussed this issue with your manager? • Have you sought input from human resources, legal, or other

appropriate subject matter experts? Step 4: Identify options • Have you identified the success criteria for a “good solution?” • Have the stakeholders had an opportunity to offer solutions?

Step 5: Weigh options • How does each alternative fit with your organization’s code of ethics,

policies, regulations, and organizational norms?

• Is each alternative legal and consistent with industry standards?


CHAPTER 10 9e • Does each alternative have possible unintended consequences? If so,

how will


CHAPTER 10 9e

you deal with those? Step 6: Choose an option • Have you considered how choice of this option might appear to others? • Would you be comfortable explaining your decision and

describing your decision-making process to others?

• Is your decision grounded in a basic sense of fairness to all affected

parties? Step 7: Implement a solution • Have you provided to all stakeholders answers to the following

questions:  Why are we doing this?  What is wrong with the current way we do things?  What are the benefits of the new way for you? • Do you have a clear transition plan that explains to people how they

will movefrom the old way of doing things to the new way? Step 8: Review results • Were the success criteria fully met? • Were there any unintended consequences? • Is there a need for further refinements?


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.