Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 1, Testbank Course Title: Rainer, IS 5e Chapter Number: 1 Question type: Multiple Choice
1) Which of the following is a benefit of being an informed user of IT? a) Understanding what is “behind” applications you use in your organization b) Providing input to enhance your organization’s applications c) Helping to select new applications d) Keeping abreast of new technologies e) All of the above Answer: e Learning Objective: Identify the reasons why being an informed user of information systems is important in today’s world. Begin the process of becoming an informed user of your organization’s information systems. Section Reference: 1.1 Why Should I Study Information Systems? Difficulty: Easy Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge
2) To address the concerns and to enable nimble responses to the technologically evolving environment, what CIBC decided to undergo? a) Strategic consulting b) Digital transformation c) Digital marketing d) Financial Tech Answer: b Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 3) What was one project that had a particularly positive impact on CIBC’s endeavour to attain digital transformation? a) Live Labs b) A real-estate app c) A gadget review site d) An app consolidating restaurant reviews e) An app for customer service Answer: a Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s worldBloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 4) CIBC was recognized as the leader by Surviscor for which of the following? a) Mobile banking services b) Web applications c) Software Engineering d) Financial investment applications Answer: a Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1 Identify the reasons why being an informed user of information systems is important in today’s world.Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Synthesis 5) In terms of return on investment (ROI), before embarking on its digital transformation, CIBC’s sales from its digital channels made up _____.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) 2 percent or less of its revenue b) 2 percent of its revenue c) 3 percent or less of its revenue d) 3 percent of its revenue Answer: a Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 6) You should seek to be an informed user of IT because ____________. a) it is easy to understand how IT works b) you could end up working in the IT department in your organization c) everyone uses IT d) you will be in a position to enhance the quality of IT applications Answer: d Difficulty: Medium Section Reference 1: 1.1 Why Should I Study Information Systems? Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Comprehension 7) A connected golf course will include all of the following except_____________. a) 5G technology b) instant messaging c) location sensors d) underground fiber Answer: b Difficulty: Easy Section Reference 1: IT’s About Business 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : Blooms || Knowledge 8) Freightos allows shippers to __________________. a) track shipments b) manage employees c) receive bids from freight forwarders d) All of the above Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 9) The title of the executive who is in charge of the people, who design and build information systems. a) CEO b) CFO c) CIO d) CIS e) CIT Answer: c Difficulty: Easy Section Reference 1: 1.1 Why Should I Study Information Systems? Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 10) MIT Technology Review refers to young people as Homo ________. a) Conectums b) Conexus c) Technologus d) Techies Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 11) The top technology job is _________. a) CEO b) CFO c) CIO d) COO Answer: c Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 12) The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from _________. a) decreasingly; within the IS department b) decreasingly; other business units c) increasingly; within the IS department d) increasingly; other business units Answer: d Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
13) The ________ is the highest-ranking IS manager and is responsible for all strategic planning in the organization. a) applications development manager b) CIO c) information center manager d) IS Director Answer: b Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 14) The ________ manages all systems throughout the organization and the day-to-day operations of the entire IS organization. a) applications development manager b) CIO c) information center manager d) IS Director Answer: d Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 15) The ________ manages IS services such as help desks, hot lines, training, and consulting. a) Applications Development Manager b) CIO c) Information Centre Manager d) IS Director
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: c Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 16) The ________ coordinates and manages new systems development projects. a) applications development manager b) CIO c) information center manager d) IS Director Answer: a Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 17) A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications. a) business analyst b) emerging technologies manager c) systems analyst d) systems programmer Answer: c Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
18) A(n) ________ focuses on designing solutions for business problems and interfaces closely with users to demonstrate how IT can be used innovatively. a) business analyst b) emerging technologies manager c) systems analyst d) systems programmer Answer: a Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 19) A(n) ________ forecasts technology trends and evaluates and experiments with new technologies. a) business analyst b) emerging technologies manager c) systems analyst d) systems programmer Answer: b Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 20) A(n) ________ creates the computer code for developing new systems software or maintaining existing systems software. a) business analyst b) emerging technologies manager c) systems analyst
Rainer, Information System, Fifth Canadian Edition
Testbank
d) systems programmer Answer: d Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 21) Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this? a) Both end users and IT employees have responsibility for systems. b) Business people are customers of the IT department. c) If technology is not working, many firms cannot function. d) Technology is getting cheaper to acquire, operate, and maintain. Answer: d Difficulty: Medium Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 22) ________ is a traditional function of the MIS department. a) Creating business alliances with business partners b) Educating the MIS staff about the business c) Managing systems development d) Managing system integration including the internet, intranets, and extranets Answer: c Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 23) ________ is a traditional function of the MIS department. a) Initiating and designing specific strategic IS b) Managing system integration including the internet, intranets, and extranets c) Partnering with business-unit executives d) Staffing, training, and developing IS skills Answer: d Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 24) ________ is a traditional function of the MIS department. a) Educating the MIS staff about the business b) Initiating and designing specific strategic IS c) Proactively using business and technical knowledge to seed innovative ideas about IT d) Providing technical services Answer: d Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 25) ________ is a traditional function of the MIS department. a) Creating business alliances with business partners b) Educating the MIS staff about the business c) Initiating and designing specific strategic IS d) Managing computer operations, including the computer centre
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 26) ________ is a traditional function of the MIS department. a) Infrastructure planning, development, and control b) Initiating and designing specific strategic IS c) Managing outsourcing d) Partnering with business-unit executives Answer: a Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 27) ________ is a consultative function of the MIS department. a) Infrastructure planning, development, and control b) Managing computer operations including the computer center c) Managing system integration including the Internet, intranets, and extranets d) Staffing, training, and developing IS skills Answer: c Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
28) ________ is a consultative function of the MIS department. a) Educating the non-MIS managers about IT b) Infrastructure planning, development, and control c) Managing systems development d) Providing technical services Answer: a Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 29) ________ is a consultative function of the MIS department. a) Infrastructure planning, development, and control b) Partnering with business-unit executives c) Providing technical services d) Staffing, training, and developing IS skills Answer: b Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 30) ________ is a consultative function of the MIS department. a) Creating business alliances with business partners b) Infrastructure planning, development, and control c) Managing computer operations, including the computer center d) Managing systems development Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 31) ________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning. a) Data items b) Information c) Knowledge d) Wisdom Answer: a Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 32) ________ refers to organized data so that it has meaning and value to the recipient. a) Data items b) Information c) Knowledge d) Wisdom Answer: b Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
33) ________ is organized data and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem. a) Data items b) Information c) Knowledge d) Wisdom Answer: c Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 34) Your professor hands you a piece of paper with the number 75 on it. This is ________. a) data b) information c) knowledge d) wisdom Answer: a Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Application Standard 1 : AACSB || Technology Standard 2 : Blooms || Application 35) Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. This is ________. a) data b) information c) knowledge d) wisdom
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Application Standard 1 : AACSB || Technology Standard 2 : Blooms || Application 36) Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring that average up to a B by the end of the semester. This is ________. a) data b) information c) knowledge d) wisdom Answer: c Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Application Standard 1 : AACSB || Technology Standard 2 : Blooms || Application 37) Which of the following is in the correct order, starting with the most elementary? a) Data, information, knowledge b) Data, knowledge, information c) Information, data, knowledge d) Information, knowledge, data Answer: a Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : Blooms || Knowledge 38) ________ consists of devices such as the processor, monitor, keyboard, and printer. a) A database b) A network c) Hardware d) Software Answer: c Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 39) ________ is a program or collection of programs that enable the hardware to process data. a) A database b) A network c) Hardware d) Software Answer: d Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 40) ________ is a collection of related files or tables containing data. a) A database b) A network c) Hardware d) Software
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 41) ________ is a connecting system (wireline or wireless) that permits different computers to share resources. a) A database b) A network c) Hardware d) Software Answer: b Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 42) ________ are the instructions for combining components to process information and generate the desired output. a) Databases b) Networks c) People d) Procedures Answer: d Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : Blooms || Knowledge 43) ________ use the hardware and software, interface with it, or use its output. a) Databases b) Networks c) People d) Procedures Answer: c Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 44) IT services, IT personnel, and IT components make up the organization’s ___________. a) ERP system b) IT infrastructure c) IT platform d) TPS Answer: b Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 45) The IT ________ are/is the IT platform. a) components b) infrastructure c) personnel d) services
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 46) A(n) ________ supports the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data. a) DBS b) ERP c) FAIS d) TPS Answer: d Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 47) When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) ______________. a) analysis; APS b) analysis; TPS c) transaction; APS d) transaction; TPS Answer: d Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Application Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : Blooms || Application 48) A(n) ________ is an interorganizational system. a) ERP system b) human resources system c) supply chain system d) TPS Answer: c Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 49) Enterprise resource planning systems: a) were designed to process transactions faster. b) evolved because newer technologies made older systems obsolete. c) use a common database for all functional areas. d) are utilized to conduct site analyses. e) All the above statements are true. Answer: c Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Evaluation Standard 1 : AACSB || Technology Standard 2 : Blooms || Evaluation 50) ________ support managers at all levels of the organization. a) Clerical workers b) Knowledge workers c) Lower-level managers d) Middle managers
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 51) ________ handle the day-to-day operations of the organization and make routine decisions. a) Clerical workers b) Knowledge workers c) Lower-level managers d) Middle managers Answer: c Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 52) ________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control. a) Clerical workers b) Knowledge workers c) Lower-level managers d) Middle managers Answer: d Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : Blooms || Knowledge 53) ________ are professional employees such as financial and marketing analysts, engineers, lawyers, and accountants. a) Clerical workers b) Knowledge workers c) Lower-level managers d) Middle managers Answer: b Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 54) You decide to specialize in marketing for your first career. You take an entry-level position as XYZ Corp. This means you are a _________. a) clerical worker b) knowledge worker c) lower-level manager d) middle manager Answer: b Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Application Standard 1 : AACSB || Technology Standard 2 : Blooms || Application 55) BI systems provide computer-based primarily support _________. a) clerical workers b) factory workers c) lower-level managers
Rainer, Information System, Fifth Canadian Edition
Testbank
d) middle managers Answer: d Difficulty: Hard Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge, Evaluation Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 56) ________ attempt(s) to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain. a) Business Intelligence b) Dashboards c) Expert Systems d) Supply chain systems Answer: c Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 57) ________ support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports. a) BI b) Dashboards c) ES d) Supply chain systems Answer: b Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 58) According to IT’s About Business 1.2, investing in a powerful CRM software has enabled the Toronto Region Immigrant Employment (TRIEC) to? a) Reduce matching time b) Making more matches at a greatly reduced cost c) Scale their mentoring partnership d) All of the above Answer: d Difficulty: Easy Section Reference 1: IT’s About Business 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 59) What is an advantage of having the Salesforce CRM application is in the cloud?. a) the coaches do not have to be onsite and can check how the mentoring partnerships are progressing anytime and from anywhere. b) the coaches do not have to be onsite and can check how the mentoring partnerships are progressing anytime and from anywhere. c) the coaches do not have to be onsite but cannot check how the mentoring partnerships are progressing. d) the coaches do not have onsite and can check how the mentoring partnerships are progressing only at certain time but from anywhere. Answer: a Difficulty: Easy Section Reference 1: IT’s About Business 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 60) 64) Which of the following statements is false?
Rainer, Information System, Fifth Canadian Edition
Testbank
a) IT ultimately decreases the number of managers and experts. b) IT makes managers more productive. c) IT increases the number of employees who can report to a single manager. d) IT reduces stress by giving managers more time to make decisions. e) IT decreases the number of promotional opportunities. Answer: d Difficulty: Easy Section Reference 1: 1.3 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 61) Which of the following is TRUE? a) Computerization reduces our level of isolation. b) IT increases the number of middle managers. c) Managers have more time to make decisions. d) Remote supervision will probably become a norm. Answer: d Difficulty: Easy Section Reference 1: 1.3 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 62) ________ is NOT a problem caused by computers. a) Carpal tunnel syndrome b) Ergonomics c) Job stress d) Repetitive strain injuries Answer: b Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 1.3 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 63) ________ is the largest book publisher and bookseller in the World today. a) Amazon b) Google c) McGraw-Hill d) Wiley Answer: a Difficulty: Hard Section Reference 1: 1.3 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 64) IT makes managers ________ productive and ________ the number of employees who can report to a single manager. a) less; decreases b) less; increases c) more; decreases d) more; increases Answer: d Difficulty: Medium Section Reference 1: 1.3 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 65) Law enforcement uses drones for what purpose?
Rainer, Information System, Fifth Canadian Edition
Testbank
a) search and rescue b) active shooter scenarios c) crime scene analysis d) All of the choices are correct. Answer: d Difficulty: Medium Section Reference 1: IT’s About Business 1.3 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 66) Wineries use drones equipped with sensors to detect. a) thieves trying to steal the grapes b) insects c) moisture d) None of the choices are correct. Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 1.3 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 67) Which of the following statements about drones is NOT true/ a) Drones are more effective monitoring tools than fixed security cameras.b) Drones are less cost effective when compared to police helicopters. c) There has been a 500 percent increase in law enforcement drone use since 2016 d) Law enforcement has used drones internationally. Answer: b Difficulty: Easy Section Reference 1: IT’s About Business 1.3
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 68) Winemakers have turned to drones to combat ___________. a) drinking age regulations b) global warming c) thieves stealing grapes d) illegal migration Answer: b Difficulty: Easy Section Reference 1: IT’s About Business 1.3 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 69) Which of the following is an obstacle towards law enforcement agencies increasing their reliance on drones. a) Companies cannot produce the drones fast enough. b) Drone capability is very limited. c) There are many government regulations associated with using drones. d) Citizens are uneasy with drone usage by law enforcement agencies. Answer: d Difficulty: Easy Section Reference 1: IT’s About Business 1.3 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 70) Which of the following is NOT a benefit of IT?
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Accessibility b) Flexibility c) Quality of leisure time d) Quantity of leisure time Answer: d Difficulty: Medium Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 71) ________ is an example of a social, collaborative, industrial robot. a) Baxter b) LoweBot c) MyBot d) Watson Answer: a Difficulty: Medium Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 72) In October 2016, an Uber self-driving truck (with a driver onboard) delivered a) 50,000 cans of beer at the end of a nearly 100-kilometre, two-hour journey. b) 50,000 cans of beer at the end of a nearly 200-kilometre, two-hour journey. c) 5000 cans of beer at the end of a nearly 200-kilometre, two-hour journey. d) 50,000 cans of beer at the end of a nearly 200-kilometre, one-hour journey.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: East Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 73) Self-driving cars made by ________ have been blamed for several fatalities. a) Ford b) Google c) Tesla d) Volvo Answer: c Difficulty: Easy Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 74) ________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service. a) Baxter b) LoweBot c) MyBot d) Watson Answer: d Difficulty: Easy Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : Blooms || Knowledge 75) IBM developed ________ to answer questions on the quiz show Jeopardy! a) Baxter b) LoweBot c) MyBot d) Watson Answer: d Difficulty: Easy Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 76) Which of the following is a negative consequence associated with John Deere’s digital transformation? a) The company has been losing revenue. b) Consumers have stopped buying tractors. c) Consumers are unable to have their equipment serviced. d) The company has had to increase its advertising drastically. Answer: c Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 77) Much of the unlicensed alternative software independent machinery repair shops buy comes from ________ . a) Ukraine b) Mexico c) China
Rainer, Information System, Fifth Canadian Edition
Testbank
d) The United States Answer: a Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 78) The John Deere Operations center is a _______ platform. USPS’s IMB system is a type of ________. a) social media b) drone c) inventory management d) cloud computing Answer: d Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Synthesis Question type: True/False 79) CIBC decided to undergo a digital transformation to address the concerns and to enable nimble responses to the technologically evolving environment. . Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 80) CIBC stands out by supporting diverse mobile touch-points and excelling at marketing and sales with features such as pre-approved offers and pre-filled applications in the mobile app.. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 81) CIBC was the first Canadian bank to launch a mobile banking Google Watch App that enables customers to check their balance and transactions, transfer funds between accounts, locate a CIBC branch or ATM.. Answer: False Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world.. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 82) Natural language voice search for mobile banking is an in-app voice command that allows users of the CIBC mobile banking app to access various features and to explore products with a simple voice prompt. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
83) Before embarking on its digital transformation, CIBC’s sales from its digital channels made up 2 percent or less of its revenue, this number increased to 20 percent in two years after the bank engaged in digital transformation. Answer: False Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Analysis Standard 1 : AACSB || Technology Standard 2 : Blooms || Analysis 84) Wendy’s was one of the first companies in the fast food industry to utilize self-serve kiosks. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 85) Amazon is entering the freight forwarding business. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 86) If you grew up using IT, you are an informed user. Answer: False Difficulty: Medium Section Reference 1: 1.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Analysis Standard 1 : AACSB || Technology Standard 2 : Blooms || Analysis 87) Only computer science majors can become CIOs. Answer: False Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 88) Career opportunities in IS are strong and are projected to remain strong over the next 10 years. Answer: True Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 89) The new, consultative function of the MIS department centers on more efficient project management, technical training, and effective infrastructure planning. Answer: False Difficulty: Medium Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Comprehension, Analysis Standard 1 : AACSB || Technology Standard 2 : Blooms || Comprehension, Analysis
Rainer, Information System, Fifth Canadian Edition
Testbank
90) The traditional function of the MIS department centers on the idea that end users do not have the required technical expertise to address IT issues. Answer: True Difficulty: Hard Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Synthesis Standard 1 : AACSB || Technology Standard 2 : Blooms || Synthesis 91) Data is more elementary than information and knowledge. Answer: True Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 92) Information is knowledge that has been organized to have meaning and value. Answer: False Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 93) The same data items, with no context, can mean entirely different things in different contexts. Answer: True
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 94) Data and information are synonyms. Answer: False Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 95) The IT components make up the IT platform. Answer: True Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 96) The IT infrastructure and IT platform are synonyms. Answer: False Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : Blooms || Knowledge 97) A departmental information system can also be called an FAIS. Answer: True Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 98) ERPs are organization-wide systems that are designed to correct a lack of communication among FAISs. Answer: True Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Comprehension Standard 1 : AACSB || Technology Standard 2 : Blooms || Comprehension 99) TPS are critical to the success of any enterprise. Answer: True Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 100) TPS typically collect data in batches. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 101) BI systems provide the input data for corporate databases. Answer: False Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 102) Nearly all TPSs are ERP systems. Answer: False Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 103) Nearly all ERP systems are also TPSs. Answer: True Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : Blooms || Knowledge 104) Investing in a powerful CRM software has enabled TRIEC to reduce matching time. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 105) By using the ERP software, TRIEC completed 1,802 mentoring matches in the partnership program in 2017–2018. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 106) In order to better help newcomers to find jobs that are in line with their expertise, TRIEC makes use of a Customer Relationship Management. Answer: True Difficulty: Easy Section Reference 1: 1.3 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Synthesis Standard 1 : AACSB || Technology Standard 2 : Blooms || Synthesis 107) When IT eliminates jobs, new jobs do not take their place. This means computers will replace us all eventually.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Medium Section Reference 1: 1.3 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Comprehension Standard 1 : AACSB || Technology Standard 2 : Blooms || Comprehension 108) Law enforcement’s usage of drones has increased dramatically since 2016. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 1.3 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 109) The use of a single, quadcopter drone in the city of Ensenada, Mexico, has helped to reduce overall crime by some 10 percent, including a 30 percent decrease in burglaries. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 1.3 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 110) Employees are more likely to work on vacation thanks to IT. Answer: True Difficulty: Easy Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 111) Watson is a cognitive computing system. Answer: True Difficulty: Easy Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 112) Companies like John Deere and Apple oppose right-to-repair legislation. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 113) John Deere embeds GPS receivers into their farm equipment. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge Question type: Text Entry
Rainer, Information System, Fifth Canadian Edition
Testbank
114) A(n) ___ is a person knowledgeable about information systems and information technology. Answer: informed user Difficulty: Easy Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 115) Information technology refers to any ___-based tool that people use to work with information and to support the information and information-processing needs of an organization. Answer: computer Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 116) The purpose of ___ has been defined as getting the right information to the right people at the right time in the right amount and in the right format. Answer: information systems (or information technology) Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 117) ___ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: Data items Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 118) ___ refers to data that have been organized so that they have meaning and value to the recipient. Answer: Information Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 119) ___ consists of data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem. Answer: Knowledge Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 120) ___ consists of devices such as the processor, monitor, keyboard, and printer. Answer: Hardware Difficulty: Easy Section Reference 1: 1.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 121) ___ is a program or collection of programs that enable the hardware to process data. Answer: Software Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 122) A ___ is a collection of related files or tables containing data. Answer: database Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 123) A ___ is a connecting system (wireline or wireless) that permits different computers to share resources. Answer: network Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
124) ___ are the instructions for combining components to process information and generate the desired output. Answer: Procedures Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 125) ___ use the hardware and software, interface with it, or use its output. Answer: People Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 126) A ___ supports the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data. Answer 1: transaction processing system Answer 2: TPS Difficulty: Easy Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge 127) A ___ is an unmanned aerial vehicle that either is controlled by pilots from the ground or autonomously follows a preprogrammed mission.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: drone Difficulty: Easy Section Reference 1: 1.4 Learning Objective 1: Identify positive and negative societal effects of the increased use of information technology. Bloomcode: Knowledge Standard 1 : AACSB || Technology Standard 2 : Blooms || Knowledge Question type: Essay 128) What is the difference between a technology user and an informed user? Why would someone want to be an informed user? How could being an informed user benefit you right now in your workplace or at your college/university? Answer: Technology user vs. informed user = informed users understand the system(s) they are using Want to be = get more value from systems being used Benefit right now = understand what is behind them (being able to judge if what you see is correct or not), enhance quality of the system by providing input, possibly recommend and select IT applications the organization should use, keeping abreast of the newest technologies (recommend adoption), improve own performance and teamwork, or start own business Difficulty: Medium Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Application Standard 1 : AACSB || Communication, Analytic, Technology, Reflective Thinking Standard 2 : Blooms || Application 129) End users are more frequently becoming part of the IT department. Since there is a possibility you could join the IT department in the future even if you don’t plan to do so right now, which five IT positions are the most attractive to you and why? Answer: “Techie” students will probably choose jobs like systems programmer, applications programmer, database administrator, webmaster, and web designer; business-oriented students should describe the other positions with those more tech-willing focusing on jobs like network manager, auditing or computer security manager, programming manager, operations manager, and systems analyst.
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Hard Section Reference 1: 1.1 Learning Objective 1: Identify the reasons why being an informed user of information systems is important in today’s world. Bloomcode: Evaluation Standard 1 : AACSB || Communication, Analytic, Technology, Reflective Thinking Standard 2 : Blooms || Evaluation 130) In your own words, define data, information, and knowledge. Use an example from your own life to explain the difference between these terms. Answer: Data items refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning. Information refers to data that have been organized so that they have meaning and value to the recipient. Knowledge consists of data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem. Data = 65
Rainer, Information System, Fifth Canadian Edition
Testbank
Information = 65 mph Knowledge = going the speed limit in a particular area because everyone knows a policeman sits in that particular spot Difficulty: Medium Section Reference 1: 1.2 Learning Objective 1: Describe the various types of computer-based information systems in an organization. Bloomcode: Application Standard 1 : AACSB || Communication, Technology, Reflective Thinking Standard 2 : Blooms || Application 131) The book provides several examples of how IT impacts entire industries. Discuss how IT has impacted the transportation and travel industry (think about taxis, travel websites, etc.). Answer: Students could discuss companies like Uber that has changed the taxi industry, Airbnb that has changed how people get a place to stay on vacation, any travel site like Travelocity – people don’t have to depend on waving a taxi driver down, finding a hotel, using a travel agent, etc.) Difficulty: Hard Section Reference 1: 1.3 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Synthesis Standard 1 : AACSB || Communication, Analytic, Technology, Reflective Thinking Standard 2 : Blooms || Synthesis 132) How has IT positively and negatively affected the quality of your life and society as a whole? While this is partially opinion, your answer should be informed by material in the book. Answer: There is no right answer to this question, but the student should/could discuss: Positives – • Continuous access to information, everywhere (continuous computing) • Ability to do pretty much anything on smartphones (classes, pay bills, purchase goods, banking, etc.) • More career opportunities • Better customer service • So much free stuff (paid for by ads on huge social networks, etc.) • Industry changes benefit us (book, music, video, software, etc.) • Health and safety improvements • More opportunities for people with disabilities or who need/want to work from home • Robots to do our chores
Rainer, Information System, Fifth Canadian Edition
Testbank
Negatives – • We can’t really get away and relax • IT has eliminated many careers (and likely will in the future) • Too easy to steal (piracy is a big problem) • Dangerous (phones while driving) • Drone dilemmas (spying, etc.) Difficulty: Medium Section Reference 1: 1.3, 1.4 Learning Objective 1: Discuss ways in which information technology can affect managers and nonmanagerial workers. Bloomcode: Application, Evaluation Standard 1 : AACSB || Communication, Analytic, Technology, Reflective Thinking Standard 2 : Blooms || Application, Evaluation
Package Title: Chapter 2, Testbank Course Title: Rainer, IS 8e Chapter Number: 2 Question type: Multiple Choice 1) Maple Leaf Sports & Entertainment (MLSE), sees digital innovation as an integral part of the organization. One of the areas of digital transformation at MLSE is the a) development of ERPs b) development and improvement of apps c) development of blockchain d) development of E-commerce Answer: B Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard: AACSB Technology 2) What is the Maple Leaf Sports & Entertainment (MLSE) digital lab called? a) Future of Sport Lab (FSL) b) Hockey e-lab (HeL) c) E-learning MLSE lab d) Social Media Sports lab Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard: AACSB Technology 3 The Raptors developed an information known as Sports Insights Central and makes use of several of IBM’s famous Watson artificial intelligence functionalities. What can the Watson Tradeoff analytics function assemble?
a) Bets from people looking at the most optimal bet for the team b) A combination of weather reports and games c) “Dream team” player combinations d) Business Analytics for team performance Answer: C Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard: AACSB Technology 4) _________ are materials, services, and information that flow through and are transformed as a result of process activities. a) Employees b) Inputs c) Outputs d) Resources Answer: b Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 5) _________ are people and equipment that perform process activities. a) Employees b) Inputs c) Outputs d) Resources Answer: d Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area.
Bloomcode: Knowledge Standard 1 : AACSB || Technology 6) _________ are the product or service created by the process. a) Employees b) Inputs c) Outputs d) Resources Answer: c Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 7) _________ is an example of effectiveness. a) Automating order entry b) Increasing customer satisfaction c) Reducing production time by one day d) Using RFID to track products Answer: b Difficulty: Hard Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Evaluation Standard 1 : AACSB || Technology 8) _________ is an example of efficiency. a) Automating order entry b) Increasing customer satisfaction c) Improving product quality d) Reducing employee turnover Answer: a
Difficulty: Hard Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Evaluation Standard 1 : AACSB || Technology 9) Procurement processes are NOT completed by _________. a) accounting b) purchasing c) sales d) warehouse Answer: c Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 10) Fulfillment processes are NOT completed by __________. a) accounting b) purchasing c) sales d) warehouse Answer: b Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 11) With hundreds of these projects on the go, Graham Construction’s success relies on __________
a) technology expertise b) control of project expenses) leadership d) funding of Microsoft Answer: b Difficulty: Easy Section Reference 1: IT’s About Business 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 12) Graham Construction developed a new information system that allows front line employees to report expenses on the go using their smartphones whenever and wherever they are. The new system allows the company to: a) faster reimbursements b) less time-consuming reporting c) a mobile paperless process d) all of the above Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 13) Which of the following problem did the previous system used by Graham Construction present: a) It was user, approver, and workflow unfriendly, and many expenses were inaccurately coded and many of them were not attributed to the right building project. b) The previous system was user, approver, and project cost management unfriendly, and many project management activities were not coded properly and many of them were not attributed to the right building project. c) The previous system was user, approver, and workflow friendly but not functional, and many expenses were inaccurately coded and many of them were not attributed to the right building project. d)
The previous system was user, approver, and workflow unfriendly, and many expenses were inaccurately calculated and many of them were not credited to the right building project. Answer: a Difficulty: Easy Section Reference 1: IT’s About Business 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 14) _________ is the result of optimizing and aligning business processes to fulfill customers’ needs, wants, and desires. a) Customer satisfaction b) Differentiation c) Productivity d) Quality Answer: a Difficulty: Medium Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 15) _________ is the result of optimizing operations and supplier processes. a) Cost reduction b) Differentiation c) Productivity d) Quality Answer: a Difficulty: Hard Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology
16) _________ is the result of optimizing the manufacturing and logistics processes. a) Cost reduction b) Cycle and fulfillment time reduction c) Productivity d) Quality Answer: b Difficulty: Hard Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 17) _________ is the result of optimizing the design, development, and production processes. a) Cycle and fulfillment time reduction b) Differentiation c) Productivity d) Quality Answer: d Difficulty: Hard Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 18) _________ is the result of optimizing the marketing and innovation processes. a) Customer satisfaction b) Cycle and fulfillment time reduction c) Differentiation d) Productivity Answer: c Difficulty: Hard
Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 19) _________ is the result of optimizing each individuals’ work processes. a) Cycle and fulfillment time reduction b) Differentiation c) Productivity d) Quality Answer: c Difficulty: Medium Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 20) _________ uses a “clean sheet” perspective. a) BPC b) BPI c) BPM d) BPR Answer: d Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 21) Many organizations find _________ too difficult, too radical, too lengthy, and too comprehensive. a) BPC b) BPI
c) BPM d) BPR Answer: d Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 22) _________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs. a) BPC b) BPI c) BPM d) BPR Answer: b Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 23) BPI is typically performed by ___________. a) clerical workers b) executives c) knowledge workers d) low-level managers Answer: c Difficulty: Hard Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Synthesis
Standard 1 : AACSB || Technology 24) Six Sigma is a popular _________ technique. a) BPC b) BPI c) BPM d) BPR Answer: b Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 25) The correct order of the BPI phases is ___________. a) analyze, control, define, measure, improve b) analyze, define, control, improve, and measure c) define, analyze, measure, control, improve d) define, measure, analyze, improve, and control Answer: d Difficulty: Medium Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 26) In the _________ phase of BPI, the BPI team documents the existing “as is” process activities, process resources, and process inputs and outputs. a) analysis b) control c) define d) improve e) measure
Answer: c Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 27) In the _________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time. a) analysis b) control c) define d) improve e) measure Answer: e Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 28) In the _________ phase of BPI, the BPI team examines the “as is” process map and the collected data to identify problems with the process and their root causes. a) analysis b) control c) define d) improve e) measure Answer: a Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology
29) In the _________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting “to be” process alternatives, and selects and implements the most appropriate solution. a) analysis b) control c) define d) improve e) measure Answer: d Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 30) In the _________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable. a) analysis b) control c) define d) improve e) measure Answer: b Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 31) When you map out how your business currently processes customer orders to figure out how to reduce delivery time, this is part of the _________ phase of BPI. a) analysis
b) control c) define d) improve e) measure Answer: c Difficulty: Medium Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Comprehension, Application Standard 1 : AACSB || Technology 32) When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the _________ phase of BPI. a) analysis b) control c) define d) improve e) measure Answer: a Difficulty: Medium Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Comprehension, Application Standard 1 : AACSB || Technology 33) When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI. a) analysis b) control c) define d) improve e) measure Answer: d Difficulty: Medium
Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Comprehension, Application Standard 1 : AACSB || Technology 34) _________ integrates disparate BPI initiatives to ensure consistent strategy execution. a) BPC b) BPM c) BPR d) BPS Answer: b Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 35) Chevron identified their desired outputs and then worked backward by examining the supporting processes. They used a holistic approach that led the company to examine the interdependencies among processes used in different business units. This is a _________ approach. a) BPC b) BPI c) BPM d) BPR Answer: d Difficulty: Easy Section Reference 1: IT’s About Business 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology
36) Chevron’s initial effort to update its business processes was followed by several smaller, employee-driven _________ initiatives (many that used the Six Sigma improvement methodology). a) BPC b) BPI c) BPM d) BPR Answer: b Difficulty: Easy Section Reference 1: IT’s About Business 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 37) Chevron supported internal improvement efforts by getting its suppliers involved using a unified _________ approach that involved standardizing processes across the entire company and consolidating process information within a central repository. a) BPC b) BPI c) BPM d) BPR Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 38) Chevron improved their business processes using _______________. a) BPI then BPM then BPR b) BPI then BPR then BPM c) BPM then BPR then BPI d) BPR then BPI then BPM Answer: d
Difficulty: Medium Section Reference 1: IT’s About Business 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 39) Globalization is a _________ pressure. a) market b) societal c) technology d) nonexistent Answer: a Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 40) Information overload is a _________ pressure. a) market b) societal c) technology d) nonexistent Answer: c Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 41) The BYOD phenomenon is a _________ pressure. a) market b) societal c) technology
d) nonexistent Answer: c Difficulty: Medium Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 42) The digital divide is an issue associated with a _________ pressure. a) market b) societal c) technology d) nonexistent Answer: b Difficulty: Medium Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 43) Compliance with government regulations is a _________ pressure. a) market b) societal c) technology d) nonexistent Answer: b Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 44) _________ is a market pressure. a) globalization
b) information overload c) protection against terrorist attacks d) technological innovation and obsolescence Answer: a Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 45) _________ is a technology pressure. a) Globalization b) Information overload c) Protection against terrorist attacks d) Reducing the digital divide Answer: b Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 46) _________ is a societal pressure. a) Globalization b) Information overload c) Protection against terrorist attacks d) Technological innovation and obsolescence Answer: c Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology
47) American companies can easily do business with Chinese companies. This is phenomenon is called ________. a) globalization b) information overload c) protection against terrorist attacks d) technological innovation and obsolescence Answer: a Difficulty: Medium Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Application Standard 1 : AACSB || Technology 48) The internet makes customers _________ powerful; this is a _________ pressure. a) less; market b) less; societal c) more; market d) more; societal Answer: c Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 49) _________ represents a huge challenge for IT departments because it means IT loses the ability to fully control and manage employee devices. a) BYOD b) ERP c) RFID d) TPS Answer: a Difficulty: Medium Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures.
Bloomcode: Knowledge Standard 1 : AACSB || Technology 50) _________ is a challenge of BYOD. a) Control b) Cost c) Productivity d) Satisfaction Answer: a Difficulty: Hard Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Evaluation Standard 1 : AACSB || Technology 51) Which of the following is NOT an organizational response to business pressures? a) Creating a digital divide b) Developing strategic systems c) Focusing on customer wants d) Mass customization Answer: a Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 52) Ford’s original strategy was _________. a) configured mass customization b) consumer segmentation c) mass customization d) mass production Answer: d Difficulty: Hard
Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 53) _________ involves companies providing standard specifications for different consumer groups. a) Configured mass customization b) Consumer segmentation c) Mass customization d) Mass production Answer: b Difficulty: Medium Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 54) _________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers. a) Configured mass customization b) Consumer segmentation c) Mass customization d) Mass production Answer: c Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 55) Royal Caribbean Cruises is digitally transforming its fleet of 49 ships. To help drive this transformation, the ships feature a mobile app for passengers and crew that includes:.
a) Online gaming b) E-commerce c) Machine learning d) Enterprise Resource Planning Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 2.3 Learning Objective 1: Differentiate among business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard: AACSB Technology 56) Royal Caribbean’s ships feature robot WOWbands. These are: a) Bands that uses radio frequency identification wristbands that allow guests to make on-board purchases and access staterooms. b) Bands that are used to access internet services c) Bands that are used to transmit GPS positions in case of emergency situations d) Bands that are used to broadcast passengers’ temperature to monitor health status Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 2.3 Learning Objective 1: Differentiate among business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard: AACSB Technology 57) Royal Caribbean is using virtual reality (VR) technology to provide passengers in inside cabins with views of the sea, with this technology passengers can: a) View cabins before purchasing tickets b) See these views from their virtual balconies c) Play at a virtual casino d) View under the sea Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 2.3 Learning Objective 1: Differentiate among business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard: AACSB Technology
58) What can be a reason to enhance customer experience for the integration of a wearable device such as Medallion with Ocean Compass? __________. a) The integration allows the passenger to order movies for entertainment. b) The integration allows the company to detect if payment to tickets was made before the passenger boards the ship. c) With a technology such as machine learning, it is possible to analyze passenger behaviour and provide personalized recommendations d) This integration allows the user to order drinks and food directly from the wearable device. Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 2.3 Learning Objective 1: Differentiate among business process reengineering, business process improvement, and business process management. Bloomcode: Application Standard: AACSB Technology 59) Bank of America set up a _________ cloud after the financial crisis of 2007–2008. a) Hybrid b) Open c) Private d) Public Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 2.4 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Learning Objective 2: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 60) Which of the following is NOT a benefit of Bank of America’s new software-defined infrastructure cloud? a) Cost b) Flexibility
c) Scalability d) Security Answer: a Difficulty: Medium Section Reference 1: IT’s About Business 2.4 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Learning Objective 2: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 61) Bank of America retired more than _________ applications after the financial crisis of 2007– 2008. a) 100 b) 5,000 c) 18,000 d) 100,000 Answer: c Difficulty: Hard Section Reference 1: IT’s About Business 2.4 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Learning Objective 2: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 62) Information-based industries are most susceptible to which one of Porter’s five forces? a) Threat of entry of new competitors b) Bargaining power of suppliers c) Bargaining power of customers d) Threat of substitute products e) Rivalry among existing firms in an industry Answer: d Difficulty: Easy Section Reference 1: 2.4
Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 63) Competitive advantage for an organization manifests itself as all of the following except: a) Lower costs b) Higher quality c) Increased time to market d) Increased profits e) Increased speed Answer: c Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 64) For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry. a) Decreases, increasing b) Increases, decreasing c) Increases, increasing d) Decreases, decreasing Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 65) _____ is a feature that must be offered by a competing organization in order to survive in the marketplace.
a) Competitive advantage b) An entry barrier c) Strategic advantage d) Rapid time-to-market e) One-to-one marketing Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 66) The threat of competitors’ entering the automobile manufacturing industry is _____ because barriers to entry are so _____. a) Low, low b) High, high c) High, low d) Low, high Answer: d Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Comprehension Standard 1 : AACSB || Technology 67) The best-known framework for analyzing competitiveness is ________’s competitive forces model. a) Job b) Gates c) Mintzberg d) Porter Answer: d Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology
68) Porter’s competitive forces model identifies _________ major forces that can endanger or enhance a company’s position in a given industry. a) 3 b) 4 c) 5 d) 6 Answer: c Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 69) The threat of new competitors will enter your market is _________ when entry is easy and _________ when there are significant barriers to entry. a) high; high b) high; low c) low; high d) low; low Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 70) The threat of new competitors will enter your market is high when entry is _________ and low when there are _________ barriers to entry. a) easy; few b) easy; significant c) hard; few d) hard; significant
Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 71) Supplier power is _________ when buyers have few choices from whom to buy and _________ when buyers have many choices. a) high; high b) high; low c) low; high d) low; low Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 72) Supplier power is high when buyers have _________ choices from whom to buy and low when buyers have _________ choices. a) few; few b) few; many c) many; few d) many; many Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology
73) Buyer power is _________ when buyers have many choices from whom to buy and _________ when buyers have few choices. a) high; high b) high; low c) low; high d) low; low Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 74) Buyer power is high when buyers have _________ choices from whom to buy and low when buyers have _________ choices. a) few; few b) few; many c) many; few d) many; many Answer: c Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 75) If there are many alternatives to an organization’s products or services, then the threat of substitutes is _________; if there are few alternatives, then the threat is ______. a) high; high b) high; low c) low; high d) low; low Answer: b
Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 76) If there are _________ alternatives to an organization’s products or services, then the threat of substitutes is high; if there are _________ alternatives, then the threat is low. a) few; few b) few; many c) many; few d) many; many Answer: c Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 77) The threat from rivalry is _________ when there is intense competition among many firms in an industry and _________ when competition is not as intense. a) high; high b) high; low c) low; high d) low; low Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 78) You have to offer online banking if you want to operate a bank. This is a(n) ________.
a) buyer power b) entry barrier c) substitute product d) supplier power Answer: b Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Application Standard 1 : AACSB || Technology 79) Which of the following increases supplier power? a) Globalization b) Integrated supply chains c) Intermediation d) Internet searching Answer: b Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Application, Synthesis Standard 1 : AACSB || Technology 80) Which of the following reduces buyer power? a) Globalization b) Loyalty programs c) Intermediation d) Internet searching Answer: b Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Application, Synthesis
Standard 1 : AACSB || Technology 81) Threat of substitute products or services refers to companies _________ the industry; rivalry refers to companies _________ the industry. a) inside; inside b) inside; outside c) outside; inside d) outside; outside Answer: c Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Evaluation Standard 1 : AACSB || Technology 82) _________ industries experience the greatest threat from substitutes. a) Information-based b) Manufacturing c) Product-based d) Retail Answer: a Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Application Standard 1 : AACSB || Technology 83) _________ are the costs, in money and time, imposed by a decision to buy elsewhere. a) Entry barriers b) Loyalty programs c) Substitute products d) Switching costs Answer: d
Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 84) You live in a small town with only one large retailer. This means there is low ______. a) buyer power b) supplier power c) threat of new entrants d) threat of substitutes Answer: a Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Application Standard 1 : AACSB || Technology 85) Your business manufactures motors. Based on prices and shipping, you only have one business as an option to buy bearings. This means there is high _________. a) buyer power b) supplier power c) threat of new entrants d) threat of substitutes Answer: b Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Application Standard 1 : AACSB || Technology 86) The music and newspaper industries were hurt primarily by _________.
a) buyer power b) supplier power c) threat of new entrants d) threat of substitutes Answer: d Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Synthesis, Evaluation Standard 1 : AACSB || Technology 87) Organization’s use Porter’s competitive forces model to design _________ strategies; they use the value chain model to identify _________ activities to make the greatest impact. a) general; general b) general; specific c) specific; general d) specific; specific Answer: b Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 88) Primary activities _________ add value directly to the firm’s products or services; support activities _________ add value directly to the firm’s products or services. a) do; do b) do; do not c) do not; do d) do not; do not Answer: b Difficulty: Easy Section Reference 1: 2.4
Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 89) _________ is an example of a support activity for most firms. a) Inbound logistics b) Marketing and sales c) Operations d) Product and technology development Answer: d Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 90) _________ is an example of a primary activity for most firms. a) Human resource management b) Operations c) Procurement d) Product and technology development Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 91) Which of the following has the strategy “I can sell at a lower price than you can”? a) Cost leader b) Customer oriented c) Differentiation d) Innovation
e) Operational effectiveness Answer: a Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 92) Walmart’s strategy is _________. a) cost leader b) customer oriented c) differentiation d) innovation Answer: a Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Application Standard 1 : AACSB || Technology 93) Which of the following has the strategy “I am better because I am different”? a) Cost leader b) Customer oriented c) Differentiation d) Innovation e) Operational effectiveness Answer: c Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology
94) Rolex’s strategy is ________. a) cost leader b) differentiation c) innovation d) operational effectiveness Answer: b Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Evaluation Standard 1 : AACSB || Technology 95) Which of the following has the strategy “I’m doing something new and you can’t catch up”? a) Cost leader b) Customer oriented c) Differentiation d) Innovation e) Operational effectiveness Answer: d Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 96) Car and technology companies are currently competing over who can offer the first selfdriving car. This is an example of a(n) _________ strategy. a) cost leader b) customer oriented c) differentiation d) innovation e) operational effectiveness Answer: d
Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Synthesis Standard 1 : AACSB || Technology 97) Which of the following has the strategy “I can do the same thing more efficiently than you can”? a) Cost leader b) Customer oriented c) Differentiation d) Innovation e) Operational effectiveness Answer: e Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 98) You decide to integrate your supply chain to cut down production time. This is an example of a(n) _________ strategy. a) cost leader b) customer oriented c) differentiation d) innovation e) operational effectiveness Answer: e Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Synthesis Standard 1 : AACSB || Technology
99) Which of the following has the strategy “I treat my customers better than you do”? a) Cost leader b) Customer oriented c) Differentiation d) Innovation e) Operational effectiveness Answer: b Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 100) Which of the following is NOT an example of excellent alignment? a) Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams. b) Organizations view their internal and external customers and their customer service function as supremely important. c) Organizations rotate business and IT professionals across departments and job functions. d) Organizations allow IT employees to develop overarching goals for the business. e) Organizations ensure that IT employees understand how the company makes or loses money. f) Organizations create a vibrant and inclusive company culture. Answer: d Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1: AACSB || Technology 101) Robotic pizza delivery currently exists in __________. a) Africa b) China c) Europe d)The United States
Answer: C Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard: AACSB || Technology 102) In addition to improving their pizzas, __________ improved its ordering process with digital technologies such as a voice-ordering chatbot and a robot delivery system. a) Domino’s b) Little Caesars c) Papa John’s d) Pizza Hut Answer: A Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard: AACSB || Technology Question Type: True/False 103) One of the areas of digital transformation at Maple Leaf Sports & Entertainment (MLSE), is the development and improvement of apps such as the Scotiabank Arena app. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard: AACSB || Technology 104)
Advanced analytics and data presentation technologies help MSLE make the right decisions when hiring players... Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Comprehension Standard: AACSB || Technology 105) Customers of a business process can be either internal or external to the organization. Answer: True Difficulty: Medium Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 106) A retailer is an example of an internal customer to a manufacturer. Answer: False Difficulty: Hard Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Synthesis Standard 1 : AACSB || Technology 107) The two fundamental metrics that organizations employ in assessing their processes are efficiency and effectiveness. Answer: True Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge
Standard 1 : AACSB || Technology 108) Efficiency focuses on doing things well in the process. Answer: True Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 109) Effectiveness focuses on doing the things that matter. Answer: True Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 110) Efficiency focuses on high quality products. Answer: False Difficulty: Medium Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Application Standard 1 : AACSB || Technology 111) Effectiveness focuses on progressing from one activity to another without delay or without wasting money or resources. Answer: False Difficulty: Medium Section Reference 1: 2.1
Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Application Standard 1 : AACSB || Technology 112) No single functional area is responsible for cross-functional business processes. Answer: True Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Comprehension Standard 1 : AACSB || Technology 113) An organization’s business processes can be a competitive advantage or disadvantage. Answer: True Difficulty: Medium Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 114) For project management, Graham Construction’s success relies on the control of project expenses for these projects to be more manageable and within budget Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 115) Part of the problem with Graham Construction’s with management of project expenses was that employees could not report expenses right away but had to store receipts, save them, and then do the job when they got back to their offices, the next day, and often even weeks later
Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 116) BPI delivers the same huge performance gains promised by BPR. Answer: False Difficulty: Medium Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 117) BPI projects tend to be performed from the bottom up while BPR projects tend to involve top-down change mandates. Answer: True Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 118) Organizations can adopt BPR to sustain BPI efforts over time. Answer: False Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology
119) Organizations can adopt BPM to sustain BPR efforts over time. Answer: False Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 120) Chevron primarily used BPC to save money. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 121) Chevron originally improved supplier relationships to save money on shipping. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 122) Chevron used BPR, BPI, and BPM to achieve operational excellence. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management.
Bloomcode: Knowledge Standard 1 : AACSB || Technology 123) A workforce including more women, single parents, minorities, and persons with disabilities puts societal pressure on organizations. Answer: False Difficulty: Hard Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Evaluation Standard 1 : AACSB || Technology Standard 1 : AACSB || Diversity 124) The internet makes customers more powerful. Answer: True Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 125) Mass customization is also called make-to-order. Answer: True Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 126) E-commerce is a broader concept than e-business. Answer: False Difficulty: Medium Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures.
Bloomcode: Knowledge Standard 1 : AACSB || Technology 127) E-commerce is the process of buying and selling goods and services. Answer: True Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 128) For wayfinding, Royal Caribbean relies on its existing networks as well as sensors on passengers’ wearable GPS to accurately map where they are on the ship. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 2.3 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard: AACSB Technology 129) The WOW band uses radio frequency identification wristbands that allow guests to make on-board purchases and access staterooms. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 2.3 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard: AACSB || Technology 130) The cruise line of Royal Caribbean Cruises uses Virtual Reality that enables guests to see how they look in various items of clothing sold on board without having to try them on. Answer: False Difficulty: Easy
Section Reference 1: IT’s About Business 2.3 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard: AACSB || Technology 131) Bank of America standardized its IT infrastructure, streamlined applications, developed customer-focused innovations, and streamlined its physical infrastructure to recover from the financial crisis of 2007–2008. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 2.4 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 132) MSC Cruises uses RFID, NFC, and VR to improve the cruising experience. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 2.3 Learning Objective 1: 2.3 Bloomcode: Knowledge Standard: AACSB Technology 133) Privacy and security are not an issue on cruise lines since data cannot be transmitted off the ship when it is out to sea. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 2.3 Learning Objective 1: 2.3 Bloomcode: Knowledge Standard: AACSB Technology
133) When you create a competitive strategy, you must plan your own moves and anticipate and counter your competitors’ moves.
Answer: True Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 134) The web has changed Porter’s five fundamental forces. Answer: False Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 135) The web has changed the nature of competition but has not changed Porter’s five fundamental forces. Answer: True Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 136) The overall impact of the web is to increase competition which generally diminishes a firm’s profitability. Answer: True Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge
Standard 1 : AACSB || Technology 137) Threat of substitute products or services and rivalry among existing firms in the industry are the same except that substitute products refers to the internet while rivalry refers to brick-andmortar stores. Answer: False Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Application, Synthesis Standard 1 : AACSB || Technology 138) If there are only two competitors, rivalry will be low. Answer: False Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Evaluation Standard 1 : AACSB || Technology 139) Primary activities relate to the production and distribution of the firm’s products and services. Answer: True Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 140) Primary activities do not add value directly to the firm’s products or services. Answer: False
Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 141) Support activities create value for which customers are willing to pay. Answer: False Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 142) Business managers and IT managers always have the same objectives. Answer: False Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 143) The business and IT departments are often ignorant of the other group’s expertise. Answer: True Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 144) Business and IT employees communicate well with each other.
Answer: False Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 145) Business executives often know little about IT, and IT executives understand the technology but may not understand the real needs of the business. Answer: True Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 146) Virginia and Idaho allow robotic delivery of products. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: 2.2 Bloomcode: Knowledge Standard: AACSB || Technology Question type: Text Entry 147) A ___ is an ongoing collection of related activities that create a product or a service of value to the organization, its business partners, and its customers. Answer: business process Difficulty: Easy Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area.
Bloomcode: Knowledge Standard 1 : AACSB || Technology 148) Inputs are materials, services, and information that flow through and are transformed as a result of ___. Answer: process activities Difficulty: Medium Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Knowledge Standard 1 : AACSB || Technology 149) Business process ___ is a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes. Answer: management Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 150) Business process ___ is a radical redesign of a business process that improves its efficiency and effectiveness often by beginning with a “clean sheet.” Answer: reengineering Difficulty: Easy Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Knowledge Standard 1 : AACSB || Technology 151) A workforce including more women, single parents, minorities, and persons with disabilities puts ___ pressure on organizations.
Answer: market Difficulty: Medium Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Comprehension Standard 1 : AACSB || Technology Standard 1 : AACSB || Diversity 152) The ___ refers to the wide gap between those individuals who have access to information and communications technology and those who do not. Answer: digital divide Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 153) ___ is the process of buying and selling goods and services. Answer: E-commerce Difficulty: Easy Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Knowledge Standard 1 : AACSB || Technology 154) ___ provide a competitive advantage by helping an organization implement its strategic goals and improve its performance and productivity. Answer 1: strategic information systems Answer 2: SISs Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology
155) ___ activities relate to the production and distribution of the firm’s products and services. Answer: Primary Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 156) ___ activities do not add value directly to the firm’s products or services. Answer: Support Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 157) Businesses strive to produce products and services at the lowest cost in the industry when they have a ___ strategy. Answer: cost leadership Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 158) Businesses strive to offer different products, services, or product features than competitors when they have a ___ strategy. Answer: differentiation Difficulty: Easy Section Reference 1: 2.4
Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 159) Businesses introduce new products and services, add new features to existing products and services, or develop new ways to produce them when they have a ___ strategy. Answer: innovation Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 160) Businesses try to improve the manner in which they execute internal business processes so that they perform these activities more effectively than rivals with a(n) ___ strategy. Answer: operational effectiveness Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology 161) Businesses concentrate on making customers happy with a ___ strategy. Answer: customer orientation Difficulty: Easy Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Knowledge Standard 1 : AACSB || Technology Question Type: Essay
162) List the three areas where information systems play a vital role. What role does technology play in each area? Suppose you purchase a product from Amazon; describe how this purchase would flow through these three areas. Answer: Difficulty: Medium Section Reference 1: 2.1 Learning Objective 1: Discuss ways in which information systems enable cross-functional business processes and business processes for a single functional area. Bloomcode: Application, Evaluation Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Standard 4 : AACSB || Reflective Thinking Solution: 1) Executing the process a. Embedded/intertwined; Process fails without system working b. Example – if the Amazon crashes, the order wouldn’t go through 2) Capturing and storing process data a. Sometimes happens inside the system but sometimes has to be entered into it b. Example – this is completely automated for Amazon (no person is involved); this is also part of the recommender system (automatic recommendations for cross-selling) 3) Monitoring process performance a. Instance level (specific task) or process level (the whole process); evaluation b. Example – this is how the order is tracked (order status) projected shipping dates, etc. 163) Describe a scenario where BPI, BPM, and BPR would be best for a company. What role do executives play in carrying out these initiatives? What role do factory workers play in carrying out these initiatives? Answer: Difficulty: Hard Section Reference 1: 2.2 Learning Objective 1: Differentiate between business process reengineering, business process improvement, and business process management. Bloomcode: Analysis, Synthesis Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: 1) BPI = incremental improvements; BPM = maintaining BPI over time; BPR = radical improvements; BPI = getting employees to recommend ways their department could do things better; BPM = ensure business processes are continually aligned with the strategy (meeting frequently with lower management); BPR = implementing a new ERP system
2) Executives = driving BPR and providing incentives for BPM and BPI; factory workers = drive BPI and carry out BPM and BPI 164) What is “green IT”? Why would a company want to pursue “going green” and how could they do it? Do you think it is worth it to “go green”? Why or why not? Answer: Difficulty: Hard Section Reference 1: 2.3 Learning Objective 1: Identify effective IT responses to different kinds of business pressures. Bloomcode: Comprehension, Analysis, Evaluation Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Standard 4 : AACSB || Reflective Thinking Solution: 1) Being more socially responsible 2) To address environmental concerns; facilities design and management (sustainable work environments), carbon management (monitor and reduce), international and US environmental laws (follow laws in what buy and how dispose) 3) Yes – it is good for the environment so customers who care about this will buy the product; no – it costs a lot of money for no impact on the bottom line 165) List and describe Porter’s five forces. Describe whether the web has increased or decreased each force and why. Suppose you want to open a restaurant in your home town; evaluate this potential business using Porter’s Five Forces. Answer: Difficulty: Hard Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Comprehension, Evaluation Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: 1) Threat of entry of new competitors = the threat that new competitors will enter your market is high when entry is easy and low when there are significant barriers to entry; web = increases because easy to create a website but decreases because first mover will set the standard; restaurant: high for franchises (assuming you have the money to put down for that) but fairly easy to open a restaurant (just need a location, food, tables, etc.), but students could argue for low for some franchises (where it could cost millions of dollars). 2) Bargaining power of suppliers = supplier power is high when buyers have few choices from
whom to buy and low when buyers have many choices; web = increases because integrating supply chain increases switching costs but decreases because it is easier to shop around; restaurant – low (lots of options for buying food – US Foods, Sysco, etc.; easy to hire people for serving) 3) Bargaining power of buyers = buyer power is high when buyers have many choices from whom to buy and low when buyers have few choices; web = decreases because loyalty programs increase switching costs but increases because it is easier to shop around; restaurant – high for large towns where they have lots of places to eat but lower for small towns where there aren’t many restaurants 4) Threat of substitute products or services = the threat of substitutes is high when there are many alternatives to an organization’s products or services; web = increases because substitutes can be created rapidly where information-based industries have highest threat but decreases if can create switching costs; restaurant – high because people don’t have to eat out (they can cook their own food) 5) Rivalry among existing firms in the industry = threat from rivalry is high when there is intense competition among many firms in an industry; web = increases because of transparency; restaurant – this depends on whether or not competition is fierce or not – could have two restaurants that constantly fight to bring in customers or thousands of restaurants who aren’t really competing much 166) What is business-IT alignment and why would an organization want to pursue it? What makes alignment so difficult? Thinking about your college or university, does the IT department have a good reputation? Do you think there is a strong alignment between IT and the professors? Answer: Difficulty: Medium Section Reference 1: 2.4 Learning Objective 1: Describe the strategies that organizations typically adopt to counter Porter’s five competitive forces. Bloomcode: Comprehension, Evaluation Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: Tight integration of the IT function with the organization’s strategy, mission, and goals; why — innovation, customer service, business and IT know each other well, reach overarching goals that are clear to everyone, everyone understands how the company makes money, a healthy company culture; difficult = different objectives, ignorant of each other’s expertise, lack of communication; evaluation = most IT departments don’t have a good reputation and don’t have strong alignment
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 3, Testbank Course Title: Rainer, IS 5e Chapter Number: 3 Question type: Multiple Choice 1) Google understands that to attract digital advertising dollars from advertiser, they: . a) Must provide discounts to users b) Must prove that digital ads work c) Must work with customers and offer them loyalty programs d) Must first negotiate with the Canadian Government a regulation to protect privacy Answer: B Difficulty: Easy Section Reference 1: IT’s about Business 3.1 Learning Objective 1: 3.1 Bloomcode: Knowledge Standard: AACSB || Technology 2) Online publishers use tracking code from Google, Facebook, and many other companies to help target their advertising. What is a concern about this for individuals? ________. a) That publishers should share profits with Google, Facebook and others b) Privacy needs to be scrutinized more carefully. c) That publishers should pay to users a fee for using their private information d) That publishers should be careful to display only ads that are of interest to users Answer: B Difficulty: Easy Section Reference 1: IT’s about Business 3.1 Learning Objective 1: 3.1 Bloomcode: Application Standard: AACSB || Technology 3) How does Google protects the privacy of consumers?. a) Through an agreement between Google and sellers b) By using patent-pending mathematical formulas when it matches one of its users with a shopper who makes a purchase in a brick-and-mortar store c) Through Google Attribution d) Through Periscope Data Analysis
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: B Difficulty: Easy Section Reference 1: IT’s about Business 3.1 Learning Objective 1: 3.1 Bloomcode: Knowledge Standard: AACSB || Technology 4) In regards to technology used by Google to protect the privacy of consumers, Paul Stephens of Privacy Rights Clearinghouse has asserted that a marketing organization can identify an individual by examining only a few pieces of data. He expressed skepticism about Google’s technology because: a) The Google’s system for guarding the identities of users will stand up to the efforts of hackers b) The Google’s system does not have a strong encryption algorithm c) The Google’s system is too new to be trusted d) The Google’s system is not meant to protect privacy but to share data with partners to increase profits Answer: A Difficulty: Easy Section Reference 1: IT’s about Business 3.1 Learning Objective 1: 3.1 Bloomcode: Knowledge Standard: AACSB || Technology 5) Marc Rotenberg, executive director of the Electronic Privacy Information Center, claims companies are becoming increasingly intrusive in terms of their data collection and are secretive as to how they gather and use those data. He proposed that: a) Government regulators and the U.S. Congress should charge an extra tax to Google and other technology companies that are collecting and using data from their users G b) Government regulators and the U.S. Congress should demand answers about how Google and other technology companies are collecting and using data from their users. c) Government regulators and the U.S. Congress should request to Google and other technology companies that are collecting and using data from their users to give them access to their systems so they can control that they do. d) Government regulators and the U.S. Congress should shut down Google and other technology companies that are collecting and using data from their users Answer: B Difficulty: Easy Section Reference 1: IT’s about Business 3.1Learning Objective 1: 3.1 Bloomcode: Application Standard: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
6) The _________ approach states that an ethical action is the one that provides the most good or does the least harm. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: e Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 7) Minimizing the organization’s carbon footprint and otherwise striving for “green IT” is an example of a _________ approach. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: e Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Synthesis, Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 8) The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. a) common good
Rainer, Information System, Fifth Canadian Edition
Testbank
b) deontology c) fairness d) rights e) utilitarian Answer: d Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 9) The pursuit of the “American dream” and our ability to choose our religious orientation is a reflection of the _________ approach. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: d Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 10) The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 11) The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: c Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 12) The _________ approach highlights the interlocking relationships that underlie all societies. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: a Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : AACSB || Technology 13) Obamacare was created to address the _________ approach. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: a Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 14) The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: b Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 15) Suppose that you believe that killing someone is wrong even if it is self-defense. This is an example of the _________ approach.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) common good b) deontology c) fairness d) rights e) utilitarian Answer: b Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge, Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 16) _________ is the first step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: e Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 17) _________ is the second step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 18) _________ is the third step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: b Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 19) _________ is the fourth step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: d Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
20) _________ is the final step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: a Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 21) _________ means that you accept the consequences of your decisions and actions. a) Accountability b) Answerability c) Liability d) Responsibility Answer: d Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 22) Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions. a) accountability b) answerability c) liability d) responsibility
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 23) _________ refers to determining who is responsible for actions that were taken. a) Accountability b) Answerability c) Liability d) Responsibility Answer: a Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 24) Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren’t accepting _________ for your actions. a) accountability b) answerability c) liability d) responsibility Answer: a Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 25) _________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Accountability b) Answerability c) Liability d) Responsibility Answer: c Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 26) Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________. a) accountability b) answerability c) liability d) responsibility Answer: c Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 27) _________ is the most recent example of ethical misbehavior in organizations. a) Enron b) Tyco
Rainer, Information System, Fifth Canadian Edition
Testbank
c) Wells Fargo bank d) WorldCom Answer: c Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 28) The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis. a) financial; Enron b) financial; Wells Fargo bank c) operational; Enron d) operational; Wells Fargo bank Answer: a Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 29) _________ issues involve collecting, storing, and disseminating information about individuals. a) Accessibility b) Accuracy c) Privacy d) Property Answer: c Difficulty: Easy Section Reference 1: 3.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 30) _________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. a) Accessibility b) Accuracy c) Privacy d) Property Answer: b Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 31) You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. a) accessibility b) accuracy c) privacy d) property Answer: b Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
32) _________ issues involve the ownership and value of information. a) Accessibility b) Accuracy c) Privacy d) Property Answer: d Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 33) _________ issues revolve around who should have access to information and whether they should pay a fee for this access. a) Accessibility b) Accuracy c) Privacy d) Property Answer: a Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 34) Companies like Google and Facebook make their money by selling your information to advertisers. This is an example of an ethical issue that falls into the category of ________. a) accessibility b) accuracy c) privacy d) property Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 35) Which of the following is a privacy issue? a) How can we ensure that the information will be processed properly and presented accurately to users? b) How should we handle illegally copying copyrighted software? c) What information about oneself should an individual be required to reveal to others? d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Answer: c Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 36) Which of the following is an accuracy issue? a) How can we ensure that the information will be processed properly and presented accurately to users? b) How should we handle illegally copying copyrighted software? c) What information about oneself should an individual be required to reveal to others? d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Answer: a Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 37) Which of the following is a property issue? a) How can we ensure that the information will be processed properly and presented accurately to users? b) How should we handle illegally copying copyrighted software? c) What information about oneself should an individual be required to reveal to others? d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Answer: b Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 38) Which of the following is an accessibility issue? a) How can we ensure that the information will be processed properly and presented accurately to users? b) How should we handle illegally copying copyrighted software? c) What information about oneself should an individual be required to reveal to others? d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Answer: d Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 39) Which of the following is a privacy issue?
Rainer, Information System, Fifth Canadian Edition
Testbank
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? b) How much should companies charge for permitting access to information in their databases? c) Under what circumstances can one use proprietary databases? d) What information about individuals should be kept in databases, and how secure is the information there? Answer: d Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 40) Which of the following is an accuracy issue? a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? b) How much should companies charge for permitting access to information in their databases? c) Under what circumstances can one use proprietary databases? d) What information about individuals should be kept in databases, and how secure is the information there? Answer: a Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 41) Which of the following is a property issue? a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? b) How much should companies charge for permitting access to information in their databases? c) Under what circumstances can one use proprietary databases? d) What information about individuals should be kept in databases, and how secure is the information there?
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: c Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 42) Which of the following is an accessibility issue? a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? b) How much should companies charge for permitting access to information in their databases? c) Under what circumstances can one use proprietary databases? d) What information about individuals should be kept in databases, and how secure is the information there? Answer: b Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 43) ________ can identify which clicks and key words had the largest impact on a consumer’s purchasing decision. a) DoubleClick b) Google Analytics c) Google Attribution d) Periscope Data Analysis Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 3.1 Learning Objective 1: 3.1 Bloomcode: Knowledge Standard: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
44) What does recent data from the U.S. Census Bureau indicate about consumer habits? a) The majority of shopping takes place online at retailers such as Amazon and Alibaba. b) The majority of shopping takes place offline, in brick-and-mortar stores. c) Online versus offline shopping habits remain relatively evenly distributed. d) The rise in popularity for consumer-to-consumer selling, such as Facebook Marketplace and Craigslist, has made it difficult to get accurate data about consumer shopping habits. Answer: B Difficulty: Medium Section Reference 1: IT’s About Business 3.1 Learning Objective 1: 3.1 Bloomcode: Application Standard: AACSB || Technology 45) What is considered to be the “holy grail” of online advertising? a) Being able to determine repeat customers to an online retailer b) Being able to determine exact spending habits of the 18-35 year old demographic c) Being able to determine which Web browsers elicit the most ad revenue d) Being able to determine purchases generated by online ad campaigns Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 3.1 Learning Objective 1: 3.1 Bloomcode: Comprehension Standard: AACSB || Technology 46) _______ is a mobile, Web-based study application used by half of all high school students and one-third of all college students in the United States. a) Brainly b) Dropbox c) Google Docs d) Quizlet Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 3.2 Learning Objective 1: 3.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard: AACSB || Technology
47) The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018 highlighted the need for ____________. a) more Web-based study tools to be available to students of all socioeconomic backgrounds. b) universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning. c) widespread reform in terms of Internet access on college campuses. d) colleges to revise their Codes of Conduct to eliminate the ambiguity in students using opensource study tools. Answer: B Difficulty: Medium Section Reference 1: IT’s About Business 3.2 Learning Objective 1: 3.1 Bloomcode: Application Standard: AACSB || Technology 48) _________ is NOT an example of a data aggregator. a) Acxiom b) ChoicePoint c) Google d) LexisNexis Answer: c Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 49) Companies purchase digital dossiers to ________. a) create customer intimacy b) engage in electronic surveillance c) evaluate the competition
Rainer, Information System, Fifth Canadian Edition
Testbank
d) track their own reputations Answer: a Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 50) Photo tagging is a type of _________ technology. a) facial recognition b) GPS c) information privacy d) RFID Answer: a Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 51) The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. a) opt-in b) opt-out c) sign-up d) sign-out Answer: b Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 52) The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it. a) opt-in b) opt-out c) sign-up d) sign-out Answer: a Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 53) Companies prefer the _________ model of informed consent. a) opt-in b) opt-out c) sign-up d) sign-out Answer: b Difficulty: Hard Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 54) Europeans and privacy advocates prefer the _________ model of informed consent. a) opt-in b) opt-out c) sign-up
Rainer, Information System, Fifth Canadian Edition
Testbank
d) sign-out Answer: a Difficulty: Hard Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 55) License plate reader companies maintain that only two groups can use their software to find the owner of a car: law enforcement agencies and ______ companies. a) advertising b) insurance c) loan d) repossession Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 3.3 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 56) While law enforcement officials, insurance companies, and automakers might be proponents of LPR companies and the technology they use, private citizens are largely concerned with _______. a) issues of privacy b) elimination of certain jobs that the technology replaces c) increased costs of things like municipal fees and fines and insurance premiums d) the Department of Motor Vehicles’ access to this information Answer: A Difficulty: Medium Section Reference 1: IT’s About Business 3.3 Learning Objective 1: 3.2 Bloomcode: Application Standard: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
57) Aadhaar is a _______ database. a) biometric b) credit card c) password d) security Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 58) ________ implemented a biometric database to better serve its poor citizens. a) Australia b) China c) India d) Russia Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 59) Which is NOT a current negative consequence of Aadhaar? a) People were unfairly dropped from food subsidiary lists. b) People have been dropped from life insurance programs. c) Millions of users’ information has been leaked to non-government entities. d) Government agencies have wrongfully published welfare beneficiaries’ information. Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: 3.2 Bloomcode: Comprehension Standard: AACSB || Technology 60) Some are concerned that the use of Aadhaar’s information will further impede _________.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) tax collection b) access to the Internet c) social mobility d) government transparency Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: 3.2 Bloomcode: Comprehension Standard: AACSB || Technology 61) The Facebook and Cambridge Analytica scandal occurred in ______; the problem started in ______. a) 2016; 2010 b) 2016; 2017 c) 2018; 2010 d) 2018; 2017 Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 62) The Cambridge Analytica scandal involved ______ user data. a) Amazon b) Facebook c) Google d) Twitter Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
63) Cambridge Analytica’s data collection of Facebook users has been used to impact and affect which area the most? a) Politics b) Retail c) Banking and finance d) Education Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: 3.2 Bloomcode: Comprehension Standard: AACSB || Technology Question type: True/False 64) When a patient is admitted to a hospital emergency room, the physician may have never seen them before, and must diagnose their problem quickly. If the physician knew the patient’s medical history, then the examination and subsequent diagnosis would be faster. To address this problem, the Government of Canada created Canada Health Infoway. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology Question type: Multiple Choice 65) In Canada. Doctors across the country now use electronic medical records to access patient information online. Medical data is private, confidential data. There are three provinces that had privacy laws that are considered similar enough to PIPEDA to be used in its stead: . a) Alberta, British Columbia, and Ontario b) Alberta, British Columbia, and Quebec c) Alberta, British Columbia, and Manitoba d) Alberta, Quebec, and Nova Scotia Answer: B Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: 3.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard: AACSB || Technology 66) One source of data used for medical and pharmaceutical research is anonymized health data. IQVIA Biotech (www.iqviabiotech.com) is a company that sells data to pharmaceutical industry when physicians and clinics have given permission and patient’s data is striped of names and other personal information. Why is this legal and does not violate Canadian legislation? a) Such anonymized data is not covered by privacy legislation. b) Because physicians and clinics are giving permission c) Once data is collected by Doctors, they own the data and not patients d) Privacy laws do not apply to a clinic’s data Answer: A Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 67) What was the result of E-Health Saskatchewan tracking access to the health records for the privacy of the victims of the Humboldt Broncos junior hockey team bus crash of April 2018? a) Several Doctors lost their license as a result of this tracking effort. . b) Clinics were charged for selling private medical records to insurance companies. c) Several doctors and an office manager were charged with inappropriately accessing the team’s medical records during April and May 2018. d) E-Health Saskatchewan was charged with invasion of privacy by Doctors and Clinics. Answer: C Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: 3.2 Bloomcode: Application Standard: AACSB || Technology 68) Besides doctors and medical clinics that are gathering electronic health information, who else is gathering health information?. a) The manufactures of smartphones, tablets, and personal technology such as Fitbit b) Gyms gather information on users c) Car manufacturers gather health information of drivers d) Walmart monitors and gathers health of information of consumers
Commented [LDL1]: I think this should be rephrased for clarity Commented [F2R1]: Reworded
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: A Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: 3.2 Bloomcode: Application Standard: AACSB || Technology Question type: True/False 69) When you use an Internet app, the app could also have access to your data Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard: AACSB || Technology 70) When you use your email, or an Internet browser, the advertisements change rapidly in response to your searches in Google. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard: AACSB || Technology 71) Deciding what is right or wrong is always easy and clear-cut. Answer: False Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : AACSB || Technology 72) What is unethical is not necessarily illegal. Answer: True Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 73) If it is unethical, it is illegal. Answer: False Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 74) All unethical actions are illegal in the United States. Answer: False Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 75) All employees have a responsibility to encourage ethical uses of information and information technology. Answer: True
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 76) You check your credit report annually to ensure your identity hasn’t been stolen. This is an example of a property issue. Answer: False Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 77) Google and Facebook collect, store, and disseminate a great deal of information about the people who use their websites. This is an example of an accuracy issue. Answer: False Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 78) Telemarketing and ads on Google are examples of accessibility issues. Answer: True Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 79) Google can analyze offline purchase activity even when consumers deactivate location tracking on their smartphones. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.1 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard: AACSB || Technology 80) Privacy experts agree with Google that Google’s double-blind encryption ensures the privacy and security of consumer information. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 3.1 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Comprehension Standard: AACSB || Technology 81) Credit card data is only helpful to online retailers and publishers if those cards are used for purchasing items online; they do not provide relevant information for brick-and-mortar purchases. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 3.1 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Comprehension Standard: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
82) The suspended Texas Christian University (TCU) students won their battle against TCU because there was not enough evidence to prove they had cheated using Quizlet. Answer: True Difficulty: Medium Section Reference 1: IT’s About Business 3.2 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Comprehension Standard: AACSB || Technology 83) Quizlet’s community guidelines explicitly prohibit cheating. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.2 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard: AACSB || Technology 84) One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.2 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Comprehension Standard: AACSB || Technology 85) Privacy rights apply only to individuals. Answer: False Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 86) Privacy rights apply to individuals, groups, and institutions. Answer: True Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 87) The right to privacy is recognized today in all the US states and by the federal government, either by statute or in common law. Answer: True Difficulty: Hard Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 88) The right of privacy is absolute. Answer: False Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 89) The right of privacy is not absolute.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 90) Privacy must be balanced against the needs of society. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 91) The public’s right to know supersedes the individual’s right of privacy. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 92) The public’s right to know isn’t as important as the individual’s right of privacy. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 93) Advancements in information technology make privacy harder to manage. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 94) Data aggregators can collect public and non-public information to create digital dossiers. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 95) Smartphones are sensors that can be used for electronic surveillance. Answer: True Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 96) The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 97) The European Union has stricter data protection laws than the US. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 98) The city of Boston suspended its license plate reader program because it accidently revealed information to a newspaper. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.3 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 99) Vigilant makes money by charging police departments for license plate readers and access to its databases. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.3 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard: AACSB || Technology 100) The Driver’s Privacy Protection Act of 1994 does not limit who can access information about automobile registrations and drivers, only what information can be used for. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 3.3 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Analysis Standard: AACSB || Technology
101) Critics view Aadhaar as a step toward a surveillance state. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 102) As anticipated by Aadhaar’s opponents, the Supreme Court found that Aadhaar violates privacy rights. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 103) The origination of Aadhaar was from a benevolent place: identifying impoverished Indians so that they could be documented and therefore receive government benefits.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Comprehension Standard: AACSB || Technology 104) According to Facebook executives, the Facebook and Cambridge Analytica scandal occurred because hackers got access to the database by stealing key passwords from users. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 105) Facebook’s main legal battles are against Russia. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 106) Much of the discovery of the ways in which Cambridge Analytica and Facebook were misusing user data came from the Pew Research Center. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Comprehension Standard: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
107) Facebook has been harshly fined and has undergone massive restructuring as a result of the discovery of the Cambridge Analytica scandal. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 3.5 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Application Standard: AACSB || Technology Question type: Text Entry 108) _____ refers to the principles of right and wrong that individuals use to make choices that guide their behavior. Answer: Ethics Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 109) The utilitarian approach states that an ethical action is the one that provides the most ___ or does the least ___. Answer 1: good Answer 2: harm Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
110) The fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some ___. Answer: defensible standard Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 111) The common good approach highlights the ___ relationships that underlie all societies. Answer: interlocking Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 112) The deontology approach states that the morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the ___ of that action. Answer: consequences Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 113) ___ is the right to be left alone and to be free of unreasonable personal intrusions. Answer: Privacy
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 114) Privacy is the right to be ___ and to be free of unreasonable personal intrusions. Answer: left alone Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 115) Information privacy is the right to determine when, and to what extent, ___ about you can be gathered or communicated to others. Answer: information Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 116) ___ is the right to determine when, and to what extent, information about you can be gathered or communicated to others. Answer: Information privacy Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 117) The process of forming a digital dossier is called ___. Answer: profiling Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Question type: Essay 118) What is ethics? Is an ethical decision easy and clear-cut? Why or why not? List and describe the five widely used ethical standards/frameworks. Evaluate a SINGLE ethical scenario with all five approaches. Answer: Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Synthesis, Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Analytic Standard 5 : AACSB || Reflective Thinking Solution: Ethics – principles of right and wrong that individuals use to make choices that guide their behavior No because an answer could be different based on the approach chosen 1) Utilitarian approach states that an ethical action is the one that provides the most good or does the least harm; a policeman killing a person who is holding others hostage is best for those being held hostage 2) Rights approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties; nobody should be killed because everyone has the right to live 3) Fairness approach posits that ethical actions treat all human beings equally, or, if unequally,
Rainer, Information System, Fifth Canadian Edition
Testbank
then fairly, based on some defensible standard; killing someone who is holding others hostage is fair because people know it isn’t right to threaten the lives of others 4) Common good approach highlights the interlocking relationships that underlie all societies; the police being on-scene is for the best of everyone – they have the right to kill under these circumstances 5) Deontology approach states that the morality of an action is based on whether than action itself is right or wrong under a series of rules, rather than based on the consequences of that action; it is never OK to kill a person even if they are being “bad” 119) The concept of “green IT” is an ethical decision every company needs to make. Using the five steps in the general framework for ethical decision-making, how would you handle the situation if you were the CEO? Answer: Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Reflective Thinking Solution: 1) Recognize an ethical issue – could not being green damage the environment? What are the good and bad alternatives for being green? Are there legal requirements for being green (energy consumption, pollution, etc.) ? 2) Get the facts – what area will be hurt by non-green activities (water, air, land)? Sufficient information? Who has a stake (environmental groups, customers, suppliers)? Have I consulted those people? 3) Evaluate alternative actions – 5 approaches – utilitarian, rights, fairness, common good, deontology 4) Make a decision and test it – pick an option 5) Act and reflect on the outcome of your decision – am I taking better care of the environment? 120) Describe five ways a digital dossier is created. Describe a potential profile that has been created for your life. Answer: Difficulty: Hard Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Synthesis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Reflective Thinking Solution: Surveillance cameras on roads or in buildings, credit card transactions, telephone calls, banking transactions, queries to search engines, government records Potential profile – many schools have cameras and many towns have cameras at intersections to record what students are doing at school or on the road (students may also have ID badges that are required to get into buildings) ; many students already have credit cards so purchases are tracked, all activity on phones can be tracked including phone calls and text messages, many students are already doing online banking, all Internet searching is tracked, students may also talk about traveling, Facebook activity (photo tagging) , etc., basically, everything we do can be tracked 121) Who conducts electronic surveillance? What types of electronic surveillance impact your life? Are you paranoid about this? If not, should you be? Explain why or why not for these last two questions. Answer: Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Reflective Thinking Solution: Cameras at many public venues, digital sensors everywhere (smartphones have many capabilities now), ID cards, webcams, video-game motion sensors, satellite photos, biometric readers, GPS, facial recognition technology (and photo tagging), in-store digital billboards that watch activity, drones, URL filtering, etc. 122) How does the Internet create a conflict between free speech and privacy? Answer: Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Analysis
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Reflective Thinking Solution: Easy to be anonymous and derogatory with no basis of fact and no recourse; companies can check the Internet on potential and current employees, but people may not be able to defend themselves (could harm chances of getting hired or could result in getting fired). 123) Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings? Answer: Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Comprehension Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Solution: 50 countries have data protection laws Some countries have stricter laws (Europe) No consistent or uniform standards for privacy and security – obstructs flow of information among countries (transborder data flows) Privacy issues – whose laws do you follow? Come up with “safe harbor” frameworks for regulation
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 4, Testbank Course Title: Rainer, IS 5e Chapter Number: 4 Question type: Multiple Choice 1) The 2017 Equifax data breach occurred because attackers _______. a) exploited a vulnerability in some web application software b) sent e-mails to consumers with links to websites with malicious software c) used social engineering to get user IDs and passwords from employees d) were able to access discarded equipment with sensitive information Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Compare and contrast human mistakes and social engineering and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 2) Equifax hired _______ to help after they suffered two breaches in 2017. a) Cylance b) Mandiant c) Praetorian d) Zero Trust Answer: B Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Compare and contrast human mistakes and social engineering and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 3) Consumers ___ put a freeze on their credit with the three credit bureaus; this is ____ for consumers. a) can; an appealing fix
Rainer, Information System, Fifth Canadian Edition
Testbank
b) can; not an appealing fix c) cannot; is a problem for d)cannot; irrelevant Answer: B Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Compare and contrast human mistakes and social engineering and provide a specific example of each one. Bloomcode: Analysis Standard 1: AACSB || Technology 4) A(n) _________ to an information resource is any danger to which a system may be exposed. a) exposure b) risk c) threat d) vulnerability Answer: c Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 5) The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. a) exposure b) risk c) threat d) vulnerability Answer: a Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 6) An information resource’s _________ is the possibility that the system will be harmed by a threat. a) exposure b) risk c) threat d) vulnerability Answer: d Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 7) Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? a) Increasing skills necessary to be a computer hacker b) International organized crime taking over cybercrime c) Lack of management support d) Smaller, faster, cheaper computers and storage devices e) Today’s interconnected, interdependent, wirelessly networked business environment Answer: a Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 8) Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? a) Additional management support b) Decreasing skills necessary to be a computer hacker c) International organized crime taking over cybercrime
Rainer, Information System, Fifth Canadian Edition
Testbank
d) Smaller, faster, cheaper computers and storage devices e) Today’s interconnected, interdependent, wirelessly networked business environment Answer: a Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 9) A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization. a) trusted; trusted b) trusted; untrusted c) untrusted; trusted d) untrusted; untrusted Answer: b Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 10) Computer crimes typically average _________ of dollars and cause businesses _________ of dollars in damages. a) hundreds; millions b) hundreds; billions c) hundreds of thousands; millions d) hundreds of thousands; billions Answer: d Difficulty: Medium Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 11) Careless Internet surfing is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 12) You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology 13) You lose the company’s USB with your sales spreadsheets on it. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology 14) You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology 15) You don’t lock your computer when you go to the restroom. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
16) Carelessness using unmanaged devices is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 17) You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology 18) You never wipe the dust off your computer. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology 19) _________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. a) Espionage b) Malware c) Profiling d) Social engineering Answer: d Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 20) You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________. a) shoulder surfing; a good way to show kindness that causes no harm b) shoulder surfing; an unintentional threat to your organization c) tailgating; a good way to show kindness that causes no harm d) tailgating; an unintentional threat to your organization Answer: d Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) _________ is an unintentional threat. a) Espionage
Rainer, Information System, Fifth Canadian Edition
Testbank
b) Identity theft c) Social engineering d) Software attacks Answer: c Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 22) _________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. a) Alien software b) Espionage c) Identity theft d) Information extortion Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 23) _________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act. a) Alien software b) Espionage c) Information extortion d) SCADA attacks Answer: c Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
24) _________ is a deliberate act that involves defacing an organization’s website, potentially damaging the organization’s image and causing its customers to lose faith. a) Espionage b) Sabotage c) SCADA attacks d) Software attacks Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 25) If humans are careless with laptops, this is an _________ error which could cause theft of equipment or information (an _________ error) . a) intentional; intentional b) intentional; unintentional c) unintentional; intentional d) unintentional; unintentional Answer: c Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 26) Intellectual property is NOT protected under _________ laws. a) copyright b) patent c) privacy d) trade secret Answer: c Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 27) A _________ is an intellectual work that is not based on public information. a) copyright b) patent c) trade secret d) trademark Answer: c Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 28) A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time. a) copyright b) patent c) trade secret d) trademark Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period. a) copyright b) patent c) trade secret d) trademark
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 30) Current US laws award patents for _________ years and copyright protection for _________ years. a) 20; 20 b) 20; life+70 c) life+70; 20 d) life+70; life+70 Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 31) You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn’t have to buy it too. This is _________ and is _________. a) piracy; legal b) piracy; illegal c) social engineering; legal d) social engineering; illegal Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 32) Piracy costs businesses _________ of dollars per year.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) hundreds b) millions c) billions d) trillions Answer: c Difficulty: Hard Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 33) _________ is a remote attack requiring user action. a) DoS b) A logic bomb c) A Trojan horse d) Virus Answer: d Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 34) _________ is a remote attack requiring no user action. a) DoS b) A logic bomb c) A Trojan horse d) Virus Answer: a Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
35) _________ is an attack by a programmer developing a system. a) DoS b) A phishing attack c) A Trojan horse d) Virus Answer: c Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 36) Hackers would use a botnet to perform a _________. a) DDoS b) a logic bomb c) a Trojan horse d) virus Answer: a Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 37) _________ causes pop-up advertisements to appear on your screen. a) Adware b) Marketware c) Spamware d) Spyware Answer: a Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
38) _________ collects personal information about users without their consent. a) Adware b) Marketware c) Spamware d) Spyware Answer: d Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 39) Keystroke loggers and screen scrapers are examples of _________. a) adware b) marketware c) spamware d) spyware Answer: d Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 40) _________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. a) Adware b) Marketware c) Spamware d) Spyware Answer: c Difficulty: Easy Section Reference 1: 4.3
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 41) Spam costs US companies _________ of dollars per year. a) hundreds b) millions c) billions d) trillions Answer: c Difficulty: Hard Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 42) If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack. a) alien software b) espionage c) SCADA d) virus Answer: c Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) _________ refers to malicious acts in which attackers use a target’s computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. a) A SCADA attack b) Cyberterrorism c) Espionage d) Identity theft
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 44) The U.S. government considers the Sony hack _________. a) a SCADA attack b) cyberterrorism c) espionage d) identity theft Answer: b Difficulty: Hard Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 45) Whaling attack is a targeted attempt to ____________ a) Bring down a company’s server b) Steal sensitive information from a company such as financial data or personal details about employees c) Break encryption keys d) Perform SQL injection attacks on a server Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 46) The DarkHotel Group has continually evolved its tactics and has integrated whaling and social engineering techniques into its malware in order to_______ ,_____________.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Conduct espionage on corporate research and development. . b) To advertise products with its malware. c) Sell private data to companies for marketing purposes d) Identify your search engine searches for Google ads targeting. . Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Comprehension Standard 1: AACSB || Technology 47) A ______ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees. a) Phishing b) Spear-phishing c) Spear-whaling d) Whaling Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 48) The goal of whaling is to trick a(n) _______ into revealing personal or corporate data. a) executive b) factory worker c) janitor d) salesperson Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
49) The entire basis of a whaling attack is to ___________. a) appear as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses. b) be as ambiguous and broad as possible so that no one person is targeted; rather, a large division in a company is. c) appeal to as many companies as possible at the same time, therefore increasing the likelihood that one will “take the bait.” d) establish a line of communication with an entry-level employee or employees first to gain trust, and then gain access to larger systems. Answer: A Difficulty: Medium Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Application Standard 1: AACSB || Technology 50) Which well-known company has NOT fallen victim to a whaling attack at present? a) Snapchat b) Yahoo! c) Google d) Facebook Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 4.2 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Comprehension Standard 1: AACSB || Technology 51) What is TRUE of the DarkHotel Group attacks? a) In 2017, they were able to extract over $100 million dollars from Facebook through whaling attacks. b) Despite utilizing a variation of the same type of attack on intellectual property for over a decade, the group continues to perpetrate cybercrimes and elude arrest. c) They have been specifically targeting political figures since sometime around 2007 by hacking into donor lists.
Rainer, Information System, Fifth Canadian Edition
Testbank
d) The group is effective largely because they continually evolve their tactics. Answer: D Difficulty: Medium Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Application Standard 1: AACSB || Technology 52) Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked with _________ in 2016. a) alien software b) a DDoS c) espionage d) a SCADA attack Answer: b Difficulty: Easy Section Reference 1: IT’s About Business 4.2 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 53) Dyn’s hackers formed a botnet from _________. a) corporate servers b) devices incorporating the Internet of Things c) individuals willing to become part-time hackers d) programmers within the company Answer: b Difficulty: Medium Section Reference 1: IT’s About Business 4.2 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 54) Jim finds out that someone accessed his bank account pretending to be him and stole thousands of dollars. This is an example of ____________.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) sabotage b) identity theft c) intellectual property d) information extortion Answer: b Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Application Standard 1: AACSB || Technology 55) Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________. a) worm b) trojan horse c) phishing attack d) denial of service attack Answer: c Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Application Standard 1: AACSB || Technology 56) An employee at ABC Inc. downloaded an email and opened the attachment contained within the message. Shortly afterwards all employees were blocked from accessing files on the company’s servers and the criminals told ABC Inc. they would have to pay a large amount of Bitcoin to regain access to their files. ABC Inc. was a victim of ____________. a) ransomware b) identity theft c) spyware d) cyber warfare Answer: a Difficulty: Medium Section Reference 1: 4.3
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Application Standard 1: AACSB || Technology 57) If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy. a) acceptance b) avoidance c) limitation d) transference Answer: a Difficulty: Easy Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Knowledge Standard 1: AACSB || Technology 58) Your company decides not to implement security procedures because employees refuse to comply anyway. This is an example of risk _________. a) acceptance b) avoidance c) limitation d) transference Answer: a Difficulty: Medium Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Application Standard 1: AACSB || Technology 59) If you limit your risk by implementing controls that minimize the impact of the threat, you have implemented a risk _________ strategy. a) acceptance b) avoidance c) limitation
Rainer, Information System, Fifth Canadian Edition
Testbank
d) transference Answer: c Difficulty: Easy Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Knowledge Standard 1: AACSB || Technology 60) Your company hires FireEye to install security software and monitor your systems. This is an example of risk _________. a) acceptance b) avoidance c) limitation d) transference Answer: c Difficulty: Medium Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Application Standard 1: AACSB || Technology 61) If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. a) acceptance b) avoidance c) limitation d) transference Answer: d Difficulty: Easy Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Comprehension Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
62) Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk _________. a) acceptance b) avoidance c) limitation d) transference Answer: d Difficulty: Medium Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Application Standard 1: AACSB || Technology 63) _________ is a physical control. a) A company gate b) Encryption c) A firewall d) VPN Answer: a Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 64) _________ is an access control. a) A company gate b) Encryption c) A firewall d) RFID Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 65) _________ is a communications control. a) A company gate b) Encryption c) A firewall d) RFID Answer: c Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 66) _________ controls prevent unauthorized individuals from gaining access to a company’s facilities. a) Access b) Communications c) Physical d) Useful Answer: c Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 67) _________ controls restrict unauthorized individuals from using information resources. a) Access
Rainer, Information System, Fifth Canadian Edition
Testbank
b) Communications c) Physical d) Useful Answer: a Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 68) _________ controls secure the movement of data across networks. a) Access b) Communications c) Physical d) Useful Answer: b Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 69) Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control. a) access b) communication c) physical d) useful Answer: c Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Analysis
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 70) Biometrics is an example of something the user _________. a) does b) has c) is d) knows Answer: c Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 71) Your student ID is an example of something the user _________. a) does b) has c) is d) knows Answer: b Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Comprehension Standard 1: AACSB || Technology 72) If you have to speak into your phone to unlock it, this is an example of something the user _________. a) does b) has c) is d) knows Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Comprehension Standard 1: AACSB || Technology 73) Typing in your password to access a system is an example of something the user _________. a) does b) has c) is d) knows Answer: d Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 74) A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks. a) anti-malware system b) DMZ c) ERP d) firewall Answer: d Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 75) A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) anti-malware system b) DMZ c) ERP d) firewall Answer: a Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 76) A(n) _________ is located between two firewalls. a) anti-malware system b) DMZ c) ERP d) spamware detector Answer: b Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 77) _________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver. a) Authorization b) Blacklisting c) Encryption d) Firewalling Answer: c Difficulty: Easy Section Reference 1: 4.5
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 78) In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking. a) private; private b) private; public c) public; private d) public; public Answer: c Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 79) _________ is a private network that uses a public network to connect users. a) DoS b) ERP c) RFID d) VPN Answer: d Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 80) Which of the following is NOT an advantage of VPN? a) Cost b) Flexibility c) Remote access
Rainer, Information System, Fifth Canadian Edition
Testbank
d) Security Answer: a Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 81) A URL that begins with https uses _________. a) DMZ b) ERP c) TLS d) VPN Answer: c Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 82) A _________ site is a fully configured computer facility with all of the company’s services, communication links, and physical plant operations. a) cold b) hot c) medium d) warm Answer: b Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
83) A _________ site typically does not include the actual application the company needs to get the business back up and running immediately. a) cold b) hot c) medium d) warm Answer: d Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 84) A _________ site provides only rudimentary services and facilities. a) cold b) hot c) medium d) warm Answer: a Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 85) A _________ site is the most expensive option. a) cold b) hot c) medium d) warm Answer: b Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 86) A _________ site is the least expensive option. a) cold b) hot c) medium d) warm Answer: a Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 87) Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a _________ site. a) cold b) hot c) medium d) warm Answer: b Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Application Standard 1: AACSB || Technology 88) Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) around b) into c) through d) with Answer: a Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 89) Auditing _________ the computer means auditors check inputs, outputs, and processing. a) around b) into c) through d) with Answer: c Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 90) Auditing _________ the computer means using a combination of client data, auditor software, and client and auditor hardware. a) around b) into c) through d) with Answer: d Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 91) Dave and Darla are worried about their home’s security as there have been a lot of robberies in the neighborhood lately. To ease their concern, they purchase insurance for their home and possessions. This is an example of __________. a) risk analysis b) risk acceptance c) risk transference d) controls Answer: c Difficulty: Medium Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Application Standard 1: AACSB || Technology 92) XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company’s facilities. XYZ Inc. is utilizing which type of technology? a) Cookies b) Intellectual Property c) Biometrics d) Malware Answer: c Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Application Standard 1: AACSB || Technology 93) Judith works from home. In order to access her corporate email and other computer systems she logs into a virtual private network (VPN). The VPN is an example of _____________. a) a communications control
Rainer, Information System, Fifth Canadian Edition
Testbank
b) a passphrase c) a digital certificate d) an audit Answer: a Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Application Standard 1: AACSB || Technology 94) Triple Z Travelsite allows customers to reserve discount hotel rooms and airline tickets with certain companies they have relationships with. In order to secure the credit card information used by customers, which of the following controls would you recommend Triple Z use? a) Biometrics b) Transport layer security c) Whitelisting d) Audits Answer: a Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Application Standard 1: AACSB || Technology 95) Ransomware negatively affected the city of Atlanta in many ways. Which vulnerability was the main cause of the problems? a) Today’s interconnected, interdependent, wirelessly networked business environment b) Smaller, faster, cheaper computers and storage devices c) Decreasing skills necessary to be a computer hacker d) International organized crime taking over cybercrime e) Lack of management support Answer: E Difficulty: Hard Section Reference 1: Closing Case
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Evaluation Standard 1: AACSB || Technology 96) _______ is designed to erase information permanently, not to hold it ransom. a) Petya b) RobbinHood c) SamSam d) WannaCry Answer: A Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: True/False 97) The 2017 Equifax data breach was more damaging to lenders than to consumers. Answer: False Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 98) Equifax’s CIO, CTO, and CEO lost their jobs due to the 2017 data breach. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Compare and contrast human mistakes and social engineering and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
99) Equifax could have upgraded and patched the software that was the cause of the breach. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 100) An intranet is a trusted network. Answer: True Difficulty: Hard Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Synthesis Standard 1: AACSB || Technology 101) VPN is a trusted network. Answer: True Difficulty: Hard Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Synthesis Standard 1: AACSB || Technology 102) The internet is an untrusted network. Answer: True Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
103) The recent trend indicates that CEOs lose their jobs after data breaches. In theory, this should impact the “lack of management support” factor that increases the vulnerability of organizational information resources. Answer: True Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 104) Cybercrime is typically nonviolent but lucrative. Answer: True Difficulty: Medium Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 105) It is always safe to open e-mails and click on links from your friends. Answer: False Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology 106) If a hacker enters a building with an official-looking ID badge. This is considered social engineering. Answer: True Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 107) Social engineers will often pose as real employees or contractors such as exterminators or fire marshals. Answer: True Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 108) Social engineering is an unintentional threat on the part of the employee. Answer: True Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 109) You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating. Answer: True Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
110) You need to be particularly careful of tailgating at airport terminals. Answer: False Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 111) Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary. Answer: False Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 112) Competitive intelligence is legal while espionage is illegal even though both involve collecting information about competitors. Answer: True Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 113) Dumpster diving is always theft and is always illegal. Answer: False Difficulty: Hard Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
114) Once a copyright and patent is established, it applies to all countries in the world. Answer: False Difficulty: Hard Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 115) You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn’t have to buy it too. This is piracy and is illegal. Answer: True Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 116) You are a computer programmer who feels short-changed by your organization. To get back at them, you would most likely use a Trojan horse, back door, or logic bomb. Answer: True Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 117) Cyberterrorism is typically carried out by individuals or groups whereas cyberwarfare is carried out by nation states or nonstate actors such as terrorists. Answer: True Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
118) DarkHotel’s attacks begin with high-level viruses individually designed to be interesting and convincing to the target victim. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 119) In early 2017, reports confirmed that Google and Facebook had lost $100 million through whaling attacks. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 120) Whaling attacks are easier to detect than typical phishing attacks because they are so highly personalized and targeted. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 121) Whaling attacks have the biggest impact on financial institutions due to the nature of their business; it is not a true concern for other types of organizations. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Application Standard 1: AACSB || Technology 122) The Dyn DDoS hack illustrates the vulnerability of the Internet of Things.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Medium Section Reference 1: IT’s About Business 4.2 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Analysis Standard 1: AACSB || Technology 123) The SCADA attacks on Dyn were so severe that they eventually blocked or significantly slowed user access to dozens of other websites like Twitter, Netflix, and CNN. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 4.2 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 124) Dyn is a cloud-based internet performance management company that provides virtual private networks for internet websites. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 4.2 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology
125) IT security is the business of everyone in an organization. Answer: True Difficulty: Easy Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
126) People tend to violate security procedures because the procedures are inconvenient. Answer: True Difficulty: Easy Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Knowledge Standard 1: AACSB || Technology 127) If you choose not to protect your information systems, you have adopted a risk acceptance strategy. Answer: True Difficulty: Medium Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Analysis Standard 1: AACSB || Technology 128) If you choose to spend as much as you can to protect your information systems, you have adopted a risk transference strategy. Answer: False Difficulty: Medium Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Analysis Standard 1: AACSB || Technology 129) If you choose limit your risk by implementing firewalls and other security measures, you have adopted a risk limitation strategy. Answer: True Difficulty: Medium Section Reference 1: 4.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Analysis Standard 1: AACSB || Technology 130) ID cards address physical and access controls. Answer: True Difficulty: Hard Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Evaluation Standard 1: AACSB || Technology 131) Authentication occurs after authorization. Answer: False Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 132) Passwords are a huge information security problem for all organizations. Answer: True Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 133) Weak passwords can be addressed through multi-factor authentication. Answer: True
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 134) Authorization means someone has privileges to do certain things on a system. Answer: True Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Comprehension Standard 1: AACSB || Technology 135) Anti-malware systems are generally reactive. Answer: True Difficulty: Hard Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 136) Whitelisting allows nothing to run unless it is on the whitelist. Answer: True Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 137) Blacklisting allows everything to run unless it is on the list.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 138) People, devices, software, and websites can be blacklisted and whitelisted. Answer: True Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 139) Employee monitoring systems are illegal and unethical. Answer: False Difficulty: Hard Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Synthesis Standard 1: AACSB || Technology 140) The external audit of information systems is frequently a part of the overall external auditing performed by a CPA firm. Answer: True Difficulty: Hard Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
141) People are not liable for fraudulent use of their credit cards. Answer: True Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 142) A CPA firm typically performs an internal business audit. Answer: False Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology
143) Government systems typically lack resources and IT expertise and operate on outdated hardware and software. This makes them particularly vulnerable to ransomware attacks. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 144) RobbinHood was a DDoS attack on the city of Atlanta. Answer: False Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Question type: Text Entry 145) ___ refers to all the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Answer: Information security Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 146) A(n) ___ to an information resource is any danger to which a system may be exposed. Answer: threat Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 147) The ___ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. Answer: exposure Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 148) An information resource’s ___ is the possibility that the system will be harmed by a threat. Answer: vulnerability
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 149) ___ refers to illegal activities conducted over computer networks, particularly the internet. Answer: cybercrime Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 150) ___ involves rummaging through commercial or residential trash to find discarded information. Answer: Dumpster diving Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 151) ___ is the deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime. Answer: Identity theft Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 152) A ___ is an intellectual work that is not based on public information.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: trade secret Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 153) A ___ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time. Answer: patent Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 154) A ___ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period. Answer: copyright Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 155) ___ are small amounts of information that websites store on your computer, temporarily or more or less permanently. Answer: Cookies Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 156) A ___ is the probability that a threat will impact an information resource.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: risk Difficulty: Easy Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Knowledge Standard 1: AACSB || Technology 157) In risk ___, the organization takes concrete actions against risks. Answer: mitigation Difficulty: Easy Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Knowledge Standard 1: AACSB || Technology 158) Information security controls are also called ___. Answer: defense mechanisms or countermeasures Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 159) ___ controls prevent unauthorized individuals from gaining access to a company’s facilities. Answer: Physical Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
160) ___ controls restrict unauthorized individuals from using information resources. Answer: Access Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 161) ___ controls secure the movement of data across networks. Answer: Communications Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 162) Access controls involve two major functions: ___ and ___. Answer 1: authentication Answer 2: authorization Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 163) ___ posits that users be granted the privilege for an activity only if there is a justifiable need for them to perform that activity. Answer: Least privilege Difficulty: Easy Section Reference 1: 4.5
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 164) ___ is a process in which a company identifies the software that it will allow to run on its computers. Answer: Whitelisting Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 165) ___ allows everything to run unless it is on the list. Answer: Blacklisting Difficulty: Easy Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Essay 166) What are the five factors that contribute to the increasing vulnerability of organizational information resources? Consider a current data breach (e.g., Target’s credit card breach in 2013, Sony’s data breach in 2014, the Democratic National Committee breach in 2015) and how each of these factors contributed to that breach. Answer: Difficulty: Hard Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Synthesis
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: 1) Today’s interconnected, interdependent, wirelessly networked business environment Target – the Fazio connection, letting them have access; while the sensitive information was “walled off,” there were still “holes” Sony – able to get access to a system via the Internet (not enough security) DNC – Russians able to get into US systems during their office hours (employees made the internal network untrusted) 2) Smaller, faster, cheaper computers and storage devices Target – it was easy for Target to store lots of customer information Sony – everything was electronic (able to leak movies before officially released) DNC – everything was electronic 3) Decreasing skills necessary to be a computer hacker Target – the phishing attack on Fazio Sony – used malware (a common tool was used) DNC – used spear-phishing 4) International organized crime taking over cybercrime Target – not in the US, stole lots of credit card numbers to sell them Sony – conducted by North Korea (possibly to stop a controversial film) DNC – Russia supposedly wanted to affect the election 5) Lack of management support Target – while they installed FireEye, they didn’t work hard enough to use it properly Sony – ignored threatening e-mails, hired the FBI and FireEye to protect employees DNC – ignored FBI’s warnings; only one guy knew about it; they didn’t have secure systems 167) Why are employees the biggest threats to an organization? What can you do to protect your future company’s assets? Answer: Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking Solution: We tend to be careless with our devices and generally in our behavior (see Table 4.1)
Rainer, Information System, Fifth Canadian Edition
Testbank
168) Identity theft is a deliberate threat to information systems and is one of the largest concerns of consumers and businesses today. What are the four techniques the book mentions for illegally obtaining information? How can you protect yourself from each of these threats? Answer: Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Application Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking Solution: 1) Dumpster diving – shred your sensitive information 2) Stealing personal information in computer databases – have strong passwords, encrypt the data 3) Infiltrating organizations (data aggregators) that store large amounts of personal information -
Rainer, Information System, Fifth Canadian Edition
Testbank
have strong passwords, encrypt the data 4) Phishing – never provide a user ID and password; always ensure the person/site is legitimate 169) Organizations spend a great deal of time and money protecting their information resources. To figure out what needs to be protected and how they are going to protect it, they need to perform risk management. What is the goal of risk management? List and describe the three processes of risk management. How can organizations mitigate risk? Describe a company that has adopted each risk mitigation strategy. Answer: Difficulty: Medium Section Reference 1: 4.4 Learning Objective 1: Describe the three risk mitigation strategies, and provide an example of each one in the context of owning a home. Bloomcode: Application Standard 1: AACSB || Technology Solution: goal = identify, control, and minimize the impact of threats; processes = analysis (with three steps: assess value of assets, estimate probability of attack, compare costs of protecting versus not protecting), mitigation (three types as noted next), and controls evaluation (cost versus benefit); mitigate = acceptance (no controls, absorb damage), limitation (try to minimize threat), transference (get insurance); examples: acceptance = Democratic National Committee, limitation (Target installed FireEye software; although they didn’t implement all the functionality), transference (see Travelers Insurance options) 170) What are the six basic guidelines for creating strong passwords? Without divulging your passwords, how do your passwords “add up” and why? HINT: You should specifically address each of the six guidelines for your passwords. Now suppose you are a manager and you know employees won’t have strong passwords, how do you address this issue? Answer: Difficulty: Medium Section Reference 1: 4.5 Learning Objective 1: Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one. Bloomcode: Comprehension, Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking Solution: First question: 1) They should be difficult to guess. 2) They should be long rather than short. 3) They should have uppercase letters, lowercase letters, numbers, and special characters. 4) They should not be recognizable words.
Rainer, Information System, Fifth Canadian Edition
Testbank
5) They should not be the name of anything or anyone familiar, such as family names or names of pets. 6) They should not be a recognizable string of numbers, such as a social security number or a birthday. Second question: Require password resets every 60–90 days and set limitations on characters, capitalizations, numbers, letters, etc.; since they may then write these passwords down, require multi-factor authentication
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 5, Testbank Course Title: Rainer, IS 5e Chapter Number: 5 Question type: Multiple Choice 1) Vivametrica was asked to compare the data collected from the claimant’s Fitbit to the general population health data and_______. a) Judge whether they were below normal for someone in her age range and of her former professionb) Judge whether they were above normal for someone in her age range and of her former professionc) Judge whether they were below normal for someone in her weight range and of her former profession d) Judge whether they were normal for someone in her age range and of her former profession Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology
2) We leave valuable trails of data behind when we use tracking and recording devices called data ________. a) debris b) exhaust c) markers d) roads Answer: B Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology
3) A connected vehicle is equipped with Internet access and usually with a wireless ________. a) LAN b) MAN c) PAN d) WAN Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 5.1 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 4) IHS Automotive estimates that the average connected car will produce up to 30 _____ of data each day. a) KB b) GB c) TB d) MB Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 5.1 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 5) Which of the following companies is NOT developing cars and self-driving technology/services? a) Amazon b) Apple c) Google d) IBM Answer: A
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: IT’s About Business 5.1 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 6) ________ are those data that visitors and customers produce when they visit a website and click on hyperlinks. a) Clickstream data b) Cookies c) ERP d) RFID Answer: a Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 7) Which of the following is NOT a reason managing data is difficult? a) Data are generated from multiple sources. b) Data are scattered throughout organizations. c) Data are subject to data rot. d) The amount of data is decreasing exponentially with time. Answer: d Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 8) Data ________ refers primarily to problems with the media on which the data are stored. a) clickstreaming b) degradation
Rainer, Information System, Fifth Canadian Edition
Testbank
c) scattering d) rot Answer: d Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 9) You recently inherited an Alvin and The Chipmunks “A Chipmunk Christmas” record. Since you don’t have a record player, you need to find a way to convert the record into a CD. This is an example of data ________. a) clickstreaming b) degradation c) scattering d) rot Answer: d Difficulty: Medium Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Application Standard 1: AACSB || Technology 10) ________ is an approach to managing information across an entire organization. a) Big data b) Data governance c) Master data d) Master data management Answer: b Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 11) ________ is a process that spans all organizational business processes and applications. a) Big data b) Data governance c) Master data d) Master data management Answer: d Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 12) ________ are a set of core data that span the enterprise information systems. a) Data governance b) Master data c) Master data management d) Transaction data Answer: b Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 13) From the mid-1950s until the early 1970s, organizations managed their data in a _________; this created ________. a) database; a centralized location for information b) database; information silos c) file management environment; a centralized location for information d) file management environment; information silos Answer: d
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Hard Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge, Synthesis Standard 1: AACSB || Technology 14) Database systems minimize ________. a) independence b) integrity c) redundancy d) security Answer: c Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 15) Database systems minimize ________. a) inconsistency b) independence c) integrity d) security Answer: a Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 16) Database systems maximize ________. a) inconsistency b) independence c) isolation d) redundancy
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 17) Databases ________ redundancy; this means ________. a) maximize; the same data are stored in multiple locations b) maximize; various copies of the data do not agree c) minimize; the same data are stored in multiple locations d) minimize; various copies of the data do not agree Answer: c Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 18) Databases ________ inconsistency; this means ________. a) maximize; the same data are stored in multiple locations b) maximize; various copies of the data do not agree c) minimize; the same data are stored in multiple locations d) minimize; various copies of the data do not agree Answer: d Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 19) Databases minimize _________; this means ________. a) independence; applications cannot access data associated with other applications
Rainer, Information System, Fifth Canadian Edition
Testbank
b) independence; applications and data are not linked to each other, so all applications are able to access the same data c) isolation; applications cannot access data associated with other applications d) isolation; applications and data are not linked to each other, so all applications are able to access the same data Answer: c Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 20) Databases maximize _________; this means ________. a) independence; applications cannot access data associated with other applications b) independence; applications and data are not linked to each other, so all applications are able to access the same data c) isolation; applications cannot access data associated with other applications d) isolation; applications and data are not linked to each other, so all applications are able to access the same data Answer: b Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) Which of the following is an accurate representation of the data hierarchy from smallest to largest? a) bit, byte, field, record, file, database b) bit, byte, field, file, record, database c) byte, bit, field, record, file, database d) byte, bit, field, file, record, database Answer: a Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 22) A ________ represents the smallest unit of data a computer can process. a) bit b) byte c) field d) file Answer: a Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 23) A ________ is a group of eight ________. a) bit; bytes b) byte; bits c) field; files d) file; fields Answer: b Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 24) Microsoft ________ is a popular example of a relational database. a) Access b) Excel c) PowerPoint d) Word Answer: a Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 25) The relational database model is based on the concept of ________-dimensional tables. a) one b) two c) three d) four Answer: b Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 26) Each relational database table contains records (listed in _______) and attributes (listed in ______) . a) columns; columns b) columns; rows c) rows; columns d) rows; rows Answer: c Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 27) A ________ generally describes an entity. a) byte b) field c) file d) record
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Hard Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 28) A(n) ________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity. a) attribute b) field c) instance d) record Answer: c Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) Each characteristic or quality of a particular entity is called a(n) ________. a) attribute b) field c) instance d) record Answer: a Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 30) The category “student” is a(n) ________. a) attribute b) database
Rainer, Information System, Fifth Canadian Edition
Testbank
c) entity d) instance Answer: c Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Application Standard 1: AACSB || Technology 31) All the information about you in your university’s database is a(n) ________. a) attribute b) database c) entity d) instance Answer: d Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Application Standard 1: AACSB || Technology 32) Your name in your university’s database is a(n) ________. a) attribute b) database c) entity d) instance Answer: a Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Application Standard 1: AACSB || Technology 33) The ________ key is an identifier field that uniquely identifies a record.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) alien b) foreign c) primary d) secondary Answer: c Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 34) The ________ key has some identifying information but does not identify the record with complete accuracy. a) alien b) foreign c) primary d) secondary Answer: d Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 35) The ________ creates links between two tables. a) alien b) foreign c) primary d) secondary Answer: b Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
36) Considering the following tables, ________ is a primary key. Student Table SID Name Expected Graduation Year 123 Smith 2017
Professor Table PID Name Tenure Year
Class Table ID Name
ABC Jones
234
Jones
2018
DEF
Brilliant 2000
567
Barilla 2018
GHI
Genius
MGT101 Intro to ABC Management BUS101 Intro to ABC Business MGT201 Intermediate GHI Management
1995
2000
PID
a) Class Table: PID b) Professor Table: Name c) Student Table: Expected Graduation Year d) Student Table: ID Answer: d Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Application Standard 1: AACSB || Technology 37) Considering the following tables, ________ is a foreign key. Student Table SID Name Expected Graduation Year 123 Smith 2017
Professor Table PID Name Tenure Year
Class Table ID Name
ABC Jones
234
Jones
2018
DEF
Brilliant 2000
567
Barilla 2018
GHI
Genius
MGT101 Intro to ABC Management BUS101 Intro to ABC Business MGT201 Intermediate GHI Management
a) Class Table: PID b) Professor Table: Name c) Student Table: Expected Graduation Year d) Student Table: ID
1995
2000
PID
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Application Standard 1: AACSB || Technology 38) Industry experts estimate that ________ percent of data in an organization is unstructured. a) 10–20 b) 40–50 c) 60–70 d) 80–90 Answer: d Difficulty: Hard Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 39) Industry experts estimate that 80-90 percent of data in an organization is ________. a) part-structured b) semi-structured c) structured d) unstructured Answer: d Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 40) Which of the following is TRUE? a) Big Data becomes less useful over time since data changes too frequently for a system to maintain. b) Big Data is so large and complex that it must be managed by using a traditional DBMS.
Rainer, Information System, Fifth Canadian Edition
Testbank
c) Big Data predictions come from teaching computers to think like humans. d) Big Data systems perform well because they contain huge amounts of data on which to base their predictions. Answer: d Difficulty: Medium Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 41) Which of the following is NOT a characteristic of Big Data? a) Variety b) Velocity c) Viscous d) Volume Answer: c Difficulty: Easy Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 42) Which of the following is NOT a problem associated with Big Data? a) Big Data can be structured, unstructured, or semi-structured. b) Big Data can come from untrusted sources. c) Big Data changes. d) Big Data lacks quality. Answer: a Difficulty: Hard Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) Google’s Cloud Spanner is a globally distributed ___ database that ____.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) NewSQL; synchronizes time b) NewSQL; tracks users c) SQL; synchronizes time d) SQL; tracks users Answer: A Difficulty: Medium Section Reference 1: IT’s About Business 5.2 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Comprehension Standard 1: AACSB || Technology 44) NewSQL is a class of modern relational database management system that attempts to provide the same scalable performance of ___ systems for ___. a) NoSQL; OLAP b) NoSQL; OLTP c) SQL; OLAP d) SQL; OLTP Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 5.2 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 45) _______ have been the primary mechanism in many organizations for performing analytics, reporting, and operations. However, they are too rigid to be effective with Big Data. a) CRMs b) EDWs c) ETLs d) SCMs Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 5.3 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology
46) A data _______ is a central repository that stores all of an organization’s data, regardless of their source or format. a) exhaust b) lake c) pond d) trail Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 5.3 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology
47) A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization. a) mart b) shop c) store d) warehouse Answer: d Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 48) A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department. a) mart; store
Rainer, Information System, Fifth Canadian Edition
Testbank
b) mart; warehouse c) warehouse; mart d) warehouse; store Answer: b Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 49) Data marts can be implemented ________ compared to data warehouses. a) less quickly b) more quickly c) at the same pace d) It depends on the situation. Answer: b Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 50) Data marts can be implemented ________ quickly than data warehouses and support ________ control. a) less; central b) less; local c) more; central d) more; local Answer: d Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 51) Data marts and data warehouses typically use ________. a) ERP b) OLAP c) OLTP d) RFID Answer: b Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 52) Data marts and data warehouses are ________; this means they ________ be updated by users. a) non-volatile; can b) non-volatile; cannot c) volatile; can d) volatile; cannot Answer: b Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 53) ________ is an example of a source system for a data warehouse. a) DSS b) ERP c) OLAP d) Web browser Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 54) Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization’s memory, usually in a(n) ________ format. a) part-structured b) semi-structured c) structured d) unstructured Answer: d Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 55) Intellectual capital is another term for ________. a) data b) information c) knowledge d) wisdom Answer: c Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 56) ________ is an intellectual asset.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Data b) Information c) Knowledge d) Wisdom Answer: c Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 57) ________ deals with more objective, rational, and technical knowledge. a) Explicit information b) Explicit knowledge c) Tacit information d) Tacit knowledge Answer: b Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 58) ________ is the cumulative store of subjective or experiential learning. a) Explicit information b) Explicit knowledge c) Tacit information d) Tacit knowledge Answer: d Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 59) Suppose you are a salesperson. You take great pride in knowing each customers’ favorite places to eat and their favorite meals. This is an example of ________. a) explicit information b) explicit knowledge c) tacit information d) tacit knowledge Answer: d Difficulty: Medium Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Application Standard 1: AACSB || Technology 60) Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________. a) explicit information b) explicit knowledge c) tacit information d) tacit knowledge Answer: b Difficulty: Medium Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Application Standard 1: AACSB || Technology 61) Which of the following is the correct order of the KMS cycle? a) capture, create, refine, store, manage, disseminate b) capture, create, refine, store, disseminate, manage c) create, capture, refine, store, manage, disseminate d) create, capture, refine, store, disseminate, manage
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: c Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 62) Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. The team is now asking the VP of shipping to review the process diagram and give opinions. Laurie’s team is at the ________ knowledge stage of the KMS cycle. a) capture b) disseminate c) refine d) create Answer: c Difficulty: Medium Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Application Standard 1: AACSB || Technology 63) Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. After getting upper management’s opinions the team posted the new diagram to a corporate portal site. They are now demonstrating the new process to all shipping department employees. Laurie’s team is at the ________ knowledge stage of the KMS cycle. a) capture b) disseminate c) refine d) create Answer: b Difficulty: Medium Section Reference 1: 5.5
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Application Standard 1: AACSB || Technology 64) ________ is the most popular query language used for interacting with a database. a) ETL b) RFID c) SQL d) TPS Answer: c Difficulty: Easy Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 65) Microsoft Access uses ________ to conduct queries. a) ETL b) QBE c) RFID d) TPS Answer: b Difficulty: Medium Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 66) The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated. a) business rules b) cardinality c) data dictionary
Rainer, Information System, Fifth Canadian Edition
Testbank
d) modality Answer: c Difficulty: Easy Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 67) ________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity. a) Business rules b) Cardinality c) Data dictionary d) Modality Answer: b Difficulty: Easy Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 68) Two vertical lines represent the ________ cardinality symbol. a) mandatory many b) mandatory single c) optional many d) optional single Answer: b Difficulty: Medium Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
69) A circle with a vertical line represents the ________ cardinality symbol. a) mandatory many b) mandatory single c) optional many d) optional single Answer: d Difficulty: Medium Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 70) A vertical line with a “chicken leg” to the entity represents the ________ cardinality symbol. a) mandatory many b) mandatory single c) optional many d) optional single Answer: a Difficulty: Medium Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 71) A circle with a “chicken leg” to the entity represents the ________ cardinality symbol. a) mandatory many b) mandatory single c) optional many d) optional single Answer: c Difficulty: Medium Section Reference 1: Appendix
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 72) A ________ relationship exists when an association is maintained within a single entity. a) binary b) solitary c) ternary d) unary Answer: d Difficulty: Easy Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 73) A ________ relationship exists when two entities are associated. a) binary b) solitary c) ternary d) unary Answer: a Difficulty: Easy Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 74) A ________ relationship exists when three entities are associated. a) binary b) ternary c) tertiary d) unary
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Hard Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 75) Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance. a) maximum; maximum b) maximum; minimum c) minimum; maximum d) minimum; minimum Answer: c Difficulty: Easy Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 76) Functional dependencies are similar to ________ keys. a) foreign b) primary c) secondary d) useful Answer: a Difficulty: Hard Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Synthesis Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
77) Which of the following technologies was NOT deployed in the 2018 Tour de France bicycles? a) Augmented reality b) GPS c) RFID d) Rechargeable battery Answer: A Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology
78) Each bicycle in the 2018 Tour de France produced a total of more than 3 ____ data points during the course of the race. a) thousand b) million c) billion d) trillion Answer: C Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 79) The 2018 Tour de France bicycles transmitted data over a ___ network. a) data b) mesh c) personal area d) satellite Answer: B
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: True/False 80) January 2017, a grand jury indicted Compton on felony charges of aggravated arson and insurance fraud. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 81) The more connected, convenient, and intelligent our devices become, the more they have the potential to expose the truth. . Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 82) In the early 2010s, a personal trainer in Calgary, Alberta was injured in an automobile accident, this case was the first known court case that used Fitbit activity data. Answer: True Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: Opening Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Comprehension Standard 1: AACSB || Technology 83) As we incorporate more and more technology into myriad aspects of daily life, so too are we presented with a whole new set of legal questions that must be answered. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Comprehension Standard 1: AACSB || Technology 84) Infotainment in cars is a new concept facilitated by social media technologies. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 5.1 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 85) While late-model cars often utilize any number of technologies to make the driving experience more enjoyable and safer for drivers, there has yet to be a car that is completely autonomous. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 5.1 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Comprehension Standard 1: AACSB || Technology 86) The process of acquiring, keeping, and managing data is becoming easier.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 87) Sarbanes-Oxley requires that private companies evaluate and disclose the effectiveness of their internal financial controls. Answer: False Difficulty: Hard Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 88) Sarbanes-Oxley requires that public companies evaluate and disclose the effectiveness of their internal operational controls. Answer: False Difficulty: Hard Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 89) Sarbanes-Oxley holds CIOs personally responsible for financial disclosures since they manage the systems that hold financial information. Answer: False Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 90) A byte is the smallest unit of data a computer can process. Answer: False Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 91) A relational database is basically one big table; it is also called a flat file. Answer: False Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 92) A foreign key is a primary key in another file. Answer: True Difficulty: Hard Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Application Standard 1: AACSB || Technology 93) A secondary key can be a foreign key. Answer: True Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
94) Unstructured data can reside in a traditional relational database. Answer: False Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 95) Big Data is a collection of data so large and complex that it is difficult to manage using traditional database management systems. Answer: True Difficulty: Easy Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 96) Big Data is so large and complex that it must be managed using a traditional DBMS. Answer: False Difficulty: Medium Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 97) The term “Big Data” refers simply to huge amounts of data. Answer: False Difficulty: Easy Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
98) Organizations can use Big Data to conduct experiments. Answer: True Difficulty: Easy Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 99) Organizations can use Big Data to microsegment customers. Answer: True Difficulty: Easy Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 100) Organizations can use Big Data to create new business models. Answer: True Difficulty: Easy Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 101) Computer network transmissions speeds are faster than the processing speeds of the computers themselves. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 5.2 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
102) The collection of qualities to which NewSQL systems for online transaction processing are measured against are Autonomy, Consistency, Independence, and Durability. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 5.2 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 103) Before Spanner, one of the major problems that Google encountered with respect to consistency among databases was that of keeping time without constant, intense communication. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 5.2 Learning Objective 1: Define Big Data and explain its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 104) It is difficult for business analysts and data scientists who rely on EDWs to ask ad hoc questions of the data. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 5.3 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology
105) A data mart is a low-cost, scaled down version of a data warehouse. Answer: True Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 106) Data marts and data warehouses are typically organized by business dimension or subject. Answer: True Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 107) Data marts and data warehouses use OLTP. Answer: False Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 108) Data warehouses are information silos. Answer: False Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 109) Data marts and data warehouses maintain historical data. Answer: True Difficulty: Easy Section Reference 1: 5.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 110) Data warehouses and data marts are updated by users. Answer: False Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 111) Data warehouses and data marts are multidimensional. Answer: True Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 112) Knowledge is distinct from data and information. Answer: True Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 113) Information is knowledge that is contextual, relevant, and useful. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 114) Knowledge is information in action. Answer: True Difficulty: Medium Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 115) Explicit knowledge deals with more objective, rational, and technical knowledge. Answer: True Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 116) Tacit knowledge is easily codified. Answer: False Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 117) Tacit knowledge is more unstructured than explicit knowledge.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Medium Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 118) KMS are useful for creating best practices in an organization. Answer: True Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 119) Organizations may need to reward employees to get them to add their expertise to a KMS. Answer: True Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 120) Once a KMS is set-up, it is updated automatically by Big Data the organization collects. Answer: False Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
121) Learning about and adjusting to your organization’s culture increases your explicit knowledge. Answer: False Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 122) The MIS department creates the business rules necessary to develop an ER diagram. Answer: False Difficulty: Medium Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 123) A circle for cardinality represents a single relationship. Answer: False Difficulty: Medium Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 124) A “chicken leg” for cardinality represents a many relationship. Answer: True Difficulty: Easy Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 125) The join operation combines records from two or more tables in a database to obtain information that is located in different tables. Answer: True Difficulty: Medium Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology 126) GPS data can be corrupted by signal noise during transmission. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology
Question Type: Text Entry 127) ___ are those data that visitors and customers produce when they visit a website and click on hyperlinks. Answer: Clickstream data Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 128) ___ is an approach to managing information across an entire organization.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: Data governance Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 129) ___ is a process that spans all organizational business processes and applications. Answer: Master data management Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 130) ___ are a set of core data that span the enterprise information systems. Answer: Master data Difficulty: Easy Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Knowledge Standard 1: AACSB || Technology 131) A(n) ___ is a collection of logically related records. Answer: data file Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
132) A data file is a collection of logically related ___. Answer: records Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 133) A byte is a group of ___ bits. Answer: 8 Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 134) A ___ is a set of programs that provide users with tools to create and manage a database. Answer: database management system or DBMS Difficulty: Easy Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Knowledge Standard 1: AACSB || Technology 135) The three distinct characteristics of Big Data are ___. Answer: volume, velocity, and variety Difficulty: Medium Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Knowledge Standard 1: AACSB || Technology 136) A data ___ is a repository of historical data that are organized by subject to support decision makers in the organization.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: warehouse Difficulty: Easy Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 137) A data ___ is a low-cost, scaled-down version of a data ___. Answer 1: mart Answer 2: warehouse Difficulty: Medium Section Reference 1: 5.4 Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Knowledge Standard 1: AACSB || Technology 138) ___ is a process that helps organizations manipulate important knowledge that comprises part of the organization’s memory, usually in an unstructured format. Answer: Knowledge management Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 139) ___ knowledge deals with more objective, rational, and technical knowledge. Answer: Explicit Difficulty: Easy Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 140) ___ knowledge is generally imprecise and costly to transfer. Answer: Tacit Difficulty: Medium Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Knowledge Standard 1: AACSB || Technology 141) ___ is a method of analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance. Answer: Normalization Difficulty: Easy Section Reference 1: Appendix Learning Objective 1: Understand the processes of querying a relational database, entityrelationship modeling, and normalization and joins. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Essay 142) List and describe the nine issues that make managing data so difficult. Discuss how your university may struggle with each issue. Now evaluate how a business like Amazon may struggle with each issue. Answer: Difficulty: Hard Section Reference 1: 5.1 Learning Objective 1: Discuss ways that common challenges in managing data can be addressed using data governance. Bloomcode: Evaluation Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 4 : AACSB || Reflective Thinking Solution: • Amount of data increasing – more new students every year, more employees, need to keep all the data on students (transcripts) , etc.; hopefully new customers placing new orders • Data are scattered – lots of different systems (class management, payment, hospital, registration, etc.) ; Amazon has to deal with different suppliers – maybe third party inventory systems aren’t as up-to-date (so customers may get an “out of stock” message after they place an order when inventory was available at the time of the order) • Data are generated from multiple sources o Internal – grades, paychecks, etc.; Amazon’s corporate databases or documents o Personal – Facebook, memes, etc.; Amazon’s employees have opinions and customers can write reviews o External – government reports (if public), university website, etc.; other websites referencing Amazon • Data degrade – employees moving, students moving (in-state vs. out-of-state), etc.; customers moving, etc. • Data rot – storing data in less than ideal places (lots of paper for most universities); same for Amazon • Data security, quality, integrity – protecting social security numbers, grades; protecting customer credit card information • Diverse systems that deal with specific business processes – most universities probably have many, many systems that need to be maintained; they may have specific systems for managing orders, inventory, and credit card numbers • Federal regulation – FERPA, HIPAA; SOX • Too much unstructured data – social media causes problems for both of these 143) Draw a simple relational database (at least two tables with at least three columns and three rows). Label the data hierarchy (except the bit). Label the primary, secondary, and foreign keys. Answer: Difficulty: Medium Section Reference 1: 5.2 Learning Objective 1: Discuss the advantages and disadvantages of relational databases. Bloomcode: Comprehension, Application Standard 1 : AACSB || Communication Standard 2 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking Solution: Student Table Professor Table Class Table SID Name Expected PID Name Tenure ID Name PID Graduation Year Year 123 Smith 2017 ABC Jones 1995 MGT101 Intro to ABC Management
Rainer, Information System, Fifth Canadian Edition
Testbank
234
Jones
2018
DEF
Brilliant 2000
567
Barilla 2018
GHI
Genius
2000
BUS101
Intro to ABC Business MGT201 Intermediate GHI Management
Byte = any single character (e.g., “1” from Student Table) Field = any cell Record = any row File = any table Database = all three tables Primary = SID, PID, or ID (respectively in each table) Secondary = any column except those listed under primary Foreign = PID in the Class Table 144) List and describe the three characteristics of Big Data. Should your university address Big Data? Why or why not? Describe at least one business (not your university if you answered “yes” to the previous questions) that has to deal with Big Data. Explain why you chose that business. Answer: Difficulty: Medium Section Reference 1: 5.3 Learning Objective 1: Define Big Data and its basic characteristics. Bloomcode: Analysis Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: 1) Volume – lots of data 2) Velocity – data flowing into organization rapidly increasing 3) Variety – can get structured, unstructured, or semi-structured data (most is unstructured) and changes rapidly (except for the structured) Most students will have to say yes because everyone has to deal with social media and what students or other people say on social media A student could pick just about any business because social media impacts everyone 145) Consider the data warehouse framework. Describe a source system and the main problem associated with these systems. What options do organizations have for storing data; which one is most effective? What is metadata? Why is data quality so important? What are the two categories of users? Answer: Difficulty: Easy Section Reference 1: 5.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Explain the elements necessary to successfully implement and maintain data warehouses. Bloomcode: Comprehension Standard 1 : AACSB || Communication Standard 2 : AACSB || Technology Solution: Source system = POS, ERP, legacy, OLTP, external web documents (any place where collect data to feed into the data warehouse); main problem = data quality Storing = one central data warehouse, independent data marts, or hub and spoke (central warehouse that pushes to data marts); data marts are NOT effective because they create information silos and have data quality problems Metadata = data about data Quality = users won’t trust the data and won’t use it Users = information producers (create information) and information consumers (use information) 146) What are the benefits and drawbacks of KMSs? Suppose you are a salesperson; would you want to use a KMS? Why or why not? Answer: Difficulty: Medium Section Reference 1: 5.5 Learning Objective 1: Describe the benefits and challenges of implementing knowledge management systems in organizations. Bloomcode: Comprehension, Synthesis Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: Benefits = create most effective and efficient way of doing something, improves overall organizational performance, improved customer service, more efficient product development, improved employee morale and retention Drawbacks = people have to be willing to share personal, tacit knowledge; must keep it up to date; must be willing to invest resources (time and money to put in the system and update it) Salesperson = students should discuss the benefits and drawbacks of sharing tacit knowledge = may be hard to codify what you know (some things may simply be instinct; other things like how to shake hands with that person or if they prefer a bow to a certain height or a kiss on a particular cheek); other things someone may not want to share because they will be afraid to get replaced by another human or a computer
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 6, Testbank Course Title: Rainer, IS 5e Chapter Number: 6 Question type: Multiple Choice 1) People in Myanmar use “Internet” and _______ interchangeably. a) Amazon b) Facebook c) Google d) Twitter Answer: B Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 2) The main problem with Myanmar’s Facebook is _______. a) data collection b) difficulty connecting c) excessive advertising d) hate speech Answer: D Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 3) Internet users in Myanmar are more likely to fall for Internet scams and hoaxes than Internet users in places like the U.K. and Canada because _________. a) there are much more rigorous checks in place for content that permitted to be published online in the U.K. and Canada. b) users in Myanmar have such low rates of digital literacy.
Rainer, Information System, Fifth Canadian Edition
Testbank
c) hackers and other cyber criminals specifically target the people of Myanmar at a rate much higher than anywhere else in the world. d) users in Myanmar are much more online than their counterparts in other countries and are exposed to many more scams and hoaxes. Answer: B Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Application Standard 1: AACSB || Technology 4) Bandwidth is stated in ________ per second. a) beeps b) bits c) blips d) bytes Answer: b Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 5) Which of the following is the correct order of networks from largest to smallest? a) MAN, WAN, LAN, PAN b) MAN, WAN, PAN, LAN c) WAN, MAN, LAN, PAN d) WAN, MAN, PAN, LAN Answer: c Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
6) Which of the following is the correct order of networks from smallest to largest? a) PAN, LAN, MAN, WAN b) PAN, LAN, WAN, MAN c) PAN, MAN, LAN, WAN d) PAN, MAN, WAN, LAN Answer: a Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 7) _________s cover large geographical areas. a) LAN b) MAN c) PAN d) WAN Answer: d Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 8) The Internet is a ________. a) LAN b) MAN c) PAN d) WAN Answer: d Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
9) A network between Mars and the Earth would be a ________. a) LAN b) MAN c) PAN d) WAN Answer: d Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 10) A network stretching across New York City would be a ________. a) LAN b) MAN c) PAN d) WAN Answer: b Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 11) A network that is restricted to a single building is a ________. a) LAN b) MAN c) PAN d) WAN Answer: a Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 12) ________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks. a) Backbone b) Cloud c) Personal area d) Software-defined Answer: d Difficulty: Medium Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 13) Ethernet is a technology associated with ________s. a) LAN b) MAN c) PAN d) WAN Answer: a Difficulty: Medium Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 14) NICs allow devices to physically connect to the _______’s communications medium. a) LAN b) MAN c) PAN d) WAN Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 15) ________s allow devices to physically connect to the LAN’s communication’s medium. a) Backbone b) ERP c) NIC d) QR code Answer: c Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 16) According to recent data, households in the three Canadian territories— Yukon, Northwest Territories, and Nunavut—lack access to_________. a) Broadband Internet, described as 50/10 Mpbs speeds with unlimited data available b) Broadband Internet, described as 100/10 Mpbs speeds with unlimited data available c) High speed Internet, described as 40/10 Mpbs speeds with unlimited data available d) High speed Internet, described as 60/10 Mpbs speeds with unlimited data available Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 6.1 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 17) Being able to connect to the Internet is crucial for Canada’s northern territories and rural residents because ______.? a) Enables them to buy goods and services that may not be available locally. b) Enables to market their own goods and services to a much larger area.
Rainer, Information System, Fifth Canadian Edition
Testbank
c) Enables to connect remotely with health services that previously required several hours of driving. d) All of the above. Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 6.1 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 18) ________ modems convert information for use on the POTS. a) Cable b) Dial-up c) DSL d) Fiber Answer: b Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 19) ________ modems convert information for use on the POTS and are almost extinct in most parts of the developed world today. a) Cable b) Dial-up c) DSL d) Fiber Answer: b Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 20) ________ modems operate over coaxial cable. a) Cable b) Dial-up c) DSL d) Fiber Answer: a Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) ________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the Internet at the same time. a) Cable b) Dial-up c) DSL d) Fiber Answer: a Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 22) ________ modems use the digital portion of a voice telephone to offer broadband access. a) Cable b) Dial-up c) DSL d) Fiber Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Hard Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 23) ________ is a cable medium. a) Microwave b) Radio c) Satellite d) Twisted-pair Answer: d Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 24) ________ is a cable medium. a) Coaxial b) Microwave c) Radio d) Satellite Answer: a Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 25) ________ is a cable medium. a) Fiber-optic
Rainer, Information System, Fifth Canadian Edition
Testbank
b) Microwave c) Radio d) Satellite Answer: a Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 26) ________ is a broadcast medium. a) Coaxial b) Fiber-optic c) Microwave d) Twisted-pair Answer: c Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 27) ________ is a broadcast medium. a) Coaxial b) Fiber-optic c) Satellite d) Twisted-pair Answer: c Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
28) ________ is a broadcast medium. a) Coaxial b) Fiber-optic c) Radio d) Twisted-pair Answer: c Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) ________ is a broadcast medium. a) Coaxial b) Fiber-optic c) Infrared d) Twisted-pair Answer: c Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 30) ________ cables are made of glass. a) Coaxial b) Fiber-optic c) Microwave d) Twisted-pair Answer: b Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 31) ________ cables are made of copper. a) Fiber-optic b) Microwave c) Radio d) Twisted-pair Answer: d Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 32) ________ cables are made of copper. a) Coaxial b) Fiber-optic c) Microwave d) Radio Answer: a Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 33) ________ is NOT an advantage of twisted-pair wire. a) Availability b) Cost c) Easy to work with
Rainer, Information System, Fifth Canadian Edition
Testbank
d) High bandwidth Answer: d Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 34) ________ is an advantage of coaxial cable. a) Cost b) Easy to work with c) High bandwidth d) Security Answer: c Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 35) ________ is a disadvantage of fiber-optic cable. a) Bandwidth b) Cost c) Difficult to work with d) Security Answer: c Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
36) According to the textbook, ________ is the most widely available cable medium. a) fiber-optic b) microwave c) radio d) twisted-pair Answer: d Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 37) ________ is the most secure cable medium. a) Fiber-optic b) Microwave c) Radio d) Satellite Answer: a Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 38) ________ is the slowest cable medium. a) Microwave b) Radio c) Satellite d) Twisted-pair Answer: d Difficulty: Easy Section Reference 1: 6.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 39) According to the textbook, ________ is the most commonly used cable medium. a) microwave b) radio c) satellite d) twisted-pair Answer: d Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 40) ________ is a common LAN protocol. a) Ethernet b) Fiber c) Internet d) Twisted-pair Answer: a Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 41) Ethernet is a common ________ protocol. a) LAN b) MAN c) PAN d) WAN
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 42) ________ is the protocol of the Internet. a) DSL b) Ethernet c) Fiber d) TCP/IP Answer: d Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) Which of the following is NOT a basic function of TCP/IP? a) Acknowledges the packets have been transmitted b) Manages the movement of data packets between computers by establishing a connection between the computers c) Responsible for disassembling, delivering, and reassembling data during transmission d) Sequences the transfer of packets Answer: c Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
44) ________ defines how messages are formulated and how their receivers interpret them. a) DSL b) HTTP c) SMTP d) TCP/IP Answer: b Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 45) The ________ layer of TCP/IP enables client application programs to access the other layers. a) application b) Internet c) network interface d) transport Answer: a Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 46) The ________ layer of TCP/IP provides communication and packet services. a) application b) Internet c) network interface d) transport Answer: d Difficulty: Easy Section Reference 1: 6.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 47) The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets. a) application b) Internet c) network interface d) transport Answer: b Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 48) The ________ layer of TCP/IP places packets on, and receives them from, the network medium, which can be any networking technology. a) application b) Internet c) network interface d) transport Answer: c Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 49) Client/server computing links two or more computers in an arrangement in which powerful ________ provide computing services for ________. a) servers; other servers
Rainer, Information System, Fifth Canadian Edition
Testbank
b) servers; user PCs c) user PCs; servers d) user PCs; other user PCs Answer: b Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 50) ________ leads to the ideas of fat and thin clients where ________ clients have no local storage and only limited processing power. a) Client/server computing; fat b) Client/server computing; thin c) Peer-to-peer processing; fat d) Peer-to-peer processing; thin Answer: b Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 51) ________ is an example of the first type of peer-to-peer processing that accesses unused CPU power among networked computers. a) BitTorrent b) Grid computing c) Microsoft SharePoint Workspace d) Napster Answer: b Difficulty: Hard Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Synthesis Standard 1: AACSB || Technology 52) ________ is an example of the first type of peer-to-peer processing that accesses unused CPU power among networked computers. a) BitTorrent b) Microsoft SharePoint Workspace c) Napster d) SETI@home Answer: d Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 53) ________ is an example of the second type of peer-to-peer processing that enables real-time, person-to-person collaboration. a) BitTorrent b) Microsoft SharePoint Workspace c) Napster d) SETI@home Answer: b Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 54) ________ is an example of the third type of peer-to-peer processing that allows for advanced search and file sharing. a) Bit Torrent b) Grid computing c) Microsoft SharePoint Workspace
Rainer, Information System, Fifth Canadian Edition
Testbank
d) SETI@home Answer: a Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 55) The Internet backbone is a ________ network. a) fiber-optic b) microwave c) radio d) satellite Answer: a Difficulty: Medium Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 56) An/The ________ is a network of networks. a) externet b) extranet c) Internet d) intranet Answer: c Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 57) An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization’s network.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) externet b) extranet c) Internet d) intranet Answer: d Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Comprehension Standard 1: AACSB || Technology 58) An/The ________ connects networks of multiple organizations so they can communicate securely. a) externet b) extranet c) Internet d) intranet Answer: b Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Comprehension Standard 1: AACSB || Technology 59) ________ offer limited accessibility to the ________ of participating companies. a) Extranets; internets b) Extranets; intranets c) Intranets; extranets d) Intranets; internets Answer: b Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
60) A(n) ________ is a company that provides Internet connections for a fee. a) ISP b) IXP c) NAP d) NSP Answer: a Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 61) ________ are exchange points for Internet traffic. a) IAPs b) ISPs c) NAPs d) NSPs Answer: c Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 62) ________ is the most commonly used IP addressing scheme. a) IPv2 b) IPv4 c) IPv6 d) IPv8 Answer: b Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 63) ________ consists of 32 bits. a) IPv2 b) IPv4 c) IPv6 d) IPv8 Answer: b Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 64) 135.62.128.91 is an example of an ________ address. a) IPv2 b) IPv4 c) IPv6 d) IPv8 Answer: b Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 65) ________ was developed because we have run out of IP addresses in the original IP addressing scheme. a) IPv2 b) IPv4 c) IPv6 d) IPv8 Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 66) ________ consists of 128 bits. a) IPv2 b) IPv4 c) IPv6 d) IPv8 Answer: c Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 67) ________ was developed to address the Internet of Things. a) IPv2 b) IPv4 c) IPv6 d) IPv8 Answer: c Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 68) The ________ functions as a transport mechanism; the ________ is an application. a) Internet; intranet b) Internet; World Wide Web c) World Wide Web; Internet d) World Wide Web; intranet
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 69) The ________ is a system of universally accepted standards for storing, retrieving, formatting, and displaying information through a ________ architecture. a) Internet; client/server b) Internet; peer-to-peer c) WWW; client/server d) WWW; peer-to-peer Answer: c Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 70) Users access the web primarily through ________. a) browsers b) hyperlinks c) hypertext d) URLs Answer: a Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 71) China’s Internet policy may be a precursor to a federated, loosely connected set of national Internets called the_____ a) Splinternet b) Spring Internet
Rainer, Information System, Fifth Canadian Edition
Testbank
c) Chinese Wall d) Border Internet Patrol Answer: a Difficulty: Easy Section Reference 1: IT’s About Business 6.2 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 72) China is the largest power to ____ the open Internet entirely a) implement b) secure c) opt out of d) give free access to Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 6.2 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 73) More than ________ percent of all online content is written in English. a) 25 b) 50 c) 75 d) 90 Answer: b Difficulty: Hard Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
74) Less than ________ percent of all web content is composed in Hindi, the first language of approximately 260 million people. a) 0.01 b) 0.1 c) 1.0 d) 10.0 Answer: b Difficulty: Hard Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 75) A(n) ________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time. a) affinity b) commercial c) corporate d) industrywide Answer: b Difficulty: Easy Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 76) A(n) ________ portals offers a single point of entry to an entire community of affiliated interests. a) affinity b) commercial c) corporate d) industrywide Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 77) A(n) ________ portal is an intranet. a) affinity b) commercial c) corporate d) industrywide Answer: c Difficulty: Medium Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Application, Synthesis Standard 1: AACSB || Technology 78) A(n) ________ portal offers a personalized, single point of access through a web browser to critical business information located inside and outside an organization. a) affinity b) commercial c) corporate d) industrywide Answer: c Difficulty: Easy Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 79) A(n) ________ portal serves entire industries. a) affinity
Rainer, Information System, Fifth Canadian Edition
Testbank
b) commercial c) corporate d) industrywide Answer: d Difficulty: Easy Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 80) ________ is an example of a metasearch engine. a) Ask b) Bing c) Dogpile d) Google Answer: c Difficulty: Medium Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 81) ________ is the largest-volume application running over the Internet. a) Chat b) E-mail c) FTP d) Voice communication Answer: b Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
82) Which of the following is NOT a reason some US companies are moving their call center operations back to the US? a) Communication b) Control c) Cost d) Security Answer: c Difficulty: Medium Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 83) ________ simplifies and integrates all forms of communication on a common hardware and software platform. a) DSL b) FTTH c) UC d) VoIP Answer: c Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 84) ________ allows you to read a voice mail message in your e-mail inbox. a) DSL b) FTTH c) UC d) VoIP Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Application Standard 1: AACSB || Technology 85) ________ is an advantage of telecommuting. a) Connection b) Productivity c) Promotion time d) Visibility Answer: b Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 86) ________ is an advantage of telecommuting. a) Promotion time b) Socialization c) Stress-level d) Visibility Answer: c Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 87) ________ is a disadvantage of telecommuting. a) Family life
Rainer, Information System, Fifth Canadian Edition
Testbank
b) Productivity c) Stress-level d) Visibility Answer: d Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 88) ________ is a disadvantage of telecommuting. a) Family life b) Productivity c) Promotion time d) Retention Answer: c Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 89) ________ refers to efforts by two or more entities who work together to accomplish certain tasks. a) Collaboration b) A virtual team c) A workgroup d) Workflow Answer: a Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 90) ________ refers specifically to two or more individuals who act together to perform a task. a) Collaboration b) A virtual team c) A workgroup d) Workflow Answer: c Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 91) ________ is the movement of information as it progresses through the sequence of steps that make up an organization’s work procedures. a) Collaboration b) A virtual team c) A workgroup d) Workflow Answer: d Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 92) ________ is a group of people working in different locations. a) Collaboration b) A virtual team c) A workgroup d) Workflow Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 93) Most global virtual teams are ________, which means ________. a) Asynchronous; all team members meet at the same time b) Asynchronous; teams members cannot meet at the same time c) Synchronous; all team members meet at the same time d) Synchronous; team members cannot meet at the same time Answer: b Difficulty: Medium Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge, Evaluation Standard 1: AACSB || Technology 94) ________ involves ________ a task to an undefined, generally large group of people in the form of an open call. a) Crowdsourcing; insourcing b) Crowdsourcing; outsourcing c) Telecommuting; insourcing d) Telecommuting; outsourcing Answer: b Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 95) ________ does not allow participants to communicate face to face.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Teleconferencing b) Telepresence c) Videoconferencing d) Videopresence Answer: a Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 96) ________ allows participants in one location see participants, documents, and presentation at other locations. a) Teleconferencing b) Telepresence c) Videoconferencing d) Videopresence Answer: c Difficulty: Medium Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 97) ________ enables participants to seamlessly share data, voice, pictures, graphics, and animation by electronic means. a) Teleconferencing b) Telepresence c) Videoconferencing d) Videopresence Answer: b Difficulty: Easy Section Reference 1: 6.6
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 98) _________ Internet policy may be a precursor to a federated, loosely connected set of national Internets called the splinternet. a) Britain’s b) China’s c) North Korea’s d) The United States’ Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 6.2 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 99) Edward Snowden’s U.S. NSA data leak accelerated _______ laws concerning data protection. a) Brazilian b) Chinese c) Russian d) South Korean Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 6.2 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 100) ________ are/is a tool for democratizing higher education. a) Distance learning b) E-learning c) DSLs d) MOOCs
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 101) MOOCs ________ been proven to effectively teach the thousands of students who enroll in them and ________ provide revenues for universities. a) have; do b) have; do not c) have not; do d) have not; do not Answer: d Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 102) ________ refers to learning supported by the web; ________ refers to any learning situation in which teachers and students do not meet face to face. a) Distance learning; e-learning b) Distance learning; long-distance learning c) E-learning; distance learning d) E-learning; long-distance learning Answer: c Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
103) Completion rates in any one MOOC tend to be less than ________ of initial registrations. a) 10 b) 50 c) 75 d) 90 Answer: a Difficulty: Medium Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 104) The Boeing Collaboration Center focuses on collaboration with _______. a) customers b) frequent flyers c) government agencies d) suppliers Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 6.4 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 105) The Boeing Collaboration Center is currently based primarily on ________ technology. a) augmented reality b) touch screen c) view screen d) virtual reality Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 6.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 106) ________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content. a) Internet access equality b) Internet access neutrality c) Network equality d) Network neutrality Answer: d Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 107) Network neutrality is an operating model under which ________ must allow customers equal access to content and applications, regardless of the source or nature of the content. a) ISPs b) IXPs c) NAPs d) NSPs Answer: a Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology Question Type: True/False 108) Myanmar has one of the world’s lowest rates of information literacy, which means there is a lack of understanding about what is being done online and how to stay safe online.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 109) In Myanmar, the problem with free speech on Twitter is that citizens used that freedom to overthrow their successful government structure. Answer: False Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 110) One of the positive impacts of how life changed for people in Myanmar after the easing of military rule was that citizens no longer relied solely on state-regulated media for their news. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 111) Due to Facebook’s swift action in removing about 50 pages that were followed by around 12 million people, Myanmar’s Rohingya Muslim population is beginning to feel safer and less persecuted in their country. Answer: False Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Comprehension Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
112) Download speed is much faster than upload speed when defining the term broadband. Answer: True Difficulty: Hard Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 113) The definition of broadband is fluid. Answer: True Difficulty: Medium Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 114) PANs are the smallest networks. Answer: True Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 115) MANs are the largest networks. Answer: False Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 116) The Internet is a WAN.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 117) The Internet is a PAN. Answer: False Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 118) LANs typically connect multiple PANs. Answer: False Difficulty: Hard Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Evaluation Standard 1: AACSB || Technology 119) WANs typically connect multiple LANs. Answer: True Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 120) Enterprise networks are composed of embedded LANs and a WAN. Answer: True
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 121) Burying fibre-optic cables is very expensive. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 6.1 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 122) Microsoft is planning on becoming an ISP to bring the Internet to rural areas. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 6.1 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 123) The Canadian Radio-television and Telecommunications Commission (CRTC) expected approximately 90 percent of Canadian homes and businesses to be able to access faster broadband speeds by 2021. Answer: True Difficulty: Hard Section Reference 1: IT’s About Business 6.1 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Synthesis Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
124) DSL modems operate on the same lines as voice telephones and cable modems. Answer: False Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 125) Cable and DSL modems offer broadband access. Answer: True Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 126) Coaxial cable is the most common cable medium. Answer: False Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 127) Ethernet is a common LAN protocol. Answer: True Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 128) In packet switching, packets travel independently across the network and can be routed through different paths in the network. Answer: True Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 129) Packet-switching networks are reliable but fault intolerant. Answer: False Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 130) Fat clients have large storage and processing power and therefore can run local programs. Answer: True Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 131) If a network goes down, thin clients are more useful than fat clients because they do not have all that extra software running. Answer: False Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 132) In peer-to-peer processing, every computer is a server. Answer: True Difficulty: Hard Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Comprehension Standard 1: AACSB || Technology 133) In peer-to-peer processing, each computer can access all files on all other computers. Answer: True Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 134) Peer-to-peer processing is illegal. Answer: False Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 135) The Internet grew out of an experimental project by some universities in the 1960s. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 136) The US Department of Defense started the first Internet project in 1969. Answer: True Difficulty: Medium Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 137) No central agency manages the Internet. Answer: True Difficulty: Medium Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 138) The cost of running the Internet is huge for most governments. Answer: False Difficulty: Hard Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Synthesis Standard 1: AACSB || Technology 139) The rightmost part of an Internet name is its top-level domain. Answer: True Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 140) IP addresses must be unique around the globe to have a global Internet. Answer: True Difficulty: Hard Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 141) ICANN coordinates unique IP addresses around the world to ensure a global Internet. Answer: True Difficulty: Hard Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 142) Domain names are read from left to right. Answer: False Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 143) The Internet is reliable and secure. Answer: False Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 144) The Internet and World Wide Web are synonyms. Answer: False Difficulty: Medium Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 145) The Internet and World Wide Web are the same thing. Answer: False Difficulty: Medium Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 146) Hypertext is the underlying concept defining the structure of the WWW. Answer: True Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 147) A URL specifies the Internet protocol and the domain name for a web site. Answer: True Difficulty: Medium Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Comprehension, Analysis Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
148) The splinternet is growing as a result of content blocking by regions and nations as well as the need for companies to comply with diverse, often conflicting national policies, regulations, and court decisions. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 6.2 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 149) China’s Internet privacy is guarantee by Golden Shield, operated by the Ministry of Public Security. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 6.2 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 150) Closed Internet provides a platform for nations to undertake information warfare, manipulate one another’s citizens, and project their interests past national borders. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 6.2 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 151) Automatic translation of web pages is allowing more people access to the Internet, which is primarily written in English. Answer: True Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 152) Multilingual websites are a competitive necessity; most organizations allow automatic translation of their web sites to address this problem. Answer: False Difficulty: Hard Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 153) Search engines and automatic translators help people discover information. Answer: True Difficulty: Easy Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 154) Web-based call centers are also known as customer care centers. Answer: True Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 155) Chat programs can be web-based, e-mail-based, or voice-based.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 156) With VoIP, your digital voice signals are converted to analog, sectioned into packets, and then sent over the Internet. Answer: False Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 157) Telecommuting means you have to drive a long distance to work. Answer: False Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 158) Yahoo! banned telecommuting; since many large companies have banned it, the telecommuting trend is on the decline. Answer: False Difficulty: Medium Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
159) You will probably not have the opportunity to telecommute given most major companies do not allow it. Answer: False Difficulty: Medium Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Application Standard 1: AACSB || Technology 160) The latest version of teleconferencing is telepresence. Answer: False Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 161) The cost of telepresence systems is decreasing, making it easier for organizations to purchase it. Answer: True Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 162) In the spring of 2020, millions of workers around the world suddenly found themselves telecommuting when the coronavirus. pandemic caused many offices to shut down Answer: True Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: IT’s About Business 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology
163) E-learning and distance learning are synonymous. Answer: False Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 164) E-learning refers to learning supported by the web. Answer: True Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 165) Distance learning refers to any learning situation in which teachers and students do not meet face to face. Answer: True Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 166) MOOCs have been proven to effectively teach thousands of students who enroll in them, so they should replace in-class learning over time.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 167) As expected, MOOCs have revolutionized higher education in the US and Europe. Answer: False Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 168) Like power and water, monthly broadband fees are tied to consumer usage. Answer: False Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 169) Telecommunications companies support network neutrality. Answer: False Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
170) Some argue network neutrality prevents innovation and discourages telecommunications companies from developing better and faster Internet services. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 171) Broadband Internet service is defined as a utility. Answer: True Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Text Entry 172) ______ refers to the transmission capacity of a network. Answer: Bandwidth Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 173) Bandwidth is stated in ___ per second. Answer: bits Difficulty: Medium Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
174) A ___ connects two or more devices in a limited geographical region so that every device on the network can communicate with every other device. Answer: local area network or LAN Difficulty: Easy Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 175) Today, computer networks communicate through ___ signals, which are discrete pulses that are either on or off, representing a series of bits. Answer: digital Difficulty: Medium Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 176) ___ is the protocol of the Internet. Answer: Transmission Control Protocol/Internet Protocol or TCP/IP Difficulty: Easy Section Reference 1: 6.2 Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 177) ___ defines how messages are formulated and how their receivers interpret them. Answer: Hypertext Transfer Protocol or HTTP Difficulty: Easy Section Reference 1: 6.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the wireline communications media and transmission technologies. Bloomcode: Knowledge Standard 1: AACSB || Technology 178) The Internet is a global ___. Answer: wide area network or WAN Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 179) ___ manages the Internet. Answer: No central agency or Nobody in particular Difficulty: Hard Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 180) A(n) ___ is a connection from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen, or by touching the screen. Answer: hyperlink Difficulty: Easy Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Knowledge Standard 1: AACSB || Technology 181) A(n) ___ is a web-based, personalized gateway to information and knowledge that provides relevant information from different IT systems and the Internet using advanced search and indexing techniques. Answer: portal
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 6.4 Learning Objective 1: Explain the impact that discovery network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 182) ___ refers to an arrangement in which participants exchange conversational messages in real time. Answer: Electronic chat Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 183) With ___, your analog voice signals are digitized, sectioned into packets, and then sent over the Internet. Answer: Internet telephony or voice-over-Internet protocol or VoIP Difficulty: Easy Section Reference 1: 6.5 Learning Objective 1: Explain the impact that communication network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 184) ___ is the movement of information as it progresses through the sequence of steps that make up an organization’s work procedures. Answer: Workflow Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
185) ___ means an organization outsources a task to an undefined, generally large group of people in the form of an open call. Answer: Crowdsourcing Difficulty: Easy Section Reference 1: 6.6 Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 186) ___ refers to learning supported by the web. Answer: E-learning Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology 187) ___ refers to any learning situation in which teachers and students do not meet face to face. Answer: Distance Learning or DL Difficulty: Easy Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Essay 188) What is an enterprise network? What is the difference between a traditional network and an SDN? Suppose you are the CIO of a large enterprise; which network would you implement and why?
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: Difficulty: Medium Section Reference 1: 6.1 Learning Objective 1: Compare and contrast the major types of networks. Bloomcode: Comprehension, Application Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Solution: a network with multiple LANs and a WAN; traditional = rigid and lack flexibility to keep pace with increasing business networking requirements vs. SDN = manage network flows through centrally located software – dynamically adjusts data flows to meet business and application needs; SDN to adjust to network requirements 189) List and describe the six ways you can access the Internet. When you have to start purchasing your own Internet connection, which one will you choose and why? HINT: You should consider availability and the advantages/disadvantages of each option assuming availability; you should research beyond what is found in the book. Answer: Difficulty: Hard Section Reference 1: 6.2 Section Reference 2: 6.3 Learning Objective 1: Describe the wireline communications media and transmission technologies. Learning Objective 2: Describe the most common methods for accessing the Internet. Bloomcode: Evaluation Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution:
Dial-up = least desirable, won’t be watching YouTube videos using it; can’t use the phone when on the Internet
Rainer, Information System, Fifth Canadian Edition
Testbank
DSL = don’t have to share with others on the network so it is more secure and don’t have slow down problems in the evenings; problems = harder to set-up Cable modem = inexpensive and easy to set-up but speeds vary and will slow down when many people are using it Satellite = like dial-up (not desirable), much slower than other options and have a download limit (one example website: http: //www.reviews.org/Internet-service/best-satellite-Internetproviders/) Wireless = this generally applies to use on smartphones (all students will probably mention this), but this isn’t typically considered a viable solution for main use in the home (currently under experimentation by Google according to IT’s About Business 6.2 and https: //www.wired.com/2017/02/google-fiber-restructure/) FTTH = extremely fast service offered by many companies now (not just new housing developments as mentioned in the text) and not necessarily that expensive but it is limited by location 190) How are the Internet and the World Wide Web different? How is an intranet related to the Internet? What function does an extranet provide? Answer: Difficulty: Medium Section Reference 1: 6.3 Learning Objective 1: Describe the most common methods for accessing the Internet. Bloomcode: Comprehension, Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: • Internet = network of networks that everyone can access; the WWW (e.g., Google, Facebook), e-mail, FTP run on the Internet • www = application that runs on the Internet • Intranet = a network that is internal to an organization and is not available to everyone; university registration system or course management system; an intranet is a protected network within an organization that can have access to the Internet • Extranet = a network that connects organizations – an intranet with external access; VPN 191) What is crowdsourcing? What benefits does crowdsourcing provide companies? What are the risks/concerns associated with crowdsourcing? Suppose you want to start your own business, would you consider crowdsourcing (why or why not)? Suppose you are the CEO of a large business, would you consider crowdsourcing (why or why not)? Answer: Difficulty: Hard Section Reference 1: 6.6
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Explain the impact that collaboration network applications have had on business and everyday life. Bloomcode: Comprehension, Application, Analysis, Synthesis Standard 1: AACSB || Communication Standard 2 : AACSB || Ethics Standard 3 : AACSB || Analytic Standard 4 : AACSB || Technology Standard 5 : AACSB || Reflective Thinking Solution: • When an organization outsources a task to an undefined, generally large group of people in the form of an open call Benefits: • Cheaper and quicker problem resolution • Tap a wider range of talent • Gain insight into customer desires • Rapid design process Risks: • Experts only? • Accuracy • Up-to-date and relevant? • Too many ideas (most may be worthless but still need to evaluate) • Intellectual property (copyrights) • Quality Small versus large depends – small may be prone to use it because it is cheap and won’t have a large workforce to develop ideas but could lose the idea (intellectual property); large may want to use it to get customer buy-in but have the resources to do it in-house if they want 192) What is the difference between e-learning and distance learning (do not simply provide the definitions for the two)? If you have taken a class online, did you enjoy it (why or why not)? If you haven’t taken a class online, would you like to (why or why not)? These last two questions are mostly opinion, but they should consider the benefits and drawbacks of e-learning. Answer: Difficulty: Medium Section Reference 1: 6.7 Learning Objective 1: Explain the impact that educational network applications have had on business and everyday life. Bloomcode: Application Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking Solution: e-learning is anything supported by the web (so a physical class could include elearning if YouTube videos are shown or the class uses a class management system); distance learning is any time the student and teacher don’t meet face-to-face (“online” classes); benefits = current and high-quality content, flexibility, less time to learn for most (learn at own pace), costs
Rainer, Information System, Fifth Canadian Edition
Testbank
less; drawbacks = computer literate, miss face-to-face interaction, not sure who completed the assignment
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 7, Testbank Course Title: Rainer, IS 5e Chapter Number: 7 Question type: Multiple Choice 1) In 2012, Walmart rebuilt the outdated technology infrastructure that supported Walmart.com by _______ a) installing brand new scan terminals in all the stores b) installing security and high speed internet connections c) building a web site with e-commerce capabilities d) introducing smartphone apps, and constructing six highly automated fulfillment centres. Answer: D Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the various online services of business-toconsumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 2) In May, 2018 Walmart overhauled its website with ___ a) highly personalized with features designed to make it easier to reorder items b) check the status on orders c) explore services at nearby Walmart stores d) All of the above Answer: D Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the various online services of business-toconsumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
3) In September 2018, Walmart began telling online shoppers that some products in its warehouses were ____in order to avoid the extra expenses associated with shipping products from more distant warehouses. a) on stock but were out of stock. b) more expensive than in brick and mortar stores. c) out of stock. d) in back order. Answer: C Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Describe the various online services of business-toconsumer (B2C) commerce, along with specific examples of each. Bloomcode: Application Standard 1: AACSB || Technology 4) Walmart’s marketplace strategy allows _________________. a) external, third-party vendors to sell their products on Walmart’s online store b) social networks to access their product catalog and get a commission for sales c) provide loyalty discount digital coupons to buyers by subscribing to an online service d) buyers to get discount coupons for referrals to Walmart’s site Answer: A Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Describe the various online services of business-toconsumer (B2C) commerce, along with specific examples of each. Bloomcode: Application Standard 1: AACSB || Technology 5) ______ commerce refers to the intersection of messaging apps and shopping. a) App b) Conversational c) Social d) Transactional Answer: B
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 6) In 2004, Tobias Lütke, Daniel Weinand, and Scott Lake founded ________. a) Volusion b) WooCommerce c) Spotify d) Shopify Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 7) The Shopify e-commerce platform includes features to. a) create an e-commerce store. b) handle social media advertising. c) handle shipping. d) All tof the above Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology
8) _________ organizations are purely physical. a) Brick-and-mortar b) Clicks-and-mortar c) Pure-play
Rainer, Information System, Fifth Canadian Edition
Testbank
d) Virtual Answer: a Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 9) _________ organizations are only online. a) Brick-and-mortar b) Brick-and-click c) Clicks-and-mortar d) Virtual Answer: d Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 10) _________ organizations have physical and online dimensions. a) Brick-and-mortar b) Clicks-and-mortar c) Pure-play d) Virtual Answer: b Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 11) You own a restaurant in New York City. This is an example of a _________ organization. a) brick-and-mortar
Rainer, Information System, Fifth Canadian Edition
Testbank
b) clicks-and-mortar c) pure-play d) virtual Answer: a Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 12) You are a musician. You only sell your songs on iTunes. This is an example of a _________ business. a) brick-and-mortar b) brick-and-click c) clicks-and-mortar d) virtual Answer: d Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 13) You sell popcorn in downtown Chicago. It became so popular that you started a website so people all over the country can get your popcorn delivered to their doorstep. This is an example of a _________ business. a) brick-and-mortar b) clicks-and-mortar c) pure-play d) virtual Answer: b Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
14) _________ comprises the vast majority of e-commerce by volume. a) B2B b) B2C c) B2E d) C2C Answer: a Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 15) You adopt a child and need to update your healthcare benefits to include that new child. This is an example of _________ e-commerce. a) B2B b) B2C c) B2E d) C2C Answer: c Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 16) You file your income taxes online. This is an example of _________ e-commerce. a) B2C b) C2C c) G2C d) T2C Answer: c Difficulty: Medium Section Reference 1: 7.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 17) You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce. a) electronic b) local c) mobile d) social Answer: c Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 18) In ________, manufacturers or retailers sell directly to customers. a) affiliate marketing b) electronic tendering c) online direct marketing d) viral marketing Answer: c Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 19) In ________, businesses request quotes from suppliers. a) affiliate marketing b) electronic tendering c) online direct marketing d) viral marketing Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 20) An electronic tendering system uses _________ with a _________ auction mechanism. a) B2B; forward b) B2B; reverse c) B2C; forward d) B2C; reverse Answer: b Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) In ________, vendors ask partners to place logo on the partner’s website and then pay that partner a commission. a) affiliate marketing b) electronic tendering c) online direct marketing d) viral marketing Answer: a Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 22) In ________, recipients of your marketing notices send information about your product to their friends. a) affiliate marketing b) electronic tendering
Rainer, Information System, Fifth Canadian Edition
Testbank
c) online direct marketing d) viral marketing Answer: d Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 23) With ________, customers use the internet to self-configure products or services. a) bartering online b) electronic exchanges c) group purchasing d) product customization Answer: d Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 24) With ________, an intermediary administers online exchange of surplus products or the company receives “points” for its contribution, which it can use to purchase other needed items. a) bartering online b) electronic exchanges c) group purchasing d) product customization Answer: a Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
25) With ________, transactions are conducted efficiently because buyers and sellers all meet in one place. a) bartering online b) electronic exchanges c) group purchasing d) product customization Answer: b Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Comprehension Standard 1: AACSB || Technology 26) With ________, small buyers aggregate demand to create a large volume and then negotiate lower prices. a) bartering online b) electronic exchanges c) group purchasing d) product customization Answer: c Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 27) In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time. a) forward; higher b) forward; lower c) reverse; higher d) reverse; lower Answer: a Difficulty: Easy Section Reference 1: 7.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 28) In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time. a) forward; higher b) forward; lower c) reverse; higher d) reverse; lower Answer: d Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) As the principal of a local high school, you want to install a wireless WAN to give students better, more secure access to the Internet. You request bids from a few local service providers to get the best price. This is an example of a _________ auction. a) downward b) forward c) reverse d) upward Answer: c Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 30) An electronic _________ is a website the represents a single store. a) auction b) mall c) marketplace d) storefront
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Easy Section Reference 1: 7.1 Section Reference 2: 7.2 Learning Objective 1: Describe the eight common types of electronic commerce. Learning Objective 2: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 31) An electronic _________ is a collection of individual shops consolidated under one internet address. a) auction b) mall c) marketplace d) storefront Answer: b Difficulty: Easy Section Reference 1: 7.1 Section Reference 2: 7.2 Learning Objective 1: Describe the eight common types of electronic commerce. Learning Objective 2: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 32) An electronic _________ is a central, virtual market space on the web where many buyers and many sellers can conduct e-commerce and e-business activities. a) auction b) mall c) marketplace d) storefront Answer: c Difficulty: Medium Section Reference 1: 7.1 Section Reference 2: 7.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the eight common types of electronic commerce. Learning Objective 2: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 33) Electronic checks are primarily used in ________. a) B2B b) B2C c) C2C d) G2C Answer: a Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 34) _________ cards allow customers to charge online payments to their credit card accounts. a) Electronic credit b) Purchasing c) Smart d) Stored-value money Answer: a Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 35) _________ cards allow businesses to charge online payments to their credit card accounts. a) Electronic credit b) Purchasing c) Smart d) Stored-value money
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 36) _________ cards allow you to store a fixed amount of prepaid money and then spend it as necessary. a) Electronic credit b) Purchasing c) Smart d) Stored-value money Answer: d Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 37) Gift cards are _________ cards. a) electronic credit b) purchasing c) smart d) stored-value money Answer: d Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 38) _________ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compatibility. a) electronic credit
Rainer, Information System, Fifth Canadian Edition
Testbank
b) purchasing c) smart d) stored-value money Answer: c Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 39) Modern credit cards are _________ cards. a) electronic credit b) purchasing c) smart d) stored-value money Answer: c Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 40) Bitcoin is a type of digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds; they are ________, which means ________. a) centralized; a central institution operates their use b) centralized; they are legal everywhere c) decentralized; no single institution operates their use d) decentralized; they are illegal in most countries Answer: c Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
41) _________ is a limitation of e-commerce. a) Accessibility b) Convenience c) Cost d) Security Answer: d Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 42) _________ is larger by volume; _________ is more complex. a) B2B; B2B b) B2B; B2C c) B2C; B2B d) B2C; B2C Answer: b Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) _________ describes the retailing strategy of selling a large number of unique items in small quantities. a) Cross selling b) The long tail c) The unique tail d) Upselling Answer: b Difficulty: Easy Section Reference 1: 7.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 44) _________ are/is electronic billboards that promote a product or a vendor. a) Banners b) Pop-under ads c) Pop-up ads d) Spam Answer: a Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 45) _________ appear(s) in front of the current browser window. a) Banners b) Pop-under ads c) Pop-up ads d) Spam Answer: c Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 46) _________ appear(s) underneath the active windows. a) Banners b) Pop-under ads c) Pop-up ads d) Spam
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 47) _________ are/is unsolicited e-mail. a) Banners b) Pop-under ads c) Pop-up ads d) Spam Answer: d Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 48) Which of the following is NOT a problem associated with channel conflict? a) Alienating customers b) Handling returns c) Logistics of online activities d) Marketing resource allocation Answer: a Difficulty: Medium Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 49) _________ occurs when shoppers visit a brick-and-mortar store but then purchase online.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Bannering b) Bundling c) Showrooming d) The long tail Answer: c Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 50) __________ are/is the underlying technology for digital currencies such as Bitcoin. a) Blockchain b) Disintermediation c) Reverse auctions d) Smart cards Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 51) ____________ use sophisticated algorithms to fully automate the buying and trading of stocks and other types of investments. a) Robo-advisors b) P2P technology c) Crowdfunding platforms d) Blockchains Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 7.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 52) Venmo, PayPal, and Zelle are all _______ service companies. a) DigiPay b) B2B c) P2P d) FinApp Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 53) Which is NOT true regarding blockchain? a) It is virtually impossible to alter its records. b) It circumvents the need for banks or brokers for some consumers. c) It is a form of Bitcoin that can be used internationally. d) It can be lifesaving in the instance of certain bacterial outbreaks. Answer: C Difficulty: Medium Section Reference 1: IT’s About Business 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Application Standard 1: AACSB || Technology 54) The term for the 20% of business supply spending unrelated to core corporate functions that is not consistently ordered from the same suppliers is ___________. a) corporate generic spending b) third-party spending c) corporate tail spend
Rainer, Information System, Fifth Canadian Edition
Testbank
d) accessory spend Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 55) An example of inventory that AmazonSupply carries is ___________. a) bulk quantities of Comet bathroom cleaner b) plain solid colored sweatshirts c) replacement ear buds d) unique home décor items Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Comprehension Standard 1: AACSB || Technology 56) Which is NOT a benefit for buyers using Amazon Business? a) They can view other buyers’ reviews of products. b) It integrates with their procurement software. c) Buyers can utilize its analytics dashboard. d) It can ship products directly to businesses’ customers. Answer: D Difficulty: Medium Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
57) One way that Amazon Business avoids problems that other distributors may encounter, especially with specialty items, is ______________. a) to avoid selling items that do not sell quickly or are not in high demand b) to keep their own stock of items on hand c) by selling only very low volumes d) to force stockouts on the majority of their items, by design Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Comprehension Standard 1: AACSB || Technology 58) Other wholesalers have difficulties competing with Amazon Business and are having to come up with other ways to stay profitable and relevant. Which suggestion is LEAST likely to be effective in this regard? a) Developing close partnerships with institutional clients b) Including value adds, such as personalized services and provision of skilled workers to help use items that are sold c) Decreasing profit margins and cost to consumers d) Exploring areas that Amazon Business is not currently taking part in Answer: C Difficulty: Medium Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Analysis Standard 1: AACSB || Technology 59) While the _________ industry is larger than _______, the companies tend to be much smaller. a) wholesale; retail b) retail; resale c) wholesale; resale d) resale; retail
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 60) ________ marketing involves a merchant paying a commission to other online entities for referring new business to the merchant’s website. a) Affiliate b) Conversational c) Social d) Transactional Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, and provide examples. Bloomcode: Knowledge Standard 1: AACSB || Technology 61) __________ has revolutionized fraudulent affiliate marketing because they have powerful tools that analyze its vast amount of user data to identify people who are most likely to believe a fraudulent ad. a) Amazon b) Facebook c) Google d) Microsoft Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, and provide examples. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
62) In the ________, organizations sell their products or services to other organizations electronically from their own private e-marketplace website or from a third-party website. a) buy-side marketplace b) electronic exchange c) sell-side marketplace d) sellers exchange Answer: c Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 63) _________ are similar to the B2C model. a) Buy-side marketplaces b) Electronic exchanges c) Sell-side marketplaces d) Sellers exchanges Answer: c Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 64) Sell-side marketplaces are similar to the _________ model. a) B2B b) B2C c) C2C d) G2E Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 65) Sell-side marketplaces are similar to the _________ model; _________ auctions are the key mechanism. a) B2B; forward b) B2B; reverse c) B2C; forward d) B2C; reverse Answer: c Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 66) The _________ is a model in which organizations attempt to procure needed products or services from other organizations electronically. a) buy-side marketplace b) electronic exchange c) sell-side marketplace d) sellers exchange Answer: a Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 67) A major method of procuring goods and services in the buy-side model is the _________ auction.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) downward b) forward c) reverse d) upward Answer: c Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 68) Group purchasing is a common technique in a ________. a) buy-side marketplace b) electronic exchange c) sell-side marketplace d) sellers exchange Answer: a Difficulty: Medium Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 69) _________ are independently owned by a third party and connect many sellers with many buyers. a) Buy-side marketplaces b) Electronic exchanges c) Sell-side marketplaces d) Sellers exchanges Answer: b Difficulty: Easy Section Reference 1: 7.3
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 70) _________ materials are inputs to the manufacturing process. a) Direct b) Horizontal c) Indirect d) Vertical Answer: a Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 71) _________ materials are those items that are needed for MRO. a) Direct b) Horizontal c) Indirect d) Vertical Answer: c Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 72) _________ exchanges connect buyers and sellers in a given industry. a) Direct b) Horizontal c) Indirect d) Vertical
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 73) _________ exchanges connect buyers and sellers across many industries. a) Direct b) Horizontal c) Indirect d) Vertical Answer: b Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 74) Amazon Business is the biggest threat to ________. a) distributors b) manufacturers c) retailers d) wholesalers Answer: d Difficulty: Easy Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 75) B2B typically has margins of 2–4 percent; Amazon _________ make money ________.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) does; through the offset of its B2C business b) does; through high volume in B2B c) does not; but it doesn’t care since it is making so much in the B2C realm d) does not; above and beyond what its competitors are making Answer: b Difficulty: Medium Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 76) _________ is a legal form of cybersquatting. a) Cyber-tasting b) Domain tasting c) ICANN-tasting d) URL tasting Answer: b Difficulty: Easy Section Reference 1: 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Knowledge Standard 1: AACSB || Ethics Standard 2 : AACSB || Technology 77) _________ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else. a) Cyber-squatting b) Cyber-using c) Domain-squatting d) Domain-using Answer: a Difficulty: Easy Section Reference 1: 7.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Knowledge Standard 1: AACSB || Ethics Standard 2 : AACSB || Technology 78) _________ are the main threat to privacy on the internet. a) Cookies b) ERPs c) RFIDs d) Smart cards Answer: a Difficulty: Easy Section Reference 1: 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Knowledge Standard 1: AACSB || Ethics Standard 2 : AACSB || Technology 79) The ________ Effect is the ongoing disruption of the retail marketplace, including both online and traditional brick-and-mortar retailers. a) Amazon b) Facebook c) Google d) Walmart Answer: A Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 80) May 2018, Walmart ended its___________, which was Walmart’s attempt at cashierless checkout
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Credit card terminals b) Paypal payment terminals c) E-cheque strategy d) Scan & Go program Answer: D Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Application Standard 1: AACSB || Technology 81) In addition to expanding its U.S. operations, Amazon is targeting ________. a) Australia b) China c) India d) Russia Answer: C Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 82) Despite Amazon’s online retailing success, it has become clear over time that there is much shopping that people prefer to do in person. This is one of the reasons Amazon bought ________. a) Bonobos b) Jet c) Whole Foods d) Zappos Answer: C Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 83) In June 2017, Amazon announced a new program called Prime Wardrobe that allows customers to a) to order clothes with high discount but no option to return items.. b) to order clothing, from 3 to 15 items at a time, without actually buying it. c) to order clothes and allow customers to try them online on a virtual system. d) to order clothes higher prices but very short delivery times. Answer: B Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: True/False 84) Walmart executives have long underestimated the convenience of shopping online from anywhere and at any time. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the various online services of business-toconsumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 85) As e-commerce sales were increasing, Walmart faced internal struggles due to lack of inventory. Answer: False Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1:
Rainer, Information System, Fifth Canadian Edition
Testbank
Describe the various online services of business-toConsumer (B2C) commerce, along with specific examples of each. Bloomcode: Synthesis Standard 1: AACSB || Technology 86) In September 2018, Walmart began telling online shoppers that some products in its warehouses were out of stock in order to avoid the extra expenses associated with shipping products. Answer: True Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Describe the various online services of business-toConsumer (B2C) commerce, along with specific examples of each. Bloomcode: Analysis Standard 1: AACSB || Technology 87) Shopify allows small entrepreneurs to set up and run their e-procurement systems without having to make significant investments in technology and expertise Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 88) E-business is a broader concept than e-commerce. Answer: True Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 89) The degree of digitization refers only to the physical or digital nature of the product or service being sold. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 90) The degree of digitization relates to the product/service and the delivery agent. Answer: True Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 91) If you purchase an e-book from Amazon, it is a clicks-and-mortar transaction. Answer: False Difficulty: Medium Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 92) eBay is a commonly known reverse auction website. Answer: False Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 93) Reverse auctions typically result in higher prices over time because a seller is targeting a single buyer. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 94) The highest bidder will win a forward auction. Answer: True Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 95) An RFQ is associated with a reverse auction. Answer: True Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 96) It is more secure for a buyer to use the telephone or mail to arrange or send payments than to use a computer. Answer: False Difficulty: Hard Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 96) The web makes disintermediation easier, particularly for online services. Answer: True Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 97) Disintermediation is a threat of substitute products from Porter’s Five Forces. Answer: True Difficulty: Hard Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Synthesis Standard 1: AACSB || Technology 98) Permission marketing asks consumers to give their permission to voluntarily accept online advertising and e-mail. Answer: True Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 99) Viral marketing refers to online, word-of-mouth marketing and is closely related to using social media for marketing purposes. Answer: True Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 100) Channel conflict and order fulfillment are the two most significant issues in e-tailing.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 101) The financial technology industry is primarily focusing on strengthening its position in client-server computing. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 102) Much of the new growth in the financial technology industry involves P2P activity. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 103) Google banned Voluum because the software can show Google employees legitimate content while consumers see fraudulent ads. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, and provide examples. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 104) Facebook banned Voluum because the software can show Google employees legitimate content while consumers see fraudulent ads. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, and provide examples. Bloomcode: Knowledge Standard 1: AACSB || Technology 105) Scams and misleading advertisements are an entirely new phenomenon due to the ubiquity of the Internet in our daily lives over the past 20 years. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, and provide examples. Bloomcode: Comprehension Standard 1: AACSB || Technology 106) Affiliate marketing is when a merchant pays a commission to another online entity for directing business to the merchant’s website. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, and provide examples. Bloomcode: Knowledge Standard 1: AACSB || Technology 107) Once caught and banned from Facebook, fraudulent affiliates find it nearly impossible to circumvent the problem or move forward. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: IT’s About Business 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, and provide examples. Bloomcode: Comprehension Standard 1: AACSB || Technology 108) Purchasing is a subset of the procurement process. Answer: True Difficulty: Medium Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 109) Procurement is a subset of the purchasing process. Answer: False Difficulty: Medium Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 110) Temporary staffing services trade in a functional exchange. Answer: True Difficulty: Medium Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Application Standard 1: AACSB || Technology 111) Grainger is Amazon Business’s main competitor.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 112) Amazon Business stays competitive in niche markets by using a long tail strategy. Answer: True Difficulty: Hard Section Reference 1: IT’s About Business 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Synthesis Standard 1: AACSB || Technology 113) Cybersquatting is illegal. Answer: True Difficulty: Easy Section Reference 1: 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Knowledge Standard 1: AACSB || Ethics Standard 2 : AACSB || Technology 114) Domain tasting is illegal and unethical. Answer: False Difficulty: Easy Section Reference 1: 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Knowledge Standard 1: AACSB || Ethics Standard 2 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
115) Most states require Amazon to collect sales taxes. Answer: True Difficulty: Easy Section Reference 1: 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Knowledge Standard 1: AACSB || Ethics Standard 2 : AACSB || Technology 116) You buy the right to use software, not distribute it. Answer: True Difficulty: Easy Section Reference 1: 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Knowledge Standard 1: AACSB || Ethics Standard 2 : AACSB || Technology 117) A unique advantage Walmart currently has over Amazon is its ability to ship-to-store. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Text Entry 118) ___ is the process of buying, selling, transferring, or exchanging products, services, or information through computer networks.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: electronic commerce or e-commerce Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 119) In ___ auctions, sellers solicit bids from many potential buyers. Answer: forward Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 120) In ___ auctions, one buyer wants to purchase a product or service. Answer: reverse Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 121) Forward auctions typically result in ___ prices over time. Answer: higher Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 122) Reverse auctions typically result in ___ prices over time. Answer: lower
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology 123) ___ marketing asks consumers to give their permission to voluntarily accept online advertising and e-mail. Answer: Permission Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 124) ___ marketing refers to online, word-of-mouth marketing and is closely related to using social media for marketing purposes. Answer: Viral Difficulty: Easy Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Knowledge Standard 1: AACSB || Technology 125) ___ is the overarching function that describes the activities and processes to acquire goods and services. Answer: Procurement Difficulty: Medium Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
126) ___ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else. Answer: Cybersquatting Difficulty: Easy Section Reference 1: 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Knowledge Standard 1: AACSB || Ethics Standard 2 : AACSB || Technology Question type: Essay 127) What is Bitcoin? How is Bitcoin different from traditional currency? Have you used Bitcoins (why or why not)? Why are Bitcoins so volatile? Answer: Difficulty: Hard Section Reference 1: 7.1 Learning Objective 1: Describe the eight common types of electronic commerce. Bloomcode: Evaluation Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: type of digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of any central bank; it is decentralized so no one controls it; personal question; it depends on what people think about it, use in foreign countries, tax treatment, supply and demand, etc. (http: //www.investopedia.com/articles/investing/052014/why-bitcoins-value-so-volatile.asp or https: //support.coinbase.com/customer/portal/articles/1834921-why-does-bitcoin-change-value-whyis-the-price-so-volatile-) 128) Discuss the differences between B2B and B2C e-commerce. Which one is more complex from a technology perspective and why? Answer: Difficulty: Easy Section Reference 1: 7.1 Section Reference 2: 7.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the eight common types of electronic commerce. Learning Objective 2: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Comprehension Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Solution: 1) B2C – businesses sell to consumers; B2B – businesses sell to other businesses 2) B2C because B2B issues tend to be business-related while B2C has to struggle with treating every individual customer as unique without any long-term guarantee of a relationship like B2B enjoys – need to be quick and efficient in shipping to customers all over the place in many different ways (B2B will probably involve a dedicated truck to a consistent customer while B2C will have to replay on the USPS at some point) 129) What functions do intermediaries serve? How is the concept of disintermediation related to Porter’s Five Forces? Is disintermediation inevitable for all industries (why or why not)? Answer: Difficulty: Medium Section Reference 1: 7.2 Learning Objective 1: Describe the various online services of business-to-consumer (B2C) commerce, along with specific examples of each. Bloomcode: Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: Functions = provide information, perform value-added services like consulting Porter’s Five Forces = it is a threat of substitute products (a website serves the same function as a distributor or retailer) – it is an unexpected competitor outside the given industry Inevitable = no (this is NOT an opinion; the answer cannot be “yes”) because not all manufacturers can deal directly with consumers; dealing with consumers is a business model by itself: intermediaries provide information and provide value-added services like consulting, intermediaries help with enormous amounts of information and when information exchange is complex 130) How are sell-side marketplaces, buy-side marketplaces, and exchanges different (do not simply provide definitions) ? Answer: Difficulty: Easy Section Reference 1: 7.3 Learning Objective 1: Describe the three business models for business-to-business (B2B) electronic commerce.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Comprehension Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Solution: Sell-side = just like B2C except for B2B; expecting other businesses to come to them to make purchases; forward auctions Buy-side = getting suppliers to bid on products/services that buying businesses need, group purchasing is often used here; reverse auctions Electronic exchanges = bringing multiple buyers and sellers together 131) What are the ethical and legal issues associated with e-business? For each one, explain your concerns (or lack of concerns). Answer: Difficulty: Medium Section Reference 1: 7.4 Learning Objective 1: Discuss the ethical and legal issues related to electronic commerce, along with examples. Bloomcode: Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Ethics Standard 3 : AACSB || Analytic Standard 4 : AACSB || Technology Solution: Privacy – cookies track everything Job loss – most probably don’t have jobs and/or are getting a degree to avoid this problem Fraudulent activity – it is really easy for criminals to steal our identities; hard to determine if a website/e-mail is real Domain names/cybersquatting – most probably don’t own their own business, so this should not matter to most students Taxes – this may or may not be a big deal to students depending on where they purchase products and in which state they live – may have to start paying more online; they may learn that they should be tracking their purchases to pay taxes Copyright – many people think piracy isn’t a big deal (the culture), so many may not feel like this is a big deal but some could be educated about its unfairness to businesses
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 8, Testbank Course Title: Rainer, IS 5e Chapter Number: 8 Question Type: Multiple Choice 1) An e-wallet, is an application that people use to _______ a) Purchase financial stocks online b) Make financial transactions c) Keep personal IDs d) Keep business cards Answer: B Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Analysis Standard 1: AACSB || Technology 2) Google Pay is a popular payment app in Canada that allows users to _____ a) Redeem loyalty cards, gift cards, and offers in stores. b) Receive e-cheques from employers for payroll payments c) Invest online in portfolio management products with banks and other financial institutions d) Get cash in Google machines located at some malls in Canada Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 3) What is one argument for the slow adoption of digital wallets in Canada a) The use of familiar chip-card payment methods backed by
Rainer, Information System, Fifth Canadian Edition
Testbank
Canada’s six major banks b) Heavy banking regulations that make it hard to use digital wallets c) Culture against e-payments d) High fees paid for the use of these payment services Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 4) What are the main specific concerns about security and privacy that Canadians have for the use of e-Wallets? a) Canada Revenue Agency using e-Wallet information for tax audits. b) Exposure of information and potential identity theft. c) Possible computer virus and malware installations with the e-Wallet app d) Possible bankruptcy of the e-Wallet company Answer: b Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 5) Suppose you use your university’s computer lab to print your research papers. If this computer lab contains desktop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab. a) mobile b) wireless c) mobile and wireless d) a waste of resources Answer: b Difficulty: Hard Section Reference 1: Introduction
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Evaluation Standard 1: AACSB || Technology 6) Suppose you use your university’s computer lab to print your research papers. If this computer lab contains laptop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab. a) mobile b) wireless c) mobile and wireless d) a waste of resources Answer: c Difficulty: Hard Section Reference 1: Introduction Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Evaluation Standard 1: AACSB || Technology 7) Suppose you use your university’s computer lab to print your research papers. If this computer lab contains laptop computers that are connected to the printer in the center of the room with Ethernet cables, it is a ________ lab. a) mobile b) wireless c) mobile and wireless d) a waste of resources Answer: a Difficulty: Hard Section Reference 1: Introduction Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Evaluation Standard 1: AACSB || Technology 8) ________ occurs when the functions of many physical devices are included in one other physical device.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Dematerialization b) Materialization c) Pervasiveness d) Ubiquitousness Answer: a Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 9) ________ transmission systems transmit data through electromagnetic waves. a) Fiber b) Microwave c) Radio d) Satellite Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 10) ________ transmission systems are relatively inexpensive but must have unobstructed line of sight. a) Fiber b) Microwave c) Radio d) Satellite Answer: b Difficulty: Easy Section Reference 1: 8.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 11) ________ transmission systems can have a large coverage area but are expensive. a) Fiber b) Microwave c) Radio d) Satellite Answer: d Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 12) ________ transmission systems can have a large coverage area but their signals experience propagation delay. a) Fiber b) Microwave c) Radio d) Satellite Answer: d Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 13) The main problem with ________ transmission systems is their signals experience propagation delay. a) fiber b) microwave
Rainer, Information System, Fifth Canadian Edition
Testbank
c) radio d) satellite Answer: d Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 14) ________ transmission systems can have a large coverage area but encryption must be used for security. a) Fiber b) Microwave c) Radio d) Satellite Answer: d Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 15) ________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted. a) Fiber b) Microwave c) Radio d) Satellite Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 16) ________ transmission systems are inexpensive and easy to install but they create electrical interference problems. a) Fiber b) Microwave c) Radio d) Satellite Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 17) ________ satellites are stationary relative to a point on the Earth. a) GEO b) LEO c) MEO d) VEO Answer: a Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 18) Only a few ________ satellites are needed for global coverage. a) GEO b) LEO c) MEO d) VEO Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 19) ________ satellites have the longest transmission delay. a) GEO b) LEO c) MEO d) VEO Answer: a Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 20) ________ satellites are the most expensive to build and launch. a) GEO b) LEO c) MEO d) VEO Answer: a Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) ________ satellites have the longest orbital life. a) GEO
Rainer, Information System, Fifth Canadian Edition
Testbank
b) LEO c) MEO d) VEO Answer: a Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 22) You have satellite TV. Providers use ________ satellites to get this service to you. a) GEO b) LEO c) MEO d) VEO Answer: a Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 23) ________ satellites have the largest footprint. a) GEO b) LEO c) MEO d) VEO Answer: a Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
24) ________ satellites move a little relative to a point on the Earth. a) GEO b) LEO c) MEO d) VEO Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 25) A moderate number of ________ satellites are needed for global coverage. a) GEO b) LEO c) MEO d) VEO Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 26) ________ satellites require medium-powered transmitters. a) GEO b) LEO c) MEO d) VEO Answer: c Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 27) ________ satellites have an orbital life of 6–12 years. a) GEO b) LEO c) MEO d) VEO Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 28) ________ satellites are used to run the GPS system. a) GEO b) LEO c) MEO d) VEO Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) ________ satellites move rapidly relative to a point on the Earth. a) GEO b) LEO c) MEO
Rainer, Information System, Fifth Canadian Edition
Testbank
d) VEO Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 30) ________ satellites have the smallest footprint. a) GEO b) LEO c) MEO d) VEO Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 31) A large number of ________ satellites are needed for global coverage. a) GEO b) LEO c) MEO d) VEO Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
32) ________ satellites require only low-power transmitters. a) GEO b) LEO c) MEO d) VEO Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 33) ________ satellites have the most negligible transmission delay. a) GEO b) LEO c) MEO d) VEO Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 34) ________ satellites are the least expensive to build and launch. a) GEO b) LEO c) MEO d) VEO Answer: b Difficulty: Easy Section Reference 1: 8.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 35) ________ satellites have the shortest orbital life. a) GEO b) LEO c) MEO d) VEO Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 36) Satellite telephone services are provided through ________ satellites. a) GEO b) LEO c) MEO d) VEO Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 37) GPS uses the known speed of the signals and distance from ________ satellite(s) to find the location of a receiving station or user. a) 1 b) 3 c) 5
Rainer, Information System, Fifth Canadian Edition
Testbank
d) 7 Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 38) ________ does NOT currently have a GPS system planned or in use. a) Australia b) China c) European Union d) Russia Answer: a Difficulty: Hard Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 39) ________ provide(s) Internet access to rural and remote areas using balloons at an altitude of 11 miles. a) Google’s Project Fi b) Google’s Project Loon c) Facebook drones d) Facebook boons Answer: b Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
40) ________ have a wingspan of a Boeing 737, fly at altitudes above 60,000 feet and stay aloft for three months at a time. a) Google’s Project Fi b) Google’s Project Loon c) Facebook drones d) Facebook boons Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 41) The biggest problem with using wireless networks is ________. a) accessibility b) cost c) security d) usability Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 42) ________ is an unauthorized access point into a wireless network. a) A rogue access point b) An evil twin attack c) Eavesdropping d) War driving Answer: a Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) If you bring your own router to school to set-up Wi-Fi but do not have permission from your university to do this, this is ________. a) a rogue access point b) an evil twin attack c) eavesdropping d) war driving Answer: a Difficulty: Medium Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Application Standard 1: AACSB || Technology 44) If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person’s knowledge, this is ________. a) a rogue access point b) an evil twin attack c) eavesdropping d) war driving Answer: b Difficulty: Medium Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Application Standard 1: AACSB || Technology 45) Suppose you go through your neighborhood to figure out how many wireless networks are unsecure. This is __________.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) a rogue access point b) an evil twin attack c) eavesdropping d) war driving Answer: d Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Comprehension Standard 1: AACSB || Technology 46) ________ refers to efforts by unauthorized users to access data that are traveling over wireless networks. a) A rogue access point b) An evil twin attack c) Eavesdropping d) War driving Answer: c Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 47) If a person intentionally or unintentionally interferes with your wireless network transmissions, they are ________. a) eavesdropping b) QR coding c) RF jamming d) war driving Answer: c Difficulty: Easy Section Reference 1: 8.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 48) Physicians are now using smartphones to: ________. a) Conduct traditional examinations of organs; b) Perform ultrasound scans c) Measure vital signs such as heart function d) All of the above Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 49) Social networks such as _____ enable more than 500,000 physicians to share information and peer-review one another’s work while keeping confidential any information that could identify the patient. a) Biomeme b) Doximity c) Twitter d) Babylon Health Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology
50) First generation mobile networks were introduced in ______. a) 1982 b) 1992 c) 2001
Rainer, Information System, Fifth Canadian Edition
Testbank
d) 2012 Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 51) Fourth generation mobile networks were introduced in ______. a) 1982 b) 1992 c) 2001 d) 2012 Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 52) The first deployment of 5G technology occurred in _______. A) China b) Russia c) South Korea d) the United States Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 53) ________ is a short-range wireless network.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Bluetooth b) LTE c) MiFi d) WiMAX Answer: a Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 54) ________ is a short-range wireless network. a) LTE b) MiFi c) UWB d) WiMAX Answer: c Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 55) ________ is a short-range wireless network. a) LTE b) MiFi c) NFC d) WiMAX Answer: c Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 56) ________ is a medium-range wireless network. a) LTE b) MiFi c) UWB d) WiMAX Answer: b Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 57) ________ is a medium-range wireless network. a) Cellular radio b) LTE c) UWB d) Wi-Fi Answer: d Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 58) ________ is a medium-range wireless network. a) LTE b) NFC c) Super Wi-Fi d) WiMAX Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 59) ________ is a wide-area wireless network. a) LTE b) MiFi c) NFC d) WiMAX Answer: d Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 60) ________ is a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps. It is a ______-range wireless network technology. a) NFC; medium b) NFC; short c) UWB; medium d) UWB; short Answer: d Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 61) ________ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _________-range wireless network technology.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) NFC; medium b) NFC; short c) UWB; medium d) UWB; short Answer: b Difficulty: Easy Section Reference 1: 8.2 Section Reference 1: 8.3 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Learning Objective 2: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 62) Firemen often use ________ to communicate with each other in burning buildings. a) NFC b) RFID c) Wi-Fi d) UWB Answer: d Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Application Standard 1: AACSB || Technology 63) Suppose you use Speedpass+ at Exxon and Mobil to pay for your gas. This is ________ technology. a) NFC b) RFID c) Wi-Fi d) UWB Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Application Standard 1: AACSB || Technology 64) Medium-range wireless networks are ________ technology. a) LAN b) MAN c) PAN d) WAN Answer: a Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 65) Which of the following is NOT a barrier to Wi-Fi expansion? a) Cost b) Roaming c) Security d) Usability Answer: d Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 66) ________ is a substitute for Bluetooth. a) MiFi b) Super Wi-Fi
Rainer, Information System, Fifth Canadian Edition
Testbank
c) Wi-Fi Direct d) WiMAX Answer: c Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Comprehension Standard 1: AACSB || Technology 67) ________ is a small, portable wireless device that provides users with a permanent Wi-Fi hotspot wherever they go. a) MiFi b) Super Wi-Fi c) Wi-Fi Direct d) WiMAX Answer: a Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 68) ________ is a wireless network proposal that creates long-distance wireless internet connections; it uses the lower-frequency “white spaces” between broadcast TV channels. a) MiFi b) Super Wi-Fi c) Wi-Fi Direct d) WiMAX Answer: b Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 69) ________ cellular networks used analog signals and had low bandwidth. a) 1G b) 2G c) 3G d) 4G Answer: a Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 70) ________ cellular networks used digital signals primarily for voice communications and provided data communication up to 10 Kbps. a) 1G b) 2G c) 3G d) 4G Answer: b Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 71) ________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging. a) 1G b) 2G c) 3G d) 4G
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: c Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 72) LTE is ________ cellular technology. a) 2G b) 3G c) 4G d) 5G Answer: c Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 73) ________ is expected to be deployed by 2020. a) 2G b) 3G c) 4G d) 5G Answer: d Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 74) ________ is the amount of bandwidth actually available for you to use.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Broadband b) Downloadability c) Connection speed d) Throughput Answer: d Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 75) Your actual download speed is determined by ________. a) broadband b) downloadability c) connection speed d) throughput Answer: d Difficulty: Hard Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 76) According to GasBuddy’s July 2019 ranking, ______ is the best gas station regarding cleanliness, customer service, outdoor lighting, and overall experience. a) Chevron b) Marathon c) Mobile d) Shell Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 8.3
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 77) GasBuddy uses ______ data to direct consumers to gas stations. a) artificial intelligence b) crowdsourced c) historical d) tracking Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 78) ________ technology enables the use of mobile wallets. a) NFC b) UWB c) Wi-Fi d) WiMAX Answer: a Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 79) ________ is the wireless transmission and receipt of data gathered from remote sensors. a) A mobile portal b) A voice portal c) L-commerce d) Telemetry
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 80) Find My iPhone is an example of ________. a) a mobile portal b) a voice portal c) l-commerce d) Telemetry Answer: d Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 81) Donald and his tech team are working on creating a new smartphone. They want users to have the ability to connect to the internet. Which feature of mobility are they concerned with? a) localization b) connectivity c) ubiquity d) customization Answer: b Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Comprehension Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
82) Donald and his tech team are working on creating a new smartphone. They want companies to know be able to use location data to market to customers. Which feature of mobility are they concerned with? a) localization b) connectivity c) ubiquity d) customization Answer: a Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Comprehension Standard 1: AACSB || Technology
83) Donald and his tech team are working on creating a new smartphone. They want users to have the ability to set individual messages and ringtones. Which feature of mobility are they concerned with? a) localization b) connectivity c) ubiquity d) customization Answer: d Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Comprehension Standard 1: AACSB || Technology 84) Susan takes her car to the gas station and taps her phone to the gas pump in order to pay. Susan is using ___________. a) a mobile wallet b) location services c) SMS d) a mobile portal
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Comprehension Standard 1: AACSB || Technology 85) Paul is travelling to a new client and he receives messages about traffic along the way. Paul is using _______. a) a mobile wallet b) location services c) intrabusiness applications d) a mobile portal Answer: b Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Comprehension Standard 1: AACSB || Technology 86) Marco fixes heating and air conditioning systems. While working on a current repair he gets information about where his next job is located and details about how to contact the customer and advise them about his arrival. Marco is using __________. a) a mobile wallet b) location services c) intrabusiness applications d) a mobile portal Answer: c Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Comprehension Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
87) The find my iphone app uses _________ to locate a user’s device. a) a mobile wallet b) telemetry c) intrabusiness applications d) a mobile portal Answer: b Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Comprehension Standard 1: AACSB || Technology
88) _________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction. a) A mobile portal b) A wireless network c) The IoT d) UWB Answer: c Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 89) ________ does NOT have an important role in the Internet of Things. a) 5G b) Bluetooth c) IPv4 d) Wireless sensors Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Hard Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Synthesis Standard 1: AACSB || Technology 90) The adoption of ________ has been an important factor in the development of the Internet of Things. a) IPv2 b) IPv4 c) IPv6 d) IPv8 Answer: c Difficulty: Medium Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 91) ________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it; it is an underlying technology of ________. a) A wireless sensor; the IoT b) A wireless sensor; RFID c) The IoT; a wireless sensor d) RFID; a wireless sensor Answer: a Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
92) _________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals. a) NFC b) RFID c) UWB d) XML Answer: b Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 93) RFID was developed to replace ________. a) bar codes b) NFC c) QR codes d) UWB Answer: a Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 94) ________ is a two-dimensional code that can store much more information than ________. a) A QR code; bar codes b) A QR code; RFID c) RFID; bar codes d) RFID; QR codes Answer: a Difficulty: Easy Section Reference 1: 8.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 95) Which of the following is FALSE of QR codes? a) QR codes are larger than bar codes because they store information both horizontally and vertically. b) QR codes are more resistant to damage than bar codes. c) QR codes can be read from any direction or angle. d) QR codes can store much more information than bar codes. Answer: a Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 96) ________ use internal batteries for power, and they broadcast radio waves to a reader. a) Active QR codes b) Active RFID codes c) Passive QR codes d) Passive RFID codes Answer: b Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 97) ________ rely entirely on readers for their power, are less expensive, and can be read only up to 20 feet. a) Active QR codes b) Active RFID codes
Rainer, Information System, Fifth Canadian Edition
Testbank
c) Passive QR codes d) Passive RFID codes Answer: d Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 98) You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________. a) active QR codes b) active RFID codes c) passive QR codes d) passive RFID codes Answer: d Difficulty: Medium Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Application Standard 1: AACSB || Technology 99) When shopping in the supermarket, Arianna notices that the cashier swipes each of the boxes of cookies she is buying over a scanning device and the scanner reads what is printed on the box, the price is recorded and added to her bill. The boxes of cookies have _________ that make this possible, a) telemetry b) bar codes c) RFID tags d) mobile wallets Answer: b Difficulty: Medium Section Reference 1: 8.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Application Standard 1: AACSB || Technology 100) Marc leaves a store in the mall and sets off the alarm. This is because the cashier likely left the ___________ on the item Marc purchased. a) telemetry b) bar code c) RFID tag d) intrabusiness app Answer: c Difficulty: Medium Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Application Standard 1: AACSB || Technology
101) In April 2015, Google announced its new wireless service, ________. a) Google Fiber b) Google MiFi c) Project Fi d) Project Wi Answer: c Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 102) Mobile wallets replace the need to carry______ a) Physical credit and debit cards b) Gift cards. c) Loyalty cards.d) All of the above.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 103) Apple Pay is a mobile wallet that uses___________________. a) Wimax communications to enable users to make payments using only one Apple devices b) Near-field communications to enable users to make payments using only one Apple device c) Near-field communications to enable users to make payments using various Apple devices d) Wifi communications to enable users to make payments using various Apple devices Answer: c Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: True/False 104) To use a mobile wallet, consumers wave their phones a few inches above a payment terminal instead of swiping a plastic card.. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 105)
Rainer, Information System, Fifth Canadian Edition
Testbank
Samsung Pay is a digital wallet that lets users make payments using compatible phones. . Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 106) The use of smartphones’ digital wallets to pay is widely adopted in Canada. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 107) The terms wireless and mobile are synonymous. Answer: False Difficulty: Easy Section Reference 1: Introduction Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 108) A device can be wireless but not mobile. Answer: True Difficulty: Easy Section Reference 1: Introduction Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Comprehension Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
109) A device can be mobile but not wireless. Answer: True Difficulty: Easy Section Reference 1: Introduction Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Comprehension Standard 1: AACSB || Technology 110) Modern smartphones exhibit a process called dematerialization. Answer: True Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 111) Satellite transmission systems are widely used but are being replaced by microwave data communications systems. Answer: False Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 112) Microwave and satellite transmission systems must receive and transmit data through line of sight. Answer: True Difficulty: Easy Section Reference 1: 8.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 113) LEO satellites have the longest orbital life. Answer: False Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 114) GEO satellites run the GPS system. Answer: False Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 115) A moderate number of MEO satellites are needed for global coverage. Answer: True Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 116) Satellite TV runs using GEO satellites. Answer: True
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 117) Cell phones in the US must have a GPS embedded in them so that the location of a person making a 911 call can be detected immediately. Answer: True Difficulty: Hard Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 118) People who set up rogue access points are always being malicious. Answer: False Difficulty: Medium Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Analysis Standard 1: AACSB || Technology 119) Physicians can use smartphones to diagnose chest infections, check for congestive heart failure, and to perform a whole-body ultrasound. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
120) Biomeme designed a smartphone kit to conduct laboratory tests on patient fluids such as urine or blood. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 121) Physicians and technology experts recommend centralizing large health databases to reduce the chance of data breaches. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 122) 5G mobile networks began appearing in 2019. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 123) Users can always roam from hotspot to hotspot seamlessly. Answer: False Difficulty: Easy Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 124) Super Wi-Fi is super-fast Wi-Fi technology. Answer: False Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 125) MiFi challenges the dominance of Bluetooth for peer-to-peer networking. Answer: False Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 126) There are two separate cellular technologies at use in North America. Answer: True Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 127) A 4G system is expected to provide a secure all-IP-based mobile broadband system to all types of mobile devices. Answer: True Difficulty: Hard
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 128) Throughput will always be less than the connection speed. Answer: True Difficulty: Hard Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 129) 4G is always faster than 3G. Answer: False Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Knowledge Standard 1: AACSB || Technology 130) GasBuddy earns money through small one-time subscription fees from users. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 131) Mobile computing has two major characteristics that differentiate it from other forms of computing: pervasiveness and broad reach.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 132) A mobile wallet is an app used for making financial transactions. Answer: True Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 133) Google Wallet is a Chinese messaging, social media, and mobile payment app developed by Tencent Answer: False Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 134) Mobile wallets utilize near-field communication. Answer: True Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
135) The majority of m-commerce applications today are used within organizations as opposed to being used publicly. Answer: True Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 136) Most airlines use voice portals to provide real-time information on flight status. Answer: True Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 137) Telemetry has limited mobile computing applications. Answer: False Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 138) IoT means everyday objects can be connected to the internet. Answer: True Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Comprehension Standard 1: AACSB || Technology 139) If your refrigerator is connected to the internet so that it can automatically re-order milk for you, this is an example of the IoT. Answer: True Difficulty: Medium Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Application Standard 1: AACSB || Technology 140) Google Fi is currently only available in the United States. Answer: False Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Comprehension Standard 1: AACSB || Technology 141) Google Fi requires users to sign an annual contract. Answer: False Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Comprehension Standard 1: AACSB || Technology 142) Project Fi focuses on providing better Wi-Fi services for the United States. Answer: False Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: Closing Case Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Comprehension Standard 1: AACSB || Technology 143) The main problem with Project Fi is that it is completely insecure since it uses Wi-Fi hotspots. Answer: False Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Text Entry 144) ___ occurs when the functions of many physical devices are included in one other physical device. Answer: Dematerialization Difficulty: Medium Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 145) ___ transmission systems transmit data through electromagnetic waves. Answer: Microwave Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
146) ___ transmission systems make use of communication satellites. Answer: Satellite Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 147) ___ transmission uses radio wave frequencies to send data directly between transmitters and receivers. Answer: Radio Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 148) The ___ is a wireless system that uses satellites to enable users to determine their position anywhere on Earth. Answer: global positioning system or GPS Difficulty: Easy Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 149) The GPS system is supported by 24 ___ satellites that are shared worldwide. Answer: medium-earth-orbit or MEO Difficulty: Medium Section Reference 1: 8.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Knowledge Standard 1: AACSB || Technology 150) ___ refers to a real-time connection between a mobile device and other computing environments. Answer: Mobile computing Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 151) A ___ aggregates and provides content and services for mobile users. Answer: mobile portal Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 152) A ___ is a website with an audio interface. Answer: voice portal Difficulty: Easy Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Knowledge Standard 1: AACSB || Technology 153) The ___ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: Internet of Things Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology 154) ___ technology allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals. Answer: Radio-frequency identification or RFID Difficulty: Easy Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Essay 155) Explain the dematerialization process of your smartphone. What are the downsides of your smartphone? Consider your personal life as well as how your future employer or business will be impacted. NOTE: This is not simply an opinion question. Answer: Difficulty: Medium Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Solution: smartphones do just about everything – surf the Internet, take pictures, call, listen to music, watch TV, etc.) (see Figure 8.1) ; downsides – never disconnected, can copy and pass on confidential information quickly and easily, losing it could mean loss of personal information like pictures or banking information (or credit cards with a mobile wallet) 156) Briefly describe Google’s Project Loon and Facebook’s drones. What are the ethical implications of these projects? Do you think these projects are good or bad for society (why)? Answer: Difficulty: Hard Section Reference 1: 8.1 Learning Objective 1: Identify advantages and disadvantages of each of the four main types of wireless transmission media. Bloomcode: Evaluation Standard 1: AACSB || Communication Standard 2 : AACSB || Ethics Standard 3 : AACSB || Technology Standard 4 : AACSB || Reflective Thinking Solution: Google’s Project Loon: provide Internet access to rural and remote areas using balloons at an altitude of 11 miles; creates an aerial wireless network with us to 4G LTE speeds Facebook’s drones: solar-powered drones to provide Internet access to rural and remote areas;
Rainer, Information System, Fifth Canadian Edition
Testbank
drones are big but weigh very little; planned to fly at altitudes above 60,000 feet and stay aloft for three months at a time; use very little power and new laser-beam technology to deliver internet Google Ethical implications: some governments may not want their people to have unrestricted Internet access (https://gigaom.com/2013/06/21/project-loon-googles-biggest-obstacle-isnttechnology-its-politics/); potentially just self-serving to “sell” more people to advertisers – privacy issues about them picking up data (http://www.techradar.com/news/world-oftech/project-loon-explained-can-google-s-balloons-unite-the-world-online-1182663/2) Drone ethical implications: privacy, safety, noise, etc.) (https://www.gislounge.com/drones-andgis-a-look-at-the-legal-and-ethical-issues/) 157) What are the advantages and disadvantages of Wi-Fi for an individual like you? What are the advantages and disadvantages of Wi-Fi for a business? Answer: Difficulty: Medium Section Reference 1: 8.2 Learning Objective 1: Explain how businesses can use short-range, medium-range, and longrange wireless networks. Bloomcode: Comprehension, Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: benefits = cost and ability to provide simple internet access; problems = roaming (can’t move from hotspot to hotspot), security, cost Personal = it is free and helps us not use our mobile data (so it saves us money too); not being able to roam is a minor inconvenience; security should be a concern (shouldn’t do banking on a free Wi-Fi network), but most students probably won’t mention this Business = the book provides examples of it working well for businesses, but long-term sustainability is a concern (cost, security, etc.) 158) Describe the five value-added attributes of mobile computing using examples from your smartphone use. How has mobile commerce changed your life? If it has not changed your life, why don’t you engage in mobile commerce? Answer: Difficulty: Medium Section Reference 1: 8.3 Learning Objective 1: Provide a specific example of how each of the five major m-commerce applications can benefit a business. Bloomcode: Application Standard 1: AACSB || Communication
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 2 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking Solution: ubiquity = can access information and communicate with anyone anywhere; convenience = connection is in the palm of our hands; instant connectivity = we don’t have to wait for a device to boot up (always on); customization = apps, getting personalized message from businesses; localization = can get ads from local businesses Changed life = most students will probably mention mobile banking, some may discuss purchasing, generally being able to see everything on a smartphone that can see at a desktop/laptop computer 159) What is the Internet of Things (IoT)? Describe a scenario where you have seen the IoT at work. If you do not have any experience with the IoT, describe a way that it may be useful in your life. In either case, make sure you do an Internet search to see what technology is currently available in that area (include at least two URLs in your answer). Answer: Difficulty: Medium Section Reference 1: 8.4 Learning Objective 1: Describe the Internet of Things, along with examples of how organizations can use the Internet of Things. Bloomcode: Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: Any object has a unique identity (IP address) and is able to send and receive information over a network with human interaction The book has multiple examples of the IoT in use (smart homes, healthcare, etc.)
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 9, Testbank Course Title: Rainer, IS 5e Chapter Number: 9 Question type: Multiple Choice 1) Snap developed the Snapchat app that:. a) Integrates image, video, communication, and entertainment b) Allows companies to send advertisement to social media users c) Allows users to use social media for political discussions d) Allows users to use social media to discuss about online shopping Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 2) Snap faces stiff competition due to______________. a) Facebook-owned apps Instagram and WhatsApp that have copied Snapchat-like features and made them better. b) The development by Google of a very similar application to Snapchat c) A launch by YouTube of a Snapchat like application as part of their features. d) Instagram’s functionality mirrors that of Snapchat Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Comprehension Standard 1: AACSB || Technology 3) The key developments of Web ________ were the creation of websites and the commercialization of the web. a) 1.0 b) 2.0 c) 3.0
Rainer, Information System, Fifth Canadian Edition
Testbank
d) 4.0 Answer: a Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 4) ________ are an example of harnessing collective intelligence. a) Mashups b) Tags c) Web services d) Wikis Answer: d Difficulty: Medium Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 5) ________ deliver functionality as services rather than as packaged software. a) Mashups b) Tags c) Web services d) Wikis Answer: c Difficulty: Medium Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 6) ________ feature remixable applications and data. a) Mashups
Rainer, Information System, Fifth Canadian Edition
Testbank
b) Tags c) Web services d) Wikis Answer: a Difficulty: Medium Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 7) ________ allow users to place information in multiple, overlapping associations rather than in rigid categories. a) Mashups b) Tags c) Web services d) Wikis Answer: b Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 8) ________ are user-generated classifications that use ________ to categorize and retrieve web pages, photos, videos, and other web content. a) Crowdsources; mashups b) Crowdsources; tags c) Folksonomies; mashups d) Folksonomies; tags Answer: d Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
9) __________ allows anyone to syndicate any content to anyone who has an interest in subscribing to it. a) Blogging b) RFID c) RSS d) UWB Answer: c Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 10) ________ is an example of microblogging. a) Facebook b) RSS c) Twitter d) UWB Answer: c Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 11) Organizations do NOT typically use wikis to _________. a) collaborate on projects b) follow consumers’ social networking comments c) keep enterprise wide documents d) provide a central repository Answer: b Difficulty: Medium Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 12) Mexicans used _______ heavily to recruit volunteers and communicate with people trapped in buildings in the 2017 earthquake. a) Facebook b) Google c) Twitter d) WhatsApp Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 9.1 Learning Objective 1: Describe how social computing improves customer service. Bloomcode: Knowledge Standard 1: AACSB || Technology 13) Which BEST describes the relationship between social media and response to natural disasters? a) While many victims utilized social media apps to draw attention to their need for aid and help, emergency officials urge the use of formal emergency services like 911 to prevent the spread of misinformation. b) Most victims continued to use standard emergency services for aid and assistance, however emergency officials urged people to use all means of communication possible, including social media posts, to gain more attention to their need. c) The widespread use of social media in lieu of traditional emergency service contact methods was detrimental to the lifesaving measures that military and first responders attempted to employ, leaving thousands upon thousands stranded without assistance. d) The only real upside to using social media as it relates to natural disasters is in the form of soliciting donations and volunteers; outside of soliciting assistance, there has yet to be a good example of social media helping those in need. Answer: A Difficulty: Hard Section Reference 1: IT’s About Business 9.1 Learning Objective 1: Describe how social computing improves customer service. Bloomcode: Evaluation Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
14) ________ provides a live notification when its customers are close to physical stores that sell its products. The company then uses Foursquare to send them coupons and discount information. a) Disney b) Levi’s c) Mountain Dew d) PepsiCo Answer: d Difficulty: Medium Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 15) Building relationships, anticipating needs, and providing special deals for the community’s members are functions of which category of Web 2.0 applications? a) Social networking b) Aggregators c) Blogs d) Crowdsourcing e) Social commerce Answer: e Difficulty: Medium Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 16) ________ advertises on Facebook by enabling consumers to populate a “shopping cart” based on what their friends think they would like. a) Disney b) Levi’s c) Mountain Dew d) PepsiCo Answer: b Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 17) The ________ rule of thumb is that ________ percent of individuals contribute ________ percent of the content. a) 20–80; 20; 80 b) 80–20; 80; 20 c) 40–60; 40; 60 d) 60–40; 60; 40 Answer: a Difficulty: Easy Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 18) ________ is NOT an example of collaborative consumption. a) Collaborative production b) Crowdfunding c) Mass customization d) Peer-to-peer lending Answer: c Difficulty: Medium Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 19) ________ does NOT use a peer-to-peer business model. a) Airbnb b) Craigslist c) eBay d) Twitter
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Medium Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Application Standard 1: AACSB || Technology 20) ________ is the greatest concern in the peer-to-peer economic model. a) Accessibility b) Cost c) Trust d) Usability Answer: c Difficulty: Easy Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) On the web, the first peer-to-peer model was _________. a) Airbnb b) Craigslist c) eBay d) Zipcar Answer: c Difficulty: Easy Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 22) Kreditech is based in ______ and is the only credit-scoring start-up that ______. a) Germany; makes loans b) Germany; uses machine learning to search for debts c) Singapore; makes loans
Rainer, Information System, Fifth Canadian Edition
Testbank
d) Singapore; uses machine learning to search for debts Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 23) Lenddo is based in ___ and finds the unbanked population in ___ particularly attractive. a) Germany; India b) Germany; the US c) Singapore; India d) Singapore; the US Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology
24) ________ helps stores like Gap promote the season’s latest fashion collections. a) Epinions b) InStyle c) Stylehive d) ThisNext Answer: c Difficulty: Hard Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 25) ________ allows shoppers to create profiles and blogs about their favorite products in social communities.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Epinions b) InStyle c) Stylehive d) ThisNext Answer: d Difficulty: Hard Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 26) Ratings, reviews, and recommendations a) Are always provided by businesses on their Web site. b) Are posted by experts. c) Are posted without compensation. d) Are an aspect of social shopping. e) Are not beneficial to the business Answer: d Difficulty: Medium Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 27) Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services. a) intermediaries b) shopping carts c) communities d) collaborative consumption e) mashup Answer: a Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
28) Which of the following is a type of collaborative consumption? a) Buying a new book from Amazon b) Craigslist c) Renting a car from Hertz or Avis d) Buying a e-textbook from your bookstore Answer: b Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) Beyond the Rack is an example of ________________ a) Shopping clubs b) Social marketplace c) Group shopping d) Peer-to-peer shopping e) Collaborative consumption Answer: a Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 30) Which of the following is not an example of social shopping? a) Group shopping b) Going to Amazon.com to buy a book c) Shopping communities and clubs d) Social marketplaces e) Peer-to-peer shopping models Answer: b Answer: d Difficulty: Medium Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
31) ________ is an example of a social commerce. a) Epinions b) Metacritic c) Disney d) ThisNext Answer: c Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 32) ________ personalizes searchers with filter bubbles. a) Amazon b) Facebook c) Google d) Twitter Answer: c Difficulty: Medium Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 33) ________ is an example of a shopping club website. a) Facebook b) Rue La La c) Tujia d) Uber Answer: b Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
34) ________ is an example of a shopping community. a) Craigslist b) Fotolia c) Kaboodle d) LivingSocial Answer: c Difficulty: Hard Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 35) ________ is an example of a social marketplace. a) Craigslist b) Facebook c) Twitter d) Tujia Answer: a Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 36) Many experts believe ________ is the solution to the challenge of making money from social networking sites and social commerce sites. a) advertising b) company buy-in c) crowdsourcing d) employee use Answer: a Difficulty: Medium Section Reference 1: 9.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 37) ________ marketing is word-of-mouth advertising. a) Conversational b) Filter c) Native d) Viral Answer: d Difficulty: Medium Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 38) ________ advertising is a sales pitch that fits into the flow of information being shown. a) Conversational b) Filter c) Native d) Viral Answer: c Difficulty: Medium Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 39) Many publishers view ________ advertising as risky because it has the potential to erode the public’s trust. a) conversational b) filter c) native
Rainer, Information System, Fifth Canadian Edition
Testbank
d) viral Answer: c Difficulty: Medium Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 40) ________ marketing is when companies use social computing tools to obtain feedback from customers. a) Conversational b) Filter c) Traditional d) Viral Answer: a Difficulty: Easy Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 41) Approximately ________ percent of consumers consult reviews before making an online purchase. a) 25 b) 50 c) 75 d) 100 Answer: b Difficulty: Medium Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
42) Almost ________ of consumers are more likely to purchase from a site that offers ratings and reviews. a) 1/3 b) 2/3 c) 1/4 d) 3/4 Answer: b Difficulty: Hard Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions. a) data b) intelligence c) knowledge d) wisdom Answer: b Difficulty: Easy Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 44) ________ uses Clarabridge text analytics software to analyze comments from its online notes, e-mails, receipt-based surveys, and social media. a) Dunkin’ Donuts b) McDonald’s c) Starbucks d) Wendy’s
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: d Difficulty: Medium Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 45) The “_______ Effect” sometimes drives physicians to provide care that patients do not actually need as a way of trying to make the patients happy. a) Facebook b) Google c)Twitter d) Yelp Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 46) Banner Health uses natural-language recognition technology to analyze online comments on social media and then reroutes negative feedback into its call center. This service is performed by _______. a) Empathiq.com b) Healthgrades.com c) Salesforce.com d) Slack.com Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 47) What is TRUE of online reviews in the health care space?
Rainer, Information System, Fifth Canadian Edition
Testbank
a) A recent survey shows that most people neither leave reviews nor read reviews when it comes to health care. b) A recent survey indicates that a large majority of people read online reviews when shopping for health care. c) A recent survey indicates that most people only pay attention to positive reviews about health care providers and usually ignore negative reviews. d) A recent survey of physicians and other health care providers found that most often, they are not concerned with online reviews of their practices and services. Answer: B Difficulty: Medium Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Analysis Standard 1: AACSB || Technology 48) A criticism of ___________ is that they only exist to improve their clients’ online images through changing consumers’ perception. a) reputation-management firms b) health care office managers c) online review sites d) consumer surveys Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 49) Which of the following is true about the impact of social computing on customer service? a) It’s harder for customers to be heard by a company. b) Businesses can take their time responding to social media posts. c) Customers themselves can be used to reduce problems. d) Businesses will only get negative comments on social media posts. Answer: c Difficulty: Medium Section Reference 1: 9.5 Learning Objective 1: Describe how social computing improves customer service.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Analysis Standard 1: AACSB || Technology 50) Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________. a) CRM b) ERP c) HRM d) SCM Answer: a Difficulty: Easy Section Reference 1: 9.5 Learning Objective 1: Describe how social computing improves customer service. Bloomcode: Knowledge Standard 1: AACSB || Technology 51) ________’s platform helps enterprises to manage the consumer experience at every interaction; the company provides social media marketing, social media monitoring, social advertising, content management, collaboration, and advocacy for large companies. A) Flickr b) Salesforce c) Sprinklr d) Twitter Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 52) _______ is NOT a competitor of Sprinklr in the social media management marketspace. a) Adobe b) Oracle c) Salesforce d) Twitter
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 9.3 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology
53) HR departments use social computing applications to assist them in which of the following activities: a) Recruiting b) Training c) Regrouping teams d) Managing downsizing e) All of the above. Answer: e Difficulty: Easy Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 54) ________ is how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization. a) Employee development b) Onboarding c) Recruiting d) Social networking Answer: b Difficulty: Easy Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
55) ________ is NOT a tool used by HR professionals. a) Chatter b) Tibbr c) Wattpad d) Yammer Answer: c Difficulty: Easy Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 56) LinkedIn’s main market segment is _________. a) high-skill jobs b) low-paying jobs c) low-skill jobs d) upper-level executives Answer: a Difficulty: Easy Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 57) Job coaches recommend spending ________ percent of your time online to get a job. a) 10 b) 25 c) 50 d) 80 Answer: a Difficulty: Medium Section Reference 1: 9.6
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 58) Job coaches recommend spending most of your time ________ to get a job. a) educating yourself b) networking c) online d) talking to headhunters Answer: b Difficulty: Easy Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 59) In 2015, Snapchat entered a partnership with _______ to present live stories from selected games. a) Major League Baseball b) The National Basketball Association c) The National Football League d) The National Hockey League Answer: C Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 60) World Stickers lets users add _______ reality elements into any scenery. a) augmented b) overlay c) snap
Rainer, Information System, Fifth Canadian Edition
Testbank
d) virtual Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 61) ________ is a Snapchat competitor in Japan and Korea. a) Facebook b) Instagram c) Snow d) WhatsApp Answer: C Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 62) _________ allow location-based image enhancements for users to overlay their snaps depending on where they are. a) Location stickers b) Third-party tags c) Geofilters d) Sponsored lenses Answer: C Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
63) Which is NOT a service that Snapchat has added after its initial launch in 2011? a) Snapcash b) On-demand geofilters c) World stickers d) Direct messaging Answer: D Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology Question Type: True/False 64) Approximately 2 billion people in certain parts of the world have no bank account Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 65) Users had passive involvement with Web 2.0 websites. Web 3.0, on the other hand, facilitates more interactive social computing. Answer: False Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 66) Companies listen to consumers in the blogosphere who express their views on the companies’ products. This is consumer-generated media.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 67) The best thing about blogs is that they accurately reflect the opinions of customers. Answer: False Difficulty: Medium Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Analysis Standard 1: AACSB || Technology 68) A wiki is a website made up entirely of content posted by users. Answer: True Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 69) Krebs has also become well known internationally. Many security industry experts request his assistance in understanding how the Eastern European criminals operate.. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 9.1 Learning Objective 1: Describe how social computing improves customer service. Bloomcode: Knowledge Standard 1: AACSB || Technology 70) Walmart suffered a security breach where over 60,000 customers’ personal information was compromised at its Photocentre
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Medium Section Reference 1: IT’s About Business 9.1 Learning Objective 1: Describe how social computing improves customer service. Bloomcode: Analysis Standard 1: AACSB || Technology 71) If a company is getting a lot of negative posts on its Wall, it is best to turn off features that let customers post comments without company approval. Answer: False Difficulty: Medium Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Analysis Standard 1: AACSB || Technology 72) Collaborative consumption services offer employees many benefits including higher pay, more paid vacation, and flexible hours. Answer: False Difficulty: Easy Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 73) Collaborative consumption services help establish a more sustainable global environment. Answer: True Difficulty: Easy Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 74) Banks use social capital to make lending decisions.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 9.4 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 75) A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user. Answer: True Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 76) Filter bubbles guarantee that you will see websites that widely disagree so you can come to an informed decision. Answer: False Difficulty: Medium Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Analysis Standard 1: AACSB || Technology 77) Group buying on websites like Airbnb helps consumers get special deals. Answer: False Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 78) Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 79) Social marketplaces are an example of C2C commerce. Answer: True Difficulty: Hard Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Synthesis Standard 1: AACSB || Technology 80) Viral marketing lends itself especially well to social networking. Answer: True Difficulty: Easy Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 81) Social computing generates faster and cheaper results than traditional focus groups. Answer: True Difficulty: Medium Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 82) Traditional focus groups foster closer customer relationships than social computing does.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Medium Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 83) Customers want to be heard and to know whether other customers agree with them, so retailers should allow customers to post reviews and ratings for the best social computing results. Answer: True Difficulty: Medium Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 84) Online reputations do not matter as much in the health care industry because insurance companies put limits on the available doctors. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 85) For healthcare providers, it is best to respond to negative reviews as soon as possible with detailed information so that readers can verify the accuracy of the response. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
86) One serious problem with patient reviews is that physicians often feel pressured to provide services that patients want, not necessarily what is medically needed. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Comprehension Standard 1: AACSB || Technology 87) Some reputation management firms actually seek out patients to provide positive online reviews. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 9.2 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Comprehension Standard 1: AACSB || Technology
88) Social computing empowers customers and enables them to become business advocates and influencers. Answer: True Difficulty: Easy Section Reference 1: 9.5 Learning Objective 1: Describe how social computing improves customer service. Bloomcode: Knowledge Standard 1: AACSB || Technology 86) Businesses must respond to customers more quickly and appropriately than they did prior to social computing. Answer: True Difficulty: Medium Section Reference 1: 9.5
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe how social computing improves customer service. Bloomcode: Analysis Standard 1: AACSB || Technology 87) Social computing improves customer service. Answer: True Difficulty: Easy Section Reference 1: 9.5 Learning Objective 1: Describe how social computing improves customer service. Bloomcode: Knowledge Standard 1: AACSB || Technology 88) Schneider Electric moved its business from Sprinklr to Salesforce because Salesforce was more flexible and allowed the company to quickly expand in India. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 89) Social networks are only useful for active job seekers. Answer: False Difficulty: Easy Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 90) You can create a profile on LinkedIn for free. Answer: True Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 91) LinkedIn’s main market is upper-level executives. Answer: False Difficulty: Easy Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 92) Any LinkedIn page is better than nothing. Answer: False Difficulty: Medium Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Analysis Standard 1: AACSB || Technology 93) It is possible to damage your own reputation on LinkedIn. Answer: True Difficulty: Medium Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Analysis Standard 1: AACSB || Technology 94) You shouldn’t put volunteer work on LinkedIn. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology 95) Users must have a Snapchat logon to use Snap Camera. Answer: False Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 96) Current Snapchat posts disappear after 10 seconds. Answer: False Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 97) Snapcash is a successful peer-to-peer payment competitor with Venmo and PayPal. Answer: False Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 98) Snapchat’s Specs is a Google Glass competitor.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Text Entry 99) ___ is a loose collection of information technologies and applications plus the websites that use them. Answer: Web 2.0 Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 100) A ___ is a personal website, open to the public, in which the site creator expresses his or her feelings or opinions through a series of chronological entries. Answer: weblog or blog Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 101) ___ refers to the number of connections a person has within and between social networks. Answer: Social capital Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 102) A(n) ___ is a website that takes different content from a number of other websites and mixes them together to create a new kind of content. Answer: mashup Difficulty: Easy Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Knowledge Standard 1: AACSB || Technology 103) ___ refers to the delivery of e-commerce activities and transactions through social computing. Answer: Social commerce Difficulty: Easy Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 104) ___ is an economic model based on sharing, swapping, trading, or renting products and services, enabling access over ownership. Answer: Collaborative consumption Difficulty: Easy Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Knowledge Standard 1: AACSB || Technology 105) ___ is a method of e-commerce that takes all of the key aspects of social networks and focuses them on shopping. Answer: Social shopping Difficulty: Easy Section Reference 1: 9.3
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 106) A ___ is a result of a search in which a website algorithm guesses what a user would like to see based on information about that user. Answer: filter bubble Difficulty: Medium Section Reference 1: 9.3 Learning Objective 1: Identify the methods used for shopping socially. Bloomcode: Knowledge Standard 1: AACSB || Technology 107) ___ refers to advertising formats that make use of the social context of the user viewing the ad. Answer: Social advertising Difficulty: Easy Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 108) The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as ___. Answer: social intelligence Difficulty: Easy Section Reference 1: 9.4 Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Knowledge Standard 1: AACSB || Technology 109) ___ is how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: Onboarding Difficulty: Medium Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Knowledge Standard 1: AACSB || Technology Question Type: Essay 110) List and describe the eight Web 2.0 information technology tools. Discuss one way businesses can use each tool (reminder: you should have eight examples). Answer: Difficulty: Medium Section Reference 1: 9.1 Learning Objective 1: Describe examples of Web 2.0 tools and major types of Web 2.0 sites. Bloomcode: Application Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Solution: 1) Tagging – keyword or term that describes a piece of information; examples (NOT IN BOOK) – using Google maps to help people find a business (e.g., having a picture of the storefront on Google) or finding local interests (e.g., a hotel may highlight local attractions to draw customers) 2) Really Simple Syndication (RSS) – allows you to receive the information you want, when you want it, without having to surf thousands of web sites; example – CNN.com allowing viewers to download the most current version of shows 3) Blogs – personal web site, open to the public, in which the site creator expresses his or her feelings or opinions via a series of chronological entries; example – listening to consumers or (NOT IN BOOK) encouraging consumers to “self-help” (e.g., customer experts help customer novices) 4) Microblogs – a form of blogging that allows users to write short messages and publish them; example – quickly share information with interested people, gather real-time market intelligence and customer feedback 5) Wikis – a website made up entirely of content posted by users; example – central repository for documents, tracking issues, resolving problems, maintaining project histories, collaborate with business partners 6) Social networking websites – allows convenient connections to those of similar interest; examples – companies managing their reputations on social networking sites, watching Banjo to watch for local trends (oil companies – stock traders) 7) Enterprise social networks – allowing employees, partners, and customers to talk on secured internal networks or via LinkedIn; examples – virtual teams, build a sense of community, work
Rainer, Information System, Fifth Canadian Edition
Testbank
remotely 8) Mashups – a website that takes different content from a number of other websites and mixes them together to create a new kind of content; example – Google Maps, Craigslist apartments 111) What benefits of social commerce do you currently enjoy? As someone about to enter the marketplace, how can social computing impact your future job prospects? How do businesses benefit from using social commerce? What risks do all businesses encounter in this social networking world? Answer: Difficulty: Medium Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology
Solution: Drawbacks: Social information is no longer anonymous Problems for governments and companies (e.g., social power to employees and customers and potential for additional competition from former employees) – they must be authentic, fair, transparent, humble, etc. (these are all benefits to customers/employees) Misuse and incorrect use can backfire (e.g., Kenneth Cole, American Apparel, CVS) Impact: Positive = use of sites like LinkedIn to build networks, get positive reviews from professors, and highlight key experiences (e.g., internships) Negative = posting inappropriate pictures on Facebook or other social media sites highlights
Rainer, Information System, Fifth Canadian Edition
Testbank
unprofessional behavior that a company would not want associated with them (e.g., illegal activity like underage drinking) Business risks: Negative posts (can’t ignore, can’t turn off but could be fake) 20–80 rule (only a minority are speaking) Information security Invasion of privacy Violation of IP Employees’ reluctance to participate Data leakage Poor or biased quality on content Cyberbullying 112) What is collaborative consumption? Describe three collaborative consumption models. Why is collaborative consumption so popular? What are some problems with collaborative consumption models? Do you engage in collaborative consumption (why or why not)? Answer: Difficulty: Medium Section Reference 1: 9.2 Learning Objective 1: Describe the benefits and risks of social commerce to companies. Bloomcode: Comprehension, Application Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Solution: an economic model based on sharing, swapping, trading, or renting products and services, enabling access over ownership; collaborative production = give back power so others can use it, crowdfunding = funding a project by raising money from lots of people, peer-to-peer lending = lending money to unrelated individuals without using a traditional financial institution; popular = we are used to trading, enticing career (self-management, variety, flexibility, provides lots of options for part-timers, retired people, etc.), allows use of underused assets or make money while driving where already going, good for the environment; problems = not allowed in many cities, workers don’t get benefits (lower pay, healthcare issues, may not have enough work) 113) Organizations argue that social marketing is acceptable since customers are providing their feedback or opinions willingly online. Do you think it is ethical for companies like Facebook, Google, and Banjo to sell information they collect (why or why not)? Answer: Difficulty: Medium Section Reference 1: 9.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Discuss innovative ways to use social networking sites for advertising and market research. Bloomcode: Application, Analysis, Evaluation Standard 1: AACSB || Communication Standard 2 : AACSB || Ethics Standard 3 : AACSB || Technology Standard 4 : AACSB || Reflective Thinking Solution: we benefit from highly targeted advertising (we have free access to sites and usually get information that meets our needs) but we lose privacy (these companies know an excessive amount about us – will that be used simply for our good or be used against us; filter bubbles are a problem) 114) Given the tips in the book, what is your strategy for using LinkedIn? Why do you think it is important to focus on these particular things? Answer: Difficulty: Medium Section Reference 1: 9.6 Learning Objective 1: Discuss different ways in which human resource managers make use of social computing. Bloomcode: Comprehension, Application Standard 1: AACSB || Technology Solution: Have a current, professional picture Keep your status correct and current Join groups in your field and for your personal interests List an accurate skill set Don’t use the standard connection request Don’t neglect your privacy settings Don’t skip the Summary Don’t eliminate past jobs of volunteer work Don’t say you have worked with someone when you haven’t
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 10, Testbank Course Title: Rainer, IS 5e Chapter Number: 10 Question type: Multiple Choice 1) Capstone wanted to establish a reliable IT platform in the newly acquired mine that enables it to_______________ a) implement a middleware that would allow the company to integrate with Oracle’s ERP. b) eliminate information silos in different departments.. c) allow silos to integrate with internet based systems. . d) to implement an MRP system. . Answer: b Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Comprehension Standard 1 : AACSB || Technology 2) Capstone Mining selected _________ for it’s ERP package.___________. a) SAP Business All in One’s mining solution. b) Oracle’s ERP c) Microsoft Dynamics d) Netsuite Answer: a Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 3) Which of the following statements is not true? a) IS plays a critical role in both small and large organizations. b) IS systems are intended to support internal processes. c) In order to be effective IS systems need to be owned by the organization itself. d) Understanding IS within your organization will help increase your productivity.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: c Difficulty: Easy Section Reference 1: Introduction Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 4) A transaction is any business event that generates ________ worthy of being captured and stored in a database. a) data b) information c) knowledge d) wisdom Answer: a Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 5) A(n) ________ supports the monitoring, collecting, storage, and processing of data from the organization’s basic business transactions, each of which generates data. a) CRM b) ERP c) SCM d) TPS Answer: d Difficulty: Easy Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 6) A(n) ________ is typically used to manage inventory.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) CRM b) ERP c) SCM d) TPS Answer: d Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Comprehension Standard 1 : AACSB || Technology 7) A TPS supports the monitoring, collecting, storage, and processing of ________ from the organization’s basic business transactions. a) data b) information c) knowledge d) wisdom Answer: a Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge, Synthesis Standard 1 : AACSB || Technology 8) If your organization collects transactions and processes them at night, this is called _________. a) batch processing b) OLAP c) OLTP d) source data processing Answer: a Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Application
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Technology 9) Most organizations design TPS to process transactions as soon as they occur. This is called _________. a) batch processing b) OLAP c) OLTP d) source data processing Answer: c Difficulty: Easy Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 10) ________ are inputs for _________. a) ES; FAIS b) DSS; TPS c) FAIS; TPS d) TPS; FAIS Answer: d Difficulty: Easy Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 11) Each department or functional area within an organization has its own collection of application programs or _________. a) CRM b) DSS c) FAIS d) TPS Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 12) The ________ function is responsible for managing the organization’s supply chain. a) accounting and financial b) HR c) marketing d) POM Answer: d Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 13) ________ eliminates the need for the company to submit purchasing orders. a) CRM b) FAIS c) TPS d) VMI Answer: d Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 14) ________ is the correct evolution of POM planning. a) ERP à ARP à MRP b) ERP à MRP à MRP II
Rainer, Information System, Fifth Canadian Edition
Testbank
c) MRP à ARP à ERP d) MRP à MRP II à ERP Answer: d Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 15) MRP is an earlier evolution of _________. a) CRM b) ERP c) FAIS d) SCM Answer: b Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 16) The planning process that integrates production, purchasing, and inventory management of interdependent items is called _________. a) ERP b) MRP c) MRP II d) SCM Answer: b Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
17) ________ is a more complex, integrated software that can handle money and labor in addition to production, purchasing, and inventory management planning. a) MRP b) MRP II c) SCM d) TPS Answer: b Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 18) ________ is an approach that integrates various automated factory systems. a) CIM b) CRM c) MRP d) TPS Answer: a Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 19) ________ is a business strategy that enables manufacturers to share product-related data that support product design and development and supply chain operations. a) CIM b) MRP c) PLM d) TPS Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 20) ________ reports are produced at scheduled intervals. a) Ad hoc b) Exception c) On-demand d) Routine Answer: d Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 21) As the CEO of Widget Inc., you get a monthly report on the percentage of orders going through e-commerce. This is a(n) ________ report. a) ad hoc b) exception c) on-demand d) routine Answer: d Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Application Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
22) Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report. a) ad hoc b) drill-down c) exception d) routine Answer: a Difficulty: Hard Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Evaluation Standard 1 : AACSB || Technology 23) Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report. a) comparative b) drill-down c) exception d) routine Answer: a Difficulty: Hard Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Evaluation Standard 1 : AACSB || Technology 24) A(n) ________ report displays a greater level of detail. a) ad hoc b) comparative c) drill-down d) key indicator Answer: c
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 25) A(n) ________ report summarizes the performance of critical activities. a) ad hoc b) comparative c) drill-down d) key indicator Answer: d Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 26) You get a sales report every month to show the products sold from each state. You notice the sales from California are down from last month, so you click on the state to get more detailed information on each sales person. You notice one salesperson sold 10% of what he did the previous year. This is an example of a(n) ________ report. a) ad hoc b) collaborative c) drill-down d) key factor Answer: c Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Application Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
27) ________ are designed to correct a lack of communication among _________. a) ERP; FAIS b) ERP; TPS c) FAIS; ERP d) FAIS; TPS Answer: a Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 28) ________ systems are an evolution for FAIS. a) CRM b) DSS c) ERP d) TPS Answer: c Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 29) The leading ERP software vendor is _________. a) Apple b) IBM c) Microsoft d) SAP Answer: d Difficulty: Medium Section Reference 1: 10.3
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 30) ________ is NOT an ERP software vendor. a) IBM b) PeopleSoft c) Oracle d) SAP Answer: a Difficulty: Medium Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 31) ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________. a) ERP I b) ERP II c) ERP III d) ERP IV Answer: b Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 32) ________ systems are interorganizational ERP systems that provide web-enabled links among a company’s key business systems and its customers, suppliers, distributors, and other relevant parties. a) ERP I
Rainer, Information System, Fifth Canadian Edition
Testbank
b) ERP II c) ERP III d) ERP IV Answer: b Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 33) ________ is a benefit of ERP. a) Complexity b) Cost c) Employee adoption d) Flexibility Answer: d Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 34) ________ is a disadvantage of ERP. a) Cost b) Decision support c) Efficiency d) Flexibility Answer: a Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
35) ________ is an extended ERP module. a) Customer relationship management b) Financial management c) HR management d) Operations management Answer: a Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 36) ________ is an extended ERP module. a) Financial management b) HR management c) Operations management d) Supply chain management Answer: d Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 37) ________ is an extended ERP module. a) Business intelligence b) Financial management c) HR management d) Operations management Answer: a Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 38) ________ is an extended ERP module. a) E-business b) Financial management c) HR management d) Operations management Answer: a Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 39) With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package’s built-in configuration options. a) as-is b) best-of-breed c) custom d) vanilla Answer: d Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 40) With the ________ approach to on-premise ERP implementation, a company develops new ERP functions designed specifically for that firm. a) as-is
Rainer, Information System, Fifth Canadian Edition
Testbank
b) best-of-breed c) custom d) vanilla Answer: c Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 41) You decide to change your business processes in order to implement SAP without making any changes to it. This is an example of the ________ approach to ERP implementation. a) as-is b) best-of-breed c) custom d) vanilla Answer: d Difficulty: Medium Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Application Standard 1 : AACSB || Technology 42) You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation. a) as-is b) best-of-breed c) custom d) vanilla Answer: b Difficulty: Medium Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Application Standard 1 : AACSB || Technology 43) You want to implement an ERP system, but you do not want to buy something from SAP or Oracle. Since you are building an ERP system from scratch, this is called a(n) ________ approach to ERP implementation. a) as-is b) best-of-breed c) custom d) vanilla Answer: c Difficulty: Medium Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Application Standard 1 : AACSB || Technology 44) ________ is a cloud-based ERP system. a) EaaS b) IaaS c) PaaS d) SaaS Answer: d Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 45) If you want to implement an ERP system but cannot afford to make large investments in IT, ________ ERP is a good solution. a) best-of-breed b) custom c) SaaS
Rainer, Information System, Fifth Canadian Edition
Testbank
d) vanilla Answer: c Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 46) Organizations typically invest in cloud-based ERP systems because they are _________. a) less error-prone b) less expensive c) more accessible d) more secure Answer: b Difficulty: Medium Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 47) ________ is a disadvantage of cloud-based ERP systems. a) Access b) Control c) Cost d) Scalability Answer: b Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
48) ________ is an advantage of cloud-based ERP systems. a) Access b) Control c) Recovery d) Security Answer: a Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 49) ________ is an advantage of cloud-based ERP systems. a) Control b) Cost c) Recovery d) Security Answer: b Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 50) ________ is an advantage of cloud-based ERP systems. a) Control b) Recovery c) Scalability d) Security Answer: c Difficulty: Easy Section Reference 1: 10.3
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 51) Which of the following statements regarding Three Square Market’s microchip pilot program is NOT true? a) The embedded chip provides access to the company’s information systems eliminating the need for a password. . b) The embedded chip provides physical access to the company. c) The microchip program is required for all employees. d) The company sells the microchip on their website. Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 10.1 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. . Bloomcode: Knowledge Standard 1 : AACSB || Technology 52) Which of the following statements regarding the SAP Hana product implemented by UnderArmour is NOT true?. a) The program can run across platforms and devices. b) The program provides real-time results. c) The program allows legacy silos to remain intact. d) All of the statements are true. Answer: d Difficulty: Easy Section Reference 1: IT’s About Business 10.2 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 53) __________ is a term that refers to techniques and methods for preparing and supporting individuals and teams throughout an organizational transition.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Computer-integrated manufacturing b) Batch processing c) Change management d) Enterprise resource planning Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 10.2 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 54) The ________ process originates in the warehouse department and ends in the accounting department. a) fulfillment b) marketing c) procurement d) production Answer: c Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 55) The ________ process originates in the sales department and ends in the accounting department. a) fulfillment b) marketing c) procurement d) production Answer: a Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1 : AACSB || Technology 56) The ________ process originates in the warehouse department and ends in the warehouse department. a) fulfillment b) marketing c) procurement d) production Answer: d Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 57) The procurement process originates in the ________ department and ends in the ________ department. a) accounting; sales b) sales; accounting c) warehouse; accounting d) warehouse; warehouse Answer: c Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 58) The fulfillment process originates in the ________ department and ends in the ________ department. a) accounting; sales b) sales; accounting c) warehouse; accounting d) warehouse; warehouse
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: b Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 59) The production process originates in the ________ department and ends in the ________ department. a) accounting; sales b) sales; accounting c) warehouse; accounting d) warehouse; warehouse Answer: d Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 60) ________ is part of the ________ process and involves sending goods that are in the warehouse to customers. a) configure-to-order; fulfillment b) configure-to-order; procurement c) sell-from-stock; fulfillment d) sell-from-stock; procurement Answer: c Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 61) ________ is part of the ________ process and involves customizing the product in response to a customer request.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Configure-to-order; fulfillment b) Configure-to-order; procurement c) Sell-from-stock; fulfillment d) Sell-from-stock; procurement Answer: a Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 62) ________ is part of the ________ process and occurs when the company is trying to increase its inventory. a) Make-to-order; procurement b) Make-to-order; production c) Make-to-stock; procurement d) Make-to-stock; production Answer: d Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 63) ________ is part of the ________ process and occurs when the company is trying to fulfill a specific customer order. a) Make-to-order; fulfillment b) Make-to-order; production c) Make-to-stock; fulfillment d) Make-to-stock; production Answer: b Difficulty: Medium Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
64) Which of the following is NOT an interorganizational system? a) CRM b) ERP c) SCM d) TPS Answer: d Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 65) Systems that manage processes originating in one company and concluding in another company are called ________ systems. a) exterorganizational b) extraorganizational c) interorganizational d) intraorganizational Answer: c Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 66) CRM systems are ________ systems. a) exterorganizational b) extraorganizational c) interorganizational d) intraorganizational Answer: c Difficulty: Easy Section Reference 1: 10.4
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 67) SCM systems are ________ systems. a) exterorganizational b) extraorganizational c) interorganizational d) intraorganizational Answer: c Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 68) TouchBistro is a provider of ___________ Toronto a) iPad point-of-sale (POS) and RFID equipment b) RFID equipment and payments solutions c) iPad point-of-sale (POS) and E-commerce solutions d) iPad point-of-sale (POS) and payments solutions Answer: d Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Analysis Standard 1 : AACSB || Technology 69) TouchBistro integrates with all the systems below EXCEPT a) multiple EMV (Europay, Mastercard,Visa) devices b) Western Union payments c) merchant accounts d) digital wallets Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology Question type: True/False 70) As its ERP package, Capstone Mining selected SAP Business All in One’s mining solution Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 71) TPSs are critical to the success of any enterprise. Answer: True Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 72) TPSs collect data continuously, typically in real time. Answer: True Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 73) TPSs have to efficiently handle both high volumes of data and large variations in those volumes.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 74) Only one person can update a TPS at a time. Answer: False Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 75) TPSs are not helpful for performing audits. Answer: False Difficulty: Hard Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Comprehension, Evaluation Standard 1 : AACSB || Technology 76) TPSs are inputs for FAIS. Answer: True Difficulty: Easy Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 77) Ad hoc reports are also called on-call reports. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 78) HR relies primarily on CIM systems. Answer: False Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 79) ERP is an earlier evolution of MRP. Answer: False Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 80) PLM is a POM function. Answer: True Difficulty: Hard Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 81) ERP helps get rid of information silos caused by FAIS.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 82) An FAIS helps get rid of information silos caused by ERP. Answer: False Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 83) The major objectives of ERP systems are to tightly integrate the functional areas of the organization and to enable information to flow seamlessly across them. Answer: True Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 84) Financial, HR, and operations management are the core ERP modules. Answer: True Difficulty: Medium Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
85) Organizations can use SaaS to acquire cloud-based ERP systems. Answer: True Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 86) EAI systems are only useful if you don’t have ERP implemented. Answer: False Difficulty: Hard Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Evaluation Standard 1 : AACSB || Technology 87) EAI systems help address issues caused by isolated information systems. Answer: True Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 88) Three Square Market employees suffered physical effects from the microchip insertion. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 10.1 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Technology 89) There are many laws protecting employee privacy in the workplace and as a result, Three Square Market employees had no privacy concerns with regard to microchip implantation. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 10.1 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 90) The production process must occur for any company to incorporate. Answer: False Difficulty: Hard Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Evaluation Standard 1 : AACSB || Technology 91) Retailers are the prime example of companies involved in the production process. Answer: False Difficulty: Hard Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Evaluation Standard 1 : AACSB || Technology 92) An ERP system can be interorganizational. Answer: True Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1 : AACSB || Technology 93) TouchBistro helps restaurant managers with staff scheduling, payroll, online ordering, and reservations. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Comprehension Standard 1 : AACSB || Technology Question type: Text Entry 94) A(n) ___ is any business event that generates data worthy of being captured and stored in a database. Answer: transaction Difficulty: Easy Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 95) TPSs are critical to the success of any enterprise because they ___. Answer: support core operations Difficulty: Hard Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 96) Organizations try to automate the TPS data entry as much as possible because of the large volume involved, a process called ___. Answer: source data automation
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 97) ___ is an approach that integrates various automated factory systems. Answer: computer-integrated manufacturing or CIM or digital manufacturing Difficulty: Easy Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Knowledge Standard 1 : AACSB || Technology 98) ___ are designed to correct a lack of communication among the FAIS. Answer: Enterprise Resource Planning (ERP) systems Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 99) ERP II systems are ___ ERP systems that provide web-enabled links among a company’s key business systems and its customers, suppliers, distributors, and other relevant parties. Answer: interorganizational Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 100) A(n) ___ integrates existing systems by providing software that connects multiple applications.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: enterprise application integration (EAI) system Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 101) An EAI system integrates existing systems by providing software, called ___, that connects multiple applications. Answer: middleware Difficulty: Easy Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Knowledge Standard 1 : AACSB || Technology 102) The ___ process originates when a company needs to acquire goods or services from external sources, and it concludes when the company receives and pays for them. Answer: procurement Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology 103) In the ___ process, the company sells goods to a customer. Answer: order fulfillment or fulfillment Difficulty: Easy Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Knowledge Standard 1 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
Question type: Essay 104) Why are TPSs so critical to the success of any enterprise? What must TPSs do to work properly and successfully? How do you think a company like Walmart uses a TPS? Answer: Difficulty: Medium Section Reference 1: 10.1 Learning Objective 1: Explain the purpose of transaction processing systems. Bloomcode: Comprehension, Application Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: They provide the inputs to other systems (they are the foundational system = support core operations) Goals: Efficiently handle high volumes of data Efficiently handle large variations in volumes (peak times like Black Friday) Avoid errors and downtime Record results accurately and securely Maintain privacy and security Dependability, reliability, processing capacity Bookstore: Bar code scanner to complete check-out process à manage inventory 105) What business area are you most interested in for a future career? Discuss the financial systems available in this functional area (from the textbook). Finally, go beyond what is in the textbook and look up some real-world applications that are currently available; discuss why you would or would not like to use one of these applications. Answer: Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Comprehension, Application Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: Accounting and finance: financial planning and budgeting, managing financial transactions, investment management, control and auditing
Rainer, Information System, Fifth Canadian Edition
Testbank
Marketing: CRM Production/OM: in-house logistics and materials management, inventory management, quality control, planning production and operations (MRP, MRP II, CRM), CIM, product life cycle management, SCM HR: recruitment, HR development, HR planning and management 106) List and describe the six types of reports. Provide an example of how you could use each report as a manager. Answer: Difficulty: Medium Section Reference 1: 10.2 Learning Objective 1: Explain the types of support that information systems can provide for each functional area of the organization. Bloomcode: Comprehension, Application Standard 1 : AACSB || Communication Standard 2 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking Solution: Routine – produced at scheduled intervals; see monthly sales reports Ad hoc (on-demand reports) – out-of-the-routine; you may ask for a sales report in the middle of the month if you have a scandal (any time you would need a special report) Drill-down – display a greater level of detail; sales report every month for each region but should be able to click on it to see each individual sales person Key indicator – summarize the performance of critical activities; get a report as a CEO with profit, sales, operations, etc. Comparative – compare different business units; get a report to compare different regions Exception – only information that falls outside thresholds; want to see if products don’t meet the quality standards at certain times or from certain regions 107) How do ERP systems build upon and/or improve TPSs and FAISs? Why do businesses want to implement ERP? Why is it so difficult to implement ERP successfully? List and briefly describe five real-world ERP failures. Answer: Difficulty: Medium Section Reference 1: 10.3 Learning Objective 1: Identify advantages and drawbacks to businesses implementing an enterprise resource planning system. Bloomcode: Comprehension, Application Standard 1 : AACSB || Communication Standard 2 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking
Rainer, Information System, Fifth Canadian Edition
Testbank
Solution: Systems: TPS = provide data for the core database of ERP; basically, an advanced TPS FAIS = address information silos by integrating and allow seamless flow of information between them Implement: Organizational flexibility and agility Decision support Quality and efficiency Difficulties: Changing existing business processes (time-consuming, resistance, could lose competitive advantage) Complex, expensive, and time consuming to implement Failure to involve affected employees in the planning and development phases and in change management processes Trying to accomplish too much too fast in the conversion process Insufficient training in the new work tasks required by the ERP system The failure to perform proper data conversion and testing for the new system ERP failures: http://blog.datixinc.com/blog/erp-failure-stories http://www.cio.com/article/2429865/enterprise-resource-planning/enterprise-resource-planning10-famous-erp-disasters-dustups-and-disappointments.html https://www.linkedin.com/pulse/erp-failures-expensive-here-six-have-been-published-davidricketts http://www.zdnet.com/article/erp-train-wrecks-failures-and-lawsuits/ http://www.360cloudsolutions.com/top-six-erp-implementation-failures/ 108) List and describe the three cross-departmental processes common to most companies. How could an organization use an ERP system to manage these processes? Would it be better for an organization to use a cloud-based ERP system (why or why not)? Answer: Difficulty: Medium Section Reference 1: 10.4 Learning Objective 1: Describe the three main business processes supported by ERP systems. Bloomcode: Comprehension, Analysis Standard 1 : AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: Procurement = purchasing products or raw materials; so starts in warehouse (need to buy) and ends in accounting (send payment) Fulfillment = fulfilling customer orders; so starts in sales department (customer request to buy) and ends in accounting (receive payment) – could sell-from-stock or configure-to-order Production = creating products; so starts and ends in warehouse and also includes production department to make the product (could make-to-stock or make-to-order)
Rainer, Information System, Fifth Canadian Edition
Testbank
ERP = track every step in the process in a centralized location instead of having information silos in FAIS where orders have to be re-entered at every step of the process Cloud-based: Advantages: Used from any location with Internet access Avoid the initial hardware and software expenses Scalable Disadvantages: Security Loss of control of strategic IT resources Loss of control over slow or non-working systems
Rainer, Information System, Fifth Canadian Edition
Testbank
Package Title: Chapter 11, Testbank Course Title: Rainer, IS 5e Chapter Number: 11 Question Type: Multiple Choice 1) Tesco implemented a new _______ system to address their business needs. a) CRM b) ERP c) RFID d) SCM Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 2) Tesco primarily had a problem with __________. a) checkout flow b) customer acquisition c) product display d) shipping products Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 3) What challenge did Tesco face when they were searching for a CRM solution? a) For many years, the company had been adding and updating their systems to support its website, resulting in redundancies and inconsistencies.
Rainer, Information System, Fifth Canadian Edition
Testbank
b) Since Tesco had been adding more services to its online presence, they had a minimal budget to implement structural strategies/changes. c) Tesco’s platforms were not advanced enough to support a CRM solution so it to start entirely from scratch and lost much of its historical data. d) Each of Tesco’s various silos required unique CRM solutions and the company was unable to find one solution that was applicable and implementable to all. Answer: A Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Analysis Standard 1: AACSB || Technology 4) ________ systems are important because customers are ________ powerful than ever; these systems put the intimacy back into customer service. a) CRM; less b) CRM; more c) SCM; less d) SCM; more Answer: b Difficulty: Easy Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 5) Businesses use customer ________ to create highly individualized offers that customers are more likely to accept. a) customization b) intimacy c) personalization d) virality Answer: b Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 6) The optimal result of the organization’s CRM efforts is to ________ the number of high-value repeat customers while ________ customer churn. a) maximize; maximizing b) maximize; minimizing c) minimize; maximizing d) minimize; minimizing Answer: b Difficulty: Easy Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 7) ________ is the customer’s potential revenue stream over a number of years. a) Customer churn b) Customer life cycle c) Lifetime value d) Market capitalization Answer: c Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 8) ________ is the loss of a certain percentage of customers over time. a) Customer churn b) Customer life cycle
Rainer, Information System, Fifth Canadian Edition
Testbank
c) Lifetime value d) Market capitalization Answer: a Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 9) ________ is the number of shares of the company’s stock outstanding multiplied by the price per share of the stock. a) Customer churn b) Customer life cycle c) Lifetime value d) Market capitalization Answer: d Difficulty: Easy Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 10) Amazon uses a _________-end CRM system because it ________. a) low; coordinates staff activities in a campaign to sell its products b) low; recommends products to returning customers c) high; coordinates staff activities in a campaign to sell its products d) high; recommends products to returning customers Answer: b Difficulty: Hard Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Application, Synthesis Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
11) Boeing uses a _________-end CRM system because it ________. a) low; coordinates staff activities in a campaign to sell its products b) low; recommends products to returning customers c) high; coordinates staff activities in a campaign to sell its products d) high; recommends products to returning customers Answer: c Difficulty: Hard Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Application, Synthesis Standard 1: AACSB || Technology 12) Indochino Inc., a menswear retailer is as an online business where customers ___________ . a) Compare prices for multiple online stores b) Can get a discount for a set of online stores c) Find the cheapest clothes on the internet according to customer’s needs d) Could take their measurements, select their fabric, and personalize their garment on the website Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 13) Indochino strives to make its customers’ journeys high-touch through ______________. a) Omni-channelling b) Showrooming c) Bargaining d) Product displaying Answer: A
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: IT’s About Business 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 14) Indochino is planning to add text messaging to its touch points with customers. The text messages will mainly be used for all the reasons below EXCEPT______ a) confirm appointments. b) send reminders. c) send discount coupons. d) update customers about the status of their delivery. Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Application Standard 1: AACSB || Technology 15) Because the need to have a centralized data about customers and internal processes, Indochino in 2016 decided to adopt _________. a) Netsuite. b) Oracle’s database. c) SAP all in one. d) Salesforce. Answer: D Difficulty: Medium Section Reference 1: IT’s About Business 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Analysis Standard 1: AACSB || Technology 16) Operational CRM systems support __________-office business processes. a) back
Rainer, Information System, Fifth Canadian Edition
Testbank
b) east c) front d) west Answer: c Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 17) Operational CRM systems support _________-office business processes or processes that _________. a) back; directly interact with customers b) back; do not directly interact with customers c) front; directly interact with customers d) front; do not directly interact with customers Answer: c Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 18) ________ is a customer-facing CRM application. a) E-mail b) FAQ c) Search d) SFA Answer: d Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 19) ________ are/is a customer-touching CRM application. a) CMAs b) CIC c) FAQs d) SFA Answer: c Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 20) ________ is a CRM operation in which organizational representatives use multiple channels to communicate with customers. a) CIC b) CMA c) JIT d) SFA Answer: a Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) A call center is a _________. a) CIC b) CMA c) JIT d) SFA Answer: a
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 22) ________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. a) CIC b) CMA c) JIT d) SFA Answer: d Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 23) A ________ system tracks all communications between the company and the customer, the purpose of each communication, and any necessary follow-up. a) contact management b) product knowledge c) sales forecasting d) sales lead tracking Answer: a Difficulty: Medium Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
24) A _________ system lists potential customers or customers who have purchased related products; that is, products similar to those that the salesperson is trying to sell to the customer. a) contact management b) product knowledge c) sales forecasting d) sales lead tracking Answer: d Difficulty: Medium Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 25) A ________ system is a mathematical technique for estimating future sales. a) contact management b) product knowledge c) sales forecasting d) sales lead tracking Answer: c Difficulty: Medium Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 26) A ________ system is a comprehensive source of information regarding products and services. a) contact management b) product knowledge c) sales forecasting d) sales lead tracking Answer: b Difficulty: Medium
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 27) ________ is the marketing of additional related products to customers based on a previous purchase. a) Bundling b) Cross-selling c) Downselling d) Upselling Answer: b Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 28) ________ is a strategy in which the salesperson provides customers with the opportunity to purchase related products or services of greater value in place of, or along with, the consumer’s initial product or service selection. a) Bundling b) Cross-selling c) Downselling d) Upselling Answer: d Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) ________ is when a business sells a group of products or services together at a lower price than their combined individual prices.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Bundling b) Cross-selling c) Downselling d) Upselling Answer: a Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 30) Amazon’s recommender system is an example of ________. a) bundling b) cross-selling c) downselling d) upselling Answer: b Difficulty: Hard Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Evaluation Standard 1: AACSB || Technology 31) Your cable company sells you package deal with internet, phone, and TV. This is an example of __________. a) bundling b) cross-selling c) downselling d) upselling Answer: a Difficulty: Medium Section Reference 1: 11.2
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Application Standard 1: AACSB || Technology 32) You want to buy a 65” TV, but a sales representative talks you into the 70” TV because it is only a little more expensive and will still fit nicely into that spot on your wall. This is an example of ________. a) bundling b) cross-selling c) downselling d) upselling Answer: d Difficulty: Medium Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Application Standard 1: AACSB || Technology 33) Analytical CRM systems provide ________ by analyzing customer behavior and perceptions. a) BI b) CIC c) ERP d) SFA Answer: a Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 34) ________ is an analytical CRM technology. a) CMA
Rainer, Information System, Fifth Canadian Edition
Testbank
b) OLAP c) OLTP d) SFA Answer: b Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 35) ________ is NOT an important technology in analytical CRM systems. a) BI b) Campaign management c) Data mining d) OLAP Answer: b Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 36) In 2014, Sun Life embarked on a long-term sales transformation initiative. As part of this program, the company deployed the. a) Sales Cloud CRM b) Sales Cloud ERP c) Customer Cloud CRM d) Customer Cloud ERP Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 11.2 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 37) Sun Life sales representatives use the _______ to analyze data about advisors and also share information with teams working in the wealth and insurance fields. a) CRM b) ERP c) SCM d) AI Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 11.2 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 38) Which is NOT an added functionality to the CRM of Sunlife ? a) dynamic dashboards b) showing visual representations of sales performance c) showing visual representations of opportunities. d) showing visual representations of competition performance. Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 11.2 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Comprehension Standard 1: AACSB || Technology 39) After Salesforce solutions were implemented at Sun Life, the company announced an expectation to___________..
Rainer, Information System, Fifth Canadian Edition
Testbank
a) to boost revenue growth in Sun Life’s Individual Insurance and Investments business unit by up to 10 percent over the next three years. b) to decrease cost in Sun Life’s Individual Insurance and Investments business unit by up to 10 percent over the next three years. c) to boost customer growth in Sun Life’s Individual Insurance and Investments business unit by up to 10 percent over the next three years. d) to boost profit growth in Sun Life’s Individual Insurance and Investments business unit by up to 10 percent over the next three years. Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 11.2 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Comprehension Standard 1: AACSB || Technology 40) Sales Cloud CRM with the Distribution and Marketing teams can assess _________.. a) the impact of key activities that each advisor engages in. b) the impact of sales on financial performance. c) the impact of budgets on advertising performance. d) the impact of investments on sales performance. Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 11.2 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Comprehension Standard 1: AACSB || Technology 41) Sun Life sales representatives use the CRM to ________. a) identify opportunities to down-sell and upsell. b) identify opportunities to cross-sell and upsell. c) identify opportunities to cross-sell and downsell . d) identify opportunities to down-sell and upsell . Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: IT’s About Business 112 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Comprehension Standard 1: AACSB || Technology 42) By running _________ and _______ side by side, Black Diamond was able to compare results and make an informed decision about which solution to implement. a) Salesforce Einstein; a third-party solution b) Salesforce Einstein; Salesforce Decider c) NFC; CRM d) Salesforce AI; Google Merchant Answer: a Difficulty: Easy Section Reference 1: IT’s About Business 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) A _____________ is a tool that uses mathematical algorithms to predict consumers’ likes and dislikes. a) third-party app b) recommendation engine c) cloud-based sales server d) analytic tool Answer: b Difficulty: Easy Section Reference 1: IT’s About Business 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
44) One of the reasons that Salesforce Einstein was selected by Black Diamond was ______. a) it decreased conversion rates b) it offered money-back guarantees c) it functioned in real time d) it was more customizable Answer: c Difficulty: Easy Section Reference 1: IT’s About Business 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 45) ____________ is/are analyzed to help Salesforce Einstein anticipate what products should be recommended to customers. a) Historical data b) Consumer demographics c) Industry trends d) Price matching Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 46) ________ CRM systems are purchased from a vendor and then installed on site. a) On-demand b) On-premise c) Mobile d) Social Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 47) You decide to purchase Oracle’s Netsuite CRM+ system. This is an example of a(n) ________ CRM system. a) on-demand b) on-premise c) mobile d) social Answer: b Difficulty: Medium Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Application Standard 1: AACSB || Technology 48) ________ CRM systems are hosted by an external vendor in the vendor’s data center. a) On-demand b) On-premise c) Mobile d) Social Answer: a Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
49) The concept of ________ is also known as utility computing or ________. a) on-demand; ERP b) on-demand; SaaS c) on-premise; ERP d) on-premise; SaaS Answer: b Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 50) ________ is the best-known on-demand CRM vendor. a) Microsoft b) Oracle c) Salesforce d) SAP Answer: c Difficulty: Medium Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Application Standard 1: AACSB || Technology 51) ________ CRM systems are interactive systems that enable organizations to conduct communications related to sales, marketing, and customer service activities through portable devices for the purpose of building and maintaining relationships with its customers. a) On-demand b) On-premise c) Open-source d) Mobile
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: c Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 52) It is really important that your customers are able to contact you anytime, anywhere, from any device. This suggests you should implement a(n) ________ CRM system. a) on-demand b) on-premise c) open-source d) mobile Answer: c Difficulty: Medium Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Application Standard 1: AACSB || Technology 53) ________ CRM systems have source code that is available to developers and users. a) On-demand b) On-premise c) Open-source d) Social Answer: c Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
54) Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system. a) mobile b) on-premise c) open-source d) social Answer: c Difficulty: Medium Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Application Standard 1: AACSB || Technology 55) ________ CRM systems use social media technology and services to enable organizations to engage their customers in a collaborative conversation in order to provide mutually beneficial value in a trusted and transparent manner. a) On-demand b) On-premise c) Open-source d) Social Answer: d Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 56) Morton’s Steakhouse utilized a(n) ________ CRM system to surprise a customer with a meal. a) mobile
Rainer, Information System, Fifth Canadian Edition
Testbank
b) open-source c) real-time d) social Answer: d Difficulty: Medium Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Application Standard 1: AACSB || Technology 57) Southwest Airlines utilized a(n) ________ CRM system to rearrange a customer’s flight schedule to get to her comatose son. a) mobile b) open-source c) real-time d) social Answer: c Difficulty: Medium Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Application Standard 1: AACSB || Technology 58) Which of the following does NOT help with managing supply chain information? a) CRM b) GPS c) RFID d) SCM Answer: a Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 59) Sourcing and procurement from external suppliers are ________ activities. a) downstream b) internal c) upstream d) irrelevant Answer: c Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 60) You purchase the raw metal, glass, and leather to manufacture your new car from various suppliers. You are conducting business ________. a) downstream b) internally c) upstream d) foolishly Answer: c Difficulty: Medium Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Application Standard 1: AACSB || Technology 61) Packing, assembly, or manufacturing are ________ activities. a) downstream b) internal c) upstream d) irrelevant Answer: b
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 62) You work on the assembly line of a BMW in South Carolina. This is a(n) ________ activity. a) downstream b) internal c) upstream d) irrelevant Answer: b Difficulty: Medium Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Application Standard 1: AACSB || Technology 63) Distribution is a(n) ________ activity. a) downstream b) internal c) upstream d) irrelevant Answer: a Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 64) You use FedEx and UPS to ship your products to customers. This is an example of a(n) ________ activity. a) downstream b) internal c) upstream d) irrelevant
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: a Difficulty: Medium Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Application Standard 1: AACSB || Technology 65) ________ flows are the physical products, raw materials, supplies, and so forth that flow along the chain. a) Financial b) Information c) Material d) Supply Answer: c Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 66) ________ flows consist of data related to demand, shipments, orders, returns, and schedules, as well as changes in any of these data. a) Financial b) Information c) Material d) Supply Answer: b Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 67) ________ flows involve money transfers, payments, credit card information and authorization, payment schedules, e-payments, and credit-related data.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Financial b) Information c) Material d) Supply Answer: a Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 68) Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM. a) deliver b) make c) plan d) return e) source Answer: c Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 69) In the ________ component of SCM, organizations choose suppliers to deliver the goods and services they need to create their product or service. a) deliver b) make c) plan d) return e) source Answer: e Difficulty: Easy
Rainer, Information System, Fifth Canadian Edition
Testbank
Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 70) In the ________ component of SCM, supply chain managers develop pricing, delivery, and payment processes with suppliers, and they create metrics to monitor and improve their relationships with their suppliers. a) deliver b) make c) plan d) return e) source Answer: e Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 71) In the ________ component of SCM, supply chain managers develop processes for managing their goods and services inventory. a) deliver b) make c) plan d) return e) source Answer: e Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 72) In the ________ component of SCM, supply chain managers schedule the activities necessary for production, testing, packaging, and preparation for delivery.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) deliver b) make c) plan d) return e) source Answer: b Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 73) The ________ component of SCM is the most metric-intensive part of the supply chain in which organizations measure quality levels, production output, and worker productivity. a) deliver b) make c) plan d) return e) source Answer: b Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 74) The ________ component of SCM is often referred to as logistics. a) deliver b) make c) plan d) return e) source Answer: a Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 75) In the ________ component of SCM, organizations coordinate the receipt of customer orders, develop a network of warehouses, select carriers to transport their products to their customers, and create an invoicing system to receive payments. a) deliver b) make c) plan d) return e) source Answer: a Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 76) In the ________ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products. a) deliver b) make c) plan d) return e) source Answer: d Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 77) The push model is also called ________ which means the production process begins with a ________. a) make-to-order; customer order
Rainer, Information System, Fifth Canadian Edition
Testbank
b) make-to-order; forecast c) make-to-stock; customer order d) make-to-stock; forecast Answer: d Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 78) The pull model is also called ________ which means the production process begins with a ________. a) make-to-order; customer order b) make-to-order; forecast c) make-to-stock; customer order d) make-to-stock; forecast Answer: a Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 79) The pull model is also known as ________ which is closely aligned with mass ________. a) make-to-order; customization b) make-to-order; production c) make-to-stock; customization d) make-to-stock; production Answer: a Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
80) ________ refers to erratic shifts in orders up and down the supply chain. a) JIT b) The bullwhip effect c) Vertical integration d) VMI Answer: b Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 81) Stockpiling is most likely to occur with ________. a) ERP b) the bullwhip effect c) vertical integration d) VMI Answer: b Difficulty: Medium Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 82) ________ is a business strategy in which a company purchases its upstream suppliers to ensure that its essential supplies are available as soon as the company needs them. a) JIT b) The bullwhip effect c) Vertical integration d) VMI Answer: c Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 83) ________ is a business strategy in which a company purchases its ________ suppliers to ensure that its essential supplies are available as soon as the company needs them. a) Vertical integration; downstream b) Vertical integration; upstream c) VMI; downstream d) VMI; upstream Answer: b Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 84) ________ delivers the precise number of parts to be assembled into a finished product at precisely the right time. a) JIT b) The bullwhip effect c) Vertical integration d) VMI Answer: a Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 85) ________ occurs when the supplier, rather than the retailer, manages the entire inventory process for a particular product or group of products. a) JIT b) The bullwhip effect c) Vertical integration d) VMI Answer: d
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 86) The Walmart and P&G relationship is an example of ________. a) JIT b) the bullwhip effect c) vertical integration d) VMI Answer: d Difficulty: Medium Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Application Standard 1: AACSB || Technology 87) Zara’s fast fashion business model requires; this makes ____critical to their success. a) CRM b) ERP c) RFID d) SCM Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 11.4 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 88) Zara produces relatively few items of a given design to create a perceived scarcity of these designs called short ______. a) production runs b) production time c) turnaround runs
Rainer, Information System, Fifth Canadian Edition
Testbank
d) turnaround time Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 11.4 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 89) _________ is a communication standard that enables business partners to exchange routine documents electronically. a) EDI b) ERP c) JIT d) VMI Answer: a Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 90) EDI increases _________. a) cycle time b) data entry errors c) message length d) productivity Answer: d Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
91) EDI decreases _________. a) customer service b) message length c) productivity d) security Answer: b Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 92) ________ is a disadvantage of EDI. a) Message length b) Productivity c) Security d) The number of standards Answer: d Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 93) ________ link(s) business partners over ________ by providing them access to certain areas of each other’s corporate ________. a) Extranets; the Internet; intranets b) Intranets; extranets; the internet c) The Internet; extranets; intranets d) The Internet; intranets; extranets Answer: a Difficulty: Easy Section Reference 1: 11.6
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 94) Extranets use ________ technology to make communication over the internet more secure. a) JIT b) RFID c) VMI d) VPN Answer: d Difficulty: Medium Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 95) ANXeBusiness is an example of ________. a) a portal and exchange b) an extranet for a company and its dealers, customers, or suppliers c) an industry’s extranet d) joint ventures and other business partnerships Answer: c Difficulty: Medium Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Application Standard 1: AACSB || Technology 96) Flexe is the _______ of warehousing. a) Airbnb b) Amazon c) Google d) Twitter
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 97) Flexe helps start-ups and small businesses compete with ____ more effectively. a) Amazon b) Facebook c) Google d) Walmart Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 98) Which is NOT a reason that Flexe provides such a valuable service to smaller companies? a) Flexe applies the companies’ own branding to boxes b) Flexe offers overnight ground service to nearly all of the U.S. c) Flexe has to ability to help expand holiday pop-up stores beyond their temporary locations d) Flexe offers CRM solutions that can reroute customers from Amazon.com to competitor websites Answer: D Difficulty: Medium Section Reference 1: IT’s About Business 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Application Standard 1: AACSB || Technology 99) ________ is critical to Amazon’s success. a) ERP
Rainer, Information System, Fifth Canadian Edition
Testbank
b) JIT c) SCM d) VMI Answer: c Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 100) Amazon uses a(n) ________ SCM system. a) mobile b) open-source c) proprietary, on-premise d) social Answer: c Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 101) Which of the following is NOT a change Amazon made after the 2013 holiday season? a) Adding more sorting centers b) Getting the USPS to delivery on Sundays c) Updating its SCM system d) Utilizing Amazon-dedicated trucks offered by UPS Answer: d Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 102) Amazon is trying to expand into ________.
Rainer, Information System, Fifth Canadian Edition
Testbank
a) Africa b) China c) Europe d) Russia Answer: b Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: True/False 103) Indochino Inc. is the world’s largest custom suit maker an online business where customers could take their measurements, select their fabric, and personalize their garment on the website. . Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Identify the primary functions of both customer and relationship management (CRM) and collaborative CRM strategies. Learning Objective 2: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Analysis Standard 1: AACSB || Technology 104) The seamless and personal customers’ experience of Indochino would not have been possible without having centralized data about customers and internal processes. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Comprehension Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
105) CRM is not a process or technology but rather a customer-centric way of thinking and acting. Answer: True Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 106) Repeat customers are the largest generator of revenue for an enterprise. Answer: True Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 107) Winning back a customer who has switched to a competitor is vastly more expensive than keeping that customer satisfied in the first place. Answer: True Difficulty: Easy Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 108) The fundamental concept of CRM is to treat different customers differently because their needs differ and their value to the company may also differ. Answer: True Difficulty: Easy Section Reference 1: 11.1
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 109) Low-end CRM systems are designed for companies like Boeing because they only have a few, large customers. Answer: False Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 110) High-end CRM systems are designed for companies like Amazon because they are so large and have so many different customers. Answer: False Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 111) Low-end CRM systems are designed for enterprises with many small customers. Answer: True Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 112) High-end CRM systems are designed for enterprises with a few large customers.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 113) Cooperative CRM systems provide effective and efficient interactive communication with the customer throughout the entire organization. Answer: False Difficulty: Easy Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 114) Timberland used NFC to address the showrooming problem. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 115) Bundling is a form of upselling. Answer: False Difficulty: Hard Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Evaluation Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
116) CMA is a way for organizations to avoid targeting people who have opted out of receiving marketing communications. Answer: True Difficulty: Medium Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 117) Customer-facing CRM applications allow customers to self-serve. Answer: False Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 118) The purpose of loyalty programs is to reward past behavior. Answer: False Difficulty: Hard Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Evaluation Standard 1: AACSB || Technology 119) Analytical CRM systems are the input for operational CRM systems. Answer: False Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 120) Data from customer-facing and customer-touching applications are the inputs for analytical CRM systems. Answer: True Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 121) Sun Life sales representatives use the ERP to analyze data about advisors.. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 11.2 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 122) Open-source CRM systems must be implemented on-premise because they require coding by internal programmers to meet the company’s needs. Answer: False Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 123) On-premise CRM systems are the most secure of all the CRM application options.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Hard Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Evaluation Standard 1: AACSB || Technology 124) The higher the inventory velocity, the more satisfied the company’s customers will be. Answer: True Difficulty: Medium Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 125) The supply chain always flows downstream. Answer: False Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 126) If you want to return a defective product to the supplier, this is an example of an upstream flow of the supply chain. Answer: True Difficulty: Medium Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Application Standard 1: AACSB || Technology 127) Supply chains require material, information, and financial flows.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: False Difficulty: Hard Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Evaluation Standard 1: AACSB || Technology 128) SCM systems are a type of interorganizational IS. Answer: True Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 129) The push model is also called make-to-order. Answer: False Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 130) When the production process begins with a customer order, it is a pull model. Answer: True Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 131) Forecasts are typically accurate which is why most companies utilize the push model. Answer: False
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Medium Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Analysis Standard 1: AACSB || Technology 132) Cars are typically produced using the pull model. Answer: False Difficulty: Medium Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Application Standard 1: AACSB || Technology 133) Dell Computer uses the pull model. Answer: True Difficulty: Medium Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Application Standard 1: AACSB || Technology 134) Zara keeps most of its manufacturing capacity idle so it can respond to demand changes with more agility than its competitors. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 11.4 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 135) One reason Zara is so successful is because it operates in the fast fashion space, which means instead of 6-month seasonal output, it commits to short-term demand forecasts of around 2 to 6 weeks.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 11.4 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 136) Ryder is an excellent example of how vertical integration is always the best solution to supply chain problems like theirs. Answer: False Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 137) JIT eliminates excess inventory. Answer: False Difficulty: Medium Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 138) JIT shifts inventory downstream. Answer: False Difficulty: Hard Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Synthesis Standard 1: AACSB || Technology 139) JIT shifts inventory upstream. Answer: True
Rainer, Information System, Fifth Canadian Edition
Testbank
Difficulty: Hard Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Synthesis Standard 1: AACSB || Technology 140) Some companies are trying to replace EDI with XML. Answer: True Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 141) Intranets link business partners over the internet by providing them access to certain areas of each other’s corporate extranets. Answer: False Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 142) The primary goal of extranets is to foster collaboration between and among business partners. Answer: True Difficulty: Medium Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
143) The primary goal of intranets is to foster collaboration between and among business partners. Answer: False Difficulty: Medium Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 144) Procurement portals are for a company’s suppliers. Answer: True Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 145) Distribution portals are for a company’s customers. Answer: True Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 146) Distribution portals automate the business processes involved in purchasing or procuring products between a single buyer and multiple suppliers. Answer: False Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management.
Rainer, Information System, Fifth Canadian Edition
Testbank
Bloomcode: Knowledge Standard 1: AACSB || Technology 147) Distribution portals automate the business processes involved in selling or distributing products from a single supplier to multiple buyers. Answer: True Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 148) Dell services its business customers through its distribution portal. Answer: True Difficulty: Medium Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Application Standard 1: AACSB || Technology 149) Flexe offers an SCM solution for businesses to compete with Amazon. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 150) Amazon’s fulfillment process is fully automated (no humans are involved) . Answer: False Difficulty: Medium Section Reference 1: Closing Case
Rainer, Information System, Fifth Canadian Edition
Testbank
Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 151) Amazon improved its efficiency after the 2013 holiday season by reducing the number of sorting centers in its distribution channel. Answer: False Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: Text Entry 152) Over time, all organizations inevitably lose a percentage of customers, a process called ___. Answer: customer churn Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 153) The organization’s numerous and diverse interactions with customers are called ___. Answer: customer touch points Difficulty: Medium Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 154) ___ systems provide effective and efficient interactive communication with the customer throughout the entire organization.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: Collaborative CRM Difficulty: Easy Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Knowledge Standard 1: AACSB || Technology 155) Customer-___ CRM applications allow customers to help themselves. Answer: touching Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 156) ___ CRM systems provide business intelligence by analyzing customer behavior and perceptions. Answer: Analytical Difficulty: Easy Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 157) Salesforce Einstein is an AI product. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge
Rainer, Information System, Fifth Canadian Edition
Testbank
Standard 1: AACSB || Technology 158) A(n) ___ CRM system is one that is hosted by an external vendor in the vendor’s data center. Answer: on-demand Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 159) ___ CRM systems are CRM systems whose source code is available to developers and users. Answer: Open-source Difficulty: Easy Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Knowledge Standard 1: AACSB || Technology 160) A(n) ___ is the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses, to the end customers. Answer: supply chain Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 161) ___ refers to the ability of all organizations within a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers’ production processes and transportation networks to their receiving docks.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: Supply chain visibility Difficulty: Easy Section Reference 1: 11.4 Learning Objective 1: Describe the three components and the three flows of a supply chain. Bloomcode: Knowledge Standard 1: AACSB || Technology 162) The function of ___ is to improve the processes a company uses to acquire the raw materials it needs to produce a product or service and then deliver that product or service to its customers. Answer: supply chain management or SCM Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 163) The ___ refers to erratic shifts in orders up and down the supply chain. Answer: bullwhip effect Difficulty: Easy Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Knowledge Standard 1: AACSB || Technology 164) ___ is a communication standard that enables business partners to exchange routine documents electronically. Answer: Electronic Data Interchange (EDI) Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition
Testbank
165) ___ link business partners over the internet by providing them access to certain areas of each other’s corporate ___. Answer 1: Extranets Answer 2: intranets Difficulty: Medium Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology 166) ___ portals automate the business processes involved in purchasing or procuring products between a single buyer and multiple suppliers. Answer: Procurement Difficulty: Easy Section Reference 1: 11.6 Learning Objective 1: Explain the utility of each of the three major technologies that support supply chain management. Bloomcode: Knowledge Standard 1: AACSB || Technology Question Type: Essay 167) Describe the CRM process. How does a company differentiate between a low- and highvalue repeat customers? Why should customers be treated differently? How do you think customer touch points should be adjusted based on customer value? Answer: Difficulty: Hard Section Reference 1: 11.1 Learning Objective 1: Identify the primary functions of both customer relationship management (CRM) and collaborative CRM strategies. Bloomcode: Comprehension, Application, Evaluation Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: 1) Marketing efforts – solicit potential customers 2) Some will purchase = customers and some will continue to purchase = repeat customers
Rainer, Information System, Fifth Canadian Edition
Testbank
3) Segment into high- and low-value customers based on lifetime value (how much money can be made off a customer over a number of years) 4) Some customers will be lost over time = customer churn Differentiate based on how much money they spend over time Why? Because some customers spend more money and should be “catered to” so they keep buying Touch points: Everyone should have access to www, call center, etc., but not every customer should get targeted ads on their smartphone (potentially too impersonal or don’t want to irritate customers) or direct mail (this is expensive and is often ignored, so this should be reserved for special customers) or a sales representative (only large customers should have someone assigned to them) – students should discuss multiple touch points and justify their answer by using the terms high- and low-value customers (there could be multiple answers, but they should explain why not every touch point is appropriate for every customer) 168) What is the difference between customer-facing and customer-touching CRM applications? List and describe the different customer-facing and customer-touching CRM applications. Which applications would you use for high-value customers and why? Which applications would you use for low-value customers and why? Answer: Difficulty: Hard Section Reference 1: 11.2 Learning Objective 1: Describe how businesses might use applications of each of the two major components of operational CRM systems. Bloomcode: Synthesis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: Customer-facing = employees interact directly with customers; customer interaction centers to communicate with customers via web, phone, fax, and face-to-face, salesforce automation use to keep records of all components in a sales transaction process, marketing to develop a purchasing profile and get people to spend more, and campaign management applications to send the right messages to the right people; more likely to use these for highvalue customers in addition to customer-touching Customer-touching = customers interact with applications directly instead of through an employee; search and comparison, websites, customized products, personalized web pages, FAQs, e-mail, loyalty programs (rewarded for repeat purchases); these are more likely for lowvalue but also high-value if people want to self-serve 169) List and describe the five alternatives to traditional, on-premise CRM systems. Suppose your organization cannot afford an on-premise CRM system; which of these alternatives would you choose to implement and why? In your answer, you should consider the advantages and disadvantages of each option.
Rainer, Information System, Fifth Canadian Edition
Testbank
Answer: Difficulty: Medium Section Reference 1: 11.3 Learning Objective 1: Explain the advantages and disadvantages of mobile CRM systems, ondemand CRM systems, open-source CRM systems, social CRM systems, and real-time CRM systems. Bloomcode: Application, Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Standard 3 : AACSB || Reflective Thinking Solution: • On-demand = vendor-hosted CRM system; benefit = cheaper (SaaS); limitation = unreliable vendors, modification difficult/impossible, integrating with existing software difficult/impossible, security and privacy • Mobile = CRM through mobile devices; benefit = interact with customers anywhere at any time; limitation = small screens and internet isn’t everywhere (limitation not in book) • Open-source = source code available; benefit = free, lots of applications, easy to customize, updates and bug fixes quickly available; limitation = quality control, no central authority for overseeing quality (depend on volunteers), must have same IT platform in place as the one on which the open-source CRM system was developed • Social = social media to get customers involved in collaborative conversations; benefit = getting customers involved and meet customer needs quickly and unexpectedly (Morton’s Steakhouse example); limitation = customers can say bad things (limitation not in book) • Real-time = organizations are able to respond to customer product searches, requests, complaints, comments, ratings, reviews, and recommendations in near real-time; benefit = meet customer needs quickly and efficiently (Southwest Airlines example); limitation = privacy (limitation not in book) 170) List and describe the five basic components of SCM. Explain how a company like Amazon may have used these components. Answer: Difficulty: Medium Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: plan (strategy for managing all resources involved in meeting customer demand – efficient delivery, quality products, low cost), source (choose suppliers – relationships with suppliers – host their products on their website and possibly in their warehouses), make
Rainer, Information System, Fifth Canadian Edition
Testbank
(manufacturing – not really relevant), deliver (logistics, coordinating receipt of customer orders, develop a network of warehouses, select carrier to transport, create an invoicing system to receive payments – warehouses in nearly every state – close to big cities for same day or next day shipping, deals with FedEx/UPS/USPS and starting their own shipping division with their own trucks), and return (handling defective, returned, or excess products from customers – make it easy to return products) 171) Describe problems that can occur along the supply chain. What are the consequences of these problems? How can companies address these problems? Answer: Difficulty: Medium Section Reference 1: 11.5 Learning Objective 1: Identify popular strategies to solving different challenges of supply chains. Bloomcode: Comprehension Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Solution: Problems = uncertainties in demand forecast caused by competition, price, weather, technological developments, economic conditions, customer confidence, delivery times (construction, traffic jams, quality problems); need to coordinate multiple activities, internal units, and business partners – lack of communication leads to the bullwhip effect (excessive inventory that increases as you move upstream) Consequences = poor customer service, do not deliver products or services when and where customers need them, poor quality products, high inventory costs, revenue loss Solutions = vertical integration (purchase upstream suppliers to ensure essential supplies are always available when needed), just-in-time (JIT) inventory systems (get raw materials just before they are needed – but does not eliminate excess inventory across the supply chain), vendor managed inventory (VMI, supplier rather than retailer manages the entire inventory process for a particular product or group of products)
Information System, Fifth Canadian Edition
Rainer
Package Title: Chapter 12 Test Bank Course Title: Introduction to IS 5e Chapter Number: 12 Question type: Multiple Choice 1) Stitch Fix markets itself to ______ who _______. a) women between 25 and 45; need their clothes mended b) women between 25 and 45; are willing to pay $55 or more on clothes and accessories c) women between 45 and 65; need their clothes mended d) women between 45 and 65; are willing to pay $55 or more on clothes and accessories Answer: B Difficulty: Easy Section Reference: Opening Case Learning Objective: 12.1 Bloomcode: Knowledge Standard: AACSB Technology 2) Which of the following is TRUE of Stitch Fix’s business model compared to their competitors? a) They create more new products to attract customers. b) They offer the lowest price. c) They ship faster. d) They understand their customers better. Answer: D Difficulty: Easy Section Reference: Opening Case Learning Objective: 12.1 Bloomcode: Knowledge Standard: AACSB Technology 3) Stitch Fix’s highest level of analytics is _______. a) descriptive b) predictive c) prescriptive
Information System, Fifth Canadian Edition
Rainer
d) presentation Answer: B Difficulty: Medium Section Reference: Opening Case Learning Objective: 12.4 Bloomcode: Analysis Standard: AACSB Technology 4) Which is TRUE of Stich Fix? a) Their business model is such that they offer exclusive lines of clothing, albeit for normal prices. b) Their business model is such that they offer exclusive lines of clothing at a fraction of the cost that the same clothes would retail for in stores. c) Their business model offers neither exclusive brands nor reduced prices, instead relying on experience and relevance. d) Their business model is such that they offer no exclusive clothing lines, however their appeal lies within their transparent pricing and ethical and sustainable clothing options. Answer: B Difficulty: Easy Section Reference: Opening Case Learning Objective: 12.4 Bloomcode: Comprehension Standard: AACSB Technology 5) Stick Fix utilizes a process known as ___________ to gain a deeper understanding of its clients’ preferences and style choices, while simultaneously collecting data on its merchandise that feeds into ___________ that help determine merchandise best suited for clients. a) social media scanning; analytics b) dark analytics; algorithms c) deep analysis; merchandising databases d) unique identification; branded content Answer: B Difficulty: Easy Section Reference: Opening Case Learning Objective: 12.4 Bloomcode: Knowledge
Information System, Fifth Canadian Edition
Rainer
Standard: AACSB Technology 6) __________ decide what data should be stored in an organization’s data warehouse. a) Customers b) IT people c) Managers d) Users Answer: d Question Title: Testbank 12.06 Difficulty: Medium Section Reference 1: Managers and Decision Making Learning Objective 1: 12.1 Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 7) Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). a) the input; inputs b) the input; outputs c) the output; inputs d) the output; outputs Answer: c Question Title: Testbank 12.07 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 8) Productivity is a _________. a) function of the number of inputs and outputs for which a manager is responsible b) measure of how useful a manager is c) ratio between the inputs and outputs for which a manager is responsible d) useful way of seeing how important a product is Answer: c
Information System, Fifth Canadian Edition
Rainer
Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 9) _______ is NOT a phase in decision making. a) Choice b) Design c) Information d) Intelligence Answer: c Question Title: Testbank 12.09 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 10) Suppose you are failing one of your classes. If you don’t know what the problem is, you need to enter the _______ phase of the decision making . a) choice b) design c) intelligence d) implementation Answer: c Question Title: Testbank 12.10 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 11) Suppose you are failing one of your classes. You know you need to pay attention in class, study every day, take better notes, read the book before the lectures, or talk to the teacher about ways to improve. You developed this list in the _________ phase of the decision making .
Information System, Fifth Canadian Edition
Rainer
a) choice b) design c) intelligence d) implementation Answer: b Question Title: Testbank 12.11 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 12) Suppose you are failing one of your classes. Based on your evaluation, you decide to start paying attention in class and talking to the teacher about ways to improve. This decision is part of the _________ phase of the decision making. a) choice b) design c) intelligence d) implementation Answer: a Question Title: Testbank 12.12 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 13) Suppose you are failing one of your classes. Based on the choice you made to start studying harder, you look over your notes every day after class and study at least an hour every night for at least a week before an exam. This action is part of the ______ phase of the decision making. a) choice b) design c) intelligence d) implementation Answer: d
Information System, Fifth Canadian Edition
Rainer
Question Title: Testbank 12.13 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 14) Examination and answering the question “what is the problem” occur in the ______ phase of the decision making. a) choice b) design c) intelligence d) implementation Answer: c Question Title: Testbank 12.14 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 15) Validation of the model and answering the question “what are my options” occur in the _____ phase of the decision making. a) choice b) design c) intelligence d) implementation Answer: b Question Title: Testbank 12.15 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 16) Verification/testing of the proposed solution and picking an option occur in the _____ phase of the decision making.
Information System, Fifth Canadian Edition
Rainer
a) choice b) design c) intelligence d) implementation Answer: a Question Title: Testbank 12.16 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 17) Answering the question “did this option work as proposed” occurs in the _____ phase of the decision making. a) choice b) design c) intelligence d) implementation Answer: d Question Title: Testbank 12.17 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 18) _______ is an interpersonal role. a) Disseminator b) Disturbance handler c) Figurehead d) Monitor Answer: c Question Title: Testbank 12.18 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 19)_________ is a decisional role. a) Disseminator b) Disturbance handler c) Figurehead d) Monitor Answer: b Question Title: Testbank 12.19 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 20) _________ is an interpersonal role. a) Entrepreneur b) Leader c) Negotiator d) Spokesperson Answer: b Question Title: Testbank 12.20 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 21) ________ is an informational role. a) Entrepreneur b) Leader c) Negotiator d) Spokesperson
Information System, Fifth Canadian Edition
Rainer
Answer: d Question Title: Testbank 12.21 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 22) _______ is a decisional role. a) Analyzer b) Leader c) Liaison d) Resource allocator Answer: d Question Title: Testbank 12.22 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 23) ________ is an informational role. a) Analyzer b) Leader c) Liaison d) Resource allocator Answer: a Question Title: Testbank 12.23 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 24) ___________ decisions deal with routine and repetitive problems.
Information System, Fifth Canadian Edition
Rainer
a) Midstructured b) Semistructured c) Structured d) Unstructured Answer: c Question Title: Testbank 12.24 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 25) __________ decisions deal with “fuzzy”, complex problems. a) Midstructured b) Semistructured c) Structured d) Unstructured Answer: d Question Title: Testbank 12.25 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 26) _________ decisions are partially routine and partially complex. a) Midstructured b) Semistructured c) Structured d) Unstructured Answer: b Question Title: Testbank 12.26 Difficulty: EasySection Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Knowledge 27) As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision. a) midstructured b) semistructured c) structured d) unstructured Answer: c Question Title: Testbank 12.27 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 28) As a board member, you recommend hiring a new CEO to address the scandals that have been reported in the Wall Street Journal. This is a(n) ________ decision. a) midstructured b) semistructured c) structured d) unstructured Answer: d Question Title: Testbank 12.28 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 29) Every year, you have to give each of your employees a performance review and decide whether they have earned a raise. This is a(n) ________ decision. a) midstructured b) semistructured c) structured d) unstructured
Information System, Fifth Canadian Edition
Rainer
Answer: b Question Title: Testbank 12.29 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 30) Considering the nature of decisions, executing specific tasks efficiently and effectively is ___________. a) financial planning b) management control c) operational control d) strategic planning Answer: c Question Title: Testbank 12.30 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 31) Considering the nature of decision, acquiring and using resources efficiently in accomplishing organizational goals is ___________. a) financial planning b) management control c) operational control d) strategic planning Answer: b Question Title: Testbank 12.31 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge
Information System, Fifth Canadian Edition
Rainer
32) Considering the nature of decisions, the long-range goals and policies for growth and resource allocation is ___________. a) financial planning b) management control c) operational control d) strategic planning Answer: d Question Title: Testbank 12.32 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 33) You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision. a) structured; management control b) structured; operational control c) unstructured; management control d) unstructured; operational control Answer: b Question Title: Testbank 12.33 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 34) You are a marketing manager responsible for planning the budget for your department. This is a(n) ______ task and a(n) _______ decision. a) semistructured; management control b) semistructured; operational control c) unstructured; management control d) unstructured; strategic planning
Information System, Fifth Canadian Edition
Rainer
Answer: a Question Title: Testbank 12.34 Difficulty: Hard Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 35) You are the CEO of Widgets R Us. You know your widgets need to be more efficient and cost less, so you ask R&D to develop a plan. This is a(n) _____ task and a(n) ______ decision. a) structured; management control b) structured; operational control c) unstructured; operational control d) unstructured; strategic planning Answer: d Question Title: Testbank 12.35 Difficulty: Medium Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 36) Data marts are typically associated with ___________. a) the development of infrastructure to support enterprise-wide analytics b) the development of one or a few related analytics applications c) support for maintaining organizational strategy d) support for organizational transformation Answer: b Question Title: Testbank 12.36 Difficulty: Easy Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Knowledge 37) Data silos are often associated with ___________.
Information System, Fifth Canadian Edition
Rainer
a) the development of infrastructure to support enterprise-wide analytics b) the development of one or a few related analytics applications c) support for maintaining organizational strategy d) support for organizational transformation Answer: b Question Title: Testbank 12.37 Difficulty: Medium Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Knowledge 38) You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of ___________. a) the development of infrastructure to support enterprise-wide analytics b) the development of one or a few related analytics applications c) support for maintaining organizational strategy d) support for organizational transformation Answer: a Question Title: Testbank 12.38 Difficulty: Medium Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Application 39) You decide to implement a new customer loyalty program that rewards customers for shopping in your store. To accomplish this, you need to implement a data warehouse to collect data from all your physical and online stores. This is an example of ___________. a) the development of infrastructure to support enterprise-wide analytics b) the development of one or a few related analytics applications c) support for maintaining organizational strategy d) support for organizational transformation Answer: d Question Title: Testbank 12.39 Difficulty: Medium Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Application 40) The entire business analytics process starts with ___________. a) a business problem b) analytics c) data management d) recommendations Answer: a Question Title: Testbank 12.40 Difficulty: Medium Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Knowledge 41) __________ analytics answers the question “what has happened”. a) Descriptive b) Predictive c) Prescriptive a) Useful Answer: a Question Title: Testbank 12.41 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 42) You would use OLAP and DSS as statistical procedures for __________ analytics. a) descriptive b) predictive c) prescriptive d) useful Answer: a Question Title: Testbank 12.42 Difficulty: Easy
Information System, Fifth Canadian Edition
Rainer
Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 43) Data reduction is the conversion of raw _______ into a smaller amount of more useful _______. a) data; information b) data; knowledge c) information; data d) information; knowledge Answer: a Question Title: Testbank 12.43 Difficulty: Hard Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Synthesis 44) _________ analytics is the first step in data reduction. a) Descriptive b) Predictive c) Prescriptive d) Useful Answer: a Question Title: Testbank 12.44 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 45) _________ involves slicing and dicing data, drilling down in the data, and rolling up data to greater summarization. a) Data mining b) DSS c) OLAP d) OLTP
Information System, Fifth Canadian Edition
Rainer
Answer: c Question Title: Testbank 12.45 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 46) __________ can perform two basic operations: 1) identifying previously unknown patters and 2) predicting trends and behaviors. a) Data mining b) DSS c) OLAP d) OLTP Answer: a Question Title: Testbank 12.46 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 47) Examples of _______ include sensitivity, what-if, and goal-seeking analyses. a) data mining b) DSS c) OLAP d) OLTP Answer: b Question Title: Testbank 12.47 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics. Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 48) If you analyze a data cube, this is an example of using ________. a) data mining b) DSS
Information System, Fifth Canadian Edition
Rainer
c) OLAP d) OLTP Answer: c Question Title: Testbank 12.48 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 49) Affinity analysis is a(n) _________ application. a) data mining b) DSS c) OLAP d) OLTP Answer: a Question Title: Testbank 12.49 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Analysis 50) If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using _________. a) data mining b) DSS c) OLAP d) OLTP Answer: a Question Title: Testbank 12.50 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Application
Information System, Fifth Canadian Edition
Rainer
51) ______ analysis examines the change in an output given the change in a particular input while keeping all other inputs constant. a) Affinity b) Goal-seeking c) Sensitivity a) What-if Answer: c Question Title: Testbank 12.51 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 52) ______ analysis attempts to predict the impact of changes in the assumptions (input data) on the proposed solution. a) Affinity b) Goal-seeking c) Sensitivity d) What-if Answer: d Question Title: Testbank 12.52 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 53) _____ analysis attempts to calculate the value of the inputs necessary to achieve a desired level of output. a) Affinity b) Goal-seeking c) Sensitivity d) What-if Answer: b Question Title: Testbank 12.53 Difficulty: Easy
Information System, Fifth Canadian Edition
Rainer
Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 54) You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis. a) affinity b) goal-seeking c) sensitivity d) what-if Answer: c Question Title: Testbank 12.54 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Application 55) You assume the inflation rate will remain constant over the next few years, so you consider purchasing a home with a variable interest rate. You decide to double-check this assumption with a(n) __________ analysis. a) affinity b) goal-seeking c) sensitivity d) what-if Answer: d Question Title: Testbank 12.55 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Application 56) You want to spend a maximum of $100,000 on your first house. You need to use a(n) _____ analysis to figure out the location and size of those types of homes. a) affinity
Information System, Fifth Canadian Edition
Rainer
b) goal-seeking c) sensitivity d) what-if Answer: b Question Title: Testbank 12.56 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Application 57) Esurance used the concept of ______ to get customers to add towing to their packages. a) cross-selling b) loyalty programs c) sales promotions d) up-selling Answer: d Question Title: Testbank 12.57 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 58) The Esurance Coverage Rules Engine is mostly a ______ analytics system. a) descriptive b) predictive d) prescriptive e) useful Answer: a Question Title: Testbank 12.58 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Analysis
Information System, Fifth Canadian Edition
Rainer
59) OntarioMD (www.ontariomd.ca) has developed an EMR-integrated health management tool to_________ a) provide clinicians with insight into the data they input into the system b) provide patients with insight into the data they input into the system c) provide Ontario government with insight into the data they input into the system d) All of the other options. Answer: a Question Title: Testbank 12.59 Difficulty: Medium Section Reference 1: IT’s About Business 12.1 Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Analysis 60) The tool developed by OntarioMD is called Insight4Care and presents EMR data in the form of charts such as bar charts and pie charts. Such systems that represent important data and reports in the form of graphics are called________. a) reports b) dashboards c) data marts d) OLAP Answer: b Question Title: Testbank 12.60 Difficulty: Medium Section Reference 1: IT’s About Business 12.1Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 61) Which of the following is NOT a use for data mining? a) Comparing products b) Detecting fraudulent credit card transactions c) Forecasting bankruptcy d) Predicting sales Answer: a Question Title: Testbank 12.61 Difficulty: Medium Section Reference 1: 12.4 Predictive Analytics
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Analysis 62) Targeted marketing relies on _________ analytical information. a) descriptive b) predictive c) prescriptive d) useful Answer: b Question Title: Testbank 12.62 Difficulty: Medium Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 63) ________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends. a) Descriptive b) Predictive c) Prescriptive d) Useful Answer: b Question Title: Testbank 12.63 Difficulty: Easy Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 64) _____ is NOT a statistical tool used for predictive analytics. a) Data mining b) Linear regression c) Logistic regression d) Multidimensional analysis Answer: d
Information System, Fifth Canadian Edition
Rainer
Question Title: Testbank 12.64 Difficulty: Easy Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 65) ________ analytics drives the coupons you get at the grocery store when you use your loyalty card. a) Descriptive b) Predictive c) Prescriptive d) Useful Answer: b Question Title: Testbank 12.65 Difficulty: Medium Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Application 66) _________ analytics answers the question “what could happen?” a) Descriptive b) Predictive c) Prescriptive d) Useful Answer: b Question Title: Testbank 12.66 Difficulty: Easy Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 67) You would use linear, multiple, or logistic regression as statistical procedures for __________ analytics. a) descriptive b) predictive c) prescriptive
Information System, Fifth Canadian Edition
Rainer
d) Useful Answer: b Question Title: Testbank 12.67 Difficulty: Easy Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 68) Simpa Networks provides a) data analytics software to create a credit score. b) insurance for impoverished people. c) solar power to people and small businesses. d) tracking for water leaks. Answer: c Question Title: Testbank 12.68 Difficulty: Easy Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 69) Simpa Networks turned to DataKind to a) develop a credit-scoring model for potential customers. b) figure out a way to supply solar power inexpensively. c) identify water leaks in pipes and prevent fraud. d) predict how likely customers will defect to a competitor. Answer: a Question Title: Testbank 12.69 Difficulty: Medium Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 70) Simpa Networks uses a __________ model to provide solar power. a) a-la-carte
Information System, Fifth Canadian Edition
Rainer
b) purchasing c) rent-to-own d) subscription Answer: c Question Title: Testbank 12.70 Difficulty: Hard Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Evaluation 71) The National Basketball Association’s first analytics system, ______, focused on _____. a) CourtVision; defense b) CourtVision; offense c) Stats; defense d) Stats; offense Answer: b Question Title: Testbank 12.71 Difficulty: Easy Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 72) The ________ defines the shift to analytics in the National Basketball Association. a) free throw b) long-range two-point jump shot c) mid-range shot d) three-point shot Answer: d Question Title: Testbank 12.72 Difficulty: Medium Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 73) ______ analytics require _______ analytics.
Information System, Fifth Canadian Edition
Rainer
a) Descriptive; predictive b) Descriptive; prescriptive c) Predictive; prescriptive d) Prescriptive; predictive Answer: d Question Title: Testbank 12.73 Difficulty: Medium Section Reference 1: 12.5 Prescriptive Analytics Learning Objective 1: Provide a definition and a use case example for prescriptive analytics. Bloomcode: Knowledge 74) _______ are/is NOT a statistical tool for prescriptive analytics. a) Data mining b) Decision trees c) Optimization d) Simulation Answer: a Question Title: Testbank 12.74 Difficulty: Easy Section Reference 1: 12.5 Prescriptive Analytics Learning Objective 1: Provide a definition and a use case example for prescriptive analytics. Bloomcode: Knowledge 75) _______ analytics answers the question “what should we do”. a) Descriptive b) Predictive c) Prescriptive d) Useful Answer: c Question Title: Testbank 12.75 Difficulty: Easy Section Reference 1: 12.5 Prescriptive Analytics Learning Objective 1: Provide a definition and a use case example for prescriptive analytics. Bloomcode: Knowledge
Information System, Fifth Canadian Edition
Rainer
76) You would use optimization or simulation for ______ analytics. a) descriptive b) predictive c) prescriptive d) useful Answer: c Question Title: Testbank 12.76 Difficulty: Easy Section Reference 1: 12.5 Prescriptive Analytics Learning Objective 1: Provide a definition and a use case example for prescriptive analytics. Bloomcode: Knowledge 77) _________ is a capability of dashboards that gives the user the ability to go to details at several levels by a series of menus or by clicking on a portion of the screen that can be expanded. a) CSF b) Drill down c) Exception reporting d) Trend analysis Answer: b Question Title: Testbank 12.77 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge 78) _________ is a capability of dashboards that are specific measures of CSFs. a) Exception reporting b) KPI c) Status access d) Trend analysis Answer: b Question Title: Testbank 12.78 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge 79) _______ is a capability of dashboards that reflect the latest data available on KPIs or some other metric often in real time. a) Drill down b) Exception reporting c) Status access d) Trend analysis Answer: c Question Title: Testbank 12.79 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge 80) _______ is a capability of dashboards that highlights deviations larger than certain thresholds. a) CSF b) Drill down c) Exception reporting d) Trend analysis Answer: c Question Title: Testbank 12.80 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge 81) You are looking at a sales report from last month. You notice one salesperson’s numbers are much lower than the rest, so you click on that person’s name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. a) CSF b) drill down c) exception reporting d) trend analysis
Information System, Fifth Canadian Edition
Rainer
Answer: b Question Title: Testbank 12.81 Difficulty: Medium Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Application 82) ______ is an example of a CSF. a) Adding a new location in Mexico b) Improving customer satisfaction c) Providing a 2% cost-of-living salary increase d) Selling 10% more widgets Answer: b Question Title: Testbank 12.82 Difficulty: Medium Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Application 83) Dashboards evolved from a) enterprise resource planning systems. b) executive information systems. c) functional area information systems. d) transaction processing systems. Answer: b Question Title: Testbank 12.83 Difficulty: Medium Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Analysis 84) You are an executive working for a Fortune 500 company. You want to see CSFs, ROI, NPV, and other financial information. You would look at the ________ wall in the Management Cockpit.
Information System, Fifth Canadian Edition
Rainer
a) black b) blue c) red d) white Answer: a Question Title: Testbank 12.84 Difficulty: Medium Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Application 85) You are an executive working for a Fortune 500 company. You want to see how your company is performing compared to other businesses in your industry and you want to see how your marketing campaigns are performing. You would look at the ________ wall in the Management Cockpit. a) black b) blue c) red d) white Answer: c Question Title: Testbank 12.85 Difficulty: Medium Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Application 86) You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. a) black b) blue c) red d) white Answer: b Question Title: Testbank 12.86 Difficulty: Medium
Information System, Fifth Canadian Edition
Rainer
Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Application 87) You are an executive working for a Fortune 500 company. You want to see the status report on your strategic project that extends your business to China. You would look at the ________ wall in the Management Cockpit. a) black b) blue c) red d) white Answer: d Question Title: Testbank 12.87 Difficulty: Medium Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Application 88) GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using a) analytics. b) dashboards. c) digitized maps. d) solar energy. Answer: c Question Title: Testbank 12.88 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge Question type: True/False 89) Stitch Fix’s business model is based on offering customers the most selection so that they can make the best choice in fashion.
Information System, Fifth Canadian Edition
Rainer
Answer: False Difficulty: Medium Section Reference: Opening Case Learning Objective: 12.1 Bloomcode: Analysis Standard: AACSB Technology 90) Experts argue business analytics and business intelligence should be used interchangeably. Answer: True Question Title: Testbank 12.90 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1:Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 91) All organizational information systems support decision making. Answer: True Question Title: Testbank 12.91 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 92) Only large organizations use business analytics applications. Answer: False Question Title: Testbank 12.92 Difficulty: Easy Section Reference 1: 12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge
Information System, Fifth Canadian Edition
Rainer
93) You can’t return to previous stages of the IDC, so it is really important to do a good job the first time. Answer: False Question Title: Testbank 12.93 Difficulty: Easy Section Reference 1:12.1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 94) You have to go through every step of the IDC every time for every problem. Answer: False Question Title: Testbank 12.94 Difficulty: Easy Section Reference 1: 12. 1Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 95) Lower-level managers typically handle strategic planning decisions. Answer: False Question Title: Testbank 12.95 Difficulty: Easy Section Reference 1: 12. 1Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 96) Middle managers typically handle management control decisions and semi-structured tasks. Answer: True Question Title: Testbank 12.96 Difficulty: Medium Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Analysis 97) Senior executives typically handle strategic planning decisions. Answer: True Question Title: Testbank 12.97 Difficulty: Easy Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 98) Data marts support the development of one or a few related analytics applications. Answer: True Question Title: Testbank 12.98 Difficulty: Medium Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Analysis 99) The entire business analytics process starts with a business problem or organizational “pain point”. Answer: True Question Title: Testbank 12.99 Difficulty: Easy Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Knowledge 100) Oracle is the most popular and common business analytics tool. Answer: False Question Title: Testbank 12.100 Difficulty: Easy Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Knowledge 101) Business analytics vendors typically design their software so that it interfaces with Excel. Answer: True Question Title: Testbank 12.101 Difficulty: Easy Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Knowledge 102) Data reduction is the conversion of raw information into a smaller amount of more useful data. Answer: False Question Title: Testbank 12.102 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 103) Affinity analysis is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups. Answer: True Question Title: Testbank 12.103 Difficulty: Easy Section Reference 1: 12.2 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 104) Esurance spent more money on their prescriptive analytics system than they save each year. Answer: False Question Title: Testbank 12.104 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Knowledge 105) About one-third of water distributed by utilities around the world is lost to leaks, so the ability to detect leaks is critical. Answer: True Question Title: Testbank 12.105 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 106) Physicians collect an enormous amount of data about their patients. Most of these data are logged into electronic medical records. Answer: True Question Title: Testbank 12.106 Difficulty: Easy Section Reference 1: Descriptive Analytics Learning Objective 1: IT’s About Business 12.1Bloomcode: Comprehension 107) The purpose of prescriptive analytics is to tell decision makers what will happen in the future. Answer: False Question Title: Testbank 12.107 Difficulty: Medium Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Analysis 108) Data mining is a statistical tool for descriptive and predictive analytics. Answer: True Question Title: Testbank 12.108 Difficulty: Easy Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Knowledge 109) Simpa Networks hired DataKind to help them find an optimal mix of customers. Answer: True Question Title: Testbank 12.109 Difficulty: Easy Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 110) Analytics in the National Basketball Association is a mapping and data visualization challenge. Answer: True Question Title: Testbank 12.110 Difficulty: Medium Section Reference 1: 12.4 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 111) Prescriptive analytics require predictive analytics with one additional component: actionable data. Answer: False Question Title: Testbank 12.111 Difficulty: Medium Section Reference 1: 12.5 Prescriptive Analytics Learning Objective 1: Provide a definition and a use case example for prescriptive analytics. Bloomcode: Analysis 112) Predictive analytics require prescriptive analytics with two additional components: actionable data and a feedback system that tracks the outcome produced by the action taken. Answer: False Question Title: Testbank 12.112 Difficulty: Easy Section Reference 1: 12.5 Prescriptive Analytics
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Provide a definition and a use case example for prescriptive analytics. Bloomcode: Knowledge 113) A dashboard is an application of the management cockpit. Answer: False Question Title: Testbank 12.113 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge 114) The Management Cockpit is a dashboard used by executives and board members. Answer: True Question Title: Testbank 12.114 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge 115) The Management Cockpit has two walls for different business issues that are important to executives: finances and competitive advantage. Answer: False Question Title: Testbank 12.115 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge Question type: Text Entry 116) Business _______________ has been defined as a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions. Answer: intelligence
Information System, Fifth Canadian Edition
Rainer
Question Title: Testbank 12.116 Difficulty: Easy Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 117) Business intelligence has been defined as a broad category of _____________________ ______________________________________ for gathering, storing, accessing, and analyzing data to help business users make better decisions. Answer: applications, technologies, and processes Question Title: Testbank 12.117 Difficulty: Medium Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 118) ________________ is a process by which an organization achieves its goals through the use of resources. Answer: Management Question Title: Testbank 12.118 Difficulty: Easy Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 119) Management is a process by which an organization achieves its goals through the use of ___________. Answer: resources Question Title: Testbank 12.119 Difficulty: Easy Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Knowledge 120) The IDC created by Herbert Simon stands for ______________. Answer: intelligence, design, choice Question Title: Testbank 12.120 Difficulty: Easy Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Knowledge 121) Business __________________ is the process of developing actionable decisions or recommendations for actions based on insights generated from historical data. Answer: analytics Question Title: Testbank 12.121 Difficulty: Easy Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Knowledge 122) Business analytics is the process of developing actionable decisions or recommendations for actions based on insights generated from ______________ data. Answer: historical Question Title: Testbank 12.122 Difficulty: Hard Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Evaluation 123) ______ is the most popular and common business analytics tool. Answer: Excel Question Title: Testbank 12.123 Difficulty: Easy Section Reference 1: 12.2 The Business Analytics Process
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Knowledge 124) ______________________ is the process of converting raw data into a smaller amount of more useful information. Answer: Data reduction Question Title: Testbank 12.124 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 125) _____________ analytics summarize what has happened in the past and allow decision makers to learn from past behaviors. Answer: Descriptive Question Title: Testbank 12.125 Difficulty: Easy Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Knowledge 126) ________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends. Answer: Predictive Question Title: Testbank 12.126 Difficulty: Easy Section Reference 1: 12.3 Predictive Analytics Learning Objective 1: Provide a definition and a use case example for predictive analytics. Bloomcode: Knowledge 127) _____ analytics go beyond descriptive and predictive models by recommending one or more courses of action and showing the likely outcome of each decision. Answer: Prescriptive Question Title: Testbank 12.127
Information System, Fifth Canadian Edition
Rainer
Difficulty: Easy Section Reference 1: 12.4 Prescriptive Analytics Learning Objective 1: Provide a definition and a use case example for prescriptive analytics. Bloomcode: Knowledge 128) A _____________ provides easy access to timely information and direct access to management reports. Answer: dashboard Question Title: Testbank 12.128 Difficulty: Easy Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Bloomcode: Knowledge Question Type: Essay 129) Suppose someone posted something inappropriate about you online. How would you follow the IDC to address this problem? Answer: Question Title: Testbank 12.129 Difficulty: Medium Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Application 130) What trends make decision making so difficult? How does technology help with this? Answer: Question Title: Testbank 12.1130 Difficulty: Medium Section Reference 1: 12. 1 Managers and Decision Making Learning Objective 1: Use a decision support framework to demonstrate how technology supports managerial decision making at each phase of the decision-making process. Bloomcode: Analysis
Information System, Fifth Canadian Edition
Rainer
131) There are three specific analytics targets that represent different levels of change. List and describe these targets. If you owned a small organization, what target would you use and why? Now assume you are the CEO of a large organization; what target would you use and why? Answer: Question Title: Testbank 12.131 Difficulty: Medium Section Reference 1: 12.2 The Business Analytics Process Learning Objective 1: Describe each phase of the business analytics process. Bloomcode: Application 132) Suppose you want to know why your car sales have declined but your truck sales have increased over the last three years. What type of analytics is this? List and describe the statistical tools you could use to analyze the problem. Explain which one you would choose and why. Answer: Question Title: Testbank 12.132 Difficulty: Medium Section Reference 1: 12.3 Descriptive Analytics Learning Objective 1: Provide a definition and a use case example for descriptive analytics. Bloomcode: Application 133) List and describe the capabilities of dashboards. Assuming you are the CEO of Uber, draw a dashboard that you would like to see. Answer: Question Title: Testbank 12.133 Difficulty: Medium Section Reference 1: 12.6 Presentation Tools Learning Objective 1: Describe two examples of presentation tools. Hint: Think about what kind of information you would want to see to make decisions as a CEO (hiring drivers, cities to make your service available, etc.). Bloomcode: Application
Information System, Fifth Canadian Edition
Rainer
Package Title: Chapter 13, Testbank Course Title: Rainer, IS 5e Chapter Number: 13 Question Type: Multiple Choice 1) Paychex provides a ____ to its customers that are primarily ____ businesses. a) PaaS; large b) PaaS; small and medium c) SaaS; large d) SaaS; small and medium Answer: D Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 2) Paychex original development model was _______. a) agile development b) end-user development c) joint application design d) traditional waterfall Answer: D Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 3) The first step in the information systems planning process is to ________. a) analyze the organization’s strategic plan b) consider potential IS development projects
Information System, Fifth Canadian Edition
Rainer
c) create an IS strategic plan d) evaluation the potential IT architecture Answer: a Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 4) The _________ identifies the firm’s overall mission, the goals that follow from that mission, and the broad steps required to reach these goals. a) IS operational plan b) IS strategic plan c) IT architecture d) Organization strategic plan Answer: d Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 5) The _________ delineates the way an organization should utilize its information resources to accomplish its mission. a) IS operational plan b) IS strategic plan c) IT architecture d) Organization strategic plan Answer: c Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge
Information System, Fifth Canadian Edition
Rainer
Standard 1: AACSB || Technology 6) The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives need to achieve the organization’s goals. a) IS operational plan b) IS strategic plan c) IT architecture d) organization strategic plan Answer: b Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 7) The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan. a) IS operational plan b) IT architecture c) organization mission d) organization strategic plan Answer: a Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 8) _________ is a managerial aspect of the IT architecture. a) How IT decisions will be made b) Networking c) The applications software d) The operating system
Information System, Fifth Canadian Edition
Rainer
Answer: a Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 9) _________ is a technical aspect of the IT architecture. a) Functional area manager involvement b) How IT decisions will be made c) How the IT department will be managed d) The applications software Answer: d Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 10) Which of the following is NOT an objective of the IT strategic plan? a) It must be aligned with the organization’s strategic plan. b) It must efficiently allocate IS development resources among competing projects. c) It must meet the needs of every functional area to ensure employee buy-in. d) It must provide for an IT architecture that seamlessly networks users, applications, and databases. Answer: c Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 11) The IT steering committee is comprised of ________.
Information System, Fifth Canadian Edition
Rainer
a) board members b) C-level executives c) top-level IT managers d) managers from each functional area Answer: d Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 12) _________ is NOT a major task of the IT steering committee. a) Approving the allocation of resources for the MIS function b) Establishing performance measures for the MIS function and ensuring they are met c) Linking corporate strategy with IT strategy d) Training the top managers from each functional area Answer: d Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 13) The _________ is/are a prioritized inventory of present applications and a detailed plan of projects to be developed or continued during the current year. a) application portfolio b) constraints of the IS function c) IS environment d) objectives of the IS function Answer: a Difficulty: Easy Section Reference 1: 13.1
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 14) The _________ is/are the technological, financial, personnel, and other resource limitations on the IS function. a) application portfolio b) constraints of the IS function c) IS environment d) objectives of the IS function Answer: b Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 15) The _________ is/are a summary of the information needs of the individual functional areas and of the organization as a whole. a) application portfolio b) constraints of the IS function c) IS environment d) objectives of the IS function Answer: c Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 16) The _________ is/are the best current estimate of the goals of the IS function. a) application portfolio b) constraints of the IS function
Information System, Fifth Canadian Edition
Rainer
c) IS environment d) objectives of the IS function Answer: d Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 17) _________ costs are those costs that remain the same regardless of any change in the company’s activity level. The CIO’s salary is an example of a _________ cost. a) Fixed; fixed b) Fixed; variable c) Variable; fixed d) Variable; variable Answer: a Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 18) _________ is a method to convert future values of benefits to their present-value equivalent by “discounting” them at the organization’s cost of funds. a) Breakeven analysis b) The business case approach c) NPV d) ROI Answer: c Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge
Information System, Fifth Canadian Edition
Rainer
Standard 1: AACSB || Technology 19) _________ measures management’s effectiveness in generating profits with its available assets by dividing the net income generated by a project by the average assets invested in the project. a) Breakeven analysis b) The business case approach c) NPV d) ROI Answer: d Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 20) _________ determines the point at which the cumulative dollar value of the benefits from a project equals the investment made in the project. a) Breakeven analysis b) The business case approach c) NPV d) ROI Answer: a Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) _________ involves system developers writing a business case to justify funding one or more specific applications or projects. a) Breakeven analysis b) The business case approach c) NPV
Information System, Fifth Canadian Edition
Rainer
d) ROI Answer: b Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 22) If a company doesn’t want to write any computer code, it would choose to ________. a) custom-write an entire application b) customize a prewritten application c) outsource the application d) use a prewritten application Answer: d Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 23) If a company wants to write some computer code, it would choose to ________. a) custom-write an entire application b) customize a prewritten application c) outsource the application d) use a prewritten application Answer: b Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
24) If a company wants to write all new computer code, it would choose to ________. a) custom-write an entire application b) customize a prewritten application c) outsource the application d) use a prewritten application Answer: a Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 25) _________ is an advantage of the buy option. a) Control b) Modification c) Integration d) Time Answer: d Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 26) _________ is a disadvantage of the buy option. a) Availability b) Control c) Hiring d) Time Answer: b Difficulty: Easy Section Reference 1: 13.2
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 27) The 80/20 rule means that if the software meets _________ percent of the company’s needs, then the company should modify _________ percent of its business processes to use the software. a) 20; 20 b) 20; 80 c) 80; 20 d) 80; 80 Answer: c Difficulty: Medium Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 28) A(n) ____________ is an agent or a vendor who assembles the software needed by enterprises and then packages it with services such as development, operations, and maintenance. a) ASP b) ERP c) PaaS d) SaaS Answer: a Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) _________ is a method of delivering software in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet.
Information System, Fifth Canadian Edition
Rainer
a) ASP b) ERP c) PaaS d) SaaS Answer: d Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 30) SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet. a) a platform b) an architecture c) hardware d) software Answer: d Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 31) If a company acquires IT applications from outside contractors or external organizations, it is called ________. a) insourcing b) onshoring c) outsourcing d) reverse outsourcing Answer: c Difficulty: Easy Section Reference 1: 13.2
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 32) Insourcing is also called ________. a) nearshoring b) onshoring c) outsourcing d) reverse outsourcing Answer: d Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 33) Starchup is a _______ provider that _______. a) IaaS; helps entrepreneurs build apps quickly b) IaaS; provides apps to dry cleaners c) SaaS; helps entrepreneurs build apps quickly d) SaaS; provides apps to dry cleaners Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 13.1 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 34) Gigster is part of the _______ economy. a) app b) quoting c) sharing d) technology
Information System, Fifth Canadian Edition
Rainer
Answer: C Difficulty: Hard Section Reference 1: IT’s About Business 13.1 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Synthesis Standard 1: AACSB || Technology 35) Which BEST describes Gigster’s business model? a) It provides access to experienced IT professionals for small, independently-owned companies that do not have the budget for in-house IT groups. b) It provides on-demand access to experienced programmers and developers for entrepreneurs who do not possess the expertise to bring app ideas to market. c) It provides access to any number of tech-industry professionals with a variety of experience to telecommuting professionals who require IT assistance. d) It provides on-demand access to a variety of people working in creative spaces for households, businesses, or individuals in need of their services. Answer: B Difficulty: Medium Section Reference 1: IT’s About Business 13.1 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Application Standard 1: AACSB || Technology 36) Gigster and Starchup’s relationship can be described as ______. a) a partnership b) competitors c) adversarial d) B2C Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 13.1 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Comprehension
Information System, Fifth Canadian Edition
Rainer
Standard 1: AACSB || Technology 37) In spring 2019 there was a rash of condominium bicycle thefts in Toronto, bicycles with ______on them were not stolen. a) good locks b) good insurance c) GPS locator devices d) RFID locator devices Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 13.2 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 38) Security codes to enter to access the condominium building are not secure because ____ . a) There are many apps that can break codes in matter of minutes. b) There are many websites that sell codes for different condominium buildings c) One can look online and find videos and websites that describe the methods to change security access codes and set up new access codes for many condominium entry systems. d) Many web sites with the help of a web cam, can help you to break the code for a fee. Answer: C Difficulty: Medium Section Reference 1: IT’s About Business 13.2 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Comprehension Standard 1: AACSB || Technology 39) It turned out that the rash of bicycle thefts in spring 2019 in Toronto had one thing in common_____. a) the same type of entry access system b) the same type of bike look system c) the same building management company
Information System, Fifth Canadian Edition
Rainer
d) The same bike brand and model Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 13.2 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 40) Which of the following is the correct order of the SDLC? a) analysis, investigation, design, implementation, programming/testing, operation/maintenance b) analysis, investigation, design, programming/testing, implementation, operation/maintenance c) investigation, analysis, design, implementation, programming/testing, operation/maintenance d) investigation, analysis, design, programming/testing, implementation, operation/maintenance Answer: d Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 41) The first stage of the SDLC is ________. a) analysis b) design c) investigation d) programming Answer: c Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
42) _________ are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly. a) Programmers b) Systems analysts c) Technical specialists d) Users Answer: d Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) _________ are IS professionals who specialize in analyzing and designing information systems. a) Programmers b) Systems analysts c) Technical specialists d) Users Answer: b Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 44) _________ are IS professionals who either modify existing computer programs or write new programs to satisfy user requirements. a) Programmers b) Systems analysts c) Technical specialists d) Users Answer: a
Information System, Fifth Canadian Edition
Rainer
Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 45) _________ are experts on a certain type of technology. a) Programmers b) Systems analysts c) Technical specialists d) Users Answer: c Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 46) Users have the greatest involvement in the _________ stage of the SDLC. a) design b) programming c) implementation d) investigation Answer: d Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 47) System developers have the greatest involvement in the _________ stage of the SDLC. a) analysis b) investigation
Information System, Fifth Canadian Edition
Rainer
c) operation d) testing Answer: d Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 48) Systems _________ addresses the business problem or business opportunity by means of a feasibility study. a) analysis b) design c) investigation d) operation Answer: c Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 49) _________ feasibility determines whether the company can develop or otherwise acquire the hardware, software, and communications components needed to solve the business problem. a) Behavioral b) Competitive c) Economic d) Technical Answer: d Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge
Information System, Fifth Canadian Edition
Rainer
Standard 1: AACSB || Technology 50) _________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project. a) Behavioral b) Competitive c) Economic d) Technical Answer: c Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 51) _________ feasibility addresses the human issues of the systems development project. a) Behavioral b) Competitive c) Economic d) Technical Answer: a Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 52) Your company’s employee base is mostly comprised of older people who generally dislike and distrust technology. This means the _________ feasibility of implementing a new system is low. a) behavioral b) competitive c) economic
Information System, Fifth Canadian Edition
Rainer
d) technical Answer: a Difficulty: Medium Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Application Standard 1: AACSB || Technology 53) The primary purpose of the systems _________ stage is to gather information about the existing system to determine the requirements for an enhanced system or a new system. a) analysis b) design c) investigation d) operation Answer: a Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 54) The end product of the _________ stage is a set of system requirements. a) analysis b) design c) investigation d) operation Answer: a Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
55) The deliverable of the system _________ phase is the set of technical system specifications. a) analysis b) design c) investigation d) programming Answer: b Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 56) Adding functions after the project has been initiated causes ________. a) direct deployment b) low feasibility c) quality issues d) scope creep Answer: d Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 57) A _________ conversion involves shutting the old system off and turning the new system on at a certain point in time. a) direct b) parallel c) phased d) pilot Answer: a Difficulty: Easy
Information System, Fifth Canadian Edition
Rainer
Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 58) _________ conversion is the least expensive. a) Direct b) Parallel c) Phased d) Pilot Answer: a Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 59) _________ conversion is the most risky. a) Direct b) Parallel c) Phased d) Pilot Answer: a Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 60) A _________ conversion introduces the new system in one part of the organization. a) direct b) parallel c) phased
Information System, Fifth Canadian Edition
Rainer
d) pilot Answer: d Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 61) A _________ conversion introduces components of the new system in stages. a) direct b) parallel c) phased d) pilot Answer: c Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 62) Your company decides to implement the manufacturing module of SAP before implementing payroll. This is an example of _________ conversion. a) direct b) parallel c) phased d) pilot Answer: c Difficulty: Medium Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Application Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
63) Your company decides to implement SAP in the United States before implementing it in Canada. This is an example of _________ conversion. a) direct b) parallel c) phased d) pilot Answer: d Difficulty: Medium Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Application Standard 1: AACSB || Technology 64) A _________ conversion involves running the old and new systems at the same time. a) direct b) parallel c) phased d) pilot Answer: b Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 65) _________ is a group-based tool for collecting user requirements and creating system designs. a) Agile development b) End-user development c) JAD d) RAD Answer: c
Information System, Fifth Canadian Edition
Rainer
Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 66) _________ is a systems development method that can combine tools to rapidly produce a high-quality system. a) Agile development b) End-user development c) JAD d) RAD Answer: d Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 67) _________ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks. a) Agile development b) End-user development c) JAD d) RAD Answer: a Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 68) _________ is an approach in which the organization’s end users develop their own applications with little or no formal assistance from the IT department.
Information System, Fifth Canadian Edition
Rainer
a) Agile development b) End-user development c) JAD d) RAD Answer: b Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 69) In the first RAD stage, developers use _________ sessions to collect user requirements. a) Agile development b) end-user development c) ICASE d) JAD Answer: d Difficulty: Medium Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 70) RAD uses _________ tools to quickly structure requirements and develop prototypes. a) Agile development b) end-user development c) ICASE d) JAD Answer: c Difficulty: Medium Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Knowledge Standard 1: AACSB || Technology 71) The scrum approach is one type of ________. a) Agile development b) end-user development c) JAD d) RAD Answer: a Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 72) The _________ is the scrum approach typically replaces a project manager. a) product owner b) program developer c) scrum master d) team Answer: c Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 73) The _________ represents the business users and any other stakeholders in the project. a) product owner b) program developer c) scrum master d) team Answer: a
Information System, Fifth Canadian Edition
Rainer
Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 74) Scrum sprints typically last 2–4 ________. a) hours b) days c) weeks d) years Answer: c Difficulty: Medium Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 75) The biggest problem associated with end-user development is ________. a) availability b) cost c) security d) time Answer: c Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 76) ________________ development is closely linked with the idea of web services and serviceoriented architectures.
Information System, Fifth Canadian Edition
Rainer
a) Agile b) Component-based c) End-user d) Object-oriented Answer: b Difficulty: Medium Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Analysis Standard 1: AACSB || Technology 77) _________ are the fundamental elements in object-oriented development and represent tangible, real-world entities. a) Behaviors b) Objects c) Operations d) Properties Answer: b Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 78) Which of the following is an advantage of the traditional SDLC? a) Bypasses the IS department and avoids delays b) Enforces quality by maintaining standards c) Involves many users in the development process d) Works wells for ill-defined problems Answer: b Difficulty: Easy Section Reference 1: 13.4 Section Reference 2: 13.3
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Learning Objective 2: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 79) Which of the following is an advantage of prototyping? a) Bypasses the IS department and avoids delays b) Enforces quality by maintaining standards c) Involves many users in the development process d) Works wells for ill-defined problems Answer: d Difficulty: Easy Section Reference 1: 13.4 Section Reference 2: 13.3 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Learning Objective 2: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 80) Which of the following is an advantage of JAD? a) Bypasses the IS department and avoids delays b) Enforces quality by maintaining standards c) Involves many users in the development process d) Works wells for ill-defined problems Answer: c Difficulty: Easy Section Reference 1: 13.4 Section Reference 2: 13.3 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Learning Objective 2: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
81) Which of the following is an advantage of end-user development? a) Bypasses the IS department and avoids delays b) Enforces quality by maintaining standards c) Involves many users in the development process d) Works wells for ill-defined problems Answer: a Difficulty: Easy Section Reference 1: 13.4 Section Reference 2: 13.3 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Learning Objective 2: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 82) Joseph and his marketing team want to create a new app where customers can give feedback on various products. They have asked the technical team to develop the app with four sprints, each two weeks apart. It is important to them that they be able to change the specs of the app based on customer feedback. This app would best be be developed using ____________ development. a) joint application b) agile c) end-user d) object-oriented Answer: b Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
83) Conrad and his team are under pressure to develop their product for the university before the semester starts and they have only two weeks. Which type of development would be least helpful for them? a) traditional development b) agile development c) rapid application development d) prototyping Answer: a Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology
84) Public Services and Procurement Canada wanted to save money on payroll processing by adopting one common payroll system that was more comprehensive and versatile and accessible by all departments and agencies with a(n) ______ a) Email system b) MRP c) SCM d) Modern database approach Answer: D Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 85) Information systems and functional departments usually set targets on. a) budgets and marketing objectives b) quality control and accuracy c) number of concurrent users d) legacy systems compatibility
Information System, Fifth Canadian Edition
Rainer
Answer: B Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology Question type: True/False 86) Paychex switched from the traditional waterfall development method to agile development to deploy software more quickly. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Comprehension Standard 1: AACSB || Technology 87) Paychex is an IaaS provider. Answer: False Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 88) One of the most important things to understand about the service that Paychex provides is that if the system were to go down for an extended period, customers would leave very quickly. Answer: True Difficulty: Easy Section Reference 1: Opening Case
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Comprehension Standard 1: AACSB || Technology 89) DevOps is a methodology combining IT developments teams with operations teams throughout the development and deployment of IT solutions. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Comprehension Standard 1: AACSB || Technology 90) While DevOps as a deployment and development method is gaining popularity, most experts agree that the waterfall method is much more effective and in the end, will result in a stronger product. Answer: False Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Analysis Standard 1: AACSB || Technology 91) Small organizations do not need a formal process for planning for and justifying IT applications. Answer: False Difficulty: Medium Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Analysis Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
92) The IT architecture encompasses both the technical and managerial aspects of information resources. Answer: True Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 93) The IT architecture focuses on the technical aspects of information resources. Answer: False Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 94) The existing IT architecture is an absolute constraint on the development of an IT strategic plan. Answer: False Difficulty: Medium Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Analysis Standard 1: AACSB || Technology 95) The IT steering committee is comprised of the top IT managers in an organization. Answer: False Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Knowledge Standard 1: AACSB || Technology 96) Fixed costs change when a company decides to implement a cloud computing solution. Answer: False Difficulty: Hard Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Evaluation Standard 1: AACSB || Technology 97) Costs of a system end when the system is installed. Answer: False Difficulty: Medium Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 98) Database design choices can affect an organization decades after they are made even when hardware and software is replaced; the Y2K problem was a perfect illustration of this. Answer: True Difficulty: Hard Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Evaluation Standard 1: AACSB || Technology 99) It is easy to assess the benefits of IT because they are so tangible. Answer: False Difficulty: Easy
Information System, Fifth Canadian Edition
Rainer
Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 100) As long a new technology is implemented, it will give organizations the benefits they seek. Answer: False Difficulty: Hard Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Evaluation Standard 1: AACSB || Technology 101) Companies can buy or lease prewritten applications. Answer: True Difficulty: Medium Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 102) Purchasing a prewritten application is always the most cost-effective and time-saving solution. Answer: False Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 103) A single software package rarely satisfies all of an organization’s needs.
Information System, Fifth Canadian Edition
Rainer
Answer: True Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 104) An ASP hosts both an application and a database for each customer. Answer: True Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 105) SaaS customers own the software but it is offered at a cheaper price. Answer: False Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 106) Open-source software is an alternative source of applications. Answer: True Difficulty: Medium Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
107) Communication, control, and cost are the three benefits of outsourcing. Answer: False Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 108) Being an informed user will help you take advantage of custom development. Answer: True Difficulty: Hard Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Synthesis Standard 1: AACSB || Technology 109) Gigster helps entrepreneurs bring an app to market because entrepreneurs frequently do not have the money or the skills to develop an app on their own. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 13.1 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 110) In spring 2019 there was a rash of condominium bicycle thefts in Toronto, all in areas where people treasure their bicycles and use them to travel around the city. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 13.2 Learning Objective 1: Describe alternative development methods and the tools that augment these methods.
Information System, Fifth Canadian Edition
Rainer
Bloomcode: Knowledge Standard 1: AACSB || Technology 111) Only IT people are involved in the SDLC. Answer: False Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 112) Technology is available at a cost that is affordable to you, but you know your employees will refuse to use anything new. This means the feasibility of your IT project is high. Answer: False Difficulty: Medium Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Analysis Standard 1: AACSB || Technology 113) A hidden backlog contains the projects that the IT department is not aware of because of low feasibility. Answer: True Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 114) IT people are supposed to identify the system requirements in the systems analysis stage. Answer: False
Information System, Fifth Canadian Edition
Rainer
Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 115) Scope creep is necessary even though it is really expensive because it allows users to request things they really need. Answer: False Difficulty: Medium Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Analysis Standard 1: AACSB || Technology 116) Most systems are implemented with direct conversion because it is the cheapest. Answer: False Difficulty: Medium Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 117) Pilot conversion is the least used conversion strategy. Answer: False Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 118) The direct and parallel conversion strategies are not used very frequently by businesses.
Information System, Fifth Canadian Edition
Rainer
Answer: True Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 119) RAD produces prototypes rather than functional components. Answer: False Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 120) The development process in RAD is iterative. Answer: True Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 121) Agile development ensures that the software includes every possible feature the user will require. Answer: False Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
122) The core tenet of agile development is to do only what you have to do to be successful right now. Answer: True Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 123) End-user development is also called Shadow IT. Answer: True Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 124) Upper CASE tools automate the early stages of the SDLC. Answer: True Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 125) Upper CASE tools automate the later stages of the SDLC. Answer: False Difficulty: Easy Section Reference 1: 13.4
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 126) Lower CASE tools automate the systems investigation, analysis, and design stages of the SDLC. Answer: False Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 127) Lower CASE tools automate the programming, testing, operation, and maintenance stages of the SDLC. Answer: True Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 128) End-user development requires a high degree of assistance from the IT department. Answer: False Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology
129) Apps built in a Windows environment typically do not operate in a Linux environment.
Information System, Fifth Canadian Edition
Rainer
Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology Question Type: Text Entry 130) A(n) ___ is a prioritized list of both existing and potential IT applications. Answer: application portfolio Difficulty: Easy Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Knowledge Standard 1: AACSB || Technology 131) A(n) ___ is an agent or a vendor who assembles the software needed by enterprises and then packages it with services such as development, operations, and maintenance. Answer: application service provider or ASP Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 132) ___ is a method of delivering software in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet. Answer: Software-as-a-service or SaaS Difficulty: Easy Section Reference 1: 13.2
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 133) ___ are a method of developing applications that run independently of the base operating system of the server. Answer: Containers Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 134) ___ is the process of steadily adding new computer code to a software project when the new computer code is written and tested. Answer: Continuous application development Difficulty: Easy Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Knowledge Standard 1: AACSB || Technology 135) A(n) ___ is a list of projects that the IT department is not aware of. Answer: hidden backlog Difficulty: Medium Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 136) Systems ___ describes how the system will resolve the business problem.
Information System, Fifth Canadian Edition
Rainer
Answer: design Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 137) Adding functions after the project has been initiated causes ___. Answer: scope creep Difficulty: Easy Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Knowledge Standard 1: AACSB || Technology 138) ___ is a group-based tool for collecting user requirements and creating system designs. Answer: Joint application design or JAD Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 139) ____ is a systems development method that can combine tools to rapidly produce a highquality system. Answer: Rapid application development or RAD Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology
Information System, Fifth Canadian Edition
Rainer
140) ___ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks. Answer: Agile development Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 141) ___ is an approach in which the organization’s end users develop their own applications with little or no formal assistance from the IT department. Answer: End-user development Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 142) ___ uses standard components to build applications. Answer: Component-based development Difficulty: Easy Section Reference 1: 13.4 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology 143) ___ is based on a different view of computer systems than that perception that characterizes traditional development approaches. Answer: Object-oriented development or OOD Difficulty: Easy Section Reference 1: 13.4
Information System, Fifth Canadian Edition
Rainer
Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Bloomcode: Knowledge Standard 1: AACSB || Technology Question Type: Essay 144) List and describe the four common approaches for conducting a cost-benefit analysis. What are the difficulties associated with conducting these approaches for IT projects? What approach would you use to justify the implementation of a website that allows customers to post comments on it and why? Answer: Difficulty: Medium Section Reference 1: 13.1 Learning Objective 1: Discuss the different cost–benefit analyses that companies must take into account when formulating an IT strategic plan. Bloomcode: Comprehension, Application, Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: Cost-benefit analysis: • NPV = convert future values of benefits to their present-value equivalent by “discounting” them at the organization’s cost of funds • ROI = effectiveness in generating profits with its available assets • Breakeven analysis = how many years will it take for the benefits to equal the investment • Business case approach = business case to justify implementation Difficulties = the cost of the system may be easy to calculate (assuming an on-premise installation), but variable costs may be hard to calculate (assuming a cloud computing solution) and other after-installation costs are involved (training, maintenance, updating, etc.); benefits are hard to calculate since many are intangible (customer satisfaction, employee satisfaction, usability, etc.); business case approach is probably the best since customers basically need to be allowed to post comments but customer satisfaction is hard to measure – businesses would have to consider how much time it will take to monitor the site – how much will that cost? 145) List and describe the four fundamental questions/decisions/strategies for acquiring IT applications (including the sub-parts). You’ve justified your IT investment, so now you need to decide how you want to pursue it. You are an entrepreneur who wants to start your own small business; how would you answer these questions? Now assume you are the CEO of a multibillion-dollar company; how would you answer these questions? Answer:
Information System, Fifth Canadian Edition
Rainer
Difficulty: Medium Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Comprehension, Application, Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: • How much computer code does the company want to write? Prewritten (no code), customize prewritten (some code), custom-write (all new code); small – either prewritten (could actually be cheaper) or custom-write/customize if the student knows programming or knows someone who can program; large – any option is good because they have the money to do what they want – time is the big issue with customization so it may be easiest to purchase prewritten but that could harm strategic advantage (have the same software as everyone else) – so it depends on the strategy • How will the company pay for the application? Buy or lease; small – leasing may be the best option to get the business started; large – this depends on the student’s perspective of buying/leasing – some feel buying is cheaper in the long run while others feel leasing is the best because upgrading is often easier (but it is more expensive in the long-run) • Where will the application run? In-house or outsourcing; small - Outsourcing may be the cheapest way of doing this so the company doesn’t have to buy hardware or hire IT personnel; large – could make the same argument as small but many large organizations already have an IT staff that can manage these things in-house • Where will the application originate? Open-source, vendor, customized, in-house, customized; small – open-source or outsourcing could be viable options because it is cheaper but see above arguments; large – see above arguments 146) What is the difference between outsourcing and offshoring? If you were the CEO of a large corporation, would you outsource, offshore, or insource (why or why not)? Answer: Difficulty: Medium Section Reference 1: 13.2 Learning Objective 1: Discuss the four business decisions that companies must make when they acquire new applications. Bloomcode: Comprehension, Application, Analysis Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology Solution: outsourcing = acquiring IT applications from outside contractors or external organizations (could be in the US or from a different country); offshoring = outsourcing to places like India and China (NOT in the US); risks of outsourcing = lose control over those resources so
Information System, Fifth Canadian Edition
Rainer
could lose competitive advantage and may not actually save money; risks of offshoring = poor communication; insourcing = need the expertise 147) List and describe the six stages of the SDLC. What role would you play in the SDLC if your company was thinking about implementing an ERP system; if you were an HR manager; if you were an IT programmer? Answer: Difficulty: Medium Section Reference 1: 13.3 Learning Objective 1: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Comprehension, Application Standard 1: AACSB || Communication Standard 2 : AACSB || Technology Solution: Systems investigation = feasibility study to see if a new system is necessary; HR manager Systems analysis = what does the new system need to do; HR manager Systems design = describe how the new system will meet business needs; programmer Programming/testing = create the new system and test it; programmer (HR manager does some testing) Implementation = start the new system and replace the old one (four options for cut-over); programmer but HR manager may have some input into which option is used Operation/maintenance – use the new system and modify it to address problems or meet needs; HR manager mostly but programmer for addressing problems
148) You decide the traditional SDLC approach has too many disadvantages. Which alternative would you use and why? HINT: You should discuss the advantages of the method you choose and at least one disadvantage supporting why you would not choose the other methods.
Information System, Fifth Canadian Edition
Rainer
Answer: Difficulty: Medium Section Reference 1: 13.4 Section Reference 2: 13.3 Learning Objective 1: Describe alternative development methods and the tools that augment these methods. Learning Objective 2: Enumerate the primary tasks and the importance of each of the six processes involved in the systems development life cycle. Bloomcode: Application Standard 1: AACSB || Communication Standard 2 : AACSB || Analytic Standard 3 : AACSB || Technology
Information System, Fifth Canadian Edition
Solution:
Rainer
Information System, Fifth Canadian Edition
Rainer