TEST BANK for EXPERIENCING MIS THIRD CANADIAN EDITION

Page 1


TEST BANK John Trembley

EXPERIENCING MIS THIRD CANADIAN EDITION

David M. Kroenke Andrew Gemino Peter Tingling


Chapter 1: Information Systems and You

1) MIS only matters to MIS majors and not to students in other business disciplines. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 7 Topic: Q7 Skill: RECALL 2) Information systems are not created for the sheer joy of exploring technology. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 7; 9 Topic: Q7 Skill: RECALL 3) You must be a technology wizard to achieve the company’s goals and objectives using IT. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 8 Topic: Q5 Skill: RECALL 4) Moore's Law can be expressed as "the speed of a computer chip doubles every 20 months." a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

1


Chapter 1: Information Systems and You

Diff: 1 Type: TF Page Reference: 14 Topic: Q6 Skill: RECALL 5) In the next decade unlimited storage will be almost free. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 18 Topic: Q6 Skill: APPLIED 6) Google uses a function called "content extraction" for Gmail accounts to understand the content of users’ e-mails. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 16 Topic: Q1 Skill: RECALL 7) Information system is a group of components that interact to produce information. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 10 Topic: Q1 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

2


Chapter 1: Information Systems and You

8) Information systems must include the use of a computer. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 6 Topic: Q1 Skill: RECALL 9) According to Industry Canada, Canada's ICT industry has grown faster than the country's overall GDP since 2002. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 12 Topic: Q4 Skill: RECALL 10) Information technology (IT) refers to methods, inventions, standards, and products. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 10 Topic: Q1 Skill: RECALL 11) Most managers will get involved in purchasing computer hardware and building systems. a. True b. False Copyright © 2014 Pearson Canada Inc.

3


Chapter 1: Information Systems and You

Answer: b Diff: 1 Type: TF Page Reference: 7 Topic: Q5 Skill: APPLIED 12) MIS stands for "Management Information Sciences." a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 3 Topic: Q1 Skill: RECALL 13) MIS is synonymous with IT. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 10 Topic: Q3 Skill: RECALL 14) Information systems are created to solve business needs. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 7 Topic: Q2 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

4


Chapter 1: Information Systems and You

15) E-mail is an example of an information system. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 13 Topic: Q1 Skill: RECALL 16) To gain a competitive advantage it is important that one be an IT developer. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 13 & 14 Topic: Q5 Skill: APPLIED 17) An important skill in business is to be able to identify opportunities for innovation through the use of information systems. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 13 & 14 Topic: Q5 Skill: APPLIED 18) MIS is the development and use of information systems to help organizations accomplish their goals and objectives. a. True b. False Copyright © 2014 Pearson Canada Inc.

5


Chapter 1: Information Systems and You

Answer: a Diff: 1 Type: TF Page Reference: 7 Topic: Q2 Skill: RECALL 19) Most innovative uses of IT have already been invented. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: VARIOUS IMPLIED Topic: Q4 Skill: APPLIED 20) The decreasing price and increasing power of computer chips is one of the main drivers for improvements in information systems. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 16 Topic: Q6 Skill: APPLIED 21) Moore's Law states that the price of microprocessors will be cut in half every 12 months. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 15 Copyright © 2014 Pearson Canada Inc.

6


Chapter 1: Information Systems and You

Topic: Q6 Skill: RECALL 22) Understanding the implications of technological change allows for greater effectiveness of business professionals. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 18 Topic: Q6 Skill: RECALL 23) A combination of business and technology skills can open a number of doors in the new Canadian economy. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: VARIOUS Topic: Q6 Skill: APPLIED 24) This class is solely about learning how to use Excel and Access. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 18 Topic: Q7 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

7


Chapter 1: Information Systems and You

25) According to "Outlook on Human Resources in the ICT Labour Market: 2008 - 2015" satisfactory communications and other business skills are important core skills for individuals looking for a career in this industry sector. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 14 Topic: Q5 Skill: RECALL 26) You can maximize the value of this course by personalizing the material a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 22 Topic: Q7 Skill: RECALL 27) The basic premise of Moore's law is a. IT makes people more efficient. b. the density of transistors on a computer chip doubles roughly every 20 months. c. people tend to want more information than they need. d. IT makes people more productive. e. computer memory is getting bigger. Answer: b Diff: 2 Type: MC Page Reference: 15 Topic: Q6 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

8


Chapter 1: Information Systems and You

28) Social Networking sites generate revenue through a. government subsidy. b. subscription fees. c. social networking sites do not generate revenue. d. advertising. e. corporate sponsorship. Answer: d Diff: 1 Type: MC Page Reference: 8 Topic: Q2 Skill: APPLIED 29) Which of the following is an example of a social networking site? a. Youtube b. Yahoo.ca c. Facebook.com d. Wikipedia e. Google.ca Answer: c Diff: 1 Type: MC Page Reference: 8 Topic: Q2 Skill: RECALL 30) Which of the following is not considered a function of a social networking site? a. A repository for personal profiles. b. Video sharing. c. Searching for new / unused books. d. Indirect selling of products. e. Searching for friends.

Copyright © 2014 Pearson Canada Inc.

9


Chapter 1: Information Systems and You

Answer: c Diff: 1 Type: MC Page Reference: 9 Topic: Q1 Skill: APPLIED 31) What is an Information System? a. An information system is a group of components that interact to produce information. b. Computer hardware and software. c. Software development process. d. A framework describing human computer interaction. e. An information gathering application. Answer: a Diff: 2 Type: MC Page Reference: 6 Topic: Q1 Skill: RECALL 32) How does IT differ from IS? a. IT costs money while IS doesn't. b. IT is a newer word for IS. c. IT refers to methods, invention, standards and products while IS is a system of hardware, software, data, procedures and people that produces information. d. IT and IS are the same. e. IT doesn't matter but IS does. Answer: c Diff: 2 Type: MC Page Reference: 10 Topic: Q3 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

10


Chapter 1: Information Systems and You

33) Which of the following best describes the five-component framework of IS? a. Hardware, software, data, procedures, and people b. Networks, software, servers, programmers, and managers c. Applications, people, standards, budgets, and software d. Storage, processing, input, output, and control e. Applications, processes, processing, data, and standards Answer: a Diff: 2 Type: MC Page Reference: 7 Topic: Q1 Skill: RECALL 34) Information systems exists to help businesses to a. save money. b. better organize our lives. c. be more profitable. d. be more competitive. e. archieve goals and objectives. Answer: e Diff: 1 Type: MC Page Reference: 7 Topic: Q2 Skill: RECALL 35) As a business professional, one needs to look at information systems only through the lens of a. business need. b. technology. c. cost savings. d. software. e. business processes. Copyright © 2014 Pearson Canada Inc.

11


Chapter 1: Information Systems and You

Answer: a Diff: 2 Type: MC Page Reference: 14 Topic: Q5 Skill: APPLIED 36) Which of the following is the federal government agency responsible for categorizing industry sectors and collecting information about them? a. Industry Canada b. Bank of Canada c. Ministry of Finance d. Canada Revenue Agency e. Ministry of Defense Answer: a Diff: 1 Type: MC Page Reference: 11 Topic: Q4 Skill: RECALL 37) According to Industry Canada, the Canadian ICT sector in 2011 included over a. 30 000 companies. b. 32 000 companies. c. 40 000 companies. d. 10 000 companies. e. 28 000 companies. Answer: b Diff: 3 Type: MC Page Reference: 11 Topic: Q4 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

12


Chapter 1: Information Systems and You

38) According to Industry Canada, what were the revenues of the Canada's ICT sector in 2010? a. 162 billion b. 1 billion c. 140 billion d. 150 billion e. 125 billion Answer: a Diff: 2 Type: MC Page Reference: 11 Topic: Q4 Skill: RECALL 39) According to Industry Canada, the average annual growth rate in the Canadian ICT sector since 2002 has been around a. 4%. b. the GDP growth rate. c. 5%. d. 6%. e. 8%. Answer: a Diff: 3 Type: MC Page Reference: 10 Topic: Q4 Skill: RECALL 40) What was the total number of Canadian workers employed by the ICT sector in 2010 according to Industry Canada? a. 563 000 b. 442 000 c. 592 000 Copyright © 2014 Pearson Canada Inc.

13


Chapter 1: Information Systems and You

d. 420 000 e. 223 000 Answer: a Diff: 2 Type: MC Page Reference: 12 Topic: Q4 Skill: RECALL 41) How much did the average Canadian ICT worker earned in 2010 according to Industry Canada? a. $90 000 b. $49 000 c. $75 000 d. $67 000 e. $59 000 Answer: d Diff: 2 Type: MC Page Reference: 12 Topic: Q4 Skill: RECALL 42) Which of the following segments of the ICT sector in Canada is responsible for the majority of this sectors revenue, according to Industry Canada? a. Software b. Manufacturing c. Services d. Export e. Hardware Answer: c Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

14


Chapter 1: Information Systems and You

Page Reference: 12 Topic: Q4 Skill: RECALL 43) Google uses Gmail's "content extraction" to a. to track all the online activities of gmail users. b. target advertising to Gmail users. c. sell advertising. d. find out the interests of gmail users. e. track IP addresses. Answer: b Diff: 2 Type: MC Page Reference: 16 Topic: Q6 Skill: RECALL 44) Gordon Moore is one of the founders of a. Intel Corporation. b. Adobe Systems. c. Cisco Systems. d. Microsoft Corporation. e. National Semiconductors. Answer: a Diff: 1 Type: MC Page Reference: 15 Topic: Q6 Skill: RECALL 45) Moore's Law states that a. the price of a computer drops by 50% every 20 months. b. the number of transistors on a microprocessor doubles every 12 months. Copyright © 2014 Pearson Canada Inc.

15


Chapter 1: Information Systems and You

c. the price of a computer drops by 50% every 12 months. d. the number of transistors per square inch on an integrated chip doubles every 20 months. e. the price of a microprocessor decreases by 50% every 20 months. Answer: d Diff: 1 Type: MC Page Reference: 15 Topic: Q6 Skill: RECALL 46) Which ratio has fallen dramatically over the years due to Moore's Law? a. Speed/reliability b. Price/performance c. Transistor/performance d. Price/Megahertz e. Cost/benefit Answer: b Diff: 2 Type: MC Page Reference: 15 Topic: Q6 Skill: RECALL 47) Which of the following will essentially be free within the next decade? a. Web sites b. Data storage c. Routers d. PCs e. Networks Answer: b Diff: 1 Type: MC Copyright © 2014 Pearson Canada Inc.

16


Chapter 1: Information Systems and You

Page Reference: 18 Topic: Q6 Skill: RECALL 48) Hal Varian suggests that mobility devices will change “what it means to go to work.” What does he mean by this? a. There will be less work. b. Networks are a thing of the past. c. You will have to go to the work. d. You will deal with work at home. e. The work will come to you. Answer: e Diff: 2 Type: MC Page Reference: 17 Topic: Q6 Skill: APPLIED 49) Which of the following is an example of a company that offers a large amount of free IT resources? a. Wal-Mart b. Amazon c. Google d. Gartner e. Pearson Publishing Answer: c Diff: 2 Type: MC Page Reference: VARIOUS Topic: Q5 Skill: APPLIED 50) What does ICT stand for? a. Information Communications Terminology Copyright © 2014 Pearson Canada Inc.

17


Chapter 1: Information Systems and You

b. Information Computing Technology c. Information Communications Technology d. Industrial Communications Technology e. Industrial Computing Technology Answer: c Diff: 1 Type: MC Page Reference: 14 Topic: Q5 Skill: RECALL 51) Which of the following are not the responsibilities of the user of an Information System? a. Backing up data. b. Programming the system. c. Learn how to employ the system to accomplish your goals. d. Help recover the system. e. Protecting the security of the system and its data. Answer: b Diff: 3 Type: MC Page Reference: VARIOUS Topic: Q5 Skill: APPLIED 52) The Running Room web site a. handles online purchases. b. provides unique services that are not available in stores. c. provides discussion groups. d. provides information efficiently to customers. e. all of the above. Answer: e Diff: 3 Copyright © 2014 Pearson Canada Inc.

18


Chapter 1: Information Systems and You

Type: MC Page Reference: 21 Topic: Q5 Q6 Skill: APPLIED 53) ________ is (are) often the most important part of an information system. a. People b. Processes c. Hardware d. Data e. Software Answer: a Diff: 2 Type: MC Page Reference: VARIOUS Topic: Q5 Skill: APPLIED 54) MIS can be defined as a. the development and use of information systems that achieve business goals and objectives. b. the use of information systems to develop business strategies. c. the use of information systems that achieve business goals and objectives. d. the development of information systems that helps a business to save money. e. the development and use of information systems to cut cost. Answer: a Diff: 1 Type: MC Page Reference: 7 Topic: Q2 Skill: RECALL 55) The critical difference between information systems and information technology is? a. The computers. Copyright © 2014 Pearson Canada Inc.

19


Chapter 1: Information Systems and You

b. The way computers are used. c. The people. d. The information and data. e. The computer programs. Answer: c Diff: 3 Type: MC Page Reference: 10 Topic: Q3 Skill: APPLIED 56) Google's use of "content extraction" with Gmail is a concern for? a. Academics b. Google c. Privacy advocates d. Governments e. Competitors Answer: c Diff: 3 Type: MC Page Reference: 16 Topic: Q6 Skill: APPLIED 57) According to Industry Canada, the percentage of all Canadian ICT workers working in ICT software and computer services in 2010 was a. 27% b. 73%. c. 75%. d. 67%. e. 69%. Answer: a Diff: 2 Copyright © 2014 Pearson Canada Inc.

20


Chapter 1: Information Systems and You

Type: MC Page Reference: 12 Topic: Q4 Skill: RECALL 58) According to Industry Canada, the total number of jobs in the Canadian ICT user industries sector was about a. 678,000 b. 71,000 c. 17,000 d. 563,000 e. 580,000 Answer: a Diff: 2 Type: MC Page Reference: 12 Topic: Q5 Skill: RECALL 59) Which of the following sectors in Canada's ICT industry had the greatest amount of employment in Canada in 2007, according to Industry Canada? a. Law enforcement b. Manufacturing c. Pharmaceutical Research d. Education e. Software and computer services industries Answer: e Diff: 2 Type: MC Page Reference: 12 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

21


Chapter 1: Information Systems and You

60) According to Industry Canada, what is the percentage of workers who have a degree in the software and computer services industry? a. 29% b. 23% c. 53% d. 43% e. 47% Answer: c Diff: 3 Type: MC Page Reference: 12 Topic: Q4 Skill: RECALL 61) According to Industry Canada, the average earnings of a software and computer services worker in Canada in 2006 is a. about $62 000. b. about $85 000. c. about $72 000. d. about $55 000. e. about $67 000. Answer: c Diff: 3 Type: MC Page Reference: 12 Topic: Q4 Skill: RECALL 62) According to Industry Canada, in 2010 the percentage of Canadian ICT workers who have a university degree is a. 44%. b. 40%. c. 41%. d. 43%. Copyright © 2014 Pearson Canada Inc.

22


Chapter 1: Information Systems and You

e. 42%. Answer: a Diff: 3 Type: MC Page Reference: 12 Topic: Q4 Skill: RECALL 63) All of the following are components of an information system except a. procedures. b. culture. c. people. d. software. e. hardware. Answer: b Diff: 2 Type: MC Page Reference: 6 Topic: Q1 Skill: RECALL 64) According to Moore's Law, an integrated chip's speed and power should ________ every 20 months. a. grow 50% b. increase exponentially c. increase 1% d. grow 100% e. gradually increase Answer: d Diff: 3 Type: MC Page Reference: 15 Topic: Q6 Copyright © 2014 Pearson Canada Inc.

23


Chapter 1: Information Systems and You

Skill: APPLIED 65) The cost as measured per 10 000 transistors on computer chips has been ________ steadily over time. a. gradually increasing b. dropping c. keeping pace d. unchanged e. increasing drastically Answer: b Diff: 3 Type: MC Page Reference: 16 Topic: Q6 Skill: APPLIED 66) It is expected that the price and power of computer chips will ________ over the next decade. a. stay about the same b. obey Moore's Law c. shrink d. continue to grow slowly e. grow more dramatically Answer: b Diff: 2 Type: MC Page Reference: 16 Topic: Q6 Skill: RECALL 67) An information system helps businesses achieve a. its goals and objectives. b. parity. c. waking up employees. Copyright © 2014 Pearson Canada Inc.

24


Chapter 1: Information Systems and You

d. security. e. fairness. Answer: a Diff: 1 Type: MC Page Reference: 7 Topic: Q2 Skill: RECALL 68) Information technology focuses on the hardware, software, and ________ components of an information system. a. data b. security c. procedures d. software e. people Answer: a Diff: 2 Type: MC Page Reference: 10 Topic: Q3 Skill: RECALL 69) Information technology only becomes useful when it is combined with the people and ________ components of an information system. a. process b. software c. hardware d. data e. procedure Answer: e Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

25


Chapter 1: Information Systems and You

Page Reference: 10 Topic: Q3 Skill: RECALL 70) One example of a simple information system that business people use would be a. instant messaging. b. a hard drive. c. a cell phone. d. a keyboard. e. a wireless mouse. Answer: a Diff: 2 Type: MC Page Reference: 10 Topic: Q3 Skill: APPLIED 71) A blog would be an example of a. IT procedures. b. an information technology. c. an information system. d. an email system. e. an infrastructure system. Answer: c Diff: 3 Type: MC Page Reference: 10 Topic: Q3 Skill: APPLIED 72) The "Outlook on Human Resources in the ICT Labour Market: 2008-2015" reports that there is a dramatic need for individuals with core skills that include a. communications skills. b. non-technical skills. Copyright © 2014 Pearson Canada Inc.

26


Chapter 1: Information Systems and You

c. basic computer skills. d. accounting skills. e. marketing skills. Answer: a Diff: 3 Type: MC Page Reference: 14 Topic: Q4 Skill: RECALL 73) Hal Varian notes that for business people a. the ability to handle data will be important for decades to come. b. learning about technology is not important. c. information technology does not change business. d. basic computer skills will be important for decades to come. e. information systems do not affect the way we work. Answer: a Diff: 3 Type: MC Page Reference: 10 Topic: Q6 Skill: APPLIED 74) A secondary focus of this class is a. learning to use Access. b. learning to use tools like Excel and Access. c. learning how to use tools like Excel and Access to accomplish a business purpose. d. learning to use Excel. e. to better understand business. Answer: c Diff: 3 Type: MC Page Reference: 18 Copyright © 2014 Pearson Canada Inc.

27


Chapter 1: Information Systems and You

Topic: Q7 Skill: APPLIED 75) David Ticoll suggests that a. we will continue to see a divide between the real and the virtual world. b. we have already seen the pinnacle of network development. c. the technology trends of today will make performance-enhancing innovations available in almost every industry. d. we will continue to have problems in finding the hidden meaning from data. e. the cost of storage will almost be free in the next decade. Answer: e Diff: 3 Type: MC Page Reference: 18 Topic: Q6 Skill: APPLIED 76) Social media applications include a. email. b. spreadsheets. c. videos. d. databases. e. social networking sites. Answer: e Diff: 1 Type: MC Page Reference: 8 Topic: Q2 Skill: RECALL 77) The ICT sector revenues in Canada in 2010 were $162 billion. Diff: 2 Type: FIB Page Reference: 11 Copyright © 2014 Pearson Canada Inc.

28


Chapter 1: Information Systems and You

Topic: Q4 Skill: RECALL

78) Moore's Law tells us that the price/performance ratio of computers has fallen dramatically for years. Diff: 2 Type: FIB Page Reference: 11 Topic: Q4 Skill: RECALL 79) The term software is used to refer to computer components that are not hardware. Diff: 1 Type: FIB Page Reference: 6 Topic: Q1 Skill: RECALL 80) When using an information system, you will have responsibilities for protecting the security of the system and its data. Diff: 2 Type: FIB Page Reference: 8 Topic: Q2 Skill: RECALL 81) The definition of MIS is that information systems exist to help businesses achieve their ________. Diff: 3 Type: FIB Page Reference: 7 Topic: Q2 Skill: APPLIED 82) The Running Room has used its web site to increase its reach to customers. Diff: 2 Type: FIB Page Reference: 18 Topic: Q6 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

29


Chapter 1: Information Systems and You

83) Moore's Law states that the number of transistors per square inch on an integrated chip doubles every 20 months. Diff: 2 Type: FIB Page Reference: 15 Topic: Q6 Skill: RECALL 84) Moore's Law has proved generally accurate for more than 40 years. Diff: 1 Type: FIB Page Reference: 15 Topic: Q6 Skill: RECALL 85) MIS is a group of components that interact to produce information. Diff: 1 Type: FIB Page Reference: 6 Topic: Q1 Skill: RECALL 86) The ICT sector in Canada, has had twice the overall growth of the national GDP since 2002. Diff: 2 Type: FIB Page Reference: 11 Topic: Q4 Skill: RECALL 87) MIS stands for management information system. Diff: 1 Type: FIB Page Reference: 7 Topic: Q1 Skill: RECALL 88) ________ are defined as the development and use of information systems that help businesses to achieve their goals and objectives.

Copyright © 2014 Pearson Canada Inc.

30


Chapter 1: Information Systems and You

Diff: 1 Type: FIB Page Reference: 8 Topic: Q2 Skill: RECALL 89) A(n) information is a group of components designed to produce information. Diff: 1 Type: FIB Page Reference: 6 Topic: Q1 Skill: RECALL 90) Every information system can be thought of as consisting of five components. Diff: 2 Type: FIB Page Reference: 6 Topic: Q1 Skill: APPLIED 91) Every information system contains hardware, software, people, data and procedures. Diff: 2 Type: FIB Page Reference: 6 Topic: Q1 Skill: RECALL 92) Every information system contains hardware, software, people, data, and procedures. Diff: 2 Type: FIB Page Reference: 6 Topic: Q1 Skill: RECALL 93) The study of MIS is not just about learning to use spreadsheets and databases, but about learning how to use these tools to accomplish a(n) business purpose. Diff: 2 Type: FIB Page Reference: 13 Topic: Q5 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

31


Chapter 1: Information Systems and You

94) Information technology (IT) concerns only the hardware, software, and data components of an information system. Diff: 2 Type: FIB Page Reference: 10 Topic: Q3 Skill: RECALL 95) Although simple, e-mail would be an example of a(n) information system. Diff: M Type: FIB Page Reference: 6 Topic: Q3 Skill: APPLIED 96) Changes in technology have advanced to a point where the content of an individual's email can now be used to determine the advertising that individual sees in their web mail account. This has resulted in privacy concerns. Diff: 3 Type: FIB Page Reference: 16 Topic: Q6 Skill: APPLIED 97) To understand MIS you need to both understand and relate business and technology to one another. Diff: 3 Type: FIB Page Reference: 13 Topic: Q5 Skill: APPLIED 98) The ability to use basic information systems is essential in today's work environment. Diff: 2 Type: FIB Page Reference: 13 Topic: Q5 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

32


Chapter 1: Information Systems and You

99) To gain a competitive advantage in today's work place your skills need to go beyond the basic use of information systems. Diff: 3 Type: FIB Page Reference: 13 Topic: Q5 Skill: APPLIED 100) In the next decade David Ticoll suggests that unlimited storage will almost be free. Diff: 2 Type: FIB Page Reference: 18 Topic: Q6 Skill: RECALL 101) The collision of the real world and the virtual world will be the result of cheap, reliable, and widely available networks. Diff: M Type: FIB Page Reference: 18 Topic: Q6 Skill: APPLIED 102) You can maximize the value of this course by personalizing the material. Diff: 2 Type: FIB Page Reference: 22 Topic: Q7 Skill: RECALL 103) What does Moore's law have to do with the amount of data being generated today? Do you see this trend continuing? Answer: Gordon Moore's famous observation was made in 1965. It projects the doubling of transistors every couple of years. Moore's Law has been maintained and still holds true today. With respect to storage devices, their capacity has been growing just as rapidly which, in turn, is driving down the price of storage. So now it is feasible to have many exabytes of storage for things like audio and video files. Yes this will most definitely continue to expand, and it is difficult to see where it will end, but things like real time video feeds and real time virtual reality simulations will take huge amounts of processing power and memory in order to store them. Copyright © 2014 Pearson Canada Inc.

33


Chapter 1: Information Systems and You

Diff: 3 Type: ES Page Reference: 15 Topic: Q6 Skill: APPLIED 104) Why is it important for business professionals to know about MIS? Answer: The decisions concerning what functions should be included in corporate information systems is too important to be simply left to the techies. Every business professional should have some knowledge about MIS so that they can be intelligent users and help the system designers to design better systems. Knowing what systems are capable of doing will help when they are interviewed by the systems analysts to determine what the system requirements of the new system will be. They will also have to frequently interact with techies in order to help debug existing systems and even to generate ideas for new applications to improve the company's competitive position. Diff: 2 Type: ES Page Reference: 18 Topic: Q6 Skill: APPLIED 105) How is IT different from an information system? Why is this important? Answer: Whereas IT is concerned with computer hardware, software, and data, which are certainly part of an information system, an information system is a broader concept than IT by itself. Information systems include IT, but also focus on the people that use it and the procedures for using it properly. This is important because IT is just a tool and to get the most out of it, we need to realize that people have to be trained and that proper procedures for using it have to be in place. Diff: 3 Type: ES Page Reference: 10 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

34


Chapter 1: Information Systems and You

106) Explain the difference between Information Technology (IT) and Information Systems (IS). Answer: Information technology and information systems are two closely related terms, but they are different. Information technology refers to methods, inventions, standards, and products. As the term implies, IT refers to raw technology, and it concerns only the hardware, software, and data components of an information system. In contrast, an information system is a system of hardware, data, procedures, and people that produce information. Diff: 2 Type: ES Page Reference: 10 Topic: Q3 Skill: RECALL 107) Describe the functions of a social networking site. Answer: Social Networking sites provides users with the ability not only to create his/her own personal profile, but also to link this profile to friends, family, team members, and other web acquaintances with similar sites. Diff: 3 Type: ES Page Reference: VARIOUS Topic: Q1 Q2 Skill: APPLIED 108) What does the 5 component framework of Information Systems entail? Answer: The 5 component framework of Information Systems consist of hardware, software, data, procedures, and people. Diff: 3 Type: ES Page Reference: 10 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

35


Chapter 1: Information Systems and You

Skill: RECALL 109) What are the responsibilities of a user of Information Systems? Answer: In addition to learning how to use a system, a user is also responsible for protecting the security of the system and its data. When the system fails, a user will have tasks to perform while the system is down, as well as tasks accomplish to help recover the system correctly and quickly. Diff: 3 Type: ES Page Reference: VARIOUS Topic: Q5 Skill: APPLIED 110) Describe the essence of Moore's Law. Answer: In 1965, Gordon Moore said that because of technology improvements in electronic chip design and manufacturing, "The number of transistors per square inch on an integrated chip doubles roughly every 2 years (20 months)." Diff: 3 Type: ES Page Reference: 14 Topic: Q6 Skill: APPLIED 111) What is the definition of MIS? Answer: MIS is the development and use of information systems that help businesses achieve their goals and objectives. This definition has three key elements: development and use, information systems, and business goals and objectives. Diff: 2 Type: ES Page Reference: 6 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

36


Chapter 1: Information Systems and You

Skill: RECALL 112) Describe an example of a company taking advantage of IT resources to further its business interests. Answer: Google uses "content extraction" to better it target its advertising on Gmail to users that may more likely be interested in the ads that they are being shown. The Running Room is using the web to create a better sense of community among its online customers. Diff: 3 Type: ES Page Reference: VARIOUS Topic: Q5 Skill: RECALL 113) What are the required qualifications for those who would like to take advantage of the jobs created by the software and computer services industry? Answer: It is a knowledge-intensive industry where approximately half of all workers process university degrees. Students in the Canadian economy who are working toward becoming business professionals cannot ignore the importance of understanding and working with information systems. Diff: 3 Type: ES Page Reference: 12 Topic: Q4 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

37


Chapter 2: Business Process Management and Decision Making

1) Business processes are synonymous with business systems. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 26 Topic: Q2 Skill: RECALL 2) You should always ask yourself “how can I use my time in school to enhance those skills I already have?” a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 44 Topic: Q8 Skill: RECALL 3) The inventory management process includes placing orders and receiving goods into inventory. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 26 Topic: Q2 Skill: APPLIED 4) In the payment process, the invoice is compared to the purchase order. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

38


Chapter 2: Business Process Management and Decision Making

Diff: 3 Type: TF Page Reference: 27 Topic: Q2 Skill: APPLIED 5) A copy of the purchase order is sent to the customer. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 27 Topic: Q2 Skill: RECALL 6) A business process consists of activities, resources, facilities, and information. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 28 Topic: Q3 Skill: RECALL 7) Any item of value can be considered to be a potential resource for a business process. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 28 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

39


Chapter 2: Business Process Management and Decision Making

8) Activities transform resources and data into different kinds of resources and data. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 28 Topic: Q3 Skill: RECALL 9) An inventory database would be considered to be an example of a facility in the inventory management process. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 28 Topic: Q3 Skill: RECALL 10) The fact that it rained 1.2 inches today is an example of information. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 28 Topic: Q3 Skill: APPLIED 11) The fact that the sun rose this morning at 6:25 a.m. is an example of data. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

40


Chapter 2: Business Process Management and Decision Making

Diff: 2 Type: TF Page Reference: 29 Topic: Q4 Skill: APPLIED 12) Data is another word for information. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 29 Topic: Q4 Skill: APPLIED 13) When data is presented with a meaningful context, it becomes information. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 29 Topic: Q4 Skill: RECALL 14) The information that is the output of one process can be viewed as a data input to another process. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 29 Topic: Q4 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

41


Chapter 2: Business Process Management and Decision Making

15) Each activity within a business process must use one, and only one, information system. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 28 Topic: Q3 Skill: RECALL 16) It is good business practice for a payment activity to have a single person assigned to approve payments and generate checks. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 33 Topic: Q6 Skill: RECALL 17) An executive information system supports strategic decision making. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 36 Topic: Q7 Skill: RECALL 18) A structured decision involves an understood and accepted method for making the decision. a. True b. False Copyright © 2014 Pearson Canada Inc.

42


Chapter 2: Business Process Management and Decision Making

Answer: a Diff: 2 Type: TF Page Reference: 36 Topic: Q7 Skill: RECALL 19) A transaction processing system helps managers allocate and utilize resources. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 35 Topic: Q7 Skill: RECALL 20) During intelligence gathering, the decision makers determine what is to be decided, what the criteria for the decision will be, and what data are available. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 37 Topic: Q7 Skill: RECALL 21) While weather is an unstructured phenomenon, weather forecasting is an example of structured decision making. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 37 Copyright © 2014 Pearson Canada Inc.

43


Chapter 2: Business Process Management and Decision Making

Topic: Q7 Skill: APPLIED 22) The quality of your thinking is a large part of the quality of the information system. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 39 Topic: Q8 Skill: RECALL 23) The review step may lead to another decision and another iteration of the decision making process. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 37 Topic: Q7 Skill: RECALL 24) Your mind and your thinking are not merely a component of the information systems you use; they are the most important component. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 37 Topic: Q8 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

44


Chapter 2: Business Process Management and Decision Making

25) Information needs to be just barely sufficient for the purpose for which it is generated. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 30 Topic: Q4 Skill: RECALL 26) For information to be worth it’s cost, there must be an appropriate relationship between the cost of information and its value. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 30 Topic: Q4 Skill: RECALL 27) A business process is a. a network of activities used to accomplish business goals. b. a set of required steps in a production process. c. a network of activities, resources, facilities, and information that interact to achieve some business function. d. a set of actives in a value chain. e. a set of activities in a supply chain. Answer: c Diff: 2 Type: MC Page Reference: 27 Topic: Q2 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

45


Chapter 2: Business Process Management and Decision Making

28) An information system must produce information that is: a. worth it’s cost, relevant, barely sufficient, accurate. b. relevant, timely, all encompassing, worth it’s cost. c. just barely sufficient, only a year old, worth it’s cost. d. Timely, and accurate. e. accurate and worth it’s cost. Answer: a Diff: 3 Type: MC Page Reference: 29 Topic: Q4 Skill: RECALL 29) Which of the following are characteristics of good information? a. Worth it’s cost, timely, relevant, all encompassing. b. Timely, expensive but complete, relevant. c. Relevant, not many important errors, worth it’s cost. d. Timely, expensive but complete, accurate. e. Timely, relevant, worth it’s cost, barely sufficient, accurate. Answer: e Diff: 3 Type: MC Page Reference: 29 Topic: Q4 Skill: APPLIED 30) Relevant information refers to information that is a. worth the value paid to generate it. b. useful to both the context and the subject at hand. c. good for the purpose for which it is generated. d. produced in time for its intended use. e. correct and complete. Copyright © 2014 Pearson Canada Inc.

46


Chapter 2: Business Process Management and Decision Making

Answer: b Diff: 2 Type: MC Page Reference: 29 Topic: Q4 Skill: RECALL 31) Just barely sufficient information refers to information that is a. correct and complete. b. produced in time for its intended use. c. good for the purpose for which it is generated. d. not useful to the decision being made. e. useful to both the context and the subject at hand. Answer: c Diff: 2 Type: MC Page Reference: 29 Topic: Q4 Skill: RECALL 32) "Worth its cost" refers to information a. that is produced in time for its intended use. b. that is good for the purpose for which it is generated. c. that is collected in a low-cost manner. d. that has an appropriate relationship between its cost and its value. e. that is useful to both the context and the subject at hand. Answer: d Diff: 2 Type: MC Page Reference: 29 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

47


Chapter 2: Business Process Management and Decision Making

33) Operational decisions refer to a. the control of resources and activities over a time period of less than one month. b. day-to-day activities. c. an understood and accepted method for making decisions. d. the allocation and utilization of resources. e. broader-scope, organizational issues. Answer: b Diff: 2 Type: MC Page Reference: 35 Topic: Q7 Skill: RECALL 34) Managerial decisions refer to a. day-to-day activities. b. broader-scope, organizational issues. c. an understood and accepted method for making decisions. d. the allocation and utilization of resources. e. the control of resources and activities. Answer: d Diff: 2 Type: MC Page Reference: 35 Topic: Q7 Skill: RECALL 35) Strategic decision refer to a. the allocation and utilization of resources. b. broader-scope, organizational issues. c. day-to-day activities. d. transactions details. e. an understood and accepted method for making decisions.

Copyright © 2014 Pearson Canada Inc.

48


Chapter 2: Business Process Management and Decision Making

Answer: b Diff: 2 Type: MC Page Reference: 35 Topic: Q7 Skill: RECALL 36) A Transaction Processing System supports a. transactional decisions. b. operational decisions. c. strategic decisions. d. executive decisions. e. managerial decisions. Answer: b Diff: 1 Type: MC Page Reference: 35 Topic: Q7 Skill: RECALL 37) A Management Information System supports a. operational decisions. b. managerial decisions. c. strategic decisions. d. unstructured decisions. e. executive decisions. Answer: b Diff: 1 Type: MC Page Reference: 35 Topic: Q7 Skill: RECALL 38) An Executive Information System supports Copyright © 2014 Pearson Canada Inc.

49


Chapter 2: Business Process Management and Decision Making

a. managerial decisions. b. strategic decisions. c. executive decisions. d. structured decisions. e. operational decisions. Answer: b Diff: 1 Type: MC Page Reference: 35 Topic: Q7 Skill: RECALL 39) An understood and accepted method for making decisions is used to make a. managerial decisions. b. operational decisions. c. strategic decisions. d. executive decisions. e. structured decisions. Answer: e Diff: 3 Type: MC Page Reference: 38 Topic: Q7 Skill: RECALL 40) An unstructured decision making process a. is one for which there is an agreed upon decision-making method. b. is one for which there is no documentation required. c. is one for which there are no structured steps. d. is one for which there are no formal procedures. e. is one for which there is no agreed-on decision-making method. Answer: e Diff: 3 Copyright © 2014 Pearson Canada Inc.

50


Chapter 2: Business Process Management and Decision Making

Type: MC Page Reference: 36 Topic: Q7 Skill: RECALL 41) The step in a decision making process where decision markers determine what is to be decided, what the criteria for the decision will be, and what data are available is called a. alternatives formulation. b. decision analysis. c. intelligence gathering. d. the review step. e. the choice step. Answer: c Diff: 2 Type: MC Page Reference: 37 Topic: Q7 Skill: RECALL 42) The stage in a decision making process where decision makers lay out various alternatives is called a. decision analysis. b. intelligence gathering. c. alternatives formulation. d. the choice step. e. the review step. Answer: c Diff: 2 Type: MC Page Reference: 37 Topic: Q7 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

51


Chapter 2: Business Process Management and Decision Making

43) The stage in a decision making process which a decision maker analyze the alternatives and selected one is called a. alternatives formulation. b. the choice step. c. intelligence gathering. d. decision step. e. the review step. Answer: b Diff: 2 Type: MC Page Reference: 37 Topic: Q7 Skill: RECALL 44) An activity can be defined as a. the carrying out of a business procedure. b. a series of steps in a business process. c. an action that supports a business strategy. d. transforming resources and information of one type into resources and information of another type. e. action performed by an actor. Answer: d Diff: 3 Type: MC Page Reference: 28 Topic: Q3 Skill: RECALL 45) Items of value are referred to as a. money. b. valuables. c. resources. d. facilities. e. equipment. Copyright © 2014 Pearson Canada Inc.

52


Chapter 2: Business Process Management and Decision Making

Answer: c Diff: 2 Type: MC Page Reference: 28 Topic: Q3 Skill: RECALL 46) The HELM system improves efficiency by eliminating a. computers aboard tugboats. b. multiple dispatcher log sheets. c. multiple data entries for each job. d. accurate paper work. e. the large number of people involved in completing a job. Answer: c Diff: 1 Type: MC Page Reference: 39 Topic: Q8 Skill: APPLIED 47) Knowledge derived from data can be described as: a. wisdom. b. information. c. knowledge. d. data. e. context. Answer: b Diff: 3 Type: MC Page Reference: 29 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

53


Chapter 2: Business Process Management and Decision Making

48) Recorded facts or figures is (are) a. context. b. information. c. data. d. knowledge. e. processed information. Answer: c Diff: 2 Type: MC Page Reference: 29 Topic: Q4 Skill: RECALL 49) Data presented in a meaningful context can be described as: a. processed information. b. knowledge. c. information. d. processed knowledge. e. processed data. Answer: c Diff: 2 Type: MC Page Reference: 29 Topic: Q4 Skill: RECALL 50) Which of the following is arguably the most important component of an Information System? a. Software b. Hardware c. Processes d. Information e. People Copyright © 2014 Pearson Canada Inc.

54


Chapter 2: Business Process Management and Decision Making

Answer: e Diff: 3 Type: MC Page Reference: 32 Topic: Q6 Skill: APPLIED 51) The review step a. is when the organization makes a decision. b. is when the organization makes a decision and may lead to another decision. c. may lead to another decision. d. is when the organization reviews the results of the decision. e. is when the organization reviews the results of the decision and may lead to another decision. Answer: e Diff: 2 Type: MC Page Reference: 37 Topic: Q7 Skill: APPLIED 52) Which of the following is a structured decision? a. Fortune telling b. Performance appraisals c. Stock marketing forecasting d. Predicting the Super Bowl winner e. Weather forecasting Answer: e Diff: 3 Type: MC Page Reference: 36 Topic: Q7 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

55


Chapter 2: Business Process Management and Decision Making

53) Which of the following is an unstructured decision? a. Allocating furniture and equipment to employees b. Weather forecasting c. Determining the future book value of assets d. Stock marketing forecasting e. Airline pricing Answer: d Diff: 3 Type: MC Page Reference: 36 Topic: Q7 Skill: APPLIED 54) Which of the following is a managerial decision? a. Which invoices should be paid today b. Determining next year's IT budget c. Should we extend credit to a customer d. Determining how many daily transactions have occurred in a specified period e. Should our firm acquire a competing firm Answer: b Diff: 3 Type: MC Page Reference: 35 Topic: Q7 Skill: APPLIED 55) Which of the following is an operational decision? a. Determining next year's IT budget b. Should we extend credit to a customer c. What are our production goals for the next three months d. Which invoices should be paid today e. Should our firm acquire a competing firm Copyright © 2014 Pearson Canada Inc.

56


Chapter 2: Business Process Management and Decision Making

Answer: d Diff: 2 Type: MC Page Reference: 35 Topic: Q7 Skill: RECALL 56) Which of the following is a strategic decision? a. Should we extend credit to a customer b. Determining next year's IT budget c. What wage should we pay a particular employee d. Should our firm acquire a competing firm e. Which invoices should be paid today Answer: d Diff: 2 Type: MC Page Reference: 37 Topic: Q7 Skill: RECALL 57) Which is the following is most useful to a company? a. Knowledge b. Observations c. Decisions d. Information e. Data Answer: a Diff: 3 Type: MC Page Reference: 37 Topic: Q7 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

57


Chapter 2: Business Process Management and Decision Making

58) The average wage for a factory worker is an example of (a) a. data. b. business process. c. knowledge. d. strategy. e. decision. Answer: c Diff: 3 Type: MC Page Reference: 29 Topic: Q4 Skill: APPLIED 59) The statement that Jeff Parks earns less than half the average hourly wage of the Garden Department is a. policy. b. strategy. c. data. d. information. e. decision. Answer: d Diff: 3 Type: MC Page Reference: 29 Topic: Q4 Skill: APPLIED 60) Which systems are typically used during the alternatives formulation step? a. Word processors b. Digital imaging systems c. Presentation software d. Statistics packages e. Collaborative systems Copyright © 2014 Pearson Canada Inc.

58


Chapter 2: Business Process Management and Decision Making

Answer: e Diff: 3 Type: MC Page Reference: 37 Topic: Q7 Skill: APPLIED 61) Which systems are typically used to analysis data and information during the choice step? a. Word processing packages b. Financial modeling tools c. Databases d. Digital imagining packages e. Presentation software Answer: b Diff: 3 Type: MC Page Reference: 37 Topic: Q7 Skill: APPLIED 62) Customer numbers and their names would be an example of the ________ component of an order management information system. a. software b. information c. procedure d. hardware e. people Answer: b Diff: 2 Type: MC Page Reference: 28 Topic: Q3

Copyright © 2014 Pearson Canada Inc.

59


Chapter 2: Business Process Management and Decision Making

Skill: RECALL 63) Business systems are sometimes referred to as business a. networks. b. models. c. channels. d. processes. e. webs. Answer: d Diff: 2 Type: MC Page Reference: 26 Topic: Q2 Skill: RECALL 64) A business process is a network of information, resources, facilities and a. hardware. b. activities. c. systems. d. data. e. knowledge. Answer: b Diff: 2 Type: MC Page Reference: 28 Topic: Q3 Skill: RECALL 65) In the inventory management process, quality inspection would be viewed as a(n) a. activity. b. information output. c. data input. d. resource. Copyright © 2014 Pearson Canada Inc.

60


Chapter 2: Business Process Management and Decision Making

e. facility. Answer: a Diff: 2 Type: MC Page Reference: 28 Topic: Q3 Skill: APPLIED 66) An activity can be ________ or _________ and sometimes blended, depending on how the procedures are executed. a. external, internal b. manual, automated c. internal, automated d. automated, integrated e. integrated, manual Answer: b Diff: 2 Type: MC Page Reference: 28 Topic: Q3 Skill: recall 67) In an automated activity the computer hardware receives its instructions from (the) a. version control program. b. network protocols. c. people. d. software. e. Web services. Answer: d Diff: 2 Type: MC Page Reference: 28 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

61


Chapter 2: Business Process Management and Decision Making

Skill: RECALL 68) Because they have input into the inventory management process, both suppliers and customers are viewed as a. information outputs. b. data inputs c. resources. d. facilities. e. activities. Answer: c Diff: 3 Type: MC Page Reference: 28 Topic: Q3 Skill: RECALL 69) The truck that delivers the orders to the receiving and stocking activity would be viewed in the inventory management process as a(n) a. facility. b. information output. c. activity. d. resource. e. data input Answer: a Diff: 2 Type: MC Page Reference: 28 Topic: Q3 Skill: RECALL 70) Inventories, databases, factories, and equipment are all examples of a. resources. b. information. c. transactions. Copyright © 2014 Pearson Canada Inc.

62


Chapter 2: Business Process Management and Decision Making

d. facilities. e. activities. Answer: d Diff: 2 Type: MC Page Reference: 28 Topic: Q3 Skill: RECALL 71) The on-time performance of all your vendors for a specific item would be an example of a. inventory b. data. c. communication. d. information. e. resource. Answer: d Diff: 2 Type: MC Page Reference: 29 Topic: Q4 Skill: APPLIED 72) For General Motors, the quantity of tire rims received would be an example of a. communication. b. knowledge. c. data. d. information. e. resource. Answer: c Diff: 2 Type: MC Page Reference: 29 Copyright © 2014 Pearson Canada Inc.

63


Chapter 2: Business Process Management and Decision Making

Topic: Q4 Skill: APPLIED 73) In an information system, the software and ________ components are both sets of instructions. a. data b. software c. people d. procedure e. hardware Answer: d Diff: 2 Type: MC Page Reference: 32 Topic: Q6 Skill: RECALL 74) Business processes generate information by combining key data in a specific a. context. b. activity. c. procedure. d. relevance. e. process. Answer: a Diff: 2 Type: MC Page Reference: 29 Topic: Q4 Skill: APPLIED 75) In an information system the people and ________ components are considered to be actors since they can take specific actions. a. hardware b. data Copyright © 2014 Pearson Canada Inc.

64


Chapter 2: Business Process Management and Decision Making

c. people d. procedure e. software Answer: a Diff: 2 Type: MC Page Reference: 32 Topic: Q6 Skill: RECALL 76) _________ would be one of the factors that lead to designing fully automated systems. a. High skill employee positions b. Tasks that require significant employee data inputs c. Low turnover employee positions d. High turnover employee positions e. Tasks that require significant human judgement Answer: d Diff: 3 Type: MC Page Reference: 33 Topic: Q6 Skill: RECALL 77) ________ is (are) instructions for hardware and _________ is (are) instructions for people. a. Procedures, software b. Software, processes c. Data, processes d. Machine instructions, user manuals e. Software, procedures Answer: e Diff: 2 Copyright © 2014 Pearson Canada Inc.

65


Chapter 2: Business Process Management and Decision Making

Type: MC Page Reference: 32 Topic: Q6 Skill: RECALL 78) If you do not know what to do with the information that your IS produces (even if it is a perfectly functioning IS): a. you likely started with faulty data. b. you probably have the wrong communications software. c. ask a techie for a translation. d. you can still make decisions based on that information. e. you are wasting your time and money. Answer: e Diff: 3 Type: MC Page Reference: 39 Topic: Q8 Skill: APPLIED 79) Business Process Modeling Notation provides four graphical elements that can be used to document a process. Diff: 2 Type: FIB Page Reference: 28 Topic: Q3 Skill: RECALL 80) Human resources personnel say that networking is one of the most effective ways of finding a job. Diff: 2 Type: FIB Page Reference: 44 Topic: Q8 Skill: RECALL 81) A purchase order lists the items ordered and the quantity requested of each item. Diff: 2 Copyright © 2014 Pearson Canada Inc.

66


Chapter 2: Business Process Management and Decision Making

Type: FIB Page Reference: 27 Topic: Q2 Skill: RECALL 82) The inventory management process works to balance the demands from customers with the inventory purchased from suppliers. Diff: 2 Type: FIB Page Reference: 27 Topic: Q2 Skill: RECALL 83) When stock in inventory hits a critical point, it is called the reorder point. Diff: 2 Type: FIB Page Reference: 27 Topic: Q2 Skill: RECALL 84) The most common definition of information is that it is derived from data, where data is defined as recorded facts. Diff: 2 Type: FIB Page Reference: 29 Topic: Q4 Skill: RECALL 85) Good information is based on complete and correct data. Diff: 2 Type: FIB Page Reference: 29 Topic: Q4 Skill: RECALL 86) Timely information is produced in time for its intended use. Diff: 2 Type: FIB Page Reference: 29 Topic: Q4 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

67


Chapter 2: Business Process Management and Decision Making

87) Information should be relevant to both the context and the subject. Diff: 2 Type: FIB Page Reference: 30 Topic: Q4 Skill: RECALL 88) For information to be worth its cost there must be an appropriate relationship between the cost of information and its value. Diff: 2 Type: FIB Page Reference: 30 Topic: Q4 Skill: RECALL 89) Software and procedure components are both sets of instructions. Diff: 2 Type: FIB Page Reference: 32 Topic: Q6 Skill: RECALL 90) Managerial decisions concern the allocation and utilization of resources. Diff: 2 Type: FIB Page Reference: 35 Topic: Q7 Skill: RECALL 91) An employee's name and number would be an example of data. Diff: 2 Type: FIB Page Reference: 29 Topic: Q4 Skill: RECALL 92) The average compensation for sales agents in a company would be an example of information. Diff: 2 Copyright © 2014 Pearson Canada Inc.

68


Chapter 2: Business Process Management and Decision Making

Type: FIB Page Reference: 29 Topic: Q4 Skill: RECALL 93) Data are raw, unprocessed facts such as inventory levels. Diff: 2 Type: FIB Page Reference: 29 Topic: Q4 Skill: RECALL 94) Automation is the process of moving human work to the computer side of the information system. Diff: 2 Type: FIB Page Reference: 33 Topic: Q6 Skill: RECALL 95) Data becomes information when it has a(n) context. Diff: 2 Type: FIB Page Reference: 29 Topic: Q4 Skill: RECALL 96) The fact that oil costs $74.25 a barrel is an example of data. Diff: 2 Type: FIB Page Reference: 29 Topic: Q4 Skill: APPLIED 97) Data is the bridge between the human and computer components of an information system. Diff: 2 Type: FIB Page Reference: 29 Topic: Q4 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

69


Chapter 2: Business Process Management and Decision Making

98) The way in which you run a program such as a spreadsheet program is called a(n) procedure. Diff: 3 Type: FIB Page Reference: 32 Topic: Q6 Skill: APPLIED 99) Instructions for how a computer should perform specific tasks is (are) called software. Diff: 2 Type: FIB Page Reference: 32 Topic: Q6 Skill: RECALL 100) From a business process view, order placement in an inventory management process would be a(n) activity. Diff: 3 Type: FIB Page Reference: 28 Topic: Q3 Skill: APPLIED 101) A customer acts as a(n) resource in the inventory management process. Diff: 3 Type: FIB Page Reference: 28 Topic: Q3 Skill: RECALL 102) A network of activities, resources, facilities, and information that interact to achieve some business function is a(n) business process. Diff: 2 Type: FIB Page Reference: 27 Topic: Q2 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

70


Chapter 2: Business Process Management and Decision Making

103) From a business process viewpoint, a warehouse that stores inventory would be a(n) facility. Diff: 2 Type: FIB Page Reference: 28 Topic: Q3 Skill: RECALL 104) The payment activity transforms invoice information into payment information. Diff: 3 Type: FIB Page Reference: 28 Topic: Q3 Skill: APPLIED 105) An example of a(n) manual payment activity is seen when an accounts payable clerk receives and checks the accuracy of invoices against the purchase orders before issuing a payment. Diff: 2 Type: FIB Page Reference: 34 Topic: Q6 Skill: RECAL 106) Provide an example of a managerial decision. Answer: Any decisions that involves the allocation and utilization of resources. Typical managerial decisions are: How much should we budget for computer hardware and programs for department A next year? How many engineers should we assign to project B? Diff: 3 Type: ES Page Reference: 35 Topic: Q7 Skill: APPLIED 107) Provide an example of an operational decision.

Copyright © 2014 Pearson Canada Inc.

71


Chapter 2: Business Process Management and Decision Making

Answer: Operational decisions concern day-to-day actives. Typical operational decisions are: How many widgets should we order from vendor A? Should we extend credit to vendor B? Which invoices should we pay today? Diff: 3 Type: ES Page Reference: 37 Topic: Q7 Skill: APPLIED 108) Provide an example of a strategic decision. Answer: Strategic decisions concern broader-scope, organizational issues. Typical decisions at the strategic levels are: Should we start a new product line? Should we open a centralized warehouse in Calgary? Diff: 3 Type: ES Page Reference: 36 Topic: Q7 Skill: APPLIED 109) Provide an example of an unstructured decision. Answer: An unstructured decision process is one for which there is no agreed-on decision-making method. Predicting the future direction fo the economy or the stock market is a famous example. Diff: 3 Type: ES Page Reference: 36 Topic: Q7 Skill: APPLIED 110) Provide an example of a structured decision. Answer: Copyright © 2014 Pearson Canada Inc.

72


Chapter 2: Business Process Management and Decision Making

A structured decision is one for which there is an understood and accepted method for making the decision. A formula for computing the reorder quantity of an item in inventory is an example of a structured decision process. Diff: 3 Type: ES Page Reference: 36 Topic: Q7 Skill: APPLIED 111) Describe the types of systems used during the intelligence gathering step. Answer: During intelligence gathering, email and video conferences facilitate communication among the decision markers. Also, during the first phase, decision makers use query and reporting systems as well as other types of data analysis applications to obtain relevant data. Diff: 3 Type: ES Page Reference: 37 Topic: Q7 Skill: RECALL 112) Describe the types of systems used during the choice step. Answer: During the choice step, analysis applications such as spreadsheets and financial and other modelling applications help decision makers to analyze alternatives. Diff: 3 Type: ES Page Reference: 37 Topic: Q7 Skill: RECALL 113) Describe the types of systems used during the implementation step. Answer:

Copyright © 2014 Pearson Canada Inc.

73


Chapter 2: Business Process Management and Decision Making

The implementation stage involves the use of communications applications, and all types of information systems can be used during review. Diff: 3 Type: ES Page Reference: 37 Topic: Q7 Skill: RECALL 114) What does a transaction processing system support? Answer: A transaction processing system supports operational decisions. Diff: 2 Type: ES Page Reference: 35 Topic: Q7 Skill: RECALL 115) What does an executive information system support? Answer: Information systems that support strategic decision making are called executive information system. Diff: 2 Type: ES Page Reference: 36 Topic: Q7 Skill: RECALL 116) What is meant by a business process? Give an example. Answer: A business process is defined as being a network of activities, resources, facilities, and information that interact to achieve some business function. Sometimes they are also referred to as business systems. The text describes an example of the inventory management process which starts with Purchasing activities and ends with the Payment

Copyright © 2014 Pearson Canada Inc.

74


Chapter 2: Business Process Management and Decision Making

activity. Other common processes might include the sales order management process and the employee recruiting process. Diff: 2 Type: ES Page Reference: 26 Topic: Q2 Skill: RECALL 117) What is data and how is it different from information? Answer: Data are simply the raw recorded facts and figures. Data is one of the five basic components of an information system. The system turns data into information by classifying, summarizing, sorting it and giving it a meaningful context. Diff: 3 Type: ES Page Reference: 29 Topic: Q4 Skill: APPLIED 118) What are the components of a business process? Give examples of each. Answer: The components of a business process include activities, resources, facilities, and information. Activities transform resources and information from one type into another. This happens when a clerk checks a customer credit rating before entering in a sales order for that customer. Resources are items of interest to the process. They interact with the process but are not under direct control of the organization. These could be customers and vendors. Facilities include databases, inventories, factories and equipment. Information is what activities use to determine how to transform the inputs they receive into outputs they produce. Diff: 3 Type: ES Page Reference: 28 Topic: Q3 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

75


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

1) The goal of business process modeling is to provide a description of a process. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 47 Topic: Q1 Skill: RECALL 2) A company creates value just by creating a model of a business process. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 48 Topic: Q1 Skill: RECALL 3) One of the added values a business process model provides is the notion of making individuals process aware. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 48 Topic: Q1 Skill: APPLIED 4) MS Visio files can be identified by their .psd filename extension. a. True b. False Answer: b Diff: 2 Copyright © 2014 Pearson Canada Inc.

76


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

Type: TF Page Reference: 48 Topic: Q2 Skill: RECALL 5) Data flow diagrams, UML and systems flowcharts are common process modeling techniques. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 49 Topic: Q2 Skill: RECALL 6) Data flow diagramming is used by approximately 60% of all data modeling practitioners. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 49 Topic: Q2 Skill: RECALL 7) The most commonly used process modleling application is MS Visio, which is used by approximately 74% of all practitioners. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 49 Topic: Q2 Copyright © 2014 Pearson Canada Inc.

77


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

Skill: RECALL 8) In MS Visio the data store symbolizes a place where you would purchase IS applications. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 51 Topic: Q3 Skill: RECALL 9) DFD’s use a set of relatively simple shapes as representations of parts of a business process. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 51 Topic: Q3 Skill: RECALL 10) There are three basic rules for drawing a DFD. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 51 Topic: Q3 Skill: RECALL 11) Every process should have at least two data flow connectors coming into it and least two data flow connectors coming out of it. Copyright © 2014 Pearson Canada Inc.

78


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 51 Topic: Q3 Skill: RECALL 12) An external entity should be connected directly to a data store. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 51 Topic: Q3 Skill: RECALL 13) A data store must be connected to a process. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 51 Topic: Q3 Skill: RECALL 14) Levelling reveals increasing amounts of detail. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 51 Copyright © 2014 Pearson Canada Inc.

79


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

Topic: Q3 Skill: RECALL 15) In DFD, the Top Process or Level 0 diagram does not provide much detail about the process. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 52 Topic: Q3 Skill: RECALL 16) The primary goal of business process modeling is to create a. a series of accounting checks and balances. b. a description of a flow of events or information in a business. c. a 3-D computer representation of a product. d. a list of people involved in customer service. e. competitive advantage. Answer: b Diff: 2 Type: MC Page Reference: 47 Topic: Q1 Skill: RECALL 17) For any organization, creating new value may include getting its people more involved in process knowledge. This is called making individuals ________________. a. educated. b. company citizens. c. process aware. d. alert. e. lean.

Copyright © 2014 Pearson Canada Inc.

80


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

Answer: c Diff: 2 Type: MC Page Reference: 48 Topic: Q1 Skill: RECALL 18) Process models can create _____________ when they help individuals develop an improved understanding of the process as a whole and become more process aware. a. new products b. economies of scale c. job security d. information e. value Answer: e Diff: 2 Type: MC Page Reference: 48 Topic: Q1 Skill: RECALL 19) Applications that support the development of business process models are referred to as a. modeling tools. b. worksheets. c. information systems. d. graphics programs. e. props. Answer: a Diff: 2 Type: MC Page Reference: 48 Topic: Q2

Copyright © 2014 Pearson Canada Inc.

81


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

Skill: RECALL 20) ________________ include data flow diagrams, systems flowcharts, UML and BPMN. a. Storage views b. System layouts c. Information tables d. Process modeling techniques e. Data marts Answer: d Diff: 2 Type: MC Page Reference: 49 Topic: Q2 Skill: RECALL 21) Data flow diagrams are used by approximately _________ of all process modeling practitioners a. 78% b. 55% c. 78% d. 42% e. 60% Answer: e Diff: 2 Type: MC Page Reference: 49 Topic: Q2 Skill: RECALL 22) Process modeling practitioners most often use a. Oracle Developer b. Page Layout c. Rational Rose Copyright © 2014 Pearson Canada Inc.

82


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

d. MS Visio e. MS Excel Answer: d Diff: 2 Type: MC Page Reference: 49 Topic: Q2 Skill: RECALL 23) DFD shapes include a. process, octagons and interface. b. interface, neural, and connector. c. connector, data store and process. d. Page layout, process and interface. e. Insert, delete and typeover. Answer: c Diff: 2 Type: MC Page Reference: 50 Topic: Q3 Skill: RECALL 24) The data store symbolizes a place where data is a. either stored or retrieved. b. edited and corrected. c. audited and collated. d. collected and mined. e. scrubbed and normalized. Answer: a Diff: 3 Type: MC Page Reference: 51 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

83


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

Skill: RECALL 25) There are ________ rules for combining shapes. a. new b. three c. dozens of d. no e. data driven Answer: b Diff: 2 Type: MC Page Reference: 51 Topic: Q3 Skill: RECALL 26) A data store cannot be directly ______________ an external entity. a. purchased from b. listed with c. stored by d. connected to e. leased from Answer: d Diff: 3 Type: MC Page Reference: 51 Topic: Q3 Skill: RECALL 27) Business processes can be quite complex. Data flow diagrams use ________ to display the various details of the process. a. plates b. levels c. numbers d. data stores Copyright © 2014 Pearson Canada Inc.

84


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

e. connects Answer: b Diff: 3 Type: MC Page Reference: 51 Topic: Q3 Skill: APPLIED 28) Data flow diagrams are constructed by using a. a set of process references. b. four shapes and three rules. c. information systems. d. relative process references. e. activities and resources. Answer: b Diff: 1 Type: MC Page Reference: 50 Topic: Q3 Skill: RECALL 29) To create a new level after level 0, in MS Visio, we have to insert a new a. date. b. premise. c. diagram. d. number. e. person. Answer: c Diff: 2 Type: MC Page Reference: 52 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

85


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

30) Scheduling employees to support an international figure skating contest would be an example of _____________ that could be mapped by a process modeling tool. a. a process b. a set of variables c. a spreadsheet d. payroll e. security system Answer: a Diff: 2 Type: MC Page Reference: 52 Topic: Q3 Skill: APPLIED 31) MS Visio files have the file extenstion a. (.exe) b. (.osd) c. (.vsd) d. (.DFD) e. (.doc) Answer: c Diff: 2 Type: MC Page Reference: 48 Topic: Q2 Skill: RECALL 32) Every process should have at least one data flow __________ coming into it and out of it. a. diagram b. entity c. positive d. connector Copyright © 2014 Pearson Canada Inc.

86


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

e. MS Visio file Answer: d Diff: 1 Type: MC Page Reference: 51 Topic: Q3 Skill: RECALL 33) Data stores cannot be directly connected to an external ________. a. data store. b. entity. c. process. d. connector. e. flow. Answer: b Diff: 3 Type: MC Page Reference: 51 Topic: Q3 Skill: RECALL 34) A data store can be connected to an external entity a. at the end of the year. b. if the external entity is secure. c. if the external entity is connected to another data store. d. through a process. e. after an IS audit. Answer: d Diff: 3 Type: MC Page Reference: 51 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

87


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

35) The interface represents a(n) ______________ that exists outside the process. a. absolute name b. person or thing c. cell reference d. date e. data point Answer: b Diff: 2 Type: MC Page Reference: 51 Topic: Q3 Skill: RECALL 36) Flow Diagrams UML and systems flowcharts are common process modelling techniques. Diff: 1 Type: FIB Page Reference: 49 Topic: Q1 Skill: RECALL 37) In DFD’s, the data store symbolizes a place where data is either stored or retrieved. Diff: 1 Type: FIB Page Reference: 51 Topic: Q1 Skill: RECALL 38) Levelling reveals increasing amounts of detail. Diff: 2 Type: FIB Page Reference: 51 Topic: Q3 Skill: RECALL 39) There are three basic rules for drawing a Data Flow Diagram. Diff: 2 Type: FIB Page Reference: 51 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

88


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

Skill: RECALL 40) One of the added values a business process model provides is the notion of making individuals process aware. Diff: 2 Type: FIB Page Reference: 48 Topic: Q1 Skill: RECALL 41) There are four simple shapes used in Data Flow Diagrams. Diff: 2 Type: FIB Page Reference: 50 Topic: Q3 Skill: RECALL 42) Process models can create value when they help individuals develop an improved understanding of the process as a whole and become more process aware. Diff: 2 Type: FIB Page Reference: 48 Topic: Q1 Skill: RECALL 43) MS Visio is the most popular application used by data modeling practitioners. Diff: 2 Type: FIB Page Reference: 49 Topic: Q2 Skill: RECALL 44) The lowest amount of detail shown in a DFD is the Level 0 or top process. Diff: 2 Type: FIB Page Reference: 51 Topic: Q3 Skill: RECALL 45) Business process modeling can be seen as the creation of a diagram that provides an overview of a flow of events. Diff: 2 Type: FIB Page Reference: 47 Topic: Q1 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

89


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

46) Describe how business process modelling can add value to an organization. Be sure to include and define the term “process aware”. Answer: Business process modelling provides an organization with the big picture of its processes so that everyone involved in each process can have a wider and more inclusive perspective of the flow of events that occur towards the delivery of the final product or service. This modelling enhances communication and thus make individuals process aware. When people are process aware, they are expected to view their actions in the light of the larger business process, and they think of ways to improve the processes they are involved in. Diff: 2 Type: ES Page Reference: 48 Topic: Q1 Skill: APPLIED 47) List the rules that apply to combining shapes in data flow diagrams. Answer:

Diff: 3 Type: ES Page Reference: 51 Topic: Q3 Skill: RECALL 48) Define the four shapes in a data flow diagram and give a real-life example of each. Answer:

Diff: 3 Type: ES Page Reference: 50 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

90


Application Extension 2a: Introduction to Business Process Modelling with MS Visio

Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

91


Chapter 3: Productivity, Innovation and Strategy

1) Primary activities are activities where value is added directly to the product. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 64 Topic: Q3 Skill: RECALL 2) The increasing reliance on the web for information has created a digital divide between those who have Internet access and those who do not. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 80 Topic: Q6 Skill: RECALL 3) Threat of government regulation is one of the five forces in Porter's model. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 67 Topic: Q4 Skill: RECALL 4) Sustaining technologies are changes in technology that maintain the rate of improvement in customer value. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

92


Chapter 3: Productivity, Innovation and Strategy

Diff: 2 Type: TF Page Reference: 69 Topic: Q5 Skill: RECALL 5) Disruptive technologies introduce a very new package of attributes to the accepted mainstream products. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 69 Topic: Q5 Skill: RECALL 6) An organization responds to the structure of its industry by choosing a competitive strategy. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 68 Topic: Q4 Skill: RECALL 7) The productivity paradox suggests IT investments do not create business value. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 60 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

93


Chapter 3: Productivity, Innovation and Strategy

Skill: RECALL 8) A value chain is a network of activities that improve the effectiveness of a good or service. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 63 Topic: Q3 Skill: RECALL 9) Porter's concept of a business chain is crucial for developing a competitive strategy. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 65 Topic: Q3 Skill: RECALL 10) As defined by Porter, a value chain is a network of value creating activities. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 65 Topic: Q3 Skill: RECALL 11) Sales and service would be examples of supporting activities in Porter's value chain model. a. True Copyright © 2014 Pearson Canada Inc.

94


Chapter 3: Productivity, Innovation and Strategy

b. False Answer: b Diff: 2 Type: TF Page Reference: 65 Topic: Q3 Skill: RECALL 12) Accounting functions like accounts receivables would be an example of a supporting activity in Porter's value chain model. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 65 Topic: Q3 Skill: APPLIED 13) An organization's goals and objectives are determined by the structure of its value chain. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 65 Topic: Q3 Skill: APPLIED 14) One way of assessing the structure of the adventure travel industry is to apply Porter's Five Forces Model. a. True b. False Answer: a Diff: 2 Copyright © 2014 Pearson Canada Inc.

95


Chapter 3: Productivity, Innovation and Strategy

Type: TF Page Reference: 69 Topic: Q4 Skill: APPLIED 15) In a large city, the threat of new entrants for the sandwich shop business is probably high. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 68 Topic: Q4 Skill: APPLIED 16) Among its suppliers, Wal-Mart is famous for not having much bargaining power. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 68 Topic: Q4 Skill: APPLIED 17) Porter identified five fundamental competitive strategies. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 68 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

96


Chapter 3: Productivity, Innovation and Strategy

18) According to Porter's model, four competitive forces determine industry profitability. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 68 Topic: Q4 Skill: RECALL 19) The bargaining power of customers is one of the competitive forces identified by Porter. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 68 Topic: Q4 Skill: RECALL 20) The bargaining power of customers is one of the competitive strategies identified by Porter. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 68 Topic: Q4 Skill: RECALL 21) Some competitive advantages are less sustainable than others. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

97


Chapter 3: Productivity, Innovation and Strategy

Diff: 1 Type: TF Page Reference: 68 Topic: Q4 Skill: RECALL 22) The systems chosen to support a particular competitive strategy may be evaluated according to the support they give that strategy. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: VARIOUS Topic: Q4 Q6 Skill: APPLIED 23) A call centre used for customer service would be an example of a support activity in the value chain. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 65 Topic: Q3 Skill: APPLIED 24) In Porter's Five Forces Model the linkages depict how competitive forces are deployed in an organization. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 67 Copyright © 2014 Pearson Canada Inc.

98


Chapter 3: Productivity, Innovation and Strategy

Topic: Q4 Skill: RECALL 25) Switching costs are those associated with network switches. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 71 Topic: Q6 Skill: RECALL 26) An information system that allows suppliers to view a company's inventory in realtime would provide a competitive advantage due to product differentiation. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 68 Topic: Q6 Skill: APPLIED 27) General Motors' OnStar system was developed so that car drivers could easily get help in emergency situations. This would be an example of an information system being used to differentiate a product. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 69 Topic: Q4 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

99


Chapter 3: Productivity, Innovation and Strategy

28) Which of the following is an example of a primary activity in a value chain? a. A manager preparing a production schedule b. A CFO preparing a budget c. An accountant preparing an income statement d. A computer technician backing up a file server e. A worker spray painting a car Answer: e Diff: 3 Type: MC Page Reference: 65 Topic: Q3 Skill: APPLIED 29) A primary activity in a value chain is best described as a. an activity that uses only raw materials. b. an activity that involves customer service and sales. c. an activity that requires the use of information systems. d. an activity which value is directly added to a product. e. the first activity in which value is created. Answer: d Diff: 2 Type: MC Page Reference: 64 Topic: Q3 Skill: RECALL 30) The physically assembly of a notebook computer is considered to be a. a support activity in a value chain. b. a production activity in a value chain. c. a primary activity in a value chain. d. a secondary activity in a value chain. e. a value adding activity in a value chain.

Copyright © 2014 Pearson Canada Inc.

100


Chapter 3: Productivity, Innovation and Strategy

Answer: c Diff: 2 Type: MC Page Reference: 64 Topic: Q3 Skill: APPLIED 31) Which of the following is an example of a supporting activity in a value chain? a. An accountant filing an income tax statement b. Assembling a product c. Product package design d. A bottle of wine being shipped to a warehouse e. Product safety tests Answer: a Diff: 2 Type: MC Page Reference: 65 Topic: Q3 Skill: APPLIED 32) A supporting activity in a value chain is best described as a. information technology related activities. b. activities that do not require manual labor. c. activities that support the primary activities in a value chain. d. activities that add no value to a value chain. e. maintenance related activities. Answer: c Diff: 2 Type: MC Page Reference: 65 Topic: Q3 Skill: RECALL 33) The observed lack of productivity from IT investments is most likely the result of Copyright © 2014 Pearson Canada Inc.

101


Chapter 3: Productivity, Innovation and Strategy

a. measurement errors. b. inflation. c. declining interest rates. d. the introduction of new technologies. e. continued drops in hardware prices. Answer: a Diff: 3 Type: MC Page Reference: 61 Topic: Q1 Skill: RECALL 34) The Productivity Paradox refers to a. increased spending on IT leading to decreased worker productivity. b. the evidence that suggests IT is irrelevant to worker productivity. c. increased IT investment leading to more sustainable competitive advantage. d. the lack of evidence of an increase in worker productivity associated with the massive increase in IT spending. e. falling computer prices due to increased processor speed. Answer: d Diff: 2 Type: MC Page Reference: 60 Topic: Q1 Skill: APPLIED 35) The difficulty in measuring productivity is largely due to a. the lack of measuring tools. b. the difficulty of measuring intangible benefits. c. an increasingly service-based economy. d. IT creating intangible benefits. e. the intangible benefits of IT in an increasingly service-based economy. Answer: e Copyright © 2014 Pearson Canada Inc.

102


Chapter 3: Productivity, Innovation and Strategy

Diff: 3 Type: MC Page Reference: 61 Topic: Q1 Skill: RECALL 36) IT investments can generate value by a. limiting the opportunities for creating competitive advantages. b. decreasing productivity. c. creating larger and larger service based economies. d. limiting the ways corporations can compete. e. creating more efficient and effective business processes that lead to lower prices. Answer: e Diff: 3 Type: MC Page Reference: 61 Topic: Q1 Skill: APPLIED 37) Increasing efficiency means a. generating better quality products with less resources. b. maximizing the cost of production. c. shorter production times. d. accomplishing business processes with less input and/or higher speeds. e. higher speed processes at the cost of more resources and lower quality. Answer: d Diff: 2 Type: MC Page Reference: 63 Topic: Q3 Skill: RECALL 38) "Doing things right" refers to a. efficiency. Copyright © 2014 Pearson Canada Inc.

103


Chapter 3: Productivity, Innovation and Strategy

b. value creation. c. effectiveness. d. social responsibility. e. sustainability. Answer: a Diff: 2 Type: MC Page Reference: 63 Topic: Q3 Skill: RECALL 39) "Doing the right things" refers to a. efficiency. b. social responsibility. c. improved quality. d. effectiveness. e. sustainability. Answer: d Diff: 2 Type: MC Page Reference: 63 Topic: Q3 Skill: RECALL 40) A value chain (is) a. a group of activities that improve the effectiveness of a good or service. b. describes how a product moves through a distribution channel. c. a group of activities that improve the efficiency of a good or service. d. describes total amount of money spent on making a product. e. describes the transactions that occur between the vendor and the consumer. Answer: a Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

104


Chapter 3: Productivity, Innovation and Strategy

Page Reference: 63 Topic: Q3 Skill: RECALL 41) Margin can be defined as a. the difference between the total cost of raw materials and the list price of a product. b. the difference of the price a customer is willing to pay and how much the company actually collects. c. the difference of the price a customer is willing to pay and the price a seller is willing to sell at. d. the difference between the selling price and the list price. e. the difference of the price a customer is willing to pay and the cost of moving the good or service through its value chain. Answer: e Diff: 2 Type: MC Page Reference: 64 Topic: Q3 Skill: RECALL 42) Which of the following is not a force in the Porter's five forces model? a. Threat of substitute products b. Bargaining power of suppliers c. Bargaining power of customers d. Threat of new entries e. Threat of government regulations Answer: e Diff: 2 Type: MC Page Reference: 67 Topic: Q4 Skill: RECALL 43) Which of the following is the best example of the bargaining power of suppliers? Copyright © 2014 Pearson Canada Inc.

105


Chapter 3: Productivity, Innovation and Strategy

a. The customer's flexibility to switch suppliers at any time. b. The ability of a dominant microprocessor manufacturer to set industry standards and charge premium prices. c. The ability to negotiate better terms with a commodity producer after a competitive bidding process. d. The ability of a customer to shop around for suppliers. e. The inability for a customer to terminate a supply contract. Answer: b Diff: 3 Type: MC Page Reference: 68 Topic: Q4 Skill: APPLIED 44) Which of the following is a fundamental competitive strategy suggested by Porter? a. Growing the diversity of the products and / or service offered b. Providing the best customer service c. Creating alliance partners d. Developing innovative products e. Differentiating its products Answer: e Diff: 3 Type: MC Page Reference: 68 Topic: Q4 Skill: RECALL 45) Which of Porter's five forces best describes the decline of film based photography? a. Threat of substitute products b. Bargaining power of suppliers c. Threat of new entry d. Bargaining power of customers e. Rivalry among existing firms

Copyright © 2014 Pearson Canada Inc.

106


Chapter 3: Productivity, Innovation and Strategy

Answer: a Diff: 2 Type: MC Page Reference: 67 Topic: Q4 Skill: APPLIED 46) High switching cost refers to a. a service charge that discourages customers from switching service providers. b. a strategy employed by companies to prevent customers from renegotiating service contracts. c. an illegal tactic that prevents customers from leaving by charging a prohibitive service termination fee. d. a strategy employed by companies to lock in customers by making it difficult or expensive to switch to another product. e. a strategy used by telecom providers to retain customers. Answer: d Diff: 2 Type: MC Page Reference: 71 Topic: Q6 Skill: RECALL 47) Which of the following best describes Bower and Christensen's idea of a sustaining technology? a. A technology innovation that increases the rate of improvement in customer value. b. A technology innovation that provides a very new package of attributes from the accepted mainstream products. c. A technology innovation that ensures environmental sustainability. d. A technology innovation that decreases the rate of improvement in customer value. e. A technology innovation that maintains the rate of improvement in customer value. Answer: e Diff: 2 Type: MC Page Reference: 69 Copyright © 2014 Pearson Canada Inc.

107


Chapter 3: Productivity, Innovation and Strategy

Topic: Q5 Skill: RECALL 48) Which of the following can be considered a sustaining technology? a. An internal antenna for cell phones b. A BlackBerry device c. MP3 file format d. A typewriter e. A photocopier Answer: a Diff: 3 Type: MC Page Reference: 69 Topic: Q5 Skill: APPLIED 49) Disruptive technologies refer to a. technological innovations that increase the value of existing products in an incremental way. b. technological innovations that cause major disruptions in IT operations. c. technological innovations that decrease the value of existing products. d. technological innovations that repackage attributes of existing products in a totally new way. e. technological innovations that set a new standard, like High Definition Television. Answer: d Diff: 2 Type: MC Page Reference: 69 Topic: Q5 Skill: RECALL 50) Which of the following can be best described as a disruptive technology? a. Vulcanized rubber tires b. Compact Discs Copyright © 2014 Pearson Canada Inc.

108


Chapter 3: Productivity, Innovation and Strategy

c. Digital music players d. Liquid Crystal Displays e. Portable computers Answer: c Diff: 2 Type: MC Page Reference: 69 Topic: Q5 Skill: RECALL 51) Which of the following can create a barrier to entry? a. Small capital investment required b. Patents c. Minimal training needed d. Can be done from home e. Low labour costs Answer: b Diff: 2 Type: MC Page Reference: 71 Topic: Q6 Skill: RECALL 52) In "IT doesn't Matter", Nicholas Carr argues that a. disruptive technologies tend to be commoditized over time and hence provides less strategic advantage. b. companies are spending too much money on IT. c. there are no productivity gains for any amount of IT investments. d. the marginal benefits of an IT investment decreases over time. e. technology adds no value to companies. Answer: a Diff: 3 Type: MC Copyright © 2014 Pearson Canada Inc.

109


Chapter 3: Productivity, Innovation and Strategy

Page Reference: 72 Topic: Q7 Skill: RECALL 53) Sustained competitive advantage requires a. companies to find a distinctive way to compete. b. the elimination of the dominant firm. c. companies to seek patent protection for their products. d. the creation of barriers of entry. e. companies to use more than one competitive strategies. Answer: a Diff: 2 Type: MC Page Reference: 73 Topic: Q7 Skill: RECALL 54) Information systems can change industry structure by a. using sustaining technologies. b. using technologies that have become commodities. c. using competitive strategies. d. using the Internet. e. using disruptive technologies. Answer: e Diff: 2 Type: MC Page Reference: 70 Topic: Q5 Skill: RECALL 55) A company can use products to create competitive advantage by a. differentiating its products. b. raising prices. Copyright © 2014 Pearson Canada Inc.

110


Chapter 3: Productivity, Innovation and Strategy

c. adding products to its product line. d. increasing brand awareness. e. lowering prices. Answer: a Diff: 2 Type: MC Page Reference: 71 Topic: Q6 Skill: RECALL 56) A company can create competitive advantage by a. lowering switching costs. b. refusing alliances. c. staying with the “tried and true” processes that competitors use. d. reducing barriers to entry. e. adding technology to its business process. Answer: e Diff: 3 Type: MC Page Reference: 72 Topic: Q7 Skill: APPLIED 57) How can competitive advantage through IT be sustained? a. Competitive advantage through IT cannot be sustained. b. By using as much proprietary technologies as possible. c. By making all employees sign nondisclosure agreements. d. By suing any competitor whom your firm suspect is copying its systems. e. By integrating all value creation processes into the organization. Answer: e Diff: 3 Type: MC Page Reference: 73 Copyright © 2014 Pearson Canada Inc.

111


Chapter 3: Productivity, Innovation and Strategy

Topic: Q7 Skill: APPLIED 58) Which of the following makes it difficult for a company to copy a rival's information systems? a. The data is different in the two organizations. b. It is difficult to duplicate business processes. c. Technology may not be available for sale. d. mastering the art of integrating technology and people. e. Talent is hard to recruit. Answer: d Diff: 3 Type: MC Page Reference: 73 Topic: Q7 Skill: APPLIED 59) In the context of Porter's five forces model, customer's bargaining power refers to a. a customer's ability to create barriers to entry. b. a customer's ability to alter his/her value chain. c. a customer's ability to integrate IT. d. a customer's ability to negotiate better prices. e. a customer’s ability to create substitutes. Answer: d Diff: 2 Type: MC Page Reference: 67 Topic: Q4 Skill: APPLIED 60) Which of the following best describes the introduction of a disruptive technology in Canada? a. The introduction of high definition TV b. The introduction of movies on DVDs Copyright © 2014 Pearson Canada Inc.

112


Chapter 3: Productivity, Innovation and Strategy

c. The introduction of satellite radio d. The introduction of digital projection in theatres e. The introduction of Automatic Teller Machines Answer: e Diff: 3 Type: MC Page Reference: 70 Topic: Q5 Skill: APPLIED 61) The network of activities that improve the effectiveness of a good or service is called a. a value chain. b. a supplier network. c. competitive strategies. d. a supply chain. e. a value web. Answer: a Diff: 2 Type: MC Page Reference: 63 Topic: Q3 Skill: RECALL 62) What term is given to Robert Solow’s quote, "We see computers everywhere except in the productivity statistics"? a. The productivity divide b. The digital divide c. The efficiency paradox d. The productivity gap e. The productivity paradox Answer: e Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

113


Chapter 3: Productivity, Innovation and Strategy

Page Reference: 60 Topic: Q1 Skill: RECALL 63) A network of value-creating activities is called a a. business strategy. b. value network. c. value chain. d. competitive advantage. e. primary value activities. Answer: c Diff: 2 Type: MC Page Reference: 63 Topic: Q3 Skill: RECALL 64) ________ is an example of a primary activity in Porter's value chain model. a. New IS development b. Shipping and receiving c. HR planning d. Strategic planning e. Accounting Answer: b Diff: 2 Type: MC Page Reference: 65 Topic: Q3 Skill: RECALL 65) ________ is an example of a support activity in Porter's value chain model. a. HR benefits management b. Production Copyright © 2014 Pearson Canada Inc.

114


Chapter 3: Productivity, Innovation and Strategy

c. Raw materials acquisition d. Customer service e. Sales Answer: a Diff: 3 Type: MC Page Reference: 65 Topic: Q3 Skill: RECALL 66) Receiving and storing raw materials for production would be an example of a(n) ________ in Porter's value chain model. a. support activity b. primary activity c. linkage d. integrated activity e. complex activity Answer: b Diff: 2 Type: MC Page Reference: 65 Topic: Q3 Skill: RECALL 67) Finding a vendor and negotiating a price for raw materials for production would be an example of a(n) ________ in Porter's value chain model. a. linkage b. integrated activity c. complex d. support activity e. primary activity Answer: d Diff: 2 Copyright © 2014 Pearson Canada Inc.

115


Chapter 3: Productivity, Innovation and Strategy

Type: MC Page Reference: 63 Topic: Q3 Skill: RECALL 68) According to Porter’s model of the value chain, the use of IS can make _______________ more effective or efficient. a. Primary activities b. Complex calculations c. supporting activities d. importing and exporting e. Linked departments Answer: c Diff: 2 Type: MC Page Reference: 65 Topic: Q3 Skill: RECALL 69) Ideally, a competitive advantage should be a. industry-wide. b. short term. c. reproducible. d. shared with partners. e. sustainable. Answer: e Diff: 2 Type: MC Page Reference: 73 Topic: Q7 Skill: RECALL 70) The threat of new entrants in an industry is high when a. entry and exit costs are low. Copyright © 2014 Pearson Canada Inc.

116


Chapter 3: Productivity, Innovation and Strategy

b. entry costs are high. c. distribution channels are few. d. entry and exit costs are high. e. few suppliers exist. Answer: a Diff: 3 Type: MC Page Reference: 68 Topic: Q4 Skill: APPLIED 71) Porter's five competitive forces include new vendors, suppliers, substitute vendors, customers and a. finance. b. rivalry of firms. c. economic pressures. d. efficiency of production. e. marketing. Answer: b Diff: 2 Type: MC Page Reference: 67 Topic: Q4 Skill: RECALL 72) ________ would be an example of using an information system to gain competitive advantage. a. Automating the general ledger system b. Developing a web service to share information with a supply chain partner c. Using PowerPoint for company presentations d. Using instant messaging while at work e. Printing internal reports in color Answer: b Copyright © 2014 Pearson Canada Inc.

117


Chapter 3: Productivity, Innovation and Strategy

Diff: 3 Type: MC Page Reference: 71 Topic: Q6 Skill: APPLIED 73) Competitive ________ refers to a significant and sustainable benefit to a company over its competition. a. commerce b. strategy c. planning d. advantage e. disintermediation Answer: d Diff: 1 Type: MC Page Reference: 73 Topic: Q7 Skill: RECALL 74) ________ is an example of a support activity in Porter's value chain model. a. Goods production b. Warranty service c. Finished goods inventory management d. Payroll management e. Raw material acquisition Answer: d Diff: 2 Type: MC Page Reference: 65 Topic: Q3 Skill: RECALL 75) If Goodyear Tires buys a rubber plantation, this is an example of _____________. Copyright © 2014 Pearson Canada Inc.

118


Chapter 3: Productivity, Innovation and Strategy

a. departmental integration b. quality controls c. backward integration d. value chain management e. reducing complexity Answer: c Diff: 3 Type: MC Page Reference: 64 Topic: Q3 Skill: APPLIED 76) If a diamond mine buys a diamond cutting operation this is an example of ___________. a. departmental integration b. backward integration c. economy of scale d. forward integration e. supporting activity Answer: d Diff: 3 Type: MC Page Reference: 64 Topic: Q3 Skill: APPLIED 77) Each value chain consists of one or more business ______________. a. activities. b. linkages c. processes. d. systems. e. partners. Answer: c Copyright © 2014 Pearson Canada Inc.

119


Chapter 3: Productivity, Innovation and Strategy

Diff: 2 Type: MC Page Reference: 63 Topic: Q3 Skill: RECALL 78) An organization responds to the structure of its industry by choosing a (n) competitive strategy. Diff: 2 Type: FIB Page Reference: 68 Topic: Q4 Skill: RECALL 79) Primary activities are activities where value is added directly to the product. Diff: 2 Type: FIB Page Reference: 64 Topic: Q3 Skill: RECALL 80) A(n) value chain is a network of activities that improve the effectiveness of a good or service. Diff: 1 Type: FIB Page Reference: 63 Topic: Q3 Skill: RECALL 81) Disruptive technologies introduce a very new package of attributes to the accepted mainstream products. Diff: 1 Type: FIB Page Reference: 69 Topic: Q5 Skill: RECALL 82) Sustaining technologies are changes in technology that maintain the rate of improvement in customer value. Diff: 1 Copyright © 2014 Pearson Canada Inc.

120


Chapter 3: Productivity, Innovation and Strategy

Type: FIB Page Reference: 69 Topic: Q5 Skill: RECALL 83) Organizations can lock in customers by making it difficult or expensive for customers to switch to another product. This is called establishing high switching costs. Diff: 2 Type: FIB Page Reference: 71 Topic: Q6 Skill: RECALL 84) The difference between the price the customer is willing to pay and the cost the company incurs in moving the goods or services through the value chain is called the margin. Diff: 2 Type: FIB Page Reference: 64 Topic: Q3 Skill: RECALL 85) Organizations can gain competitive advantage by reducing costs. Diff: 1 Type: FIB Page Reference: 72 Topic: Q6 Skill: RECALL 86) When a firm like Bell offers free anti-spam protection to their customers, they are trying to gain a competitive advantage by locking in their customers. Diff: 3 Type: FIB Page Reference: 71 Topic: Q6 Skill: APPLIED 87) When FedEx developed the package tracking application, they were trying to gain competitive advantage through IT innovation. Diff: 3 Type: FIB Copyright © 2014 Pearson Canada Inc.

121


Chapter 3: Productivity, Innovation and Strategy

Page Reference: 77 Topic: Q6 Skill: APPLIED 88) A system that reduces costs for a company can result in significant competitive advantage. Diff: 2 Type: FIB Page Reference: 68 Topic: Q4 Skill: RECALL 89) The increasing reliance on the web for information has created a (n) digital divide between those who have Internet access and those who do not. Diff: 2 Type: FIB Page Reference: 80 Topic: Q1 Skill: RECALL 90) Describe the ways in which companies gain a competitive advantage over other companies seeking the same customers. Answer: Companies can gain competitive advantage by following one of Porter’s four competitive strategies. For example, a company can focus on being the cost leader (e.g., Walmart), or it can focus on differentiating its products from those of the competition (e.g., Apple). Furthermore, the company can use the cost or differentiation strategy across an industry, or it can focus its strategy on a particular industry segment. Diff: 2 Type: ES Page Reference: 68 Topic: Q4 Skill: RECALL 91) Companies want to create switching costs in order to lock in their customers. Diff: 2 Type: FIB Page Reference: 71 Copyright © 2014 Pearson Canada Inc.

122


Chapter 3: Productivity, Innovation and Strategy

Topic: Q6 Skill: RECALL 92) Companies that make it difficult or expensive for customers to change to another product are increasing barriers to entry for potential competitors. Diff: 3 Type: FIB Page Reference: 71 Topic: Q6 Skill: APPLIED 93) An entry barrier makes it more difficult for new competition to enter the market. Diff: 1 Type: FIB Page Reference: 71 Topic: Q6 Skill: RECALL 94) A strategic alliance with other organizations can be used to establish standards, reduce purchasing costs, and jointly promote products. Diff: 2 Type: FIB Page Reference: 72 Topic: Q6 Skill: RECALL 95) By providing customers with the addresses and easy e-mail access between senders and receivers, a shipping company can reduce their customers' costs and lock in customers to their services. Diff: 3 Type: FIB Page Reference: 71 Topic: Q6 Skill: APPLIED 96) An innovative shipping information system for a small package delivery company helps to differentiate its package delivery service from competitors that do not have a similar system. Diff: 2 Type: FIB Page Reference: 77 Copyright © 2014 Pearson Canada Inc.

123


Chapter 3: Productivity, Innovation and Strategy

Topic: Q6 Skill: APPLIED 97) Patents are difficult and expensive to enforce. Diff: 1 Type: FIB Page Reference: 72 Topic: Q7 Skill: RECALL 98) According to Nicholas Carr the more ubiquitous a technology the less competitive advantage it offers. Diff: 2 Type: FIB Page Reference: 72 Topic: Q7 Skill: RECALL 99) If I use my time wisely in school to create new skills, enhance the ones I have, and differentiate my skills from others, I am developing my competitive advantage. Diff: 2 Type: FIB Page Reference: 70 Topic: Q5 Skill: APPLIED 100) If I show a prospective employer that I have a unique set of skills that are especially suited to the job opening that they have, I am demonstrating that I have a(n) competitive advantage over other candidates. Diff: 2 Type: FIB Page Reference: 71 Topic: Q6 Skill: RECALL 101) Everett Rogers defined diffusion of innovation as the process by which an innovation gets communicated to members of a social system. Diff: 2 Type: FIB Page Reference: 70 Topic: Q5 Copyright © 2014 Pearson Canada Inc.

124


Chapter 3: Productivity, Innovation and Strategy

Skill: RECALL 102) Describe the five stages through which the diffusion of an innovation occurs suggested by Rogers. Answer: The stages through which the diffusion of innovation happens are: 1) Knowledge: occurs when a person hears of the innovation for first time 2) Persuasion: occurs when the person becomes interested in the innovation and wants to learn more about it. 3) Decision: Occurs when the person has collected all the information necessary to make the decision of whether or not adopt the innovation. 4) Implementation: Occurs when the person has decided to pursue the innovation 5) Confirmation: Occurs when the person has used the innovation in its full potential and is happy about it. Diff: 2 Type: ES Page Reference: 70 Topic: Q5 Skill: RECALL 103) The decision stage in the diffusion of innovation happens when considering the pros and cons of purchasing an iPhone. Diff: 2 Type: FIB Page Reference: 70 Topic: Q5 Skill: RECALL 104) Diffusion of innovation is a way of thinking about the adoption of new technologies. Diff: 2 Type: FIB Page Reference: 70 Topic: Q5 Skill: RECALL 105) What is meant by the "value chain"? How does it apply to information systems? Answer: The value chain is a series of activities that include inbound logistics, operations, outbound logistics, marketing and sales, and service. It is a tool for modeling how an Copyright © 2014 Pearson Canada Inc.

125


Chapter 3: Productivity, Innovation and Strategy

organization adds "value" that a customer is willing to pay for. The generic value chain has five primary and four support activities. By modeling the value chain and its linkages, Porter started a movement towards more integrated, cross-departmental business systems. Companies use the value chain to analyze how they add value and compare it to their competition. Combined with Porter's other work on competitive advantage, they can examine how IT can be used on each of the value chain activities to add value. Diff: 3 Type: ES Page Reference: 65 Topic: Q3 Skill: APPLIED 106) What are sustaining technologies? Answer: Sustaining technologies are changes in technology that maintain the rate of improvement in customer value. Diff: 2 Type: ES Page Reference: 69 Topic: Q5 Skill: RECALL 107) What is a value chain? Answer: A value chain is a network of activities that improve the effectiveness (or value) of a good or service. Diff: 1 Type: ES Page Reference: 63 Topic: Q3 Skill: RECALL 108) What is meant by effectiveness? Answer: Copyright © 2014 Pearson Canada Inc.

126


Chapter 3: Productivity, Innovation and Strategy

Increased effectiveness means that the company considers offering either new or improved goods or services that the customer values. Diff: 2 Type: ES Page Reference: 63 Topic: Q3 Skill: RECALL 109) What are primary activities? Answer: Primary activities are activities where value is added directly to the product. Diff: 2 Type: ES Page Reference: 64 Topic: Q3 Skill: RECALL 110) What is meant by increasing efficiency? Answer: Increasing efficiency means that business processes can be accomplished either more quickly or with fewer resources and facilities (or both). Diff: 2 Type: ES Page Reference: 63 Topic: Q3 Skill: RECALL 111) How can IT increase productivity? Answer: Productivity for organizations can be increased either through increased efficiency or effectiveness. Diff: 3 Type: ES Copyright © 2014 Pearson Canada Inc.

127


Chapter 3: Productivity, Innovation and Strategy

Page Reference: 63 Topic: Q3 Skill: APPLIED 112) What are three ways that value can be created by Information Technology investments? Answer: 1) through productivity gains, 2) altering the structure of competition, 3) more efficient operations which reduce cost to final customer. Diff: 3 Type: ES Page Reference: 65 Topic: Q3 Skill: APPLIED 113) What are the primary activities in Porter's value chain model? Give an example of an IS application that supports each of these activities. Answer: The generic value chain has five primary and four support activities. The primary activities of the value chain include inbound logistics, operations, outbound logistics, marketing and sales, and service. For inbound and outbound logistics one example application might be RFID. For operations, computer-controlled machines would be an example along with MRP. Outbound logistics systems might include shipping and planning. A sales and marketing example could include an order entry system, and for service, there are equipment maintenance systems. Diff: 3 Type: ES Page Reference: 64 Topic: Q3 Skill: RECALL 114) Describe Porter's Five Forces Model for Competition. How can IS be used in this model? Answer:

Copyright © 2014 Pearson Canada Inc.

128


Chapter 3: Productivity, Innovation and Strategy

Porter's model is based on the insight that a corporate strategy should meet the opportunities and threats in the organization's external environment. Competitive strategy should be based on an understanding of industry structures and the way they change. Porter has identified five competitive forces that shape every industry and every market. These forces determine the intensity of competition and hence the profitability and attractiveness of an industry. The objective of corporate strategy should be to modify these competitive forces in a way that improves the position of the organization. Porter's model supports analysis of the driving forces in an industry. Based on the information derived from the Five Forces Analysis, management can decide how to influence or to exploit particular characteristics of their industry. The cost and complexity of an ERP or CRM can act as a barrier to new entrants. The disintermediation of Web-based SCM can decrease the bargaining power of suppliers and increase that of customer. Auctions like eBay can also increase the threat of substitute vendors and put pressure on prices. Diff: 3 Type: ES Page Reference: 66 Topic: Q4 Skill: APPLIED 115) When ATMs first came out, they provided a significant competitive advantage because they helped banks to differentiate themselves from others. Today, almost all banks provide access to these, so it is considered to be a standard service. How could you re-engineer a bank's ATM system in order to gain competitive advantage today? Answer: An ATM is one example of an automated information system. When they were first introduced they were an important innovation, that helped reduce costs of banking transactions and helped differentiate one bank from another. Nowadays, it is not enough for a bank to simply offer ATM service, but that they can be updated so that they provide additional statements for free or little charge such as lists of the 10 prior transactions. One of the biggest issues with ATMs is the fees charged. If you can reduce the cost of the ATM so that it is free to your customers this would certainly give your bank an advantage. If the cost of using a competing system were high, this would also help lock in the customers. Other services that could be offered might be making loan payments, supporting multiple languages, or transfer funds between accounts. Diff: 3 Type: ES Page Reference: 69 Topic: Q5 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

129


Application Extension 3a: Introduction to Microsoft Excel

1) Before the advent of computers accountants used paper spreadsheets. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 83 Topic: Q1 Skill: RECALL 2) Today the term spreadsheet almost always refers to electronic models. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 83 Topic: Q1 Skill: RECALL 3) Cells are identified by their column letters and row numbers. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 83 Topic: Q1 Skill: RECALL 4) Cells can only store numbers. a. True b. False Answer: b Diff: 2 Copyright © 2014 Pearson Canada Inc.

130


Application Extension 3a: Introduction to Microsoft Excel

Type: TF Page Reference: 83 Topic: Q1 Skill: RECALL 5) The flexibility of cells is an important factor in making a spreadsheet a powerful tool. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 83 Topic: Q1 Skill: RECALL 6) When you build a formula it must begin with an "=". a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 84 Topic: Q2 Skill: RECALL 7) Text can be used in arithmetic formulas. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 84 Topic: Q2 Skill: RECALL 8) "2B" would be a cell reference. Copyright © 2014 Pearson Canada Inc.

131


Application Extension 3a: Introduction to Microsoft Excel

a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 84 Topic: Q1 Skill: RECALL 9) "/" is the sign used for multiplication. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 85 Topic: Q2 Skill: RECALL 10) The "Fill" capability in Excel can create more formulas with less work. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 85 Topic: Q2 Skill: RECALL 11) To increase a cells value by 10%, it is best to reference the cell with a value of 10% in the formula. a. True b. False Answer: a Diff: 3 Type: TF Copyright © 2014 Pearson Canada Inc.

132


Application Extension 3a: Introduction to Microsoft Excel

Page Reference: 85 Topic: Q2 Skill: RECALL 12) "C8" is an absolute reference. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 86 Topic: Q2 Skill: RECALL 13) Formatting cells allows the user to better see the type of data that is in a cell. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 88 Topic: Q3 Skill: RECALL 14) Formatting options are shown on the Home tab ribbon. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 88 Topic: Q3 Skill: RECALL 15) Excel provides powerful graphing capabilities. Copyright © 2014 Pearson Canada Inc.

133


Application Extension 3a: Introduction to Microsoft Excel

a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 88 Topic: Q4 Skill: RECALL 16) A cell is identified by using a a. column number and a row number. b. column letter and a row number. c. position number. d. column letter and a row letter. e. column number and a row letter. Answer: b Diff: 2 Type: MC Page Reference: 83 Topic: Q1 Skill: RECALL 17) Spreadsheets store information in ________. a. rows b. locations c. cells d. columns e. boxes Answer: c Diff: 1 Type: MC Page Reference: 83 Topic: Q1

Copyright © 2014 Pearson Canada Inc.

134


Application Extension 3a: Introduction to Microsoft Excel

Skill: RECALL 18) Workbooks are made up of multiple pages called ____________. a. text b. arithmetic symbols c. formulas d. numbers e. worksheets Answer: e Diff: 2 Type: MC Page Reference: 83 Topic: Q1 Skill: RECALL 19) The first thing a user should do once they start to work within an Excel file is to a. save the workbook. b. create a new worksheet. c. add text. d. create the model. e. add formulas. Answer: a Diff: 1 Type: MC Page Reference: 84 Topic: Q1 Skill: RECALL 20) To place a graph on your spreadsheet you would use the ________ tab. a. View b. Page Layout c. Home d. Insert Copyright © 2014 Pearson Canada Inc.

135


Application Extension 3a: Introduction to Microsoft Excel

e. Data Answer: d Diff: 2 Type: MC Page Reference: 90 Topic: Q4 Skill: RECALL 21) You can format your worksheet using icons on the ________ tab. a. View b. Insert c. Data d. Home e. Page Layout Answer: d Diff: 2 Type: MC Page Reference: 88 Topic: Q3 Skill: RECALL 22) If you need to sort and filter data you would use tools on the ________ tab. a. Review b. Page Layout c. Insert d. Data e. Home Answer: d Diff: 2 Type: MC Page Reference: 84 Topic: Q1 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

136


Application Extension 3a: Introduction to Microsoft Excel

23) To create complex formulas you would use tools on the ________ tab. a. Home b. Data c. Formula d. Page Layout e. Insert Answer: c Diff: 2 Type: MC Page Reference: 84 Topic: Q1 Skill: RECALL 24) During the "fill" function when you move the mouse over top of the handle on the cell the mouse icon changes to a(n) a. + sign. b. * sign. c. ? sign. d. ! sign. e. - sign. Answer: a Diff: 2 Type: MC Page Reference: 85 Topic: Q2 Skill: RECALL 25) A relative reference keeps the relative positions of the formula and the cells it references ________. a. synchronized b. intact c. absolute d. asynchronous Copyright © 2014 Pearson Canada Inc.

137


Application Extension 3a: Introduction to Microsoft Excel

e. referred to Answer: b Diff: 2 Type: MC Page Reference: 85 Topic: Q2 Skill: RECALL 26) If you want to apply the same "growth rate" to a number of formulas in different cells you would use a(n) a. asynchronous reference. b. absolute reference. c. intact reference. d. relative reference. e. synchronous reference Answer: b Diff: 2 Type: MC Page Reference: 86 Topic: Q2 Skill: RECALL 27) It is ________ best to use references to cell rather than number in your spreadsheet formulas. a. rarely b. never c. sometimes d. always e. usually Answer: d Diff: 2 Type: MC Page Reference: 86

Copyright © 2014 Pearson Canada Inc.

138


Application Extension 3a: Introduction to Microsoft Excel

Topic: Q2 Skill: RECALL 28) To make a reference absolute you place ________ signs in front of the column letter and row number. a. + b. $ c. ! d. % e. ? Answer: b Diff: 2 Type: MC Page Reference: 86 Topic: Q2 Skill: RECALL 29) $B$4 is an example of a(n) a. synchronous reference. b. fixed reference. c. asynchronous reference d. relative reference. e. absolute reference. Answer: e Diff: 1 Type: MC Page Reference: 86 Topic: Q2 Skill: RECALL 30) You can use the ________ key to cycle through the various types of cell addressing. a. F8 b. F10 c. F4 Copyright © 2014 Pearson Canada Inc.

139


Application Extension 3a: Introduction to Microsoft Excel

d. F2 e. F5 Answer: c Diff: 2 Type: MC Page Reference: 87 Topic: Q2 Skill: RECALL 31) "$G4" is an example of a(n) a. absolute column reference. b. intact column reference. c. absolute row reference. d. relative column reference. e. intact row reference. Answer: a Diff: 2 Type: MC Page Reference: 87 Topic: Q2 Skill: RECALL 32) "G$4" is an example of a(n) a. absolute column reference. b. relative row reference. c. absolute row reference. d. intact column reference. e. intact row reference. Answer: c Diff: 2 Type: MC Page Reference: 87 Topic: Q2 Copyright © 2014 Pearson Canada Inc.

140


Application Extension 3a: Introduction to Microsoft Excel

Skill: RECALL 33) Spreadsheets were a ________ factor in the early adoption of personal computers. a. small b. nonc. minimal d. major e. minor Answer: d Diff: 1 Type: MC Page Reference: 83 Topic: Q1 Skill: RECALL 34) The ________ key allows you to edit a cell's content. a. F4 b. F2 c. F5 d. F1 e. F3 Answer: b Diff: 2 Type: MC Page Reference: 84 Topic: Q2 Skill: RECALL 35) When there are two formulas to choose from to type into a cell, choose the formula that is ________. a. easier to enter b. more correct c. longer d. flexible Copyright © 2014 Pearson Canada Inc.

141


Application Extension 3a: Introduction to Microsoft Excel

e. shorter Answer: d Diff: 3 Type: MC Page Reference: 85 Topic: Q2 Skill: RECALL 36) Another way of creating an absolute cell address is to use a(n) ______. a. absolute name b. range name c. cell reference d. range reference e. cell location Answer: b Diff: 2 Type: MC Page Reference: 87 Topic: Q2 Skill: RECALL 37) Paper spreadsheets were used prior to the advent of computers. Diff: 1 Type: FIB Page Reference: 83 Topic: Q1 Skill: RECALL 38) The term spreadsheet usually refers to electronic models, today. Diff: 1 Type: FIB Page Reference: 83 Topic: Q1 Skill: RECALL 39) Cells are identified by their column letters and row numbers. Diff: 2 Type: FIB Copyright © 2014 Pearson Canada Inc.

142


Application Extension 3a: Introduction to Microsoft Excel

Page Reference: 83 Topic: Q1 Skill: RECALL 40) A formula always begins with a(n) equals sign. Diff: 2 Type: FIB Page Reference: 84 Topic: Q2 Skill: RECALL 41) "B2" would be a cell reference. Diff: 2 Type: FIB Page Reference: 83 Topic: Q1 Skill: RECALL 42) A(n) * or asterisk is used for multiplication in formulas. Diff: 2 Type: FIB Page Reference: 85 Topic: Q2 Skill: RECALL 43) "$F$5" is a(n) absolute reference. Diff: 2 Type: FIB Page Reference: 86 Topic: Q2 Skill: RECALL 44) The formatting options are show on the Home tab ribbon. Diff: 2 Type: FIB Page Reference: 88 Topic: Q3 Skill: RECALL 45) The fill capability of Excel allows the users to create more formulas with less work. Diff: 2 Type: FIB Page Reference: 86 Topic: Q2 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

143


Application Extension 3a: Introduction to Microsoft Excel

46) In Excel, users can build column, line, pie, bar, and area graphs. Diff: 2 Type: FIB Page Reference: 90 Topic: Q4 Skill: RECALL 47) Describe how you would enter a new formula that adds the value of two cells into and Excel spreadsheet. Answer: You would first click on the cell that the formula is required in and then enter the = sign to start the formula. Form this point you could type in the formula using the cell names and the + sign for an addition formula or click on the first cell then enter the + sign and click on the second cell to enter the formula. An example would be "=A1+B1" entered in cell "C1". Diff: 2 Type: ES Page Reference: 84 Topic: Q2 Skill: APPLIED 48) Why are absolute references important in Excel? Answer: An absolute reference gives the user the ability to fix a cell reference to a specific cell in the spreadsheet in a formula and this allows for easier copying of the formula when a set of formulas need to reference the same value in the spreadsheet such as a tax rate or growth percentage. Diff: 3 Type: ES Page Reference: 86 Topic: Q2 Skill: RECALL 49) How does a user rename a worksheet tab? Answer: If the user double clicks the worksheet tab the name becomes editable and the user can type the new name and hit enter. Copyright © 2014 Pearson Canada Inc.

144


Application Extension 3a: Introduction to Microsoft Excel

Diff: 2 Type: ES Page Reference: 84 Topic: Q1 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

145


Chapter 4: Hardware and Software

1) A megabyte is 1024 Gigabytes. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 2) A terabyte is larger than a petabyte in terms of computer storage. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 3) A bit is a character of data. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 4) A gigabyte or GB is 1024 MB. a. True b. False Answer: a Diff: 1 Copyright © 2014 Pearson Canada Inc.

146


Chapter 4: Hardware and Software

Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 5) The term "byte" stands for binary digit. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 105 Topic: Q3 Skill: RECALL 6) The term "bit" stands for binary digit. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 105 Topic: Q3 Skill: RECALL 7) A byte is a group of 8 bits. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 8) Memory that is permanent is called "volatile" memory. Copyright © 2014 Pearson Canada Inc.

147


Chapter 4: Hardware and Software

a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 107 Topic: Q3 Skill: RECALL 9) The CPU reads instructions and data from memory via the data bus. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 10) The most frequently used data is stored in cache memory. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 11) The speed of a CPU is measured bits per second. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 104 Copyright © 2014 Pearson Canada Inc.

148


Chapter 4: Hardware and Software

Topic: Q3 Skill: RECALL 12) Hardware is electronic components that are used to input, process, output and store data. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 103 Topic: Q3 Skill: RECALL 13) A printer is an example of an input hardware device. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 105 Topic: Q3 14) A CPU is sometimes called the "brain" of the computer. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 104 Topic: Q3 Skill: RECALL 15) The CPU in an example of an output device. a. True b. False Copyright © 2014 Pearson Canada Inc.

149


Chapter 4: Hardware and Software

Answer: b Diff: 2 Type: TF Page Reference: 104 Topic: Q3 Skill: RECALL 16) A tablet PC screen is an example of an input device. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 104 Topic: Q3 Skill: RECALL 17) The CPU is an example of a processing hardware device. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 104 Topic: Q3 Skill: RECALL 18) The CPU stores results of computations on the hard drive. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 104 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

150


Chapter 4: Hardware and Software

Skill: RECALL 19) Main memory is also called optical storage. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 104 Topic: Q3 Skill: RECALL 20) The type of CPU required will often depend on the type of computing done. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 104 Topic: Q3 Skill: RECALL 21) The data bus connects the CPU to the output devices such as the monitor. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 22) Main memory is an example of volatile memory. a. True b. False

Copyright © 2014 Pearson Canada Inc.

151


Chapter 4: Hardware and Software

Answer: a Diff: 2 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 23) When the computer is turned on, the operating system is loaded into main memory. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 24) Optical disks are an example of main memory. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 104 Topic: Q3 Skill: RECALL 25) Magnetic and optical disks are considered to be nonvolatile memory. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 105 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

152


Chapter 4: Hardware and Software

26) Volatile memory devices maintain their contents without the power being on. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 107 Topic: Q3 Skill: RECALL 27) Main memory holds the program instructions for applications that are currently being processed. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 28) When multiple programs are running, the CPU uses memory swapping as each program is used. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 107 Topic: Q3 Skill: APPLIED 29) When you work on a spreadsheet program like Excel, the program is loaded into main memory for processing. a. True b. False Copyright © 2014 Pearson Canada Inc.

153


Chapter 4: Hardware and Software

Answer: a Diff: 2 Type: TF Page Reference: 107 Topic: Q3 Skill: RECALL 30) Cache memory helps speed up the overall throughput of the CPU. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 106 Topic: Q3 Skill: RECALL 31) The speed of a CPU is measured in dots per second. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 104 Topic: Q3 Skill: RECALL 32) One way to stay informed about technology changes in your area of business is to get involved as a user representative on technology committees in your organization. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 125 Copyright © 2014 Pearson Canada Inc.

154


Chapter 4: Hardware and Software

Topic: Q1 Skill: RECALL 33) Technology change is a fact of life and each person can choose how to relate to it. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 125 Topic: Q1 Skill: RECALL 34) Sometimes virus attacks are brought on by the negligence and ignorance of the user. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 118 Topic: Q7 Skill: APPLIED 35) Software vendors intentionally leave security holes in their software so they can charge for patches and fixes later. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 118 Topic: Q7 Skill: APPLIED 36) A macro virus propagates using the Internet or other computer network, and becomes so overwhelming that the network becomes unusable. Copyright © 2014 Pearson Canada Inc.

155


Chapter 4: Hardware and Software

a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 118 Topic: Q7 Skill: RECALL 37) As software vendors discover security holes in their products they continually issue modifications called "hole repairs." a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 118 Topic: Q7 Skill: RECALL 38) A ________ is the smallest piece of data in this list. a. byte b. field c. file d. table e. record Answer: a Diff: 2 Type: MC Page Reference: 106 Topic: Q3 Skill: RECALL 39) The Y2K problem refers to a. the inability of all computers to function after year 2000. Copyright © 2014 Pearson Canada Inc.

156


Chapter 4: Hardware and Software

b. a manufacturing flaw in some Intel processors in 1998. c. the use of 4 digits to represent the year in early computers. d. the use of 2 digits to represent the year in early computers. e. the use of the 1929 rule to determine the first two digits of the year. Answer: d Diff: 2 Type: MC Page Reference: 102 Topic: Q2 Skill: RECALL 40) The first digital computing devices were invented in the a. 1930s b. 1940s c. 1950s d. 1960s e. 1870s Answer: b Diff: 2 Type: MC Page Reference: 98 Topic: Q2 Skill: RECALL 41) University of Toronto installed the first digital computer in Canada in a. 1950 b. 1952 c. 1954 d. 1956 e. 1958 Answer: b Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

157


Chapter 4: Hardware and Software

Page Reference: 99 Topic: Q2 Skill: RECALL 42) Which of the following is an example of an output device? a. A mouse b. A set of headphones c. A scanner d. A computer keyboard e. A microphone Answer: b Diff: 1 Type: MC Page Reference: 103 Topic: Q3 Skill: RECALL 43) Which of the following is an example of an output device? a. A microphone b. A computer keyboard c. A laser printer d. A mouse e. A scanner Answer: c Diff: 1 Type: MC Page Reference: 103 Topic: Q3 Skill: RECALL 44) What of the following is not a function of the central processing unit? a. Stores results in memory b. Performs arithmetic and logical comparisons Copyright © 2014 Pearson Canada Inc.

158


Chapter 4: Hardware and Software

c. Stores data d. Performs calculations e. Selects instructions Answer: c Diff: 2 Type: MC Page Reference: 104 Topic: Q3 Skill: RECALL 45) As predicted by Moore's Law, the capacity of storage devices is ________ as the costs ________. a. decreasing; decrease b. increasing; increase c. decreasing; stay the same d. increasing; stay the same e. increasing; decrease Answer: e Diff: 2 Type: MC Page Reference: 102 Topic: Q2 Skill: RECALL 46) Which of the following is an example of optical storage media? a. Memory chip b. DVD disc c. A USB memory key d. Cache e. A hard drive Answer: b Diff: 1 Type: MC Copyright © 2014 Pearson Canada Inc.

159


Chapter 4: Hardware and Software

Page Reference: 105 Topic: Q3 Skill: RECALL 47) A kilobyte is a collection of a. 512 bytes. b. 1024 bytes. c. 1024 megabytes. d. 1024 gigabytes. e. 8 bytes. Answer: b Diff: 2 Type: MC Page Reference: 106 Topic: Q3 Skill: RECALL 48) Bytes consist of ________ bits of memory. a. 2 b. 12 c. 8 d. 4 e. 6 Answer: c Diff: 2 Type: MC Page Reference: 106 Topic: Q3 Skill: RECALL 49) Instructions move from main memory into the CPU via the (a) a. network card. b. memory chip. Copyright © 2014 Pearson Canada Inc.

160


Chapter 4: Hardware and Software

c. operating system. d. data channel. e. cache. Answer: d Diff: 2 Type: MC Page Reference: 106 Topic: Q3 Skill: RECALL 50) Which of the following is an example of an operating system? a. Glass Fish b. Java c. Unix d. Boot Camp e. VMware Fusion Answer: c Diff: 2 Type: MC Page Reference: 110 Topic: Q6 Skill: RECALL 51) Volatile memory means that a. such devices are fragile. b. such devices are susceptible to electromagnetic interference. c. these devices maintain their contents as soon as the content is added to them. d. the contents are lost once power is off. e. these devices are cheaper than non-volatile memory. Answer: d Diff: 2 Type: MC Page Reference: 107 Copyright © 2014 Pearson Canada Inc.

161


Chapter 4: Hardware and Software

Topic: Q3 Skill: RECALL 52) When you purchase a copy of Microsoft Windows , a. you are buying an operating system. b. you are buying an application that runs on Mac. c. you are buying an application program. d. you are buying a graphics program. e. you are buying a suite of office programs. Answer: a Diff: 2 Type: MC Page Reference: 110 Topic: Q3 Skill: RECALL 53) Software applications that provides capabilities common across all organizations and industries are called a. horizontal market applications. b. supply chain management applications. c. value chain management applications. d. enterprise resource planning applications. e. operating systems software. Answer: a Diff: 2 Type: MC Page Reference: 113 Topic: Q5 Skill: RECALL 54) Vertical market software refers to a. industry specific software. b. supply chain management software. c. enterprise resource planning software. Copyright © 2014 Pearson Canada Inc.

162


Chapter 4: Hardware and Software

d. productivity software. e. value chain management software. Answer: a Diff: 2 Type: MC Page Reference: 113 Topic: Q5 Skill: RECALL 55) Which device listed below is an example of an input hardware device? a. Printer b. DVD drive c. CPU d. Speaker e. Touch Screen Answer: e Diff: 1 Type: MC Page Reference: 104 Topic: Q3 Skill: RECALL 56) Which device listed below is an example of an output hardware device? a. Touch screen b. Keyboard c. Bar code scanner d. Magnetic tape e. Printer Answer: e Diff: 1 Type: MC Page Reference: 103 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

163


Chapter 4: Hardware and Software

Skill: RECALL 57) Which device listed below is an example of a processing hardware device? a. Main memory b. Keyboard c. Printer d. Magnetic tape e. Touch screen Answer: a Diff: 3 Type: MC Page Reference: 104 Topic: Q3 Skill: RECALL 58) Which device listed below is an example of a storage hardware device? a. Keyboard b. Bar code scanner c. Mouse d. Printer e. Optical disk Answer: e Diff: 2 Type: MC Page Reference: 104 Topic: Q3 Skill: RECALL 59) Linux is an example of a. an application. b. horizontal-market software. c. vertical-market software. d. one-of-a-kind application. Copyright © 2014 Pearson Canada Inc.

164


Chapter 4: Hardware and Software

e. operating system software. Answer: e Diff: 2 Type: MC Page Reference: 111 Topic: Q5 Skill: RECALL 60) ________ software consists of programs that perform business functions like general ledger and accounting. a. Operating system b. Firmware c. Tailor-made d. Application e. Vertical-market software Answer: d Diff: 1 Type: MC Page Reference: 112 Topic: Q5 Skill: RECALL 61) A computer monitor is an example of a. data. b. hardware. c. a DSS. d. spaceware. e. software. Answer: b Diff: 1 Type: MC Page Reference: 107 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

165


Chapter 4: Hardware and Software

Skill: RECALL 62) Users employ ________ computers for work processing, spreadsheets, and database access. a. operating b. custom c. client d. server e. dumb terminal Answer: c Diff: 2 Type: MC Page Reference: 108 Topic: Q4 Skill: RECALL 63) The ________ system manages the computer's resources. a. open source b. application c. software d. operating e. information Answer: d Diff: 2 Type: MC Page Reference: 110 Topic: Q5 Skill: RECALL 64) A virus delivers a(n) ________ when its program deletes programs and data. a. worm b. packet c. payload d. bomb Copyright © 2014 Pearson Canada Inc.

166


Chapter 4: Hardware and Software

e. MB Answer: c Diff: 2 Type: MC Page Reference: 118 Topic: Q7 Skill: RECALL 65) One-of-a-kind application software is a. operating software. b. software that runs printers. c. designed for a specific, unique need d. like a web-browser. e. memory-swapping software. Answer: c Diff: 3 Type: MC Page Reference: 114 Topic: Q5 Skill: RECALL 66) ________ is installed in special, read-only memory in devices like printers or communication devices. a. Firmware b. Application c. Vertical-market d. Operating system e. BIOS Answer: a Diff: 2 Type: MC Page Reference: 115 Topic: Q5 Copyright © 2014 Pearson Canada Inc.

167


Chapter 4: Hardware and Software

Skill: RECALL 67) A ________ is a virus that is attached to Word and Excel files. a. time bomb b. worm c. Macro-virus d. Trojan horse e. zombie Answer: c Diff: 2 Type: MC Page Reference: 118 Topic: Q7 Skill: RECALL 68) A ________ is a virus that replicates itself over the Internet and other networks. a. patch b. macro c. time bomb d. worm e. Trojan horse Answer: d Diff: 2 Type: MC Page Reference: 118 Topic: Q7 Skill: RECALL 69) Volatile memory ________ data when the power is turned off. a. removes b. saves c. corrects d. backs up Copyright © 2014 Pearson Canada Inc.

168


Chapter 4: Hardware and Software

e. loses Answer: e Diff: 2 Type: MC Page Reference: 107 Topic: Q3 Skill: RECALL 70) A bar code scanner is an example of a(n) a. processing device. b. input device. c. storage device. d. optical device. e. output device. Answer: b Diff: 2 Type: MC Page Reference: 104 Topic: Q3 Skill: RECALL 71) Main memory is an example of a. cache memory. b. non-volatile memory. c. input memory. d. volatile memory. e. optical memory. Answer: d Diff: 2 Type: MC Page Reference: 107 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

169


Chapter 4: Hardware and Software

72) Data moves between main memory and the CPU via (the) a. CPU. b. instruction set. c. data bus. d. main memory. e. data application. Answer: c Diff: 2 Type: MC Page Reference: 106 Topic: Q3 Skill: RECALL 73) A ________ is a computer infected by a worm virus. a. payload b. worm c. zombie d. time bomb e. Trojan horse Answer: c Diff: 2 Type: MC Page Reference: 118 Topic: Q7 Skill: RECALL 74) One ________ is equivalent to 1024 GB. a. megabyte b. gigaflop c. gigabyte d. terabyte e. kilobyte Copyright © 2014 Pearson Canada Inc.

170


Chapter 4: Hardware and Software

Answer: d Diff: 2 Type: MC Page Reference: 106 Topic: Q3 Skill: RECALL 75) Data in the CPU is processed in the form of a. bytes. b. pixels. c. characters. d. dots. e. bits. Answer: e Diff: 3 Type: MC Page Reference: 106 Topic: Q3 Skill: APPLIED 76) A bit has a value of a. 0 or 1. b. 0. c. 11010. d. 1024. e. 1. Answer: a Diff: 1 Type: MC Page Reference: 105 Topic: Q3 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

171


Chapter 4: Hardware and Software

77) The ________ of a CPU is measured in hertz. a. dot pitch b. seek time c. data bus d. clock speed e. size Answer: d Diff: 2 Type: MC Page Reference: 104 Topic: Q3 Skill: RECALL 78) The operating system employs ________ so that users can run multiple applications and files at the same time. a. main memory b. seek time c. patches d. rotational delay e. memory swapping Answer: e Diff: 3 Type: MC Page Reference: 107 Topic: Q3 Skill: RECALL 79) ________ is designed to increase the overall throughput of the CPU. a. Cache memory b. Non-volatile memory c. Volatile memory d. Seek time e. Main memory Copyright © 2014 Pearson Canada Inc.

172


Chapter 4: Hardware and Software

Answer: a Diff: 3 Type: MC Page Reference: 106 Topic: Q3 Skill: RECALL 80) Perhaps falsely, ________ is generally regarded as one of the more difficult operating systems to learn to use. a. Unix b. Windows XP c. Mac OS X d. Windows Vista e. Linux Answer: a Diff: 2 Type: MC Page Reference: 110 Topic: Q5 Skill: APPLIED 81) When one buys an operating system like Windows 7, you are actually buying (a) software a. upgrade. b. licence. c. version. d. copyright. e. rights. Answer: b Diff: 2 Type: MC Page Reference: 110 Topic: Q5

Copyright © 2014 Pearson Canada Inc.

173


Chapter 4: Hardware and Software

Skill: RECALL 82) A spreadsheet program is an example of a. operating system software. b. firmware. c. vertical-market software. d. horizontal-market software. e. system software. Answer: d Diff: 2 Type: MC Page Reference: 113 Topic: Q5 Skill: RECALL 83) A grocery scanning check out system is an example of a. firmware. b. system software. c. operating system software. d. horizontal-market software. e. vertical-market software. Answer: e Diff: 3 Type: MC Page Reference: 113 Topic: Q5 Skill: APPLIED 84) Business people who prefer to ignore technology and leave technology knowledge strictly to the technology professionals are giving the (a) ________ to others in the industry. a. information systems b. appropriate timing c. competitive advantage Copyright © 2014 Pearson Canada Inc.

174


Chapter 4: Hardware and Software

d. software edge e. customer management edge Answer: c Diff: 2 Type: MC Page Reference: 124 Topic: Q1 Skill: RECALL 85) Reading articles about technology trends specific to your business, attending workshops on technology trends, and reading technology ads are all examples of a. ways of staying current on technology. b. ways of staying current in your business. c. vendor retrieval. d. looking for a technology job. e. customer management trends. Answer: a Diff: 2 Type: MC Page Reference: 124 Topic: Q1 Skill: RECALL 86) Software vendors should make it easy for users to download and apply ________ to fix known holes in their software. a. encryption keys b. repairs c. patches d. viruses e. bugs Answer: c Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

175


Chapter 4: Hardware and Software

Page Reference: 118 Topic: Q7 Skill: APPLIED 87) In 2003, the ________ worm clogged the Internet and caused Bank of America ATM machines and information systems of hundreds of other organizations to fail. a. 911 b. Michelangelo c. Trojan d. viral e. Slammer Answer: e Diff: 3 Type: MC Page Reference: 118 Topic: Q7 Skill: RECALL 88) To keep from getting a virus on your computer, be sure never to download files, programs, or attachments from ________ web sites. a. private b. hijacked c. pirated d. unknown e. commercial Answer: d Diff: 2 Type: MC Page Reference: 118 Topic: Q7 Skill: APPLIED 89) Cloud computing may be more efficient because a. it uses several computers to address a single problem. Copyright © 2014 Pearson Canada Inc.

176


Chapter 4: Hardware and Software

b. it adds to the ability to store data. c. customers only pay for what they use, and updates are done automatically. d. it is resident on your computer. e. it is available only during business hours. Answer: c Diff: 2 Type: MC Page Reference: 109 Topic: Q4 Skill: APPLIED 90) Customer relationship management can be delivered over the Internet through the use of a. grid computing. b. thick clients. c. server farms. d. cloud computing. e. thin clients. Answer: d Diff: 2 Type: MC Page Reference: 109 Topic: Q4 Skill: RECALL 91) An application that needs only a browser is called a (n) a. cloud application. b. thin client. c. open source application. d. query optimization. e. ease of use progrtam. Answer: b Diff: 2 Copyright © 2014 Pearson Canada Inc.

177


Chapter 4: Hardware and Software

Type: MC Page Reference: 116 Topic: Q5 Skill: RECALL 92) Grid computing use software to a. create a private network of computers at a school or company. b. share operating systems among a number of computers. c. coordinate all the activities in a large collection of computers. d. allow multiple operating systems to operate on a single computer. e. divide and apportion pieces of a program among several computers to solve a single problem. Answer: e Diff: 3 Type: MC Page Reference: 109 Topic: Q4 Skill: RECALL 93) The price of a given CPU will be halved every 18 months according to Moore's Law. Diff: 2 Type: FIB Page Reference: 102 Topic: Q2 Skill: RECALL 94) The clock speed of the CPU is measured in hertz, or cycles per second. Diff: 2 Type: FIB Page Reference: 104 Topic: Q3 Skill: RECALL 95) Gigahertz (GHz) stands for billions of cycles per second. Diff: 2 Type: FIB Page Reference: 104 Copyright © 2014 Pearson Canada Inc.

178


Chapter 4: Hardware and Software

Topic: Q3 Skill: RECALL 96) Users of cloud computing rent the usage of computers from third-party providers. Diff: 2 Type: FIB Page Reference: 109 Topic: Q4 Skill: RECALL 97) Software that is installed often in special, read-only memory in devices like printers or communication devices is called firmware. Diff: 3 Type: FIB Page Reference: 115 Topic: Q4 Skill: RECALL 98) Computer programs like QuickBooks that perform a specific business function are called application software. Diff: 2 Type: FIB Page Reference: 109 Topic: Q5 Skill: RECALL 99) Vertical market application software serves the needs of a specific industry. Diff: 2 Type: FIB Page Reference: 113 Topic: Q5 Skill: RECALL 100) Horizontal-market application software like a word processor application provides common capabilities across all organizations and industries. Diff: 2 Type: FIB Page Reference: 113 Topic: Q5 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

179


Chapter 4: Hardware and Software

101) Software that is tailor-made for special applications is called custom software. Diff: 2 Type: FIB Page Reference: 114 Topic: Q5 Skill: RECALL 102) A licence stipulates how a program may be used by the purchaser. Diff: 2 Type: FIB Page Reference: 112 Topic: Q5 Skill: RECALL 103) Linux is an operating system developed loosely knit group of programmers. What is the name for this group? Can you describe two benefits of using this type of software? Answer: The name for the loosely unit group of programmers is “open-source community.” These programmers act mostly as volunteers in creating software. In that sense, this community owns the software, Linux. The benefits of using this software are that it is free. There is no licence associated with it. Another benefit is that the source code can be modified to user needs. Also, since it’s software owned by a community, there are permanent updates and enhancements to the software. Diff: 3 Type: Essay Page Reference: 112 Topic: Q5 Skill: APPLIED 104) Macintosh computers have been used primarily by graphic artists and workers in the arts community. Diff: 1 Type: FIB Page Reference: 111 Topic: Q4 Skill: RECALL 105) Unix was developed by Bell Labs and is generally regarded as more difficult to use than Windows or Mac OS. Diff: 2 Type: FIB Copyright © 2014 Pearson Canada Inc.

180


Chapter 4: Hardware and Software

Page Reference: 111 Topic: Q4 Skill: RECALL 106) Linux is a version of Unix that was developed by the open source community. Diff: 2 Type: FIB Page Reference: 111 Topic: Q4 Skill: RECALL 107) Cache memory helps speed up the overall throughput of the CPU. Diff: 2 Type: FIB Page Reference: 106 Topic: Q3 Skill: RECALL 108) The CPU reads instructions and data from memory via the data bus. Diff: 3 Type: FIB Page Reference: 106 Topic: Q3 Skill: RECALL 109) Macro viruses attach themselves to Word, Excel, or other type of documents. Diff: 2 Type: FIB Page Reference: 118 Topic: Q7 Skill: RECALL 110) The Operating System is a computer program that controls all of the computer's resources. Diff: 2 Type: FIB Page Reference: 106 Topic: Q3 Skill: RECALL 111) The Slammer virus that clogged the Internet in 2003 is an example of a(n) worm. Copyright © 2014 Pearson Canada Inc.

181


Chapter 4: Hardware and Software

Diff: 3 Type: FIB Page Reference: 118 Topic: Q7 Skill: RECALL 112) Viruses that are specifically programmed to spread are called worms. Diff: 2 Type: FIB Page Reference: 118 Topic: Q7 Skill: RECALL 113) Payload is the program code that is delivered by a virus to cause harmful actions. Diff: 3 Type: FIB Page Reference: 118 Topic: Q7 Skill: RECALL 114) A worm is a virus that propagates using the Internet or other computer network. Diff: 2 Type: FIB Page Reference: 118 Topic: Q7 Skill: RECALL 115) A(n) gigabyte (GB) is equal to 1024 MB. Diff: 2 Type: FIB Page Reference: 106 Topic: Q3 Skill: RECALL 116) Vendors issue patches to fix security holes in their programs. Diff: 3 Type: FIB Page Reference: 118 Topic: Q7 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

182


Chapter 4: Hardware and Software

117) 1024 GB of data is also referred to as a(n) terabyte (TB). Diff: 2 Type: FIB Page Reference: 106 Topic: Q3 Skill: RECALL 118) To represent the term "MIS" in a binary language would require three bytes of information. Diff: 3 Type: FIB Page Reference: 106 Topic: Q3 Skill: APPLIED 119) A byte is equivalent to one character of information. Diff: 2 Type: FIB Page Reference: 106 Topic: Q3 Skill: RECALL 120) The collection of instructions that a computer can process is called the computer's instruction set. Diff: 2 Type: FIB Page Reference: 108 Topic: Q4 Skill: RECALL 121) The need to minimize data volume to reduce the costs of storage was one reason for the Y2K problem. Diff: 3 Type: FIB Page Reference: 102 Topic: Q2 Skill: RECALL 122) According to most software licence agreements, vendors are not accountable for any security holes in the software that might leave their customers vulnerable to attack. Copyright © 2014 Pearson Canada Inc.

183


Chapter 4: Hardware and Software

Diff: 3 Type: FIB Page Reference: 118 Topic: Q7 Skill: APPLIED 123) Every computer should have an active copy of a(n) Antivirus programs. Diff: 2 Type: FIB Page Reference: 118 Topic: Q7 Skill: APPLIED 124) A(n) terabyte is equal to 1024 gigabytes. Diff: 3 Type: FIB Page Reference: 106 Topic: Q3 Skill: RECALL 125) Some larger corporations and government organizations still use mainframe computers. Diff: 2 Type: FIB Page Reference: 99 Topic: Q2 Skill: RECALL 126) What is firmware? Answer: Firmware is computer software that is installed into devices like printers, print servers, and various types of communication devices. Diff: 2 Type: ES Page Reference: 115 Topic: Q5 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

184


Chapter 4: Hardware and Software

127) How are computer viruses different from worms? Answer: A virus is a computer program that replicates itself; a worm is a virus that propagates using the Internet or other computer network. Diff: 3 Type: ES Page Reference: 118 Topic: Q7 Skill: APPLIED 128) Explain the functions of BIOS. Answer: BIOS is an important piece of firmware that checks to make sure the memory and input devices are functional before the operating system is loaded. Diff: 3 Type: ES Page Reference: 115 Topic: Q5 Skill: APPLIED 129) Why will knowing the basics about modern information technology help you in business? Answer: Knowing the basics about modern information technology (IT) (e.g., hardware, software, and networking) will not only help you be a more knowledgeable consumer of technology but also will help you be on top on the new advancements in your respective industry of interest. This understanding will allow you to recognize its positive and negative effects on society, and foresee the future. Indeed, knowing about modern IT may help you change the structure of your industry. (Refer to Porter’s four competitive strategies on how IT can possibly do this in Chapter 3.) Diff: 3 Type: ES Page Reference: 98 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

185


Chapter 4: Hardware and Software

Skill: APPLIED 130) Briefly describe how a computer works. Answer: The CPU (central processing unit) is the major actor. To run a program or process data, the CPU must first transfer the program or data from disk to main memory. Then, to execute an instruction, it moves the instruction from main memory into the CPU via the data channel or bus. The CPU has a small amount of very fast memory called a cache. The CPU keeps frequently used instructions in the cache. Having a large cache makes the computer faster, but cache is expensive. Main memory of the computer contains program instructions and instructions for the operating system, which is a program that controls the computer's resources as well as a block of data. Main memory is too small to hold all of the programs and data that a user may want to process. CPU loads programs into memory in chunks. When the user requested additional processing, the CPU loaded another piece of code. Diff: 3 Type: ES Page Reference: 106 Topic: Q3 Skill: APPLIED 131) How does the Microsoft licensing model differ from an open source licence? Answer: Microsoft licenses its software to its customers, users buy ther right to use the program, but do not own the program. Open source software is owned by the community that develops it, that includes every user potentially. There is no fee to use open source software. Diff: 3 Type: ES Page Reference: 111 Topic: Q5 Skill: APPLIED 132) What are the difference in functions between a client computer and a server computer? Answer: Copyright © 2014 Pearson Canada Inc.

186


Chapter 4: Hardware and Software

User uses client computers for word processing, spreadsheets, database access, and so forth. Most client computers also have software that enables them to connect to a network. Server computers publish web sites, sell goods, host databases, and provide other functions. Diff: 3 Type: ES Page Reference: 116 Topic: Q5 Skill: APPLIED 133) What are two major categories of software? Give an example of each. Answer: At the highest level, one should think of both operating systems (or system software) and application software. An example of a common operating system would, of course, be Windows XP. An example of an application program is MS Word with the MS Office application suite. Other examples of application software could be general ledger, payables, order entry, purchasing, etc. Diff: 3 Type: ES Page Reference: 113 Topic: Q5 Skill: APPLIED 134) Describe the functions of an operating system software. Answer: An operating system is a program that controls the computers resources and is responsible for loading and unloading programs. Diff: 2 Type: ES Page Reference: 106 Topic: Q3 Skill: APPLIED 135) What are the differences between volatile and nonvolatile memory? Give an example of each. Why is this important to know in business? Copyright © 2014 Pearson Canada Inc.

187


Chapter 4: Hardware and Software

Answer: Volatile memory is impermanent as compared to nonvolatile memory which is relatively permanent. This simply means that when the electric power that flows through the circuits is turned off, the data represented in the volatile memory disappears whereas the nonvolatile memory will retain the data. The main examples are RAM which is volatile and ROM which is nonvolatile. This is important to know in business so that we save our important data in a non-volatile memory format when we are done. Diff: 3 Type: ES Page Reference: 107 Topic: Q3 Skill: APPLIED 136) How is data represented and processed in the CPU? Answer: Computers use bits to represent data. A bit, or binary digit, has a value of zero or one. These bits are used to represent both computer instructions and also data and are processed in the CPU. They are loaded from the magnetic disk into main memory and then into the memory registers of the CPU where the instructions are fetched, decoded, and then executed. The results are stored in more registers and then moved back to main memory via the data bus. Diff: 3 Type: ES Page Reference: 106 Topic: Q3 Skill: APPLIED 137) Describe three different types of viruses and how they work. Answer: A Trojan horse virus masquerades as a game, music file, or a useful program that users want to download and then delivers a malicious payload. A macro virus attaches to a Word, Excel, or other type of document file. Then when the file is opened, it places itself in the start up file of that particular application and then infects every file the application processes after that. Worm viruses use the Internet or other computer network to spread and propagate. They can choke networks with a high volume of traffic to make the network unusable.

Copyright © 2014 Pearson Canada Inc.

188


Chapter 4: Hardware and Software

Diff: 3 Type: ES Page Reference: 188 Topic: Q7 Skill: APPLIED 138) What is an operating system? How does it perform memory swapping and why is this important for business? Answer: Operating system software is software that works behind the scenes of the computer to manage all the computer resources, including the CPU, main memory, and the input and output from other devices. When a user attempts to use multiple applications and multiple files, they must all be loaded into main memory. When the capacity of main memory is reached, the operating system will remove some applications and data from main memory to make room for the new program or file that was invoked. If the user jumps to one of the applications that was removed from main memory, the operating system will "page" it back into main memory as needed. This will result in slower processing of the data and applications. Diff: 3 Type: ES Page Reference: 106 Topic: Q3 Skill: APPLIED 139) What is the difference between off-the-shelf and custom software? What are the advantages and disadvantages of custom software? Answer: Off-the-shelf software is purchased and then may be modified to fit the particular need. Custom software is programmed from scratch to meet the needs of the company. Custom software development can be difficult and risky. Software development projects are hard to manage and are often 200 to 300 percent over budget and late. It may be that the needs of the organization are so unusual that no packaged system comes close to meeting those needs. If the potential gain in competitive advantage is great, it may be enough to justify the risk. It is also risky because many other existing applications may have to be modified in order to be integrated with the custom application. If the original developers of the system leave the organization, there must be good documentation of the custom system in order for other people to properly maintain it. Diff: 3 Copyright © 2014 Pearson Canada Inc.

189


Chapter 4: Hardware and Software

Type: ES Page Reference: 114 Topic: Q5 Skill: APPLIED 140) What are the different categories of hardware? Give an example of each. Answer: If we look at the basic functions of hardware, they can be categorized into input, output, processing, and storage devices. Input hardware includes keyboards, light pens, and mice; output devices are monitors and printers; processing hardware would include the CPU and main memory; and storage hardware would include magnetic and optical disk. Diff: 3 Type: ES Page Reference: 103 Topic: Q3 Skill: APPLIED 141) Some people say that technology changes too quickly and that they don't want any more features on the hardware and software that they use. Discuss the downside and the upside of this argument. Answer: While it is certainly true that software and hardware companies tend to overwhelm markets with their continual release of new and improved products, it difficult for them not to do this. They are under pressure to keep their firm's growth at high levels and so need to release new and improved products. Then there are some power users who demand new products. And if companies don't keep advancing their own technologies, they will be perceived as laggards in the industry rather than leaders. It is dangerous from a user standpoint to buy one version of software or hardware, learn it thoroughly, and then refuse to upgrade. Eventually these products will no longer be supported by the vendors and won't run on any available computers. There is a lot of marketing hype around new technology products, it is important to try and see through the, but it is equally important to keep up with advances in technology. Diff: 3 Type: ES Page Reference: 124 Topic: Q1 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

190


Chapter 4: Hardware and Software

142) Describe how you would stay informed about changes in technology. Answer: For today’s professionals, there is no other option except immersing oneself in the new changes in technology. There are different ways in which you can do this: 1) reading material that contains this type of information (e.g., CNET News and ZDNet); 2) attending professional events that combine your specialty with technology (e.g., if you are banker, attend sessions on technology trends for bankers); and 3) getting involved as a user representative in technology committees within your organization if possible (i.e., if your company is implementing an ERP, you can take part as technology champion or reviewer). Diff: 3 Type: ES Page Reference: 124 Topic: Q1 Skill: APPLIED 143) Explain why it is important for a manager to know how computers work. Answer: Computers can be bought with different amounts of memory and different configurations and, of course, their costs also vary with it. For that reason, it’s important for managers to understand the basics of how computers work so that they can help with the decisionmaking process when choosing the computers needed in the organization. For example, managers should at least be able to understand that the ability and capacity of certain computers to process a given amount of work in a set period depend on more factors than just the speed of the processor. And thus, they should be able to select the right computers for the information storage and processing needs of their organizations. This knowledge would also help these managers increase their negotiating skills with technology vendors. Diff: 3 Type: ES Page Reference: 107 Topic: Q3 Skill: APPLIED 144) Why is cloud computing theoretically more efficient than traditional computing?

Copyright © 2014 Pearson Canada Inc.

191


Chapter 4: Hardware and Software

Answer: Cloud computing is more efficient because users pay only for what they use. Hardware and software are not purchased and then not used. In cloud computing hardware and software is rented only when it is necessary and this makes cloud computing more efficient. Diff: 3 Type: ES Page Reference: 109 Topic: Q4 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

192


Chapter 5: Database and Content Management

1) A database is a self-describing collection of integrated records. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 131 Topic: Q4 Skill: RECALL 2) Special data called structured data describes the structure of the database. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 134 Topic: Q4 Skill: RECALL 3) Metadata is data about data. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 134 Topic: Q4 Skill: RECALL 4) The name of the field, its datatype, and description are examples of metadata. a. True b. False Answer: a Diff: 2 Copyright © 2014 Pearson Canada Inc.

193


Chapter 5: Database and Content Management

Type: TF Page Reference: 134 Topic: Q4 Skill: RECALL 5) A DBMS is software that helps manage the operating system. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 141 Topic: Q5 Skill: RECALL 6) A database application system consists of forms, reports, and database programs. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 135 Topic: Q5 Skill: RECALL 7) Most large companies develop their own DBMSs. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 135 Topic: Q5 Skill: RECALL 8) IBM makes a DBMS called SQL-Server. Copyright © 2014 Pearson Canada Inc.

194


Chapter 5: Database and Content Management

a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 135 Topic: Q5 Skill: RECALL 9) MySQL is an open source DBMS product. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 135 Topic: Q5 Skill: RECALL 10) Oracle makes a DBMS packaged called DB2. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 135 Topic: Q5 Skill: RECALL 11) SQL Server is an open-source DBMS package that is free for most database applications. a. True b. False Answer: b Diff: 2 Type: TF Copyright © 2014 Pearson Canada Inc.

195


Chapter 5: Database and Content Management

Page Reference: 135 Topic: Q5 Skill: RECALL 12) A DBMS and a database are two different things. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 135 Topic: Q5 Skill: RECALL 13) A DBMS is a collection of tables, relationships, and metadata. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 135 Topic: Q5 Skill: RECALL 14) SQL is an international standard language for processing a database. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 136 Topic: Q5 Skill: RECALL 15) SQL stands for "Standard Query Language". Copyright © 2014 Pearson Canada Inc.

196


Chapter 5: Database and Content Management

a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 136 Topic: Q5 Skill: RECALL 16) SQL can be used to add a new column to a table. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 136 Topic: Q5 Skill: APPLIED 17) A database can have one and only one application. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 137 Topic: Q6 Skill: RECALL 18) A database application can have one or more users. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 137 Copyright © 2014 Pearson Canada Inc.

197


Chapter 5: Database and Content Management

Topic: Q6 Skill: RECALL 19) A database form translates inputted changes into a SQL query in order for the database to process them. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 136 Topic: Q5 Skill: APPLIED 20) Many people find it easier to store data using a spreadsheet than a database. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 130 Topic: Q3 Skill: RECALL 21) The only remaining personal DBMS today is Paradox. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 142 Topic: Q7 Skill: RECALL 22) A spreadsheet is just another type of relational database. a. True Copyright © 2014 Pearson Canada Inc.

198


Chapter 5: Database and Content Management

b. False Answer: b Diff: 2 Type: TF Page Reference: 133 Topic: Q4 Skill: applied 23) Personal DBMS can handle over 100 users. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 142 Topic: Q7 Skill: RECALL 24) Spreadsheets usually track only one “theme”, but databases usually involved more than one “theme”. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 130 Topic: Q3 Skill: RECALL 25) Employees usually insert content directly into a company's website without a controlling editor. a. True b. False Answer: b Diff: 2 Type: TF Copyright © 2014 Pearson Canada Inc.

199


Chapter 5: Database and Content Management

Page Reference: 129 Topic: Q2 Skill: APPLIED 26) ________ is a form of creative endeavor that can be protected through a trademark, patent, copyright, industrial design, or integrated circuit topography. a. Innovative design b. Intellectual property c. Creative writing d. Programming e. Digital design Answer: b Diff: 1 Type: MC Page Reference: 128 Topic: Q1 Skill: RECALL 27) What does CMS stand for? a. Content Management System b. Copy Management System c. Customer Management System d. Customer Manipulation System e. Content Manipulation System Answer: a Diff: 1 Type: MC Page Reference: 129 Topic: Q2 Skill: RECALL 28) A ________ is a self-describing collection of integrated records. a. column b. table Copyright © 2014 Pearson Canada Inc.

200


Chapter 5: Database and Content Management

c. row d. field e. database Answer: e Diff: 1 Type: MC Page Reference: 131 Topic: Q4 Skill: RECALL 29) A group of similar rows or records is called a ________. a. database b. table c. instance d. attribute e. column Answer: b Diff: 1 Type: MC Page Reference: 131 Topic: Q4 Skill: RECALL 30) ________ describe(s) the structure of the database. a. Metadata b. Tables c. Columns d. A relationship diagram e. Fields Answer: a Diff: 2 Type: MC Page Reference: 131 Copyright © 2014 Pearson Canada Inc.

201


Chapter 5: Database and Content Management

Topic: Q4 Skill: RECALL 31) A database consists of a. rows, tables, instructions. b. metadata, keyboard, relationships. c. tables, instructions, relationships. d. relationships, rows tables. e. CPU, tables, rows. Answer: d Diff: 3 Type: MC Page Reference: 131 Topic: Q4 Skill: RECALL 32) A ________ is a column or group of columns that identifies a unique row in a table. a. record b. relationship c. row d. key e. field Answer: d Diff: 2 Type: MC Page Reference: 132 Topic: Q4 Skill: RECALL 33) ________ are keys in a different table from the one in which they reside. a. Secondary keys b. Simple keys c. Special keys Copyright © 2014 Pearson Canada Inc.

202


Chapter 5: Database and Content Management

d. Primary keys e. Foreign keys Answer: e Diff: 3 Type: MC Page Reference: 133 Topic: Q4 Skill: RECALL 34) ________ is a formal name for a table. a. File b. Database c. Collection d. Metadata e. Relation Answer: e Diff: 2 Type: MC Page Reference: 133 Topic: Q4 Skill: RECALL 35) A relational database refers to a. databases that have related objects related by similar attributes. b. a set of tables that contains similar content. c. a set of files that have similar names. d. databases that carry data in the form of tables with individual primary keys. e. databases that carry data in the form of tables and that represent relationships using foreign keys. Answer: e Diff: 2 Type: MC Page Reference: 133 Copyright © 2014 Pearson Canada Inc.

203


Chapter 5: Database and Content Management

Topic: Q5 Skill: RECALL 36) Which of the following are not considered to be metadata? a. Field properties b. Description c. File name d. Data type e. Field name Answer: c Diff: 2 Type: MC Page Reference: 133 Topic: Q4 Skill: APPLIED 37) ________ consists of forms, formatted reports, queries, and application programs. a. A database application b. A DBMS program c. A Visual Basic application d. A database e. A Windows application Answer: a Diff: 1 Type: MC Page Reference: 135 Topic: Q5 Skill: RECALL 38) Which of the following is a personal DBMS product? a. Microsoft Access b. Oracle c. SQL. Copyright © 2014 Pearson Canada Inc.

204


Chapter 5: Database and Content Management

d. Microsoft SQL Server e. IBM DB2. Answer: a Diff: 1 Type: MC Page Reference: 142 Topic: Q7 Skill: RECALL 39) Which of the following is an international standard language for processing a database? a. VBA b. C++ c. Visual Basic d. Standard Query Language e. Structured Query Language Answer: e Diff: 2 Type: MC Page Reference: 136 Topic: Q5 Skill: RECALL 40) A database applications is a collection of programs, forms, reports and a. Queries b. Tables c. Metadata d. Keys e. Printers Answer: a Diff: 2 Type: MC Page Reference: 137 Copyright © 2014 Pearson Canada Inc.

205


Chapter 5: Database and Content Management

Topic: Q6 Skill: RECALL 41) ________ are used to display formatted data and to generate paper copies of the data. a. Tables b. Forms c. Views d. Reports e. Queries Answer: d Diff: 2 Type: MC Page Reference: 139 Topic: Q6 Skill: RECALL 42) Which of the following techniques is used to resolve the lost-update problem? a. Preemptive updating b. Sharing c. Task switching d. Locking e. Multitasking Answer: d Diff: 2 Type: MC Page Reference: 141 Topic: Q6 Skill: RECALL 43) Which of the following is a file extension name of a graphics file? a. .wav b. .mov c. .mpg Copyright © 2014 Pearson Canada Inc.

206


Chapter 5: Database and Content Management

d. .pdf e. .bmp Answer: e Diff: 2 Type: MC Page Reference: 128 Topic: Q1 Skill: RECALL 44) Which of the following is a file extension name of an audio file? a. .pdf b. .wav c. .mov d. .bmp e. .mpg Answer: b Diff: 1 Type: MC Page Reference: 128 Topic: Q1 Skill: RECALL 45) Which of the following is a file extension name of a video file? a. .wav b. .mpg c. .doc d. .pdf e. .bmp Answer: b Diff: 1 Type: MC Page Reference: 128 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

207


Chapter 5: Database and Content Management

Skill: RECALL 46) Which of the following is a file extension name of a word-processing document? a. .mpg b. .docx c. .bmp d. .xlsx e. .wav Answer: b Diff: 1 Type: MC Page Reference: 128 Topic: Q1 Skill: RECALL 47) Which of the following are not users of a content management system? a. Customers b. Web masters c. Copy editors d. Managers e. Employees Answer: a Diff: 3 Type: MC Page Reference: 129 Topic: Q2 Skill: RECALL 48) The company that digitized the Oxford English Dictionary is called a. IBM. b. Nortel. c. Microsoft. d. Open Text. Copyright © 2014 Pearson Canada Inc.

208


Chapter 5: Database and Content Management

e. Research in Motion. Answer: d Diff: 1 Type: MC Page Reference: 129 Topic: Q2 Skill: RECALL 49) Columns are also called a. rows. b. databases. c. fields. d. relations. e. tables. Answer: c Diff: 1 Type: MC Page Reference: 131 Topic: Q4 Skill: RECALL 50) In a relational database, a collection of related records is a(n) a. row. b. attribute. c. table. d. column. e. field. Answer: c Diff: 2 Type: MC Page Reference: 131 Topic: Q4 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

209


Chapter 5: Database and Content Management

51) A collection of records in a relational database can be called a a. matrix. b. column. c. field. d. row. e. relation. Answer: e Diff: 2 Type: MC Page Reference: 133 Topic: Q4 Skill: RECALL 52) The company Open Text provides companies with “cloud based” a. sales management software b. document management software c. Microsoft Office d. data storage e. accounting software Answer: b Diff: 3 Type: MC Page Reference: 129 Topic: Q2 Skill: RECALL 53) Many users prefer to avoid database applications altogether and simply store their data in a(n) a. mattress. b. file. c. old can. d. spreadsheet. e. encrypted table. Copyright © 2014 Pearson Canada Inc.

210


Chapter 5: Database and Content Management

Answer: d Diff: 2 Type: MC Page Reference: 130 Topic: Q3 Skill: RECALL 54) ________ software assists in creating, maintaining, and manipulating databases. a. DMS b. KMS c. DBMS d. MIS e. DBM Answer: c Diff: 3 Type: MC Page Reference: 135 Topic: Q5 Skill: RECALL 55) Content management is indexing the right information, processing, sorting it, and then a. getting it printed when needed. b. hiring good programmers. c. editing right employee input. d. making it available in the right format at the right time. e. giving it to employees with “strong” passwords. Answer: d Diff: 3 Type: MC Page Reference: 128 Topic: Q2 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

211


Chapter 5: Database and Content Management

56) ________ is a record in a relational database. a. A field b. A table c. A column d. A row e. A key Answer: d Diff: 2 Type: MC Page Reference: 131 Topic: Q4 Skill: RECALL 57) ________ is an example of a personal DBMS. a. Access b. SQL Server c. DB2 d. SQL e. Oracle Answer: a Diff: 2 Type: MC Page Reference: 131 Topic: Q4 Skill: RECALL 58) ________ is an example of an enterprise DBMS. a. Access b. DB2 c. FoxPro d. Quattro Pro e. Paradox Copyright © 2014 Pearson Canada Inc.

212


Chapter 5: Database and Content Management

Answer: b Diff: 2 Type: MC Page Reference: 135 Topic: Q5 Skill: RECALL 59) MySQL is popular because it is a(n) ________ DBMS. a. open-source b. work-group c. personal d. enterprise e. powerful Answer: a Diff: 2 Type: MC Page Reference: 135 Topic: Q5 Skill: RECALL 60) One example of a DBMS is a. SQL Server. b. .NET. c. Java. d. OEM. e. Excel. Answer: a Diff: 2 Type: MC Page Reference: 135 Topic: Q5 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

213


Chapter 5: Database and Content Management

61) SQL is a a. query language. b. database system. c. 3GL. d. 2GL. e. programming language. Answer: a Diff: 2 Type: MC Page Reference: 136 Topic: Q5 Skill: RECALL 62) A(n) ________ DBMS is designed to process large organizational and workgroup databases. a. object-oriented b. network c. relational d. personal e. enterprise Answer: e Diff: 2 Type: MC Page Reference: 141 Topic: Q7 Skill: RECALL 63) SQL stands for a. Structured Query Language. b. Standard Query Language. c. Structured Question Language. d. Simple Query Language. e. Standard Question Language. Copyright © 2014 Pearson Canada Inc.

214


Chapter 5: Database and Content Management

Answer: a Diff: 2 Type: MC Page Reference: 136 Topic: Q5 Skill: RECALL 64) ________ is an international standard language for processing a database. a. VBA b. SQL c. Java d. .NET e. MySQL Answer: b Diff: 2 Type: MC Page Reference: 136 Topic: Q5 Skill: RECALL 65) The ________ problem is unique to a multi-user database environment. a. redundancy b. lost-update c. locked file d. security e. data integrity Answer: b Diff: 3 Type: MC Page Reference: 141 Topic: Q6 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

215


Chapter 5: Database and Content Management

66) Users process data in the database using a. files. b. logic. c. programs. d. reports. e. queries. Answer: e Diff: 3 Type: MC Page Reference: 135 Topic: Q5 Skill: APPLIED 67) The name of the field, the data type, and number of characters allowed are examples of a. attributes. b. characters. c. content. d. overhead. e. metadata. Answer: e Diff: 2 Type: MC Page Reference: 134 Topic: Q4 Skill: RECALL 68) ________ describe(s) the structure of a database. a. Logic b. Metadata c. Models d. Protocols e. Content Copyright © 2014 Pearson Canada Inc.

216


Chapter 5: Database and Content Management

Answer: b Diff: 2 Type: MC Page Reference: 134 Topic: Q4 Skill: RECALL 69) In today's business world content is just not about collection and distribution. It is also about a. the accuracy of the content. b. the organization of the content. c. the content management system. d. the relevance of the content. e. presenting the content appropriately for the audience. Answer: e Diff: 2 Type: MC Page Reference: 128 Topic: Q1 Skill: RECALL 70) In the early days of corporate websites, employees were allowed to add content directly to the sites. Today this practice is not acceptable because a. of the lack of consistency in both look and accuracy of the web site. b. employees lack the skills to add content to web sites due to the greater sophistication of the software used today for corporate web sites. c. companies with web sites now have copy editors to prepare web site content. d. most companies use content management systems today. e. most web sites are driven by database management systems. Answer: a Diff: 3 Type: MC Page Reference: 129 Topic: Q2 Copyright © 2014 Pearson Canada Inc.

217


Chapter 5: Database and Content Management

Skill: RECALL 71) Modern content management systems a. seek out documents located across an organization and actively manage access to the content. b. manage only media files. c. archive documents. d. organize content for corporate web sites. e. manage all aspects of corporate data. Answer: a Diff: 3 Type: MC Page Reference: 129 Topic: Q2 Skill: RECALL 72) Content is closely related to a. intellectual property. b. words. c. software. d. property in the broadest sense. e. organized materials. Answer: a Diff: 2 Type: MC Page Reference: 128 Topic: Q1 Skill: RECALL 73) One of the DMBS administrative functions includes a. building the database. b. backing up the database. c. collecting user requirements for the database. d. planning the database. Copyright © 2014 Pearson Canada Inc.

218


Chapter 5: Database and Content Management

e. entering new data into the database. Answer: b Diff: 3 Type: MC Page Reference: 137 Topic: Q5 Skill: RECALL 74) A database differs from a spreadsheet by a. involving lists of a single theme. b. having only columns. c. having lists of multiple rows and columns. d. involving lists of multiple themes. e. having only rows. Answer: d Diff: 3 Type: MC Page Reference: 130 Topic: Q3 Skill: APPLIED 75) In databases, names of clients can be troublesome since they may not be a. relevant. b. simple. c. reconciled. d. unique. e. normalized. Answer: d Diff: 3 Type: MC Page Reference: 138 Topic: Q6 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

219


Chapter 5: Database and Content Management

76) In a relational database application, a(n) ________ key is used to link one table with another. a. primary b. index c. secondary d. foreign e. composite Answer: d Diff: 2 Type: MC Page Reference: 133 Topic: Q4 Skill: RECALL 77) Some employees are frustrated with database applications or are unwilling to share their data, so they prefer to store their data in a(n) spreadsheet instead of a database application. Diff: 2 Type: FIB Page Reference: 130 Topic: Q3 Skill: RECALL

78) If a user stores their data in a spreadsheet, it is unavailable to other users unless it is stored in the company’s CMS. Diff: 3 Type: FIB Page Reference: 129 Topic: Q2 Skill: RECALL 79) metadata describes the data in a database. Diff: 2 Type: FIB Page Reference: 134 Topic: Q4 Copyright © 2014 Pearson Canada Inc.

220


Chapter 5: Database and Content Management

Skill: RECALL 80) Enterprise DBMS like DB2 are designed for large, corporate database applications. Diff: 1 Type: FIB Page Reference: 141 Topic: Q7 Skill: RECALL 81) For applications that need to process databases over the Internet, the application serves as an intermediary between the web server and the database. Diff: 2 Type: FIB Page Reference: 140 Topic: Q6 Skill: RECALL 82) Characters of information are represented by individual bytes. Diff: 1 Type: FIB Page Reference: 132 Topic: Q4 Skill: RECALL 83) A(n) DBMS is software that is used to create, process, and administer a database. Diff: 2 Type: FIB Page Reference: 135 Topic: Q5 Skill: RECALL 84) A(n) relation is another name for a table in relational database terms. Diff: 2 Type: FIB Page Reference: 133 Topic: Q4 Skill: RECALL 85) SQL is a query language that is portable between all relational DBMSs. Diff: 2 Copyright © 2014 Pearson Canada Inc.

221


Chapter 5: Database and Content Management

Type: FIB Page Reference: 136 Topic: Q5 Skill: RECALL 86) Personal database products like MS Access are designed for individual users or small workgroups of no more than 15 users. Diff: 2 Type: FIB Page Reference: 142 Topic: Q7 Skill: RECALL 87) If your database produces inaccurate results that don’t seem to have a cause, your database may be having lost-update problems. Diff: 3 Type: FIB Page Reference: 141 Topic: Q6 Skill: RECALL 88) A web CMS helps to enable a company to standardize the look and feel of a web site. Diff: 2 Type: FIB Page Reference: 129 Topic: Q2 Skill: RECALL 89) A collection of columns or fields is called rows or records. Diff: 1 Type: FIB Page Reference: 131 Topic: Q4 Skill: RECALL 90) A group of similar rows or records is called a file or a(n) table. Diff: 1 Type: FIB Page Reference: 131 Topic: Q4 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

222


Chapter 5: Database and Content Management

91) Bytes are grouped into columns or fields. Diff: 1 Type: FIB Page Reference: 131 Topic: Q4 Skill: RECALL 92) A database is a self-describing collection of integrated records. Diff: 1 Type: FIB Page Reference: 131 Topic: Q4 Skill: RECALL 93) A database is a collection of tables, relationships, and metadata. Diff: 2 Type: FIB Page Reference: 131 Topic: Q4 Skill: RECALL 94) Data type and description are examples of metadata. Diff: 2 Type: FIB Page Reference: 134 Topic: Q4 Skill: RECALL 95) The purpose of a database is to keep track of things that involve more than one theme. Diff: 2 Type: FIB Page Reference: 130 Topic: Q3 Skill: RECALL 96) A(n) query is a special name for a question that is asked in a database application. Diff: 2 Type: FIB Copyright © 2014 Pearson Canada Inc.

223


Chapter 5: Database and Content Management

Page Reference: 136 Topic: Q5 Skill: RECALL 97) A database is a collection of tables, metadata, and relationships. Diff: 2 Type: FIB Page Reference: 135 Topic: Q5 Skill: RECALL 98) Setting up the database security is a part of database administration. Diff: 2 Type: FIB Page Reference: 137 Topic: Q5 Skill: RECALL 99) When a database form is processed to add a new record to a table, the DBMS converts the contents of the form into a(n) SQL statement. Diff: 3 Type: FIB Page Reference: 136 Topic: Q5 Skill: RECALL 100) To prevent the lost-update problem, the DBMS should have some type of locking mechanism. Diff: 3 Type: FIB Page Reference: 141 Topic: Q6 Skill: RECALL 101) Forms and reports are usually part of a database application. Diff: 2 Type: FIB Page Reference: 139 Topic: Q6 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

224


Chapter 5: Database and Content Management

102) What are the differences between a database and a spreadhseet? Answer: A spreadsheet table is organized into rows and columns and is typically used to track related data across two dimensions (e.g. student grades on course assignments), whereas a database is a three-dimensional storage structure—think of a series of two-dimensional tables linked together (e.g. course scheduling for faculty and students). A database has metadata to structure the data of the database. Spreadsheets are simple to set up and understand. However, a database is preferable in cases where the user needs to keep track of three or more things –customers, sales, suppliers, and other transactions—and databases are better when data involves more than one topic or theme. Spreadsheets work best when the data involves just one topic or theme. Diff: 3 Type: ES Page Reference: 130 Topic: Q3 Skill: APPLIED 103) Explain the difference between a primary key and a foreign key. Answer: A primary key is a column or group of columns that has a unique value for each row in a table. Foreign keys are primary keys from a different table than the one in which they reside. Diff: 3 Type: ES Page Reference: 133 Topic: Q4 Skill: APPLIED 104) What is a database application? Answer: A database application consists of forms, formatted reports, queries, and application programs. Each of these in turn calls on the database management system to process the database tables. Diff: 2 Type: ES Copyright © 2014 Pearson Canada Inc.

225


Chapter 5: Database and Content Management

Page Reference: 135 Topic: Q5 Skill: RECALL 105) Discuss the challenges for a multiuser database application. Answer: Multiple users may try to update the same record at the same time, which can make for a lost-update problem. To prevent this problem, some type of locking must be used to coordinate the activities of users. Diff: 3 Type: ES Page Reference: 141 Topic: Q6 Skill: APPLIED 106) Describe the use of a content management system. Answer: When an employee wants to place some content on the organizations web site he or she will access the web content management system. The web CMS is usually located on the company's web site server. The employee typically loads the raw content into the CMS. Copy editors then review the document and make necessary changes. They then pass the content on to layout editors, who prepare how the content will be presented. The content and presentation are stored with the help of a DBMS. The manager in charge of the web site will then review the content and presentation and publish the work to the live web site. Diff: 3 Type: ES Page Reference: 129 Topic: Q2 Skill: RECALL 107) Name three different DBMS packages available today. Answer: IBM DB2, Oracle, Microsoft SQL Server, MySQL.

Copyright © 2014 Pearson Canada Inc.

226


Chapter 5: Database and Content Management

Diff: 1 Type: ES Page Reference: 135 Topic: Q5 Skill: recall 108) What is the difference between a DBMS and a database? Answer: A DBMS is a software program that helps to build, control and maintain a database; a database is a collection of tables, relationships, and metadata. Diff: 2 Type: ES Page Reference: 135 Topic: Q5 Skill: RECALL 109) What is metadata? Give an example. Why is it important? Answer: Metadata is data "about" data. Metadata describes the structure of the database and its contents. Examples include the names and descriptions of the fields, the various aliases for them throughout the database, the dates that they were created and modified, the data types, the field widths, and whether it's a key or indexed. Metadata is important because it helps the DBMS to automate some data management tasks. However, as the amount of metadata grows it takes up more memory and must be managed itself. Diff: 3 Type: ES Page Reference: 134 Topic: Q4 Skill: APPLIED 110) What is a DBMS? What are the advantages and disadvantages of using a DBMS? Answer: DBMS stands for Database Management System. There are many different kinds but the relational DBMS (RDBMS) is by far the most popular today. A DBMS is useful because it helps database developers create tables and relationships, manage the metadata, process Copyright © 2014 Pearson Canada Inc.

227


Chapter 5: Database and Content Management

the database with queries, and administer the user access and security. It standardizes data access in the organization and simplifies data maintenance. Data can be quite complex and quite expensive to manage. If the centralized data store is not archived and backed up properly, the impact of lost corporate data will be more severe than in an older situation where there were a lot of redundant databases. Diff: 3 Type: ES Page Reference: 135 Topic: Q5 Skill: APPLIED 111) It is often said that much of corporate data resides in various unrelated spreadsheet files or, "spreadsheet silos." What are these concepts and why are they a problem? Answer: Millions of business users rely daily on spreadsheets for business intelligence (BI) functions such as data manipulation, data visualization, presentation graphics, forecasting, and so on. For many users, spreadsheets are a form of reporting, and pivot tables a type of data analysis. When users modify the data in spreadsheets and add new data, soon the data in the spreadsheet looks nothing like the source data. This creates problems for sharing the data with others and it generates inconsistent versions of the data in the organization. Diff: 3 Type: ES Page Reference: 130 Topic: Q3 Skill: APPLIED 112) What is meant by a relational database? What are the advantages of relational database technology? Answer: Relational databases store data in tables and use shared fields (primary and foreign keys) in order to show the relationships between tables. Relational databases are based on strong fundamental theory and limit the amount of data redundancy and data errors. A relational database can enforce data and referential integrity constraints. They are the most popular type of DBMS available because they capture all the possible types of relationships and they are fairly easy to learn and implement. There are many skilled IT specialists in this field so it is fairly easy to find support for this technology.

Copyright © 2014 Pearson Canada Inc.

228


Chapter 5: Database and Content Management

Diff: 3 Type: ES Page Reference: 133 Topic: Q4 Skill: APPLIED 113) What is SQL? Why is it so important for DBMS? Give an example. Answer: SQL stands for "Structured Query Language", and this is the standard query language for all DBMSs. It is a 4GL so it is fairly English-like and easy to learn. A knowldege of generic SQLcan be transferred to any of the popular DBMSs easily. There are SQL commands for creating tables, manipulating data, and for maintaining the data. A standard format for a data manipulation type of query is: SELECT field 1, field 2, ….field n FROM table 1, table 2, ….table m WHERE condition 1, condition 2, ….condition p is true So a typical query might be: SELECT CustomerNumber, CustomerName FROM Customer WHERE Province = ‘AB' Diff: 3 Type: ES Page Reference: 136 Topic: Q5 Skill: APPLIED 114) What is the difference between a personal DBMS and an enterprise DBMS? Give an example of each. Answer: A personal DBMS is designed for smaller, simpler database applications. It can be used for personal or small workgroup applications with fewer than 100 users, usually less than 15. Most of the time a personal DBMS is used by a single user for a stand-alone application. The most popular example is MS Access. Enterprise DBMSs like DB2 from IBM process large organizational or workgroup database applications. They may have thousands of users with multiple applications distributed across various networks. They have more sophisticated network and security capabilities than a personal DBMS. Diff: 3 Type: ES Copyright © 2014 Pearson Canada Inc.

229


Chapter 5: Database and Content Management

Page Reference: 141-142 Topic: Q7 Skill: APPLIED 115) If you are a database administrator and you uncover some suspicious transactions in one of your database applications, what should you do? Answer: Everyone should be aware that fraud does happen, it is more likely to be due to an employee than an outsider. The first thing to be aware of is you must not speak casually about this situation with anyone. It is important to begin carefully to collect as much data as possible on the situation and document all the names and dates. As soon as possible you should speak with a member of the senior management, possibly a CIO or CFO since the CFO is usually in charge of financial controls. If the matter continues for very long and looks complicated, you should consider contacting your own lawyer to protect your own interests. Diff: 3 Type: ES Page Reference: 137 Topic: Q5 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

230


Application Extension 5a: Database Design

1) A physical representation of a database is called a data model. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 152 Topic: Q2 Skill: RECALL 2) A data model describes the data and relationships that will be stored in the database. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 152 Topic: Q2 Skill: RECALL 3) The data model should summarize the data requirements as derived from interviews with the end users. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 152 Topic: Q2 Skill: APPLIED 4) The Object-Relationship (OR) technique is the most popular one for creating a data model. a. True b. False Answer: b Copyright © 2014 Pearson Canada Inc.

231


Application Extension 5a: Database Design

Diff: 2 Type: TF Page Reference: 152 Topic: Q3 Skill: RECALL 5) Once the entities have been defined, the data model can be implemented directly on the DBMS. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 152 Topic: Q2 Skill: RECALL 6) "Address" would be a likely attribute of a customer entity in a database application. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 153 Topic: Q2 Skill: RECALL 7) "Name" would be a good identifier for a customer entity in a database application. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 153 Topic: Q3 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

232


Application Extension 5a: Database Design

8) "PartNumber" would be a good identifier for a part entity in a database application. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 153 Topic: Q3 Skill: RECALL 9) Each entity should have one unique identifier. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 153 Topic: Q3 Skill: RECALL 10) In E-R diagrams, entities are represented with rectangles. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 154 Topic: Q3 Skill: RECALL 11) The notation N:N indicates a many-to-many relationship. a. True b. False Answer: b Diff: 2 Copyright © 2014 Pearson Canada Inc.

233


Application Extension 5a: Database Design

Type: TF Page Reference: 154 Topic: Q3 Skill: RECALL 12) In E-R diagrams, attributes can be represented with crow's feet. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 154 Topic: Q3 Skill: RECALL 13) Normalization is a process that helps ensure that the tables from the database design process are well structured. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 156 Topic: Q4 Skill: RECALL 14) In a 1:N type of relationship, the foreign key is stored on the "1" side. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 158 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

234


Application Extension 5a: Database Design

15) E-R diagrams are too cumbersome for use in database design discussions. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 158 Topic: Q4 Skill: RECALL 16) An entity is something you want to track. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 153 Topic: Q3 Skill: RECALL 17) A data model should show how users see their “world”. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 152 Topic: Q2 Skill: RECALL 18) Users validate and approve the data model prior to its transformation into a database design. a. True b. False Answer: a Diff: 2 Copyright © 2014 Pearson Canada Inc.

235


Application Extension 5a: Database Design

Type: TF Page Reference: 152 Topic: Q2 Skill: RECALL 19) Users need to verify the data model for correctness. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 152 Topic: Q2 Skill: RECALL 20) Any mistake in the data modeling stage will come back to haunt you. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 152 Topic: Q2 Skill: APPLIED 21) At times you may not place a field in a table because it can be readily computed in forms or reports. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 163 Topic: Q6 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

236


Application Extension 5a: Database Design

22) Normalization is a trade-off between the elimination of data duplication and processing speed. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 157 Topic: Q4 Skill: RECALL 23) When a student can have more than one adviser it is a N:M relationship. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 154 Topic: Q4 Skill: RECALL 24) When two rows in a database are supposed to refer to the same thing and they do not, you have a data integrity problem. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 156 Topic: Q4 Skill: RECALL 25) The easiest time to change a database design is during the data modeling stage. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

237


Application Extension 5a: Database Design

Diff: 1 Type: TF Page Reference: 160 Topic: Q5 Skill: RECALL 26) UML stands for a. Unified Modeling Language. b. Unified Metadata Language. c. United Metadata Language. d. Universal Metadata Language. e. Universal Modeling Language. Answer: a Diff: 1 Type: MC Page Reference: 152 Topic: Q3 Skill: RECALL 27) ________ is the process of converting poorly structured tables into two or more wellstructured tables. a. Sharing b. Reengineering c. Normalization d. Decentralization e. Redesigning Answer: c Diff: 1 Type: MC Page Reference: 156 Topic: Q4 Skill: RECALL 28) "One department can have many advisers" is an example of Copyright © 2014 Pearson Canada Inc.

238


Application Extension 5a: Database Design

a. a one-to-many relationship. b. maximum cardinality relationship. c. a minimum cardinality relationship. d. a one-to-one relationship. e. a many-to-many relationship. Answer: a Diff: 1 Type: MC Page Reference: 154 Topic: Q3 Skill: RECALL 29) Entities have ________ that describes characteristics of the entity. a. relations b. properties c. attributes d. names e. files Answer: c Diff: 1 Type: MC Page Reference: 153 Topic: Q3 Skill: RECALL 30) Entities have an ________ which is an attribute whose value is associated with one and only one entity instance. a. index b. agenda c. attribute d. initial e. identifier Answer: e Copyright © 2014 Pearson Canada Inc.

239


Application Extension 5a: Database Design

Diff: 2 Type: MC Page Reference: 153 Topic: Q3 Skill: RECALL 31) A person, place or object would be represented in a database application as a(n) a. entity. b. record. c. table. d. class. e. object. Answer: a Diff: 1 Type: MC Page Reference: 153 Topic: Q3 Skill: RECALL 32) A(n) ________ diagram is like a blueprint of a database application. a. flowchart b. O-O c. workflow d. Entity-Relationship (E-R) e. O-R Answer: d Diff: 2 Type: MC Page Reference: 154 Topic: Q3 Skill: RECALL 33) ________ is (are) the most popular diagramming tool(s) for database applications. a. O-O Copyright © 2014 Pearson Canada Inc.

240


Application Extension 5a: Database Design

b. E-R diagrams c. Flowcharts d. Workflows e. UML Answer: b Diff: 2 Type: MC Page Reference: 154 Topic: Q3 Skill: RECALL 34) In a relational database, each entity is described by a. characters. b. data. c. bytes. d. attributes. e. records. Answer: d Diff: 2 Type: MC Page Reference: 153 Topic: Q3 Skill: RECALL 35) When creating tables for an entity, the identifier of the entity becomes the _________ of the table. a. master column. b. key. c. index attribute. d. foreign key. e. index field. Answer: b Diff: 2 Copyright © 2014 Pearson Canada Inc.

241


Application Extension 5a: Database Design

Type: MC Page Reference: 158 Topic: Q4 Skill: RECALL 36) If the same data element is stored differently in another table, this is said to be an issue of a. inaccurate data. b. entity integrity. c. data repetition. d. normalization. e. data integrity. Answer: e Diff: 3 Type: MC Page Reference: 157 Topic: Q4 Skill: RECALL 37) A(n) ________ data model captures the entities and their relationships in a database application. a. workflow b. O-O c. Semantic Object d. E-R e. flowchart Answer: d Diff: 2 Type: MC Page Reference: 152 Topic: Q3 Skill: RECALL 38) An example of a one-to-many type of relationship might be Copyright © 2014 Pearson Canada Inc.

242


Application Extension 5a: Database Design

a. an employee cannot be assigned a computer. b. an employee can be assigned an office. c. an employee can be assigned more than one computer. d. an employee can be assigned one and only one computer. e. an employee is assigned a company car. Answer: c Diff: 2 Type: MC Page Reference: 154 Topic: Q3 Skill: APPLIED 39) The most confusing type of a relationship is the ________ relationship. a. 1:N b. M:M c. N:M d. 1:1 e. N:1 Answer: c Diff: 2 Type: MC Page Reference: 155 Topic: Q3 Skill: RECALL 40) ________ is used to indicate a many-to-many relationship. a. N:M b. 1:M c. M:N d. M:M e. 1:1 Answer: a Diff: 1 Copyright © 2014 Pearson Canada Inc.

243


Application Extension 5a: Database Design

Type: MC Page Reference: 154 Topic: Q3 Skill: RECALL 41) ________ would be the best identifier attribute for an employee table. a. Birth Date b. Social Insurance number c. Last Name d. Phone number e. First Name and Last Name Answer: b Diff: 2 Type: MC Page Reference: 153 Topic: Q3 Skill: APPLIED 42) ________ is the last step in developing a database application. a. Designing the tables with the keys b. Getting the information requirements c. Reviewing the data model with users d. Creating the database e. Creating a data model Answer: d Diff: 2 Type: MC Page Reference: 152 Topic: Q2 Skill: RECALL 43) If a student is allowed to have multiple majors and advisers are assigned to multiple students, these would be examples of ________ relationships. a. M:N Copyright © 2014 Pearson Canada Inc.

244


Application Extension 5a: Database Design

b. N:1 c. 1:1 d. N:M e. 1:N Answer: d Diff: 2 Type: MC Page Reference: 154 Topic: Q3 Skill: RECALL 44) The ________ shows the number of entities that can be involved in a relationship. a. E-R b. UML c. data integrity d. workflow e. cardinality Answer: e Diff: 1 Type: MC Page Reference: 155 Topic: Q3 Skill: RECALL 45) ________ is the process of converting poorly-structured tables into two or more wellstructured tables. a. Application development b. Normalization c. Structuring d. Clarification e. Conversion Answer: b Diff: 1 Copyright © 2014 Pearson Canada Inc.

245


Application Extension 5a: Database Design

Type: MC Page Reference: 156 Topic: Q4 Skill: RECALL 46) Database practitioners classify tables into various ________ depending on the type of data integrity problems to which they might be subject. a. layers b. categories c. normal forms d. strata e. types Answer: c Diff: 3 Type: MC Page Reference: 157 Topic: Q4 Skill: RECALL 47) In a one-to-many relationship, the foreign key is stored in the table that is on the ________ side of the relationship. a. weak b. many c. many-to many d. one e. cardinal Answer: b Diff: 2 Type: MC Page Reference: 159 Topic: Q4 Skill: RECALL 48) A N:M relationship is represented with a(n) Copyright © 2014 Pearson Canada Inc.

246


Application Extension 5a: Database Design

a. intersection table. b. entity. c. composite table. d. linking field. e. index field. Answer: a Diff: 3 Type: MC Page Reference: 160 Topic: Q4 Skill: RECALL 49) The cardinality of the relationship between a employer and its employees is a. 1:N b. M:N c. N:M d. 1:1 e. N:1 Answer: a Diff: 1 Type: MC Page Reference: 155 Topic: Q3 Skill: RECALL 50) A 1:N relationship relates ________ record(s) to ________ record(s )in a database. a. many, one b. one, three c. one, one d. many, many e. one, many Answer: e Diff: 1 Copyright © 2014 Pearson Canada Inc.

247


Application Extension 5a: Database Design

Type: MC Page Reference: 155 Topic: Q3 Skill: RECALL 51) Understanding how to interpret E-R diagrams will help you interpret ________ with a bit of study. a. flow diagrams b. relational models c. UML models d. O-O models e. workflow models Answer: c Diff: 2 Type: MC Page Reference: 152 Topic: Q3 Skill: RECALL 52) On difficulty with designing database is the ________ number of possibilities of what to include. a. small b. minimal c. large d. fixed e. known Answer: c Diff: 1 Type: MC Page Reference: 152 Topic: Q2 Skill: RECALL 53) Database developers ________ as the first step in development. Copyright © 2014 Pearson Canada Inc.

248


Application Extension 5a: Database Design

a. interview users b. create a relational model c. create an E-R diagram d. create a data model e. write queries Answer: a Diff: 1 Type: MC Page Reference: 151 Topic: Q2 Skill: RECALL 54) There is (are) ________ style(s) of E-R diagrams. a. 2 b. one c. several d. 15 e. 10 Answer: c Diff: 2 Type: MC Page Reference: 155 Topic: Q3 Skill: RECALL 55) Tables are transformed into ________ to remove duplicate data and other problems. a. regular design b. normalized design c. regular form d. normal form e. relational form Answer: d Diff: 2 Copyright © 2014 Pearson Canada Inc.

249


Application Extension 5a: Database Design

Type: MC Page Reference: 157 Topic: Q4 Skill: RECALL 56) On the many side of a relationship you place the ________ of the ________ relationship to represent the relationships in the database. a. foreign key, one side b. primary key, one side c. index key, one side d. primary key, many side e. foreign key, many side Answer: b Diff: 3 Type: MC Page Reference: 159 Topic: Q4 Skill: RECALL 57) When you place data into a database you need to place (the) ________ records first. a. first b. foreign key c. primary key d. any e. indexed Answer: c Diff: 3 Type: MC Page Reference: 158 Topic: Q4 Skill: RECALL 58) The user's review of the data model is a. done after the database is programmed Copyright © 2014 Pearson Canada Inc.

250


Application Extension 5a: Database Design

b. treated as a casual process c. not necessary d. not usually done e. crucial Answer: e Diff: 2 Type: MC Page Reference: 161 Topic: Q5 Skill: RECALL 59) In an automobile table the ________ would make the best table key a. model b. a combination of make and model c. make d. license plate number e. VIN Answer: e Diff: 2 Type: MC Page Reference: 158 Topic: Q4 Skill: APPLIED 60) A crow's foot diagram is a type of a. relationship map. b. data model. c. E-R diagram. d. UML model. e. normalization model. Answer: c Diff: 1 Type: MC Copyright © 2014 Pearson Canada Inc.

251


Application Extension 5a: Database Design

Page Reference: 155 Topic: Q3 Skill: RECALL 61) Normalization is a process for ensuring that the tables in a database design are efficient and well-structured. Diff: 2 Type: ES Page Reference: 156 Topic: Q4 Skill: RECALL 62) UML is the second most popular data modeling technique. Diff: 3 Type: ES Page Reference: 152 Topic: Q3 Skill: RECALL 63) An E-R data model captures both the entities involved and the relationships between the entities. Diff: 3 Type: ES Page Reference: 152 Topic: Q3 Skill: RECALL 64) The easiest time to make changes to the database structure is during the data modeling phase. Diff: 2 Type: ES Page Reference: 160 Topic: Q5 Skill: RECALL 65) A(n) identifier is an attribute or group of attributes whose value is associated with one and only one entity instance. Diff: 2 Type: ES Page Reference: 153 Copyright © 2014 Pearson Canada Inc.

252


Application Extension 5a: Database Design

Topic: Q3 Skill: RECALL 66) N:M is the notation used to describe a many-to-many relationship. Diff: 1 Type: ES Page Reference: 154 Topic: Q3 Skill: RECALL 67) Maximum cardinality indicates the most entities that can be involved in a relationship. Diff: 2 Type: ES Page Reference: 155 Topic: Q3 Skill: RECALL 68) In an E-R data model, the crow's feet symbol is used to indicate the many side of the relationship. Diff: 2 Type: ES Page Reference: 155 Topic: Q3 Skill: RECALL 69) The number of entities that can be involved in a relationship in a data model is called the cardinality. Diff: 2 Type: ES Page Reference: 155 Topic: Q3 Skill: RECALL 70) The foreign key is put on the many side of a one-to-many relationship. Diff: 2 Type: ES Page Reference: 158 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

253


Application Extension 5a: Database Design

71) In order to represent a(n) N:M type of relationship, a third table is created using the keys from the two entities being related. Diff: 3 Type: ES Page Reference: 155 Topic: Q3 Skill: RECALL 72) When a table contains inaccurate data for the same data elements in a table, it is said that the data in the table lacks integrity. Diff: 2 Type: ES Page Reference: 156 Topic: Q4 Skill: RECALL 73) A(n) attribute is a characteristic of an entity. Diff: 1 Type: ES Page Reference: 153 Topic: Q3 Skill: RECALL 74) A crow's foot diagram is a type of E-R diagram. Diff: 1 Type: ES Page Reference: 155 Topic: Q3 Skill: RECALL 75) Entities have relationships with one another. Diff: 1 Type: ES Page Reference: 153 Topic: Q3 Skill: RECALL 76) A(n) identifier is an attribute or group of attributes whose value is associated with one and only one entity instance. Diff: 2 Copyright © 2014 Pearson Canada Inc.

254


Application Extension 5a: Database Design

Type: ES Page Reference: 153 Topic: Q3 Skill: RECALL 77) A(n) entity is something users want to track. Diff: 1 Type: ES Page Reference: 153 Topic: Q3 Skill: RECALL 78) Normal form removes duplicate data and other problems from a table. Diff: 2 Type: ES Page Reference: 157 Topic: Q4 Skill: RECALL 79) The easiest time to change a database is during the data modeling stage. Diff: 2 Type: ES Page Reference: 160 Topic: Q5 Skill: RECALL 80) Data integrity problems can occur when data is duplicated. Diff: 2 Type: ES Page Reference: 157 Topic: Q4 Skill: RECALL 81) Data integrity problems make your database unreliable. Diff: 2 Type: ES Page Reference: 158 Topic: Q4 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

255


Application Extension 5a: Database Design

82) Entities have a(an) Identifier, which is an attribute whose value is related to one and only one entity instance. Diff: 1 Type: ES Page Reference: 151 Topic: Q2 Skill: RECALL 83) Describe how normalization works. Answer: Normalization is the process of converting poorly structured tables into two or more wellstructured tables. Diff: 3 Type: ES Page Reference: 156 Topic: Q4 Skill: RECALL 84) What are the stages in developing a database application? At what point is it easiest to make changes? Answer: Once a suitable application has been identified, the information requirements of the various users need to be identified. This entails interviewing the users about the reports, forms, and screens of data they need to access. A skilled database designer then identifies all the entities, attributes, and relationships needed and arrives at a data model for the application using E-R or possible UML, as the data modeling tool. This data model is then converted into a set of tables with primary and foreign keys that capture all the relationships previously identified in the data model. This set of tables is then normalized so that it is not subject to all the various anomalies that poorly designed databases have, and then the tables and attributes are created using the target DBMS for the application. Users will be involved in testing the system at all points of the development process, but as a rule, it is usually easiest to make changes earlier in the process. That is why it is important to test the data model with a wide range of queries and reports to make sure that it meets all the user requirements, since it is harder to change the database once it is implemented in the DBMS. Diff: 3 Type: ES Page Reference: 152 Copyright © 2014 Pearson Canada Inc.

256


Application Extension 5a: Database Design

Topic: Q2 Skill: RECALL 85) What are the different types of relationships represented in a data model? How are these captured by the use of keys? Answer: There are four different types of relationships that have to be modeled in a data model; a 1:1, 1:N, N:1 and the most complex, N:M (many-to-many). In a 1:N and N:1 type of relationship, the foreign key is stored on the "many" side. In a 1:1 relationship, it can be stored on either side of the relationship. If the designer feels that the relationship may eventually change to a 1:N type, then the key should be stored on the potential "many" side. In a N:M type of relationship, a new intersection table is created using the identifier from each of the linked tables to form a new "composite" key. Diff: 2 Type: ES Page Reference: 154 Topic: Q3 Skill: APPLIED 86) What are the different keys used for in relational databases? How do they maintain the integrity of the information in the database applications? Answer: The primary key is also known as the identifier. This is the field or collection of fields that serves to uniquely identify a specific record. Setting the primary key enables the DBMS to maintain what is called entity integrity, which prevents any duplicates from being stored in that table. This key can also be stored as a field in other related tables. As such, it is known as a foreign key and helps to maintain referential integrity. This means that if a related record is deleted or modified, the DBMS will know that the other record will also have to be deleted or modified. Diff: 3 Type: ES Page Reference: VARIOUS Topic: VARIOUS Skill: APPLIED 87) Describe an E-R diagram.

Copyright © 2014 Pearson Canada Inc.

257


Application Extension 5a: Database Design

Answer: An E-R diagram is a high level data model of a database that list the following components: 1. Entities and their attributes including the potential primary keys of the entity 2. The relationships between the entities and their cardinalities Diff: 3 Type: ES Page Reference: 154 Topic: Q3 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

258


Application Extension 5b: Using Microsoft Access

1) A data entry form in Access can be created using the Form tool in the Create tab ribbon. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 176 Topic: Q3 Skill: RECALL 2) Data entry forms in Access are used to generate reports. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 177 Topic: Q3 Skill: RECALL 3) Before creating a database in Access, you should develop a data model based on the user requirements. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 167 Topic: Q1 Skill: RECALL 4) Access allows users to create tables in a design view. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

259


Application Extension 5b: Using Microsoft Access

Diff: 2 Type: TF Page Reference: 169 Topic: Q1 Skill: RECALL 5) The most common data type for fields in tables is always the "number" data type. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 172 Topic: Q1 Skill: APPLIED 6) Forms allow users to view and maintain data in a database. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 178 Topic: Q3 Skill: APPLIED 7) The relationships window allows users to define the relationships between tables. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 173 Topic: Q2 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

260


Application Extension 5b: Using Microsoft Access

8) Access does not allow users to create queries in SQL. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 179 Topic: Q4 Skill: RECALL 9) Access provides a graphical user interface for creating database queries. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 179 Topic: Q4 Skill: RECALL 10) A quick way of creating reports in Access is to use the Report Wizard. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 182 Topic: Q5 Skill: RECALL 11) In the table design mode in Access the field and data type are required to create an attribute. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

261


Application Extension 5b: Using Microsoft Access

Diff: 2 Type: TF Page Reference: 170 Topic: Q1 Skill: APPLIED 12) A primary key is indicated by a small key icon next to the field name in the design mode of the table. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 172 Topic: Q1 Skill: RECALL 13) Relationships can be assigned using the Relationships tool that is found on the Database Tools tab of the ribbon. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 173 Topic: Q2 Skill: RECALL 14) Relationships are created in the relationships window by clicking on the primary key in one table and dragging it to the related field in another table. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 173 Copyright © 2014 Pearson Canada Inc.

262


Application Extension 5b: Using Microsoft Access

Topic: Q2 Skill: RECALL 15) A subform allows multiple records to be displayed that are related to the record displayed in the main form. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 178 Topic: Q3 Skill: APPLIED 16) A question one asks of the database is known as a(n) a. result b. form c. query d. report e. table Answer: c Diff: 1 Type: MC Page Reference: 179 Topic: Q4 Skill: RECALL 17) In MS Access, ________ is a term that refers to the attributes that are described in the data model. a. table b. data c. field d. application e. key

Copyright © 2014 Pearson Canada Inc.

263


Application Extension 5b: Using Microsoft Access

Answer: c Diff: 2 Type: MC Page Reference: 170 Topic: Q1 Skill: RECALL 18) In MS Access, the ________ data type is used to generate a unique primary key. a. text b. integer c. currency d. number e. autonumber Answer: e Diff: 3 Type: MC Page Reference: 172 Topic: Q1 Skill: APPLIED 19) When creating a new table in Access, the primary key is set by clicking on the ________ icon. a. drive b. switch c. exclamation mark d. relationship e. key Answer: e Diff: 2 Type: MC Page Reference: 172 Topic: Q1 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

264


Application Extension 5b: Using Microsoft Access

20) When defining a relationship between two tables in Access, it is important to be sure to drag the correct ________ in the right direction and lay it on the other table. a. relationship b. attribute c. window d. key e. table Answer: b Diff: 3 Type: MC Page Reference: 173 Topic: Q2 Skill: RECALL 21) ________ are used by the user to enter data in to an Access database. a. Queries b. Modules c. Tables d. Forms e. Reports Answer: d Diff: 2 Type: MC Page Reference: 176 Topic: Q3 Skill: RECALL 22) ________ ask questions about the data. a. Reports b. Queries c. Modules d. Forms e. Tables Copyright © 2014 Pearson Canada Inc.

265


Application Extension 5b: Using Microsoft Access

Answer: b Diff: 2 Type: MC Page Reference: 179 Topic: Q4 Skill: RECALL 23) You build the links between tables using the ________ window. a. relationships b. relationship wizard c. database diagram d. mapping e. database relationships Answer: a Diff: 2 Type: MC Page Reference: 173 Topic: Q2 Skill: RECALL 24) The second column at the top of the table design window contains the ________ of the field. a. field name b. field size c. properties d. data type e. description Answer: d Diff: 2 Type: MC Page Reference: 171 Topic: Q1 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

266


Application Extension 5b: Using Microsoft Access

25) The properties of each field are set at the ________ of the table design window. a. top b. centre c. bottom d. left e. right Answer: c Diff: 3 Type: MC Page Reference: 171 Topic: Q1 Skill: RECALL 26) Access' graphical query interface translates statements into ________. a. VBA b. ASP c. query d. SQL e. C++ Answer: d Diff: 3 Type: MC Page Reference: 179 Topic: Q4 Skill: RECALL 27) The description in the table design window is used for ________. a. additional data type information b. formatting fields c. documentation d. setting properties e. additional field name information Copyright © 2014 Pearson Canada Inc.

267


Application Extension 5b: Using Microsoft Access

Answer: c Diff: 2 Type: MC Page Reference: 170 Topic: Q1 Skill: RECALL 28) In Access, entities are called ________. a. columns b. rows c. fields d. tables e. queries Answer: d Diff: 2 Type: MC Page Reference: 170 Topic: Q1 Skill: RECALL 29) A report ______________ can be used to create a report. a. wizard b. queries c. tables d. modules e. forms Answer: a Diff: 1 Type: MC Page Reference: 182 Topic: Q5 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

268


Application Extension 5b: Using Microsoft Access

30) The ______________ keyword tells Access to present the text data in alphabetical order. a. order b. table c. plus d. red e. Ascending Answer: e Diff: 3 Type: MC Page Reference: 179 Topic: Q4 Skill: APPLIED 31) Access displays the _____________of a field as help text on forms. a. description b. data type c. name d. colour e. attribute Answer: a Diff: 3 Type: MC Page Reference: 170 Topic: Q1 Skill: RECALL 32) _______________ is one of many reserved words in the Access environment. a. “Value” b. “Data” c. “Colour” d. “Name” e. “Variable” Copyright © 2014 Pearson Canada Inc.

269


Application Extension 5b: Using Microsoft Access

Answer: d Diff: 3 Type: MC Page Reference: 172 Topic: Q1 Skill: RECALL 33) It is possible to create a primary key composed of ___________ columns or fields. a. relational b. linked c. number d. multiple e. text Answer: d Diff: 3 Type: MC Page Reference: 172 Topic: Q1 Skill: APPLIED 34) The key icon can be found in the ________ tab ribbon. a. Design b. Create c. Datasheet d. Home e. Database Tools Answer: a Diff: 2 Type: MC Page Reference: 172 Topic: Q1 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

270


Application Extension 5b: Using Microsoft Access

35) In an _____________ field, Access creates values for the user. a. number b. hyperlink c. long integer d. text e. Autonumber Answer: e Diff: 3 Type: MC Page Reference: 173 Topic: Q1 Skill: APPLIED 36) In a query of two or more tables Access will show a. all the relevant records in both/all tables. b. only records in the parent table c. only records that have matching values in all the tables. d. only records that do not have matching records in all the tables. e. every record in one table joined to each record in the other table. Answer: c Diff: 3 Type: MC Page Reference: 179 Topic: Q4 Skill: RECALL 37) To create a data entry form in Access, you can use the default table display or you can use the form generator. Diff: 2 Type: FIB Page Reference: 176 Topic: Q3 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

271


Application Extension 5b: Using Microsoft Access

38) Database forms allow the users to view, add, update or delete data in the underlying tables. Diff: 1 Type: FIB Page Reference: 177 Topic: Q3 Skill: RECALL

39) To run a query click on the red exclamation point labeled Run. Diff: 1 Type: FIB Page Reference: 179 Topic: Q5 Skill: RECALL

40) MS Access makes it easy to generate database queries by providing an easy-to-use graphical interface that generates SQL statements automatically. Diff: 2 Type: FIB Page Reference: 179 Topic: Q4 Skill: RECALL

41) In order to execute a query in MS Access, create the query and then click on the exclamation mark icon. Diff: 2 Type: FIB Page Reference: 179 Topic: Q4 Skill: RECALL

42) Forms allow a user to view and maintain the data in a database. Diff: 2 Type: FIB Page Reference: 177 Topic: Q3 Skill: RECALL

43) Queries in Access are translated into SQL by the query graphical interface. Diff: 2 Type: FIB Copyright © 2014 Pearson Canada Inc.

272


Application Extension 5b: Using Microsoft Access

Page Reference: 179 Topic: Q4 Skill: RECALL

44) Access provides a graphical user interface for creating queries. Diff: 2 Type: FIB Page Reference: 179 Topic: Q4 Skill: RECALL

45) To create a report from two tables you can use the Report Wizard. Diff: 2 Type: FIB Page Reference: 182 Topic: Q5 Skill: RECALL

46) In a form you can type over any data you wish to change. Diff: 2 Type: FIB Page Reference: 178 Topic: Q3 Skill: RECALL

47) What are data entry forms used for and how are they created in MS Access? Answer: In order to help users view the data and update it by entering new data, making changes, and deleting data, there are a variety of form options in Access. First, by clicking on the table itself in the Object Window, users can then view and modify data directly in the table. Another way is to use the Form Wizard in Access to guide you through the creation of a more customized form. There is also a form editor that will give developers even more control over the look and feel and content on the form. Diff: 3 Type: ES Page Reference: 177 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

273


Application Extension 5b: Using Microsoft Access

48) Why are queries so useful and how are they created in MS Access? Answer: Creating database queries shows the true power of relational databases. Queriescan be used to make powerful calculations and link up large amounts of data in multiple tables in creative ways that will help users. MS Access helps novice users to learn how to make queries by using its graphic interface, called Query By Example (QBE). This tool provides a grid for users to click and drag the fields they want. Then it converts the QBE information into SQL commands for execution. For more advanced users, Access provides a SQL editor tool which allows developers to write and edit queries directly in SQL. It is helpful sometimes to work through the logic of more complex queries. In Access it is simple to go back and forth between the QBE editor and the SQL editor. Diff: 3 Type: ES Page Reference: 179 Topic: Q4 Skill: RECALL 49) What are reports used for and how are they created in MS Access? Answer: Reports allow users to place summarized data either from tables or queries on paper in creative formats. They allow users to communicate better and turn data into information. In Access reports are best made by using the report wizard which allows users to build reports from 2 or more tables or queries. In many instances reports are built from queries, putting them into well formatted printouts. Diff: 3 Type: ES Page Reference: 182 Topic: Q5 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

274


Chapter 6: Networks and Collaboration

1) At company social events, talking to people you don't know will help expand your business network only if you know how these new acquaintances can help you. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 220 Topic: Q1 Skill: RECALL 2) According to the text, networking "weak" ties is not the best strategy for increasing the number of people in your network. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 221 Topic: Q1 Skill: RECALL 3) Effective collaboration results are greater that any results produced by individuals working alone. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 191 Topic: Q1 Skill: RECALL 4) A Local Area Network (LAN) would be used to connect computers located in Calgary and Montreal. a. True b. False Copyright © 2014 Pearson Canada Inc.

275


Chapter 6: Networks and Collaboration

Answer: b Diff: 2 Type: TF Page Reference: 193 Topic: Q2 Skill: RECALL 5) An ISP functions as a gateway to the Internet. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 199 Topic: Q5 Skill: RECALL 6) The 802.11b standard is the dominant WLAN standard today. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 197 Topic: Q3 Skill: APPLIED 7) The fastest WLAN standard in use today is 802.11n. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 196 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

276


Chapter 6: Networks and Collaboration

Skill: RECALL 8) An analog signal is a digital format. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 201 Topic: Q5 Skill: RECALL 9) A modem converts a TCP/IP signal to a wireless format. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 203 Topic: Q5 Skill: RECALL 10) DSL stands for digital signal line and operates on the same lines as voice telephones and dial-up modems. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 202 Topic: Q5 Skill: RECALL 11) An Access Point converts wired LAN to wireless LAN. a. True b. False Copyright © 2014 Pearson Canada Inc.

277


Chapter 6: Networks and Collaboration

Answer: a Diff: 2 Type: TF Page Reference: 203 Topic: Q5 Skill: RECALL 12) Broadband lines include dial-up and cable modems. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 202 Topic: Q5 Skill: RECALL 13) Narrowband transmission speeds typically do not exceed 56 kbps. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 202 Topic: Q5 Skill: RECALL 14) Coaxial cable lines offer faster transmission speeds than optical fibre lines. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 197 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

278


Chapter 6: Networks and Collaboration

Skill: RECALL 15) Twisted pair copper lines are used in DSL modems. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 203 Topic: Q5 Skill: RECALL 16) Satellite transmission is often part of a Wide Area Network (WAN). a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 197 Topic: Q3 Skill: RECALL 17) A Virtual Private Network (VPN) is a type of WAN. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 209 Topic: Q7 Skill: RECALL 18) VPN stands for "Visual Protocol Network." a. True b. False

Copyright © 2014 Pearson Canada Inc.

279


Chapter 6: Networks and Collaboration

Answer: b Diff: 1 Type: TF Page Reference: 208 Topic: Q7 Skill: RECALL 19) A tunnel is a virtual, private pathway over a public or shared network from the VPN client to the VPN server. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 209 Topic: Q7 Skill: RECALL 20) VPNs enable remote access with public Internet lines. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 209 Topic: Q7 Skill: RECALL 21) ISPs cannot commit to offer performance-level guarantees to users. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 202 Topic: Q5 Copyright © 2014 Pearson Canada Inc.

280


Chapter 6: Networks and Collaboration

Skill: RECALL 22) A web crawler is used to find and collect URLs. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 210 Topic: Q8 Skill: RECALL 23) HTTPS is a protocol for secure communication over the Internet. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 208 Topic: Q7 Skill: RECALL 24) With symmetric encryption, different keys are used; one key encodes the message, and the other key decodes the message. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 208 Topic: Q7 Skill: RECALL 25) In symmetric encryption, the same key is used to encode and to decode. a. True b. False Copyright © 2014 Pearson Canada Inc.

281


Chapter 6: Networks and Collaboration

Answer: a Diff: 1 Type: TF Page Reference: 208 Topic: Q7 Skill: RECALL 26) The network effect is the effect that the larger the number of people using the network the more valuable the network. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 192 Topic: Q1 Skill: RECALL 27) Networks like LinkedIn are not limited in their growth. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 193 Topic: Q1 Skill: APPLIED 28) GPS satellites operate using radio signals. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 193 Copyright © 2014 Pearson Canada Inc.

282


Chapter 6: Networks and Collaboration

Topic: Q1 Skill: RECALL 29) Workflow Control is required in collaborative work so that one worker's work does not interfere with another worker's work. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 191 Topic: Q1 Skill: RECALL 30) Communication skills and culture are critical factors in collaboration efforts. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 191 Topic: Q1 Skill: RECALL 31) Smart phones combine powerful processors with only voice applications. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 198 Topic: Q4 Skill: RECALL 32) In most LANs, the DHCP server assigns a. printer drivers. Copyright © 2014 Pearson Canada Inc.

283


Chapter 6: Networks and Collaboration

b. IP addresses. c. security warnings. d. routing signals. e. connections to the modem. Answer: b Diff: 2 Type: MC Page Reference: 200 Topic: Q5 Skill: RECALL 33) Which of the following is an example of a protocol? a. GPS b. SDSL c. DNS d. WAN e. IEEE 802.3 Answer: e Diff: 2 Type: MC Page Reference: 196 Topic: Q3 Skill: RECALL 34) 1 Mbps stands for a. 1 048 576 bit per second. b. 1 000 000 000 bit per second. c. 1 073 741 824 bit per second. d. 1 000 000 bit per second. e. 1 000 bit per second. Answer: d Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

284


Chapter 6: Networks and Collaboration

Page Reference: 196 Topic: Q3 Skill: RECALL 35) A network that reside in a single geographic location on the premises of the company is called a(n) a. LAN. b. SAN. c. Internet. d. WAN. e. Ethernet. Answer: a Diff: 1 Type: MC Page Reference: 193 Topic: Q2 Skill: RECALL 36) Which of the following connects computers at different geographic locations? a. PTSN b. WAN c. SAN d. Ethernet e. LAN Answer: b Diff: 1 Type: MC Page Reference: 193 Topic: Q2 Skill: RECALL 37) A ________ is a set of rules that two communicating devices follow. a. LAN b. WAN Copyright © 2014 Pearson Canada Inc.

285


Chapter 6: Networks and Collaboration

c. language d. standard e. protocol Answer: e Diff: 1 Type: MC Page Reference: 194 Topic: Q3 Skill: RECALL 38) MAC stands for a. Maximum Access Control. b. Medium Access Control. c. Media Access Controls. d. Media Address Control. e. Media Access Control. Answer: e Diff: 2 Type: MC Page Reference: 194 Topic: Q3 Skill: RECALL 39) Joel wants to connect his 5 home PCs together. Which of the following cables would best suit the purpose? a. Phone wires b. Unshielded twisted pair c. Shield twisted pair cable d. Coaxial cable e. Optical fibre cables Answer: b Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

286


Chapter 6: Networks and Collaboration

Page Reference: 195 Topic: Q3 Skill: RECALL 40) Optical fibre cables carry signals with a. x-rays. b. electronic signals. c. light rays. d. magnetic waves. e. radio waves. Answer: c Diff: 1 Type: MC Page Reference: 195 Topic: Q3 Skill: RECALL 41) The 802.11n standard allows speeds up to a. 216 Mbps. b. 248 Mbps. c. 256 Mbps. d. 54 Mbps. e. 108 Mbps. Answer: b Diff: 1 Type: MC Page Reference: 196 Topic: Q30 Skill: RECALL 42) Which of the following is the device that allows users to connect to a wireless network? a. a hub b. a router Copyright © 2014 Pearson Canada Inc.

287


Chapter 6: Networks and Collaboration

c. a wireless gateway d. a switch e. an access point Answer: e Diff: 2 Type: MC Page Reference: 197 Topic: Q3 Skill: RECALL 43) The difference between a SDSL connection and a ADSL connection is a. ADSL lines have different upload and download speeds. b. data transmission and voice transmission can occur at the same time with ADSL and not with SDSL. c. DSL lines have different upload and download speeds. d. ADSL and SDSL are the same. e. data transmission and voice transmission can occur at the same time with SDSL and not with ADSL. Answer: a Diff: 2 Type: MC Page Reference: 202 Topic: Q5 Skill: RECALL 44) Narrowband connections typically have connection speeds a. less than 256 kbps. b. less than 128 kbps. c. great than 56 kbps. d. greater than 256 kbps. e. less than 56 kbps. Answer: e Diff: 1 Copyright © 2014 Pearson Canada Inc.

288


Chapter 6: Networks and Collaboration

Type: MC Page Reference: 202 Topic: Q5 Skill: RECALL 45) Broadband connections typically have connection speeds a. greater than 256 kbps. b. less than 128 kbps. c. less than 56 kbps. d. less than 256 kbps. e. great than 56 kbps. Answer: a Diff: 2 Type: MC Page Reference: 202 Topic: Q5 Skill: RECALL 46) Which of the following offers the same fast speed with both upload and download? a. Dialup b. Cable modem connection c. PSTN connection d. ADSL e. SDSL Answer: e Diff: 2 Type: MC Page Reference: 202 Topic: Q5 Skill: RECALL 47) A(n) ________ uses the Internet or a private internet to create the appearance of private point-to-point connections a. ADSL Copyright © 2014 Pearson Canada Inc.

289


Chapter 6: Networks and Collaboration

b. YNPN c. VPN d. PSTN e. SDSL Answer: c Diff: 1 Type: MC Page Reference: 208 Topic: Q7 Skill: RECALL 48) What is a web crawler? a. A software program that browses the web in a very methodical way. b. A software program that keeps track of changes on web sites. c. A software program that searches the web for content. d. A person who does research on behalf of law enforcement. e. A person who does research on the web on behalf of companies. Answer: a Diff: 2 Type: MC Page Reference: 210 Topic: Q8 Skill: RECALL 49) Which of the following is an example of a packet switched network? a. SAN b. The Internet c. Ethernet d. LAN e. WLAN Answer: b Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

290


Chapter 6: Networks and Collaboration

Page Reference: 206 Topic: Q6 Skill: RECALL 50) The Advanced Research Projects Agency Network (ARPANET) is funded by a. US Department of Defense. b. IBM. c. US Department of Commerce. d. Microsoft. e. NASA. Answer: a Diff: 1 Type: MC Page Reference: 206 Topic: Q6 Skill: RECALL 51) A ________ must be used to convert an analog signal to a digital one, when trying to transmit data over a typical phone line. a. fibre optic switch b. modem c. frame relay d. tunnel e. SOHO Answer: b Diff: 2 Type: MC Page Reference: 201 Topic: Q5 Skill: RECALL 52) A computer ________ is a collection of computers that communicate with one another through transmission media. a. server Copyright © 2014 Pearson Canada Inc.

291


Chapter 6: Networks and Collaboration

b. system c. application d. database e. network Answer: e Diff: 1 Type: MC Page Reference: 193 Topic: Q2 Skill: RECALL 53) A(n) ________ uses the Internet or other networks to create the appearance of private point-to-point connections. a. SMTP b. ATM c. VPN d. Ethernet e. URL Answer: c Diff: 2 Type: MC Page Reference: 209 Topic: Q7 Skill: RECALL 54) ________ is the most popular LAN standard. a. 802.11g b. UML c. Ethernet d. TCP/IP e. OSI Answer: c Diff: 1 Copyright © 2014 Pearson Canada Inc.

292


Chapter 6: Networks and Collaboration

Type: MC Page Reference: 196 Topic: Q3 Skill: RECALL 55) ________ lines are most useful when an organization has large amounts of traffic between two sites. a. Twisted pair b. optic fibre c. Private d. Leased e. WAN Answer: d Diff: 3 Type: MC Page Reference: 203 Topic: Q5 Skill: RECALL 56) ________ consist of connected computers at a single organizational site. a. Tunnels b. WLANs c. LANs d. VPNs e. WANs Answer: c Diff: 2 Type: MC Page Reference: 193 Topic: Q2 Skill: RECALL 57) Mobile banking and mobile ticket purchases are examples of a. packet processing. Copyright © 2014 Pearson Canada Inc.

293


Chapter 6: Networks and Collaboration

b. advanced SDSL. c. optical fibre cables. d. the network effect. e. m-commerce. Answer: e Diff: 2 Type: MC Page Reference: 198 Topic: Q4 Skill: RECALL 58) A(n) ________ connects computers at different geographic locations. a. WlAN b. LAN c. GPS SYSTEM d. WAN e. root server Answer: d Diff: 2 Type: MC Page Reference: 193 Topic: Q2 Skill: RECALL 59) The ________ is a network of networks. a. Internet b. intranet c. WAN d. LAN e. transmission network Answer: a Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

294


Chapter 6: Networks and Collaboration

Page Reference: 194 Topic: Q2 Skill: RECALL 60) The computers on ________ are usually within a kilometre of each other. a. a WAN b. a root server c. the Internet d. a LAN e. a system Answer: d Diff: 1 Type: MC Page Reference: 194 Topic: Q2 Skill: RECALL 61) DSL connection is implemented in ________ media. a. optical fibre cable b. UTP c. wireless d. Ethernet e. transmission Answer: b Diff: 3 Type: MC Page Reference: 195 Topic: Q3 Skill: RECALL 62) Computers and printers on a LAN are connected to a ________ to communicate and transmit messages on the LAN. a. routing table b. switch Copyright © 2014 Pearson Canada Inc.

295


Chapter 6: Networks and Collaboration

c. root server d. http server e. TLD Answer: b Diff: 3 Type: MC Page Reference: 194 Topic: Q3 Skill: RECALL 63) IEEE 802.3 is the most popular LAN ________ in use today. a. switch b. architecture c. protocol d. encryption e. TLD Answer: c Diff: 1 Type: MC Page Reference: 196 Topic: Q3 Skill: RECALL 64) ________ transmits signals using light rays. a. Coaxial cable b. Radiowaves c. Microwaves d. Optical fibre cable e. UTP Answer: d Diff: 2 Type: MC Page Reference: 195 Copyright © 2014 Pearson Canada Inc.

296


Chapter 6: Networks and Collaboration

Topic: Q3 Skill: RECALL 65) In order for a printer or laptop to connect to a wireless LAN they must have a a. PPP. b. NIC. c. WNIC. d. browser. e. switch. Answer: c Diff: 3 Type: MC Page Reference: 196 Topic: Q3 Skill: RECALL 66) The use of ________ allows us to be connected with anything, anywhere, and at any time. a. NICs. b. switch. c. routing tables. d. smartphones. e. access point. Answer: d Diff: 2 Type: MC Page Reference: 198 Topic: Q4 Skill: RECALL 67) A(n) ________ provides you with a legitimate Internet address and serves as your gateway to the Internet. a. SMTP b. VPN Copyright © 2014 Pearson Canada Inc.

297


Chapter 6: Networks and Collaboration

c. switch d. TCP/IP e. ISP Answer: e Diff: 1 Type: MC Page Reference: 199 Topic: Q5 Skill: RECALL 68) ________ is the fastest WLAN standard today. a. 802.11b b. 802.3 c. 802.11a d. 802.11n e. 802.11g Answer: d Diff: 3 Type: MC Page Reference: 196 Topic: Q3 Skill: RECALL 69) ________ is good for homes and small businesses because they receive more data than they transmit. a. DSL b. UTP c. Optical fibre d. SDSL e. ADSL Answer: e Diff: 3 Type: MC Copyright © 2014 Pearson Canada Inc.

298


Chapter 6: Networks and Collaboration

Page Reference: 202 Topic: Q5 Skill: RECALL 70) WWANs a. are no bigger than a kilometer across. b. are bigger than WLANs but slower. c. are run on optical fibre. d. use the 10/100/1000 standard. e. are bigger than WLANs and use cellular networks. Answer: e Diff: 2 Type: MC Page Reference: 202 Topic: Q5 Skill: RECALL 71) ________ provide the fastest data transmission speeds. a. Optical fibre cables b. Microwaves c. UTP d. Twisted pair lines e. Coaxial cables Answer: a Diff: 2 Type: MC Page Reference: 197 Topic: Q3 Skill: RECALL 72) In the TCP/IP system, Layer 4 is used to a. describe the communications equipment. b. pass data between programs and the transport layer. Copyright © 2014 Pearson Canada Inc.

299


Chapter 6: Networks and Collaboration

c. control packet organization. d. control the wireless devices in the network. e. open the connections and maintain them. Answer: b Diff: 3 Type: MC Page Reference: 204 Topic: Q6 Skill: RECALL 73) ____________________ make(s) the internet efficient and resilient. a. Network Address Translation Protocol. b. VPNs c. File Transfer Protocols. d. Web browsers e. Packet switching Answer: e Diff: 2 Type: MC Page Reference: 206 Topic: Q6 Skill: RECALL 74) A DSL modem that is always connected is ________ than a dial-up modem. a. more latent b. more robust c. more practical d. faster e. more secure Answer: d Diff: 2 Type: MC Page Reference: 202 Copyright © 2014 Pearson Canada Inc.

300


Chapter 6: Networks and Collaboration

Topic: Q5 Skill: RECALL 75) Which of the following applies to asymmetric encryption? a. One key encodes the message, one key decodes the message. b. It is used in IM. c. It is simpler than symmetric encryption. d. It is faster than symmetric encryption. e. Only one key is used. Answer: a Diff: 2 Type: MC Page Reference: 208 Topic: Q7 Skill: RECALL 76) HTTPS and SSL/TLS utilize which of the following? a. a combination of public key/private key and symmetric encryption b. a combination of public key/private key and asymmetric encryption c. private keys only d. asymmetric encryption e. public keys only Answer: a Diff: 3 Type: MC Page Reference: 208 Topic: Q7 Skill: RECALL 77) According to the text, "weak ties" can a. connect us to the same number of people as strong links. b. hinder our networking abilities. c. be a hindrance for connecting to everyone in six degrees. Copyright © 2014 Pearson Canada Inc.

301


Chapter 6: Networks and Collaboration

d. be crucial to connecting you to everyone in six degrees. e. be impossible in social settings. Answer: d Diff: 2 Type: MC Page Reference: 222 Topic: Q1 Skill: APPLIED 78) The Internet is a a. LAN. b. WAN. c. ISP. d. HTPP. e. DSL. Answer: b Diff: 1 Type: MC Page Reference: 200 Topic: Q5 Skill: RECALL 79) When using Google Docs in a collaborative group project, workflow control ensures a. all members know how to use the applications. b. all members have access to the applications. c. the network is up and functioning. d. one member's work does not interfere with another member's work. e. the project work gets completed. Answer: d Diff: 3 Type: MC Page Reference: 192 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

302


Chapter 6: Networks and Collaboration

Skill: APPLIED 80) Many organization use collaboration because a. it takes advantages of business graduates excellent communication skills. b. the infrastructure to use collaboration exist in the organization. c. it makes for more effective business processes. d. workflow control software exists. e. the results can be greater than the results produced by a single individual. Answer: e Diff: 2 Type: MC Page Reference: 191 Topic: Q1 Skill: RECALL 81) By expanding your personal professional network on LinkedIn a. you are creating a local network. b. you are taking advantage of network externalities. c. you are taking advantages of your professional contacts. d. you are taking advantages of technology. e. you have joined the trend of collaboration. Answer: b Diff: 3 Type: MC Page Reference: 192 Topic: Q1 Skill: APPLIED 82) Smartphones a. are cellular phones. b. are enabling new applications, such as T-commerce. c. are enabling Internet connections through only Wi-Fi. d. are small computers with a restricted variety of services. Copyright © 2014 Pearson Canada Inc.

303


Chapter 6: Networks and Collaboration

e. have not seen any real agreement as to what they exactly are. Answer: e Diff: 3 Type: MC Page Reference: 198 Topic: Q4 Skill: RECALL 83) Any text sent via https is encrypted and therefore is relatively safe. Diff: 2 Type: FIB Page Reference: 208 Topic: Q7 Skill: RECALL 84) A(n) VPN uses the Internet or other network to create the appearance of private, point-to-point connections. Diff: 2 Type: FIB Page Reference: 209 Topic: Q7 Skill: RECALL 85) Network devices have two addresses; a physical MAC address and a logical IP address. Diff: 3 Type: FIB Page Reference: 200; 194 Topic: Q5 Skill: APPLIED 86) A collection of computers that communicate with one another via transmission media is called a(n) network. Diff: 1 Type: FIB Page Reference: 193 Topic: Q2 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

304


Chapter 6: Networks and Collaboration

87) A(n) modem is a device that converts digital signals to analog signals. Diff: 1 Type: FIB Page Reference: 201 Topic: Q5 Skill: RECALL 88) A(n) LAN connects computers that reside in a single geographic location. Diff: 1 Type: FIB Page Reference: 193 Topic: Q2 Skill: RECALL 89) On of the four critical factors in the effectiveness of collaboration is content management. Diff: 3 Type: FIB Page Reference: 191 Topic: Q1 Skill: RECALL 90) Computers at different geographic locations are connected with a(n) WAN. Diff: 1 Type: FIB Page Reference: 193 Topic: Q2 Skill: RECALL 91) A network of networks is known as a(n) internet. Diff: 1 Type: FIB Page Reference: 194 Topic: Q2 Skill: RECALL 92) The MAC address is a unique identifier built into the NIC when it is manufactured. Diff: 3 Type: FIB Page Reference: 194 Copyright © 2014 Pearson Canada Inc.

305


Chapter 6: Networks and Collaboration

Topic: Q3 Skill: RECALL 93) A(n) switch connects printers, and computers to a LAN and has a unique identifier. Diff: 3 Type: FIB Page Reference: 194 Topic: Q3 Skill: RECALL 94) At least one access point is required for a(n) wireless network. Diff: 3 Type: FIB Page Reference: 197 Topic: Q3 Skill: RECALL 95) A WAN alternative that uses the Internet or a private internet to create the appearance of private point-to-point connections is called a(n) VPN. Diff: 3 Type: FIB Page Reference: 197 Topic: Q3 Skill: RECALL 96) A(n) tunnel is a virtual private pathway over a public or shared network from the VPN client to the VPN server. Diff: 3 Type: FIB Page Reference: 209 Topic: Q7 Skill: RECALL 97) To ensure security, VPN client software encrypts the original message so that its contents are hidden. Diff: 2 Type: FIB Page Reference: 209 Topic: Q7 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

306


Chapter 6: Networks and Collaboration

98) A(n) key is a tool used to encrypt data. Diff: 2 Type: FIB Page Reference: 208 Topic: Q7 Skill: RECALL 99) In general, the people you know the least, contribute the most to your social network. Diff: 1 Type: FIB Page Reference: 221-222 Topic: Q1 Skill: APPLIED 100) In social network theory, weak ties often contribute the most to your social network. Diff: 2 Type: FIB Page Reference: 222 Topic: Q1 Skill: RECALL 101) Every business, every organization, needs to be thinking about the ubiquitous and cheap connectivity that is growing exponentially. Diff: 3 Type: FIB Page Reference: 216 Topic: Q1 Skill: RECALL 102) Knowing the basic terminology of computer networks and how they work makes you a more informed user of computer networks. Diff: 2 Type: FIB Page Reference: 191 Topic: Q1 Skill: APPLIED 103) Collaboration involves coordination and communication and often makes use of computer networks. Diff: 3 Type: FIB Copyright © 2014 Pearson Canada Inc.

307


Chapter 6: Networks and Collaboration

Page Reference: 191 Topic: Q1 Skill: RECALL 104) Copper wire, optical fibre, and radio frequencies can be referred to as transmission media. Diff: 2 Type: FIB Page Reference: 193 Topic: Q2 Skill: RECALL 105) When deciding if a search engine will be efficient in getting search results, consider breadth of coverage and the ordering of results. Diff: 3 Type: FIB Page Reference: 211 Topic: Q8 Skill: RECALL 106) Since most search engines are operated by private for-profit companies, one must also consider the effect of advertisers on their positioning in search results. Diff: 3 Type: FIB Page Reference: 211 Topic: Q8 Skill: RECALL 107) M-Commerce applications allow mobile phones to conduct certain types of transactions. Diff: 1 Type: FIB Page Reference: 198 Topic: Q4 Skill: RECALL 108) What is the difference between a network and a human network and why is the second very important? Answer: A computer network is a collection of computers that communicate with one another over transmission lines. The three basic types of networks are LANs, WANs, and internets. A Copyright © 2014 Pearson Canada Inc.

308


Chapter 6: Networks and Collaboration

human network is a collection of social connections. Most successful professionals build their own human networks because they know that there are many people that can help them in various situations and who may likewise need their help. These professionals attend social events, collect and pass out cards, and engage in pleasant conversation to expand their networks. Helping each other serves to strengthen the personal bonds of your network when you know you can rely on someone in certain situations (e.g., finding information, getting a job). Diff: 2 Type: ES Page Reference: 219 Topic: Q1 Skill: APPLIED 109) What is the difference between a LAN and a WAN? Give an example of how each one could be used in business. Answer: A local area network (LAN) connects computers that reside in a single geographic location on the premises of the company that operates the LAN. Wide area networks (WANs) connect computers at different geographic locations. The computers in two separate company sites can be connected using a WAN. With a LAN the number of connected computers can range from two to several hundred, but they are still in a single location (usually within a building or floor of a building). Most small businesses have a LAN in place in their office that connects them. A university campus uses a backbone (usually fibre optic) and connects all the different buildings on the campus and possibly multiple campuses on the university's WAN. Diff: 2 Type: ES Page Reference: 193 Topic: Q2 Skill: APPLIED 110) What is a NIC and a WNIC? Why are they important in a LAN? Answer: A NIC is a Network Interface Card and a WNIC is a Wireless Network Interface Card. Each device that is connected to a LAN must have a NIC so that the device can send and receive messages with its unique address. In a wireless LAN the devices connect via a WNIC instead of a regular NIC.

Copyright © 2014 Pearson Canada Inc.

309


Chapter 6: Networks and Collaboration

Diff: 2 Type: ES Page Reference: 194 Topic: Q3 Skill: RECALL 111) What is a VPN and how does it work? Give an example of how it is used in business. Answer: VPN stands for a "virtual private network." This is one alternative to a WAN. A VPN takes advantage of the Internet or leased lines to create the appearance of private, pointto-point connections. Being "virtual" simply means that it appears to exist to the users, but does not actually exist. In business, if a manufacturer needs to maintain a steady connection to their suppliers, they might set up a VPN with them. This is because they are more stable and offer much better security, yet they are relatively inexpensive and quite flexible and easy to set up. Diff: 2 Type: ES Page Reference: 208-209 Topic: Q7 Skill: APPLIED 112) Describe two different WAN alternatives. Answer: By definition a WAN connects computers that are at physically separate sites. Connecting to the Internet, either through a dial-up, DSL, or cable modem is an example of one WAN topology. If higher speeds, greater bandwidth and higher security are needed, many large corporations will use a PSDN, or public switched data network. This is a combination of computers and leased lines set up by a vendor who sells time on them to corporations. Diff: 3 Type: ES Page Reference: 197 Topic: Q3 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

310


Chapter 6: Networks and Collaboration

113) Public key/private key is a special version of asymmetric encryption that is very popular on the Internet. Describe what is meant by both public key and private key. How are they used on the Internet to provide security? Answer: In cryptography, a public key is a value provided by some designated authority as an encryption key. When the public key is combined with a private key, it can be used to effectively encrypt messages and digital signatures. The use of combined public and private keys is known as asymmetric cryptography. A system for using public keys is called a public key infrastructure (PKI). In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange encrypted messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. Diff: 3 Type: ES Page Reference: 208 Topic: Q7 Skill: APPLIED 114) The Internet has probably decreased the number of degrees that separate us from everyone else. Why is this so? Could it also increase our separation? Why or why not? Answer: This is a question with many right answers. The student should simply demonstrate an understanding and consideration of the material. Certainly the Internet has caused an unprecedented increase in the connections among people for personal as well as professional reasons. Depending on the size of your mailing list, one stroke of a key can send an e-mail to thousands of people. A Web page can generate even more connections with little effort. This means an increase in efficiency in terms of time spent per connection made. The quality of the connection however, may be lacking. Students could argue that meeting people in person may often be much more effective than e-mail, depending on the situation. Even phone conversations can be more effective in certain relationships. Maybe our time spent on the Internet actually limits our direct connection to people. Diff: 3 Type: ES Page Reference: 221-222 Topic: Q1 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

311


Chapter 6: Networks and Collaboration

115) What is the Domain Name System? Answer: The purpose of a DNS is to convert human-friendly URLs into computer-friendly IP addresses. Diff: 1 Type: ES Page Reference: 201 Topic: Q5 Skill: RECALL 116) What is a packet-filtering firewall? Answer: A packet-filtering firewall examine each part of a message and determine whether or let that part pass. To make this decision, it examines the source address, the destination address(es), and other data. Packet-filtering firewalls can prohibit outsiders from starting a session with any user behind the firewall. They can disallow traffic from particular sites, such as known hacker addresses. Diff: 2 Type: ES Page Reference: 207 Topic: Q7 Skill: RECALL 117) Explain the difference between a narrowband and a broadband connection. Answer: Narrowband lines typically have transmission speeds less than 56 kbps; broadband line have speeds in excess of 256 kbps. Diff: 1 Type: ES Page Reference: 203 Topic: Q5 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

312


Chapter 6: Networks and Collaboration

118) What is the difference between a private IP and a public IP? Answer: Public IP addresses are used on the Internet. Private IP addresses are used only by the company that operates the private network or intranet. Diff: 1 Type: ES Page Reference: 201 Topic: Q5 Skill: RECALL 119) What is the purpose of a DHCP server? Answer: A DHCP server assigns an IP number for a computer to use. Diff: 2 Type: ES Page Reference: 201 Topic: Q5 Skill: RECALL 120) What are the typical options for a home user to connect to the Internet? Answer: 1) Dial-up connection 2) ADSL connection 3) Cable modem connection 4) wireless network Diff: 1 Type: ES Page Reference: 201-202 Topic: Q5 Skill: RECALL 121) What are the components of a LAN? Answer: A LAN is a group of computers connected together on a single company site, usually located within a kilometer or so. A LAN usually has computers and printers connected Copyright © 2014 Pearson Canada Inc.

313


Chapter 6: Networks and Collaboration

via a switch, which receives and transmits messages on the LAN. Each device on a LAN has a network interface card (NIC) that connects the device’s circuitry to the network cable. Newer machines have onboard NICs, which is a NIC built into the computer. Each NIC has a unique identifier, which is called the MAC (media access control) address. The computers, printers, switches, and other devices on a LAN are connected using one of two media. Most connections are made using unshielded twisted pair (UTP) cable. Other connections that required higher speed use optical fibre cables. Diff: 2 Type: ES Page Reference: 194 Topic: Q3 Skill: RECALL 122) Describe how a VPN works. Answer: A VPN uses the Internet or a private internet to create the appearance of private point-topoint connections. Diff: 2 Type: ES Page Reference: 208 Topic: Q7 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

314


Chapter 7: Competitive Advantage and Business Proces

1) One way to gain competitive advantage using information systems is through business process. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 226 Topic: Q1 Skill: RECALL 2) It is illegal to use a shared supply chain management system to infer what your competitor's inventory levels are. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 226 Topic: Q1 Skill: APPLIED 3) Using MIS, one way to gain competitive advantage is to enhance the product or service by applying technological change. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 226 Topic: Q1 Skill: RECALL 4) Functional silos are designed to work independently of one another. a. True b. False Copyright © 2014 Pearson Canada Inc.

315


Chapter 7: Competitive Advantage and Business Proces

Answer: a Diff: 1 Type: TF Page Reference: 227 Topic: Q2 Skill: RECALL 5) Cross-functional systems facilitate work of a single department or business function. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 228 Topic: Q2 Skill: RECALL 6) Supplier relationship management is a business process for managing all contacts between the organization and its supplies. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 240 Topic: Q8 Skill: RECALL 7) In the last 10 years, all companies have entirely switched from functional systems to fullly integrated or cross-functional systems. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 231 Copyright © 2014 Pearson Canada Inc.

316


Chapter 7: Competitive Advantage and Business Proces

Topic: Q2 Skill: RECALL 8) With functional silos, management must query separate functional systems and integrate the data manually. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 228 Topic: Q2 Skill: RECALL 9) With functional systems, one of the biggest problems is duplicated data. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 229 Topic: Q2 Skill: RECALL 10) Functional systems often lead to disjointed processes and increased expenses. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 229 Topic: Q2 Skill: RECALL 11) Independent, isolated systems are good for making businesses more efficient today. a. True Copyright © 2014 Pearson Canada Inc.

317


Chapter 7: Competitive Advantage and Business Proces

b. False Answer: b Diff: 2 Type: TF Page Reference: 229 Topic: Q2 Skill: RECALL 12) ERP systems integrate sales, orders, inventory, manufacturing, customer service, human resources, and accounting. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 235 Topic: Q6 Skill: RECALL 13) Order entry is usually found in the accounting functional systems. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 229 Topic: Q2 Skill: RECALL 14) A general ledger application would be an example of a process-based system. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 229 Copyright © 2014 Pearson Canada Inc.

318


Chapter 7: Competitive Advantage and Business Proces

Topic: Q2 Skill: RECALL 15) Most organizations today have a mixture of functional and integrated systems. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 228 Topic: Q2 Skill: RECALL 16) Customer Relationship Management (CRM) is an example of a cross-functional system. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 237 Topic: Q7 Skill: RECALL 17) Enterprise Resource Planning software uses one database to connect the functional areas. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 235 Topic: Q6 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

319


Chapter 7: Competitive Advantage and Business Proces

18) Enterprise Application Integration uses an interface to access the individual functional databases. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 232 Topic: Q3 Skill: RECALL 19) Customer service is typically part of the marketing and sales function. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 229 Topic: Q2 Skill: RECALL 20) The operations function handles order entry and inventory management. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 229 Topic: Q2 Skill: RECALL 21) It is not possible to improve business processes without technological change. a. True b. False Answer: b Diff: 1 Copyright © 2014 Pearson Canada Inc.

320


Chapter 7: Competitive Advantage and Business Proces

Type: TF Page Reference: 230 Topic: Q3 Skill: RECALL 22) EAI leaves the functional systems and databases basically intact. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 231 Topic: Q3 Skill: RECALL 23) Either EAI or ERP can be used to integrate functional systems. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 231 Topic: Q3 Skill: RECALL 24) The user interface for Enterprise Application Integration systems and Enterprise Resource Planning systems look completely different to the end user. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 232 Topic: Q3 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

321


Chapter 7: Competitive Advantage and Business Proces

25) Business process design is well understood and the outcomes are fairly certain once the changes are begun. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 233 Topic: Q4 Skill: APPLIED 26) In a functional system, the data required to answer queries from and about customers is contained within the order management system so links to other systems are not necessary. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 230 Topic: Q2 Skill: APPLIED 27) Isolated systems can lead to inefficiency and higher organizational costs. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 230 Topic: Q2 Skill: RECALL 28) Porter's concept of the "process chain" is crucial for developing a competitive strategy. a. True b. False Copyright © 2014 Pearson Canada Inc.

322


Chapter 7: Competitive Advantage and Business Proces

Answer: b Diff: 2 Type: TF Page Reference: 228 Topic: Q2 Skill: RECALL 29) Most employees welcome and embrace changes caused by business process redesign. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 232 Topic: Q4 Skill: APPLIED 30) Grand & Toy has expanded its business model by offering services through the web in the last decade. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 226 Topic: Q1 Skill: RECALL 31) Functional systems in Porter’s Value Chain are usually comprised of a. HR, Accounting, Operations, Sales. b. Accounting, Payroll, HR, Sales. c. Operations, Advertising, HR, Sales. d. Accounting, Advertising, Payroll, Marketing. e. Primary activities and Support Activities.

Copyright © 2014 Pearson Canada Inc.

323


Chapter 7: Competitive Advantage and Business Proces

Answer: a Diff: 3 Type: MC Page Reference: 228 Topic: Q2 Skill: RECALL 32) Originally the ________ supported the work of a single department or function. a. calculation systems b. cross-function systems c. departmental systems d. inter-organizational systems e. functional systems Answer: e Diff: 2 Type: MC Page Reference: 227 Topic: Q2 Skill: RECALL 33) Systems that are designed to support activities across departmental boundaries are called a. calculation systems. b. functional systems. c. cross-departmental systems. d. inter-organizational systems. e. operating systems. Answer: c Diff: 1 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

324


Chapter 7: Competitive Advantage and Business Proces

34) Systems that are used by two or more related companies are referred to as a. functional systems. b. calculation systems. c. inter-organizational systems. d. operating systems. e. departmental systems. Answer: c Diff: 1 Type: MC Page Reference: 228 Topic: Q2 Skill: RECALL 35) Which of the following are examples of accounting functional systems? a. Lead tracking b. Inventory management c. Sales forecasting d. Manufacturing operations e. Accounts receivable Answer: e Diff: 2 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL 36) Which of the following is (are) true statements with functional systems? a. Improved data results b. Improved data integrity c. Better communciations d. Increased profitability e. Isolated systems

Copyright © 2014 Pearson Canada Inc.

325


Chapter 7: Competitive Advantage and Business Proces

Answer: e Diff: 2 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL 37) Which of the following is a (are) consequence(s) of a disjoint system? a. Efficiency b. Greater supply of integrated enterprise information c. Decreased cost d. Cohesive business processes e. Lower profits Answer: e Diff: 2 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL 38) Which of the following is a rationale for business process design? a. Existing functional systems are flawed and should be improved. b. New and more efficient business processes that integrate the activities of all departments involved in a value chain should be created. c. Business processes are inefficient and do not integrate with other departments. d. Existing business processes are returning a good ROI and should be kept running like this. e. Existing systems do not support the value chain and therefore need to be improved. Answer: b Diff: 2 Type: MC Page Reference: 231 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

326


Chapter 7: Competitive Advantage and Business Proces

39) ________ support the business processes of attracting, selling, managing, delivering, and supporting customers. a. Enterprise Resource Planning Systems b. Value Chain Management Systems c. Supplier Relationship Management Systems d. Supply Chain Management Systems e. Customer Relationship Management Systems Answer: e Diff: 2 Type: MC Page Reference: 237 Topic: Q7 Skill: RECALL 40) ________ support all of the primary business processes as well as the human resources and accounting support processes. a. Customer Relationship Management Systems b. Supply Chain Management Systems c. Enterprise Resource Planning Systems d. Value Chain Management Systems e. Supplier Relationship Management Systems Answer: c Diff: 2 Type: MC Page Reference: 235 Topic: Q6 Skill: RECALL 41) When a company purchases an “Industry Standard Process” from a vendor like SAP, the company often has to a. lay off staff to conform to the new standards. b. change the way to company operates to conform to the software. c. buy more equipment to conform to the software needs. Copyright © 2014 Pearson Canada Inc.

327


Chapter 7: Competitive Advantage and Business Proces

d. hire more staff to use the software more efficiently. e. wait years for a payback. Answer: b Diff: 3 Type: MC Page Reference: 233 Topic: Q5 Skill: RECALL 42) When a company purchases an “Industry Standard Process” from a vendor like SAP, the company may benefit a. by gaining “best practices” it would otherwise have developed on its own. b. because employees will conform with the changes rapidly and be more efficient. c. because customers will demand lower prices. d. hardly ever. e. because the company will have a unique application that will generate competitive advantage. Answer: a Diff: 3 Type: MC Page Reference: 233 Topic: Q5 Skill: APPLIED 43) ERP systems handle a. mainly HR functions. b. mainly sales tracking. c. only accounting. d. All of the company’s functions. e. sales and accounting. Answer: d Diff: 3 Type: MC Copyright © 2014 Pearson Canada Inc.

328


Chapter 7: Competitive Advantage and Business Proces

Page Reference: 235 Topic: Q6 Skill: RECALL 44) The elimination of the middle layer in a supply chain is called a. disintermediation. b. intermediation. c. reintermediation. d. normalization. e. price elasticity. Answer: a Diff: 2 Type: MC Page Reference: 239 Topic: Q8 Skill: RECALL 45) ________ is a business process for managing all contacts between an organization and its suppliers. a. SRM b. CRM c. BRM d. KRM e. FRM Answer: a Diff: 2 Type: MC Page Reference: 239 Topic: Q8 Skill: RECALL 46) Functional applications are sometimes call a. islands of automation. b. inefficient systems. Copyright © 2014 Pearson Canada Inc.

329


Chapter 7: Competitive Advantage and Business Proces

c. isolated silos. d. functional islands. e. functional silos. Answer: e Diff: 2 Type: MC Page Reference: 227 Topic: Q2 Skill: RECALL 47) ________ are used by non-manufacturers, such as distributors and retailers. a. Human resource systems b. Manufacturing systems c. Accounting systems d. Operations systems e. Marketing and sales systems Answer: d Diff: 3 Type: MC Page Reference: 227 Topic: Q2 Skill: APPLIED 48) Which of the following is a function of a manufacturing system? a. Order entry b. Customer service c. Scheduling d. Order management e. Inventory management Answer: c Diff: 2 Type: MC Page Reference: 229 Copyright © 2014 Pearson Canada Inc.

330


Chapter 7: Competitive Advantage and Business Proces

Topic: Q2 Skill: RECALL 49) Which of the following is involved in supply chain management? a. SRM b. CRM c. VRM d. CRM and VRM e. SRM and CRM Answer: e Diff: 2 Type: MC Page Reference: 240 Topic: Q8 Skill: RECALL 50) Which of the following is not a driver of supply chain management performance? a. Information b. Transportation c. Facilities d. Hardware e. Inventory Answer: d Diff: 2 Type: MC Page Reference: 240 Topic: Q8 Skill: RECALL 51) ERP uses a. integration to manage the 5 different databases in a typical company. b. pull-push production planning. c. customized programming to adapt to the purchaser’s way of doing business. Copyright © 2014 Pearson Canada Inc.

331


Chapter 7: Competitive Advantage and Business Proces

d. one centralized database. e. undocumented, brand new software. Answer: d Diff: 3 Type: MC Page Reference: 235 Topic: Q5 Skill: RECALL 52) Which of the following contains the elements of the customer life cycle? a. Marketing, Customer acquisition, Relationship management, Customer service b. Customer acquisition, Loss/churn, Accounts receivable, Customer service c. Loss /churn, Relationship management, Marketing, Accounts receivable d. Relationship management, Accounts payable, Loss/churn, Marketing e. Loss/Churn, Relationship management, Customer acquisition, Marketing Answer: e Diff: 2 Type: MC Page Reference: 237 Topic: Q7 Skill: RECALL 53) The purpose of relationship management applications is to a. extend social marketing effectiveness. b. reduce accounts receivable. c. advertise promotions in a timely way. d. get new customers. e. maximize the value of the existing customer base. Answer: e Diff: 2 Type: MC Page Reference: 237 Topic: Q7 Copyright © 2014 Pearson Canada Inc.

332


Chapter 7: Competitive Advantage and Business Proces

Skill: RECALL 54) Sales management applications support a. the maximization of the value of the customer. b. sales to existing customers. c. network marketing. d. database conversion e. prospecting for new customers. Answer: b Diff: 2 Type: MC Page Reference: 238 Topic: Q7 Skill: RECALL 55) Interorganizational systems that enable companies to efficiently handle the flow of goods from suppliers to customer are known as a. application software b. disintermediating systems c. competitive advantages d. CRM systems e. supply chain management systems Answer: e Diff: 2 Type: MC Page Reference: 239 Topic: Q8 Skill: RECALL 56) The internet and database management systems have allowed manufacturers like Dell to sell directly to consumers. This is called a. direct marketing b. B2G sales c. disintermediation Copyright © 2014 Pearson Canada Inc.

333


Chapter 7: Competitive Advantage and Business Proces

d. integrated CRM e. eBay Answer: c Diff: 2 Type: MC Page Reference: 239 Topic: Q8 Skill: RECALL 57) The only source of revenue in the supply chain is the a. sales department. b. cash register. c. end consumer. d. purchasing department. e. manufacturer. Answer: c Diff: 3 Type: MC Page Reference: 240 Topic: Q8 Skill: RECALL 58) Functional applications are sometimes called functional a. automation. b. silos. c. islands. d. confusion. e. integration. Answer: b Diff: 2 Type: MC Page Reference: 227 Topic: Q2 Copyright © 2014 Pearson Canada Inc.

334


Chapter 7: Competitive Advantage and Business Proces

Skill: RECALL 59) Systems that span functional ________ are known as cross-functional systems. a. departments b. processes c. systems d. boundaries e. functions Answer: d Diff: 1 Type: MC Page Reference: 228 Topic: Q2 Skill: RECALL 60) Inventory management systems are usually found in the __________ functional area. a. sales and marketing. b. operations. c. human resources. d. accounting and finance. e. manufacturing. Answer: b Diff: 1 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL 61) Payroll is an application that is traditionally run in the functional area of a. sales and marketing. b. human resources. c. manufacturing. d. operations. Copyright © 2014 Pearson Canada Inc.

335


Chapter 7: Competitive Advantage and Business Proces

e. accounting and finance. Answer: b Diff: 1 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL 62) The general ledger (GL) is an application that is traditionally run in the functional area of a. sales and marketing. b. manufacturing. c. operations. d. human resources. e. accounting and finance. Answer: e Diff: 1 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL 63) Order entry is an application that is traditionally run in the functional area of a. human resources. b. accounting and finance. c. manufacturing. d. operations. e. sales and marketing. Answer: d Diff: 1 Type: MC Page Reference: 229 Topic: Q2 Copyright © 2014 Pearson Canada Inc.

336


Chapter 7: Competitive Advantage and Business Proces

Skill: RECALL 64) _______ combines functional systems by using software bridges to connect different functional systems. a. EAI b. ERP c. CRM d. SAP R/3 e. MIS Answer: a Diff: 2 Type: MC Page Reference: 231 Topic: Q3 Skill: RECALL 65) Lead tracking is an application that is traditionally run in the functional area of a. operations. b. sales and marketing. c. manufacturing. d. accounting and finance. e. human resources. Answer: b Diff: 1 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL 66) SAP is one of the leading vendors of ________ software. a. ERP b. SCM c. CRM d. DBMS Copyright © 2014 Pearson Canada Inc.

337


Chapter 7: Competitive Advantage and Business Proces

e. CASE Answer: a Diff: 2 Type: MC Page Reference: 235 Topic: Q6 Skill: RECALL 67) Software that integrates sales, orders, inventory, manufacturing, customer service, human resources, and accounting is called ____________ a. ERP systems. b. vapour ware. c. DBMS. d. CAM. e. MPS. Answer: a Diff: 2 Type: MC Page Reference: 235 Topic: Q6 Skill: RECALL 68) One of the problems of functional systems is that data stored for different functional areas may be inconsistent and a. incomplete. b. redundant. c. outdated. d. not integrated e. disjointed. Answer: b Diff: 2 Type: MC Page Reference: 229

Copyright © 2014 Pearson Canada Inc.

338


Chapter 7: Competitive Advantage and Business Proces

Topic: Q2 Skill: RECALL 69) When functional systems are isolated, business processes are a. redundant. b. disjointed. c. incomplete. d. not integrated. e. outdated. Answer: b Diff: 2 Type: MC Page Reference: 229 Topic: Q2 Skill: RECALL 70) If the order entry system defines part numbers using a 6-digit code and the inventory system defines part numbers using an 8 digit code, the data must be ________ in order for the two systems to share data. a. recombined b. imported c. re-structured d. updated e. converted Answer: e Diff: 3 Type: MC Page Reference: 230 Topic: Q2 Skill: RECALL 71) Oracle, Microsoft, and SAP are all examples of ________ software vendors. a. MRP b. CRM Copyright © 2014 Pearson Canada Inc.

339


Chapter 7: Competitive Advantage and Business Proces

c. ERP d. SCM e. CASE Answer: c Diff: 2 Type: MC Page Reference: 235 Topic: Q6 Skill: RECALL 72) An example of integrated, cross functional information system would be _______ a. CASE. b. CAM. c. CAO. d. CRM. e. CAD. Answer: d Diff: 2 Type: MC Page Reference: 237 Topic: Q7 Skill: RECALL 73) A hotel that is experiencing a slow period could use a(n) ________________ to market promotions to its best customers. a. flyer campaign b. general ledger program c. twitter account d. facebook page e. integrated CRM application Answer: e Diff: 3 Type: MC Copyright © 2014 Pearson Canada Inc.

340


Chapter 7: Competitive Advantage and Business Proces

Page Reference: 238 Topic: Q7 Skill: RECALL 74) Business process management is all about a. CRM b. installing SAP R/3 to gain industry standard processes c. shortening your supply chain d. accomplishing the same activities with less resource cost e. becoming a cost leader under Porter’s models Answer: d Diff: 3 Type: MC Page Reference: 231 Topic: Q3 Skill: RECALL 75) ________ systems link up all the processes that touch the customer. a. MRP b. CASE c. CRM d. ERP e. SRM Answer: c Diff: 2 Type: MC Page Reference: 237 Topic: Q7 Skill: RECALL 76) Business process design projects are expensive and difficult because a. business processes are oten complex. b. of legacy technology. Copyright © 2014 Pearson Canada Inc.

341


Chapter 7: Competitive Advantage and Business Proces

c. of legal issues. d. poor business processes are inefficient. e. business processes are complex and poor business processes are inefficient. Answer: a Diff: 3 Type: MC Page Reference: 233 Topic: Q4 Skill: RECALL 77) The movement of business process design came about because systems developers began to wonder how they could a. improve existing functional systems. b. develop customer management relationship systems. c. use networks to go beyond just automating functional applications. d. use systems to automate the supply chain. e. integrate several different areas in an entire value chain. Answer: e Diff: 3 Type: MC Page Reference: 231 Topic: Q3 Skill: RECALL 78) When implementing a system such as SAP companies must (can) a. experience substantial change. b. save money. c. experience its primary benefits from the software d. adhere to industry standard processes. e. continue to use all their own business process standards. Answer: d Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

342


Chapter 7: Competitive Advantage and Business Proces

Page Reference: 235 Topic: Q6 Skill: RECALL 79) The greatest advantages of a CRM system is that a. organizations can prioritize sales time and effort. b. it can use sales management applications. c. customer-touching processes can be linked to one another. d. all the data is stored in a single database. e. sales people can potentially increase sales. Answer: c Diff: 3 Type: MC Page Reference: 237 Topic: Q7 Skill: RECALL 80) When adopting an ERO, the organization gains benefits because a. ERP has process blueprints. b. ERP allows the organization to gain the benefit of processes that have already been proven successful. c. ERP integrates all the activities in the organization and makes the organization successful. d. ERP allows the organizatin to standardize all of the corporate data. e. ERP places all the corporate data into a single database and makes business process more successful. Answer: b Diff: 2 Type: MC Page Reference: 236 Topic: Q6 Skill: RECALL 81) SRM applications support these three basic processes: Copyright © 2014 Pearson Canada Inc.

343


Chapter 7: Competitive Advantage and Business Proces

a. approve, enter, pay. b. book, receive, attend. c. attract, qualify, convert. d. invoice, inventory and payment. e. source, purchase and settle. Answer: e Diff: 3 Type: MC Page Reference: 240 Topic: Q8 Skill: RECALL 82) Companies selling to other companies or to government need to fully a. integrate CRM and SRM systems. b. reach a wider audience. c. integrate ERP systems into their business models. d. become electronic exchanges. e. incorporate non-merchant e-commerce. Answer: a Diff: 3 Type: MC Page Reference: 240 Topic: Q8 Skill: APPLIED 83) In the auto industry, supply chain management applications will include a. SRM, inventory and CRM b. customer tracking, production, and advertising. c. SRM and CRM only. d. ERP. e. production capacity. Answer: a Diff: 3 Copyright © 2014 Pearson Canada Inc.

344


Chapter 7: Competitive Advantage and Business Proces

Type: MC Page Reference: 240 Topic: Q8 Skill: APPLIED 84) In the settlement phase of an SRM application the SRM is linked to a. the financial management application or module. b. operations and manufacturing department. c. the company’s web ordering system. d. the supplier’s bank account. e. the inventory management application. Answer: a Diff: 3 Type: MC Page Reference: 241 Topic: Q8 Skill: APPLIED 85) CRM is software that integrates all of the processes that touch a customer. Diff: 2 Type: FIB Page Reference: 237 Topic: Q7 Skill: RECALL 86) A(n) CRM system stores all customer data in one place. Diff: 2 Type: FIB Page Reference: 237 Topic: Q7 Skill: RECALL 87) EAI applications store data in (a) multiple database(s). Diff: 2 Type: FIB Page Reference: 232 Topic: Q3 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

345


Chapter 7: Competitive Advantage and Business Proces

88) Systems that integrate all of an organization's core processes are called ERP systems. Diff: 2 Type: FIB Page Reference: 232 Topic: Q3 Skill: RECALL 89) One of the most successful vendors of ERP software is the German firm SAP. Diff: 1 Type: FIB Page Reference: 235 Topic: Q6 Skill: RECALL 90) Business application software from large companies usually has industry standard processes. Diff: 3 Type: FIB Page Reference: 233 Topic: Q5 Skill: RECALL 91) Four major factors, or drivers, affect supply chain performance: facilities, inventory, transportation, and information. Diff: 2 Type: FIB Page Reference: 240 Topic: Q8 Skill: RECALL 92) cross-functional systems were developed to solve the problems associated with functional silos. Diff: 2 Type: FIB Page Reference: 228 Topic: Q2 Skill: RECALL 93) To compete internationally, organizations must eventually achieve the efficiencies of cross-functional, process-based systems. Diff: 3 Type: FIB Page Reference: 228 Topic: Q2 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

346


Chapter 7: Competitive Advantage and Business Proces

94) Functional systems include HR, Accounting and Finance, Marketing and Sales, Operations, and Manufacturing. Diff: 1 Type: FIB Page Reference: 227 Topic: Q2 Skill: RECALL 95) Personnel performance assessments are tasks that are supported by the human resources (HR) functional systems. Diff: 2 Type: FIB Page Reference: 229 Topic: Q2 Skill: RECALL 96) Cash management is a task that is supported by accounting functional systems. Diff: 2 Type: FIB Page Reference: 229 Topic: Q2 Skill: RECALL 97) Marketing and sales systems are functional systems that store data about potential customers, their product interests, and contacts with them by sales personnel for leadtracking purposes. Diff: 2 Type: FIB Page Reference: 229 Topic: Q2 Skill: RECALL 98) When a salesperson enters a customer order and verifies the customer's credit they are using a functional application from the operations systems. Diff: 2 Type: FIB Page Reference: 229 Topic: Q2 Skill: RECALL 99) Industry standard processes can save the organization substantial costs of designing a new process. Diff: 2 Type: FIB Page Reference: 233 Topic: Q5 Copyright © 2014 Pearson Canada Inc.

347


Chapter 7: Competitive Advantage and Business Proces

Skill: RECALL 100) There are three factors of information: purpose, availability, and means. Diff: 2 Type: FIB Page Reference: 242 Topic: Q7 Skill: RECALL 101) The competitive advantage of ERP systems erodes if all companies use the same “industry standard” processes. Diff: 2 Type: FIB Page Reference: 231 Topic: Q6 Skill: RECALL 102) It is the combination of people, procedures, hardware, software, and data that creates sustainable advantage. Diff: 2 Type: FIB Page Reference: 236 Topic: Q6 Skill: RECALL 103) Inter-organizational systems are used by two or more related companies. Diff: 2 Type: FIB Page Reference: 228 Topic: Q2 Skill: RECALL 104) The purpose of relationship management applications is to maximize the value of the existing customer base. Diff: 2 Type: FIB Page Reference: 238 Topic: Q2 Skill: RECALL 105) Integrated CRM applications store data in a single database. Diff: 1 Type: FIB Page Reference: 238 Topic: Q7 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

348


Chapter 7: Competitive Advantage and Business Proces

106) With a(n) ERP system, people in the functional areas use the software to send and receive data directly from the central database. Diff: 2 Type: FIB Page Reference: 232 Topic: Q3 Skill: RECALL 107) Diagrams that show business processes show the flow and logic of one set of processes; these are referred to as blueprints. Diff: 3 Type: FIB Page Reference: 233 Topic: Q4 Skill: RECALL 108) Because all customer data resides in a single location in a CRM system, all CRM processes can be linked to one another. Diff: 2 Type: FIB Page Reference: 237 Topic: Q7 Skill: RECALL 109) In an ERP, the processes displayed in the business blueprints have been tried and tested by hundreds of organizations. Diff: 2 Type: FIB Page Reference: 236 Topic: Q5 Skill: RECALL 110) What is an enterprise resource planning system? Answer: Enterprise resource planning systems support all of the primary business processes as well as the human resources and accounting support processes. Diff: 2 Type: ES Page Reference: 235 Topic: Q5 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

349


Chapter 7: Competitive Advantage and Business Proces

111) What are the steps in the customer life cycle? Answer: Marketing, customer acquisition, relationship management, and loss/churn. Diff: 3 Type: ES Page Reference: 237 Topic: Q7 Skill: RECALL 112) What is an industry standard process? Answer: An industry standard process is embedded is a business process that is embedded in enterprise application software. Diff: 2 Type: ES Page Reference: 233 Topic: Q5 Skill: RECALL 113) What is a SRM system? Answer: A supplier relationship management is a business process for managing all contacts between an organization and its suppliers. Diff: 2 Type: ES Page Reference: 240 Topic: Q8 Skill: RECALL 114) What is a CRM system? Answer: Copyright © 2014 Pearson Canada Inc.

350


Chapter 7: Competitive Advantage and Business Proces

Customer relationship management (CRM) systems support the business processes of attracting, selling, managing, delivering, and supporting customers. Diff: 2 Type: ES Page Reference: 237 Topic: Q7 Skill: RECALL 115) What is a supply chain? Answer: A supply chain is a network of organizations and facilities that transforms raw materials into products delivered to customers. Diff: 1 Type: ES Page Reference: 239 Topic: Q8 Skill: RECALL 116) What is the difference between a CRM and a traditional functional application? Answer: The difference between CRM systems and traditional functional applications is that CRM addresses all activities and events that touch the customer and provides a single repository for data about all customer interactions. With functional systems, data about customers are sprinkled in databases all over the organization. Some customer data exist in customer management databases, some in order entry databases, some in customer service databases, and so forth. CRM systems store all customer data in one place and make it possible to access all data about the customer. Diff: 3 Type: ES Page Reference: 237 Topic: Q7 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

351


Chapter 7: Competitive Advantage and Business Proces

117) It is said that adopting a system such as SAP R/3 may trigger a reduction in competitive advantage through the spread of industry standard processes. Explain why this may happen and identify the important difference that may mitigate this reduction. Answer: Adopting a system such as SAP/3 may cause a reduction in competitive advantage through the spread of industry standard processes because the organization is imitating other organization’s processes instead of developing/improving its own. Therefore, it seems to provide not much differentiation from other organizations. However, as we have learned, information systems do not only refer to the hardware, software, and procedures, but also data and people. Thus, the organization’s competitive advantage depends on the good combination of these five components. Also, industry standard process can help an organization improve their processes by realizing the best practices of its competitors. Diff: 3 Type: ES Page Reference: 233 Topic: Q5 Skill: APPLIED 118) As all the companies in an industry move to more integrated information systems how can they still reap a competitive advantage from them? Does adopting the standard business blueprint still provide a competitive advantage? Answer: Although many companies raced to implement an ERP system prior to Y2K, there was considerable variation in the level and quality of the integration of the business processes that they achieved. There is still a lot of room for improvement. Companies hope to build on these integrated systems not only by improving the processes, but also by adding wireless access, Web-enabling them, and integrating other new technologies like RFID tags and scanning applications. Some very large companies even have multiple ERP systems that are difficult to integrate between their different business units. There is potential for integration on an even larger, corporate scale. There is some debate today about whether ERP systems have become so prevalent that they have become commoditized and don't offer any differentiation in industry. ERP vendors have tried to counter this by expanding their offerings to support things like archiving and specialized reporting. They now offer to go back and perform process tune-ups and even optimizing things like the supply chain. Diff: 3 Type: ES Page Reference: 236 Topic: Q6 Copyright © 2014 Pearson Canada Inc.

352


Chapter 7: Competitive Advantage and Business Proces

Skill: APPLIED 119) Give an example of an application from each of the five categories of functional systems. Answer: Marketing and Sales: Sales forecasting Operations: Inventory management Manufacturing: Scheduling Human resources: Payroll and compensation Accounting and finance: Accounts receivable Diff: 2 Type: ES Page Reference: 229 Topic: Q2 Skill: RECALL 120) Describe how an ERP supports each of the primary activities in Porter's value chain model. Answer: The generic value chain has five primary and four support activities. The primary activities of the value chain include inbound logistics, operations, outbound logistics, marketing and sales, and service. An ERP allows for the linking of these activities together so that data from the primary and support activities can be combined in the decision making process. Diff: 3 Type: ES Page Reference: 228 Topic: Q2 Skill: APPLIED 121) Inter-organizational information systems such as SCM, SRM, and Web-based systems have the potential for providing significant competitive advantage today. While this is good in theory, what potential problems does it present? Answer: The adoption of inter-organizational information systems involves multiples departments; that is, its implementation demands the organization to invest enough time in a thorough understanding of the system a priori. One potential problem that may arise is that data Copyright © 2014 Pearson Canada Inc.

353


Chapter 7: Competitive Advantage and Business Proces

are not properly corrected (e.g., accurate information, normalized data) and entered in the system. This problem may cause the system to fail because the ultimate goal of these systems is the exchange of accurate and reliable information. Another issue is people’s resistance to using the new system and the change. If users are not given a proper training in the benefits, use, and purpose of the system as well as not given the opportunity to get involved in the implementation stages, users start losing faith in the usefulness of the information system. Diff: 3 Type: ES Page Reference: 236 Topic: Q6 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

354


Chapter 8: Decision Making and Business Intelligence

1) Online transaction processing (OLTP) systems are the backbone of all cross-functional systems in a company. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 258 Topic: Q2 Skill: RECALL 2) Data-mining systems use heuristic techniques to process data to find hidden patterns and relationships among the data. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 263 Topic: Q4 Skill: RECALL 3) A reporting system is designed to provide the right information, to the right user, at the right time. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 264 Topic: Q4 Skill: RECALL 4) A data-mining system uses statistical analysis to enable fundraisers to predict who will donate to a cause. a. True b. False Copyright © 2014 Pearson Canada Inc.

355


Chapter 8: Decision Making and Business Intelligence

Answer: a Diff: 2 Type: TF Page Reference: 262 Topic: Q4 Skill: RECALL 5) Data-mining is about probabilities not certainties. So sometimes a good model may look bad because of a string of bad luck. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 276 Topic: Q7 Skill: RECALL 6) Reporting systems are programs that read data from a variety of sources, process that data, produce and deliver formatted reports to users. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 263 Topic: Q4 Skill: RECALL 7) Fine data are highly summarized. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 257 Copyright © 2014 Pearson Canada Inc.

356


Chapter 8: Decision Making and Business Intelligence

Topic: Q1 Skill: RECALL 8) Coarse data are highly summarized. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 257 Topic: Q1 Skill: RECALL 9) Clickstream data is very fine data. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 257 Topic: Q1 Skill: RECALL 10) Generally it is better to have data that is too fine rather than too coarse. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 257 Topic: Q1 Skill: RECALL 11) Systems that focus on making data collected in OLTP to support decision making are often referred to as knowledge management systems. a. True Copyright © 2014 Pearson Canada Inc.

357


Chapter 8: Decision Making and Business Intelligence

b. False Answer: b Diff: 2 Type: TF Page Reference: 258 Topic: Q3 Skill: RECALL 12) Systems that focus on making data collected in OLTP to support decision making are often referred to as expert systems. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 258 Topic: Q3 Skill: RECALL 13) Systems that focus on making data collected in OLTP to support decision making are often referred to as decision support systems. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 258 Topic: Q3 Skill: RECALL 14) OLTP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. a. True b. False Answer: b Diff: 2 Copyright © 2014 Pearson Canada Inc.

358


Chapter 8: Decision Making and Business Intelligence

Type: TF Page Reference: 259 Topic: Q3 Skill: RECALL 15) OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 259 Topic: Q3 Skill: RECALL 16) With cluster analysis, analysts create a model or hypothesis before running the analysis. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 268 Topic: Q7 Skill: APPLIED 17) With supervised data mining, analysts create a model or hypothesis before running the analysis. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 268 Topic: Q7 Copyright © 2014 Pearson Canada Inc.

359


Chapter 8: Decision Making and Business Intelligence

Skill: RECALL 18) Neural networks are a supervised data-mining technique. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 267 Topic: Q7 Skill: RECALL 19) Cluster analysis measures the impact of a set of variables on another variable. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 268 Topic: Q7 Skill: RECALL 20) Regression analysis measures the impact of a set of variables on another variable. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 268 Topic: Q7 Skill: RECALL 21) A data warehouse is a data collection that is created to address the needs of a particular business function, problem, or opportunity. a. True b. False Copyright © 2014 Pearson Canada Inc.

360


Chapter 8: Decision Making and Business Intelligence

Answer: b Diff: 2 Type: TF Page Reference: 264 Topic: Q6 Skill: RECALL 22) A data mart is a data collection that is created to address the needs of a particular business function, problem, or opportunity. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 266 Topic: Q6 Skill: RECALL 23) Problematic data are termed dirty data. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 256 Topic: Q1 Skill: RECALL 24) Problematic data are termed missing values. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 256 Copyright © 2014 Pearson Canada Inc.

361


Chapter 8: Decision Making and Business Intelligence

Topic: Q1 Skill: RECALL 25) The data resource challenge refers to the lack of data to support decision making. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 256 Topic: Q3 Skill: RECALL 26) Market-basket analysis is a data-mining system, which computes correlations based on past orders to determine items that are frequently purchased together. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 264 Topic: Q6 Skill: RECALL 27) Experts systems encapsulate knowledge and use if/then rules to support decisions. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 264 Topic: Q4 Skill: RECALL 28) With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. Copyright © 2014 Pearson Canada Inc.

362


Chapter 8: Decision Making and Business Intelligence

a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 268 Topic: Q7 Skill: RECALL 29) Discovering patterns and relationships in data is the purpose of data mining. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 267 Topic: Q7 Skill: RECALL 30) Managers suffer more from an overabundance of irrelevant data. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 255 Topic: Q1 Skill: RECALL 31) The total amount of data generated by 2010 is estimated to be a. 330 petabytes. b. 3.3 zettabytes. c. 33 petabytes. d. 3.3 exabytes. e. 0.33 yottabytes. Copyright © 2014 Pearson Canada Inc.

363


Chapter 8: Decision Making and Business Intelligence

Answer: d Diff: 2 Type: MC Page Reference: 256 Topic: Q1 Skill: RECALL 32) The hyper abundance of information is sometimes called a. data abundance. b. Moore's Law. c. the Ackoff principle. d. information overload. e. dirty data. Answer: d Diff: 1 Type: MC Page Reference: 255 Topic: Q1 Skill: RECALL 33) Data ________ refers to the degree of summarization or detail. a. relevance b. granularity c. integrity d. clarity e. quality Answer: b Diff: 2 Type: MC Page Reference: 257 Topic: Q2 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

364


Chapter 8: Decision Making and Business Intelligence

34) If you are collecting data electronically and processing the transaction online, then you are using (a) ________. a. online analytical processing (OLAP) b. online transaction processing (OLTP) c. data warehouse d. data-mining e. database management system (DBMS) Answer: b Diff: 1 Type: MC Page Reference: 257 Topic: Q2 Skill: RECALL 35) A person's clicking behavior on the web is termed as their a. mouse trails. b. webstream. c. clickstream. d. web tracks. e. link journey. Answer: c Diff: 1 Type: MC Page Reference: 257 Topic: Q1 Skill: RECALL 36) Problematic data are termed a. problem data. b. irrelevant data. c. incorrect data. d. dirty data. e. untrustworthy data. Copyright © 2014 Pearson Canada Inc.

365


Chapter 8: Decision Making and Business Intelligence

Answer: d Diff: 1 Type: MC Page Reference: 256 Topic: Q1 Skill: RECALL 37) While data may be collected in OLTP, the fact that data may not be used to improve decision making refers to (the) a. data overload challenge. b. information overload. c. data resource challenge. d. data integrity challenge. e. knowledge challenge. Answer: c Diff: 2 Type: MC Page Reference: 258 Topic: Q3 Skill: RECALL 38) A ________ is a data collection that is created to address the needs of a particular business function, problem, or opportunity. a. database b. data mart c. data-mine d. data depot e. data warehouse Answer: b Diff: 2 Type: MC Page Reference: 266 Topic: Q6

Copyright © 2014 Pearson Canada Inc.

366


Chapter 8: Decision Making and Business Intelligence

Skill: RECALL 39) The purpose of a business intelligence system is to provide information that a. improves decision making. b. can be summarized. c. is less granular. d. follows privacy legislation. e. has only one level of complexity. Answer: a Diff: 2 Type: MC Page Reference: 262 Topic: Q4 Skill: RECALL 40) ________ is the application of statistical techniques to find patterns and relationships in data and to predict outcomes. a. Data mining b. Data warehousing c. Data depositing d. Data marting e. Databasing Answer: a Diff: 3 Type: MC Page Reference: 263 Topic: Q4 Skill: RECALL 41) With ________, analysts do not create a model or hypothesis before running the analysis. Instead, they apply the data-mining technique to the data and observe the results. a. regression analysis b. supervised data mining Copyright © 2014 Pearson Canada Inc.

367


Chapter 8: Decision Making and Business Intelligence

c. neural networks d. cluster analysis e. unsupervised data mining Answer: e Diff: 2 Type: MC Page Reference: 268 Topic: Q7 Skill: RECALL 42) ________ measure(s ) the impact of a set of variables on another variable. a. Supervised data mining b. Regression analysis c. Unsupervised data mining d. Neural networks e. Cluster analysis Answer: b Diff: 2 Type: MC Page Reference: 268 Topic: Q7 Skill: RECALL 43) ________ is a statistical technique that can identify groups of entities that have similar characteristics. a. Regression analysis b. Data mining c. Cluster analysis d. Character analysis e. Supervised data mining Answer: c Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

368


Chapter 8: Decision Making and Business Intelligence

Page Reference: 268 Topic: Q7 Skill: RECALL 44) If transactions are entered and processed immediately upon entry, then the system is operating in a. transaction time. b. batch mode. c. unprotected mode. d. online mode. e. real time. Answer: e Diff: 1 Type: MC Page Reference: 257 Topic: Q2 Skill: RECALL 45) A phone number of 123-456-7890 and an age of 999 are examples of ___________ in a database. a. granularity b. OLTP c. incorrect data labels d. dirty data e. too many attributes Answer: d Diff: 3 Type: MC Page Reference: 256 Topic: Q1 Skill: RECALL 46) ________ integrate data from multiple sources, and process those data by sorting, grouping, summing, averaging, and comparing. Copyright © 2014 Pearson Canada Inc.

369


Chapter 8: Decision Making and Business Intelligence

a. Reporting systems b. Supplier Relationship Management systems c. Business intelligence systems d. Expert Systems e. Customer Relationship Management systems Answer: a Diff: 1 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 47) ________ process data using sophisticated statistical techniques like regression analysis and decision tree analysis. a. CRM systems b. Data-mining systems c. Business intelligence systems d. Reporting systems e. Expert Systems Answer: b Diff: 2 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 48) ________ create value from intellectual capital by collecting and sharing human knowledge of products, product uses, best practices, and other critical knowledge with employees, managers, customers, suppliers, and other who need it. a. CRM applications b. Expert Systems c. Business intelligence systems d. Data mining systems e. Knowledge management systems Copyright © 2014 Pearson Canada Inc.

370


Chapter 8: Decision Making and Business Intelligence

Answer: e Diff: 2 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 49) ________ encapsulate the knowledge of human experts in the form of if-then rules. a. Data mining systems b. Expert Systems c. Business intelligence applications d. Reporting systems e. CRM systems Answer: b Diff: 1 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 50) The purpose of (a) ________ is to extract and clean data from operational systems and other sources. a. cluster analysis b. data mart c. data warehouse d. regression analysis e. data mining Answer: c Diff: 1 Type: MC Page Reference: 265 Topic: Q5 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

371


Chapter 8: Decision Making and Business Intelligence

51) In 2002, a total of ________ petabytes of new data were created. a. 304 b. 330 c. 3.3 d. 403 e. 430 Answer: d Diff: 2 Type: MC Page Reference: 255 Topic: Q1 Skill: RECALL 52) ________ provides the ability to sum, count, average, and perform other simple arithmetic operation on groups of data. a. Online database processing (OLDP) b. Online transaction processing (OLTP) c. Online data processing (OLDP) d. Online record processing (OLRP) e. Online analytic processing (OLAP) Answer: e Diff: 2 Type: MC Page Reference: 259 Topic: Q3 Skill: RECALL 53) An OLAP report has a. measures and dimensions. b. averages. c. dimensions. d. measures and averages. e. measures. Copyright © 2014 Pearson Canada Inc.

372


Chapter 8: Decision Making and Business Intelligence

Answer: a Diff: 2 Type: MC Page Reference: 259 Topic: Q3 Skill: RECALL 54) Systems that focus on making data collected in OLTP useful for allowing multiple decision makers to collaborate are often referred to as a. Executive Information Systems. b. Data Mining Systems. c. Expert Systems. d. Knowledge Management Systems. e. Decision Support Systems. Answer: e Diff: 2 Type: MC Page Reference: 261 Topic: Q3 Skill: RECALL 55) ________ analysis is a data-mining system which computes correlation of items on past orders to determine items that are frequently purchased together. a. Market-basket b. Marketing c. Value chain d. Data-mining e. Shopping cart Answer: a Diff: 2 Type: MC Page Reference: 269 Topic: Q7

Copyright © 2014 Pearson Canada Inc.

373


Chapter 8: Decision Making and Business Intelligence

Skill: RECALL 56) If you need to identify groups of entities that have similar characteristics, you need to perform (a) a. cluster analysis. b. regression analysis. c. neural network analysis. d. online analytical processing. e. grouping analysis. Answer: a Diff: 3 Type: MC Page Reference: 268 Topic: Q7 Skill: APPLIED 57) Which of the following systems fosters innovation, improves customer service, and increases organizational responsiveness by sharing knowledge of products, product uses, and best practices? a. Market-basket Analysis b. Regression Analysis Systems c. Data-mining Systems d. Knowledge Management Systems e. Expert Systems Answer: d Diff: 3 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 58) Which of the following is an assumption about information systems that Ackoff disputed? a. Computer speed doubles every 18 months.

Copyright © 2014 Pearson Canada Inc.

374


Chapter 8: Decision Making and Business Intelligence

b. There is too much uncertainty in making any decision. c. Managers have no problem making decisions if they get the data they need. d. Managers that make decisions do not get irrelevant data. e. There is too much information. Answer: c Diff: 3 Type: MC Page Reference: 255 Topic: Q1 Skill: APPLIED 59) Which of the following is an assumption about information systems that Ackoff disputed? a. There is too much uncertainty in making any decision. b. Decisions are poor because managers lack relevant information. c. Computer speed doubles every 18 months. d. There is too much information. e. Mangers suffer from a lack of perfect data. Answer: b Diff: 3 Type: MC Page Reference: 255 Topic: Q1 Skill: APPLIED 60) Which of the following is an assumption about information systems that Ackoff disputed? a. Managers are aware of the data they need. b. There is too much information. c. There is too much uncertainty in making any decisions. d. Computer speed doubles every 18 months. e. Managers suffer from a lack of training. Answer: a Copyright © 2014 Pearson Canada Inc.

375


Chapter 8: Decision Making and Business Intelligence

Diff: 3 Type: MC Page Reference: 255 Topic: Q1 Skill: APPLIED 61) Why does the exponential growth in data matter? a. There was too little data before. b. Managers know what data they need. c. Information overload is a blessing. d. Getting the right information at the right time can improve decisions. e. You can make money with data. Answer: d Diff: 3 Type: MC Page Reference: 254 Topic: Q1 Skill: APPLIED 62) It is usually better to have data granularity that is ______________ rather than too coarse. a. dirty data b. missing values c. inconsistent d. more recent e. too fine Answer: e Diff: 1 Type: MC Page Reference: 257 Topic: Q1 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

376


Chapter 8: Decision Making and Business Intelligence

63) The data processing strategy that waits for many transactions to pile up before they are processed is called a. LDAP. b. delayed processing. c. batch processing. d. OLTP. e. OLAP. Answer: c Diff: 1 Type: MC Page Reference: 255 Topic: Q2 Skill: RECALL 64) ________ systems are the backbone of all functional, cross-functional, and interorganizational systems in an organization. a. OLAP b. Batch processing c. OLTP d. LDAP e. Real time Answer: c Diff: 2 Type: MC Page Reference: 256 Topic: Q2 Skill: RECALL 65) Thomas Davenport noted that a major grocery chain used less than ________ percent of its scanner data a. 1 b. 2 c. 3 d. 4 Copyright © 2014 Pearson Canada Inc.

377


Chapter 8: Decision Making and Business Intelligence

e. 5 Answer: b Diff: 3 Type: MC Page Reference: 256 Topic: Q3 Skill: RECALL 66) Which of the following is a synonym for data-mining? a. Data discovery b. Cluster analysis c. Data mart d. Data parsing e. Knowledge discovery in databases Answer: e Diff: 3 Type: MC Page Reference: 265 Topic: Q4 Skill: APPLIED 67) Experts in a communications company believe that cell phone usage on weekends is determined by the age of the customer and the number of months the customer has the cell phone account. Which of the following technique could be used to analyze the data? a. Regression analysis b. Unsupervised data-mining c. Neural networks d. Cluster analysis e. Market-based analysis Answer: a Diff: 3 Type: MC Page Reference: 266

Copyright © 2014 Pearson Canada Inc.

378


Chapter 8: Decision Making and Business Intelligence

Topic: Q7 Skill: APPLIED 68) When an area code changes in a database, the phone number for a given customer before the change will not match the customer's number after the change. This is an example of a. too fine data. b. too coarse data. c. missing values. d. incomplete or inaccurate data. e. inconsistent data. Answer: e Diff: 3 Type: MC Page Reference: 256 Topic: Q1 Skill: RECALL 69) Clickstream data is often ___________ and much of it has to be discarded. a. incomplete or inaccurate data. b. too coarse. c. inconsistent data. d. missing value. e. too fine. Answer: e Diff: 3 Type: MC Page Reference: 257 Topic: Q1 Skill: RECALL 70) A nonprofit organization can process a donation without knowing the donor’s gender or age, but a data mining application that looks at differences in donation behaviours based on gender would be impaired. This data problem is known as a. too fine data. Copyright © 2014 Pearson Canada Inc.

379


Chapter 8: Decision Making and Business Intelligence

b. missing values. c. inconsistent data. d. incomplete or inaccurate data. e. too coarse data. Answer: b Diff: 2 Type: MC Page Reference: 254 Topic: Q1 Skill: RECALL 71) Highly summarized data is known as being a. coarse. b. fine. c. inconsistent. d. too summarized. e. too comprehensive. Answer: a Diff: 2 Type: MC Page Reference: 257 Topic: Q1 Skill: RECALL 72) Clickstream data is a. a record of customer’s or visitor’s behavior on a website. b. not used for market basket predictions. c. inconsistent. d. too summarized. e. the end result of data mining. Answer: a Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

380


Chapter 8: Decision Making and Business Intelligence

Page Reference: 257 Topic: Q1 Skill: RECALL 73) It is better to have data that is too fine than too coarse because fine data can be converted to coarse data by a. separating the data into its constituent parts. b. using regression analysis. c. placing the data into a data mart. d. summing and combining the data. e. placing the data into a data warehouse. Answer: d Diff: 2 Type: MC Page Reference: 257 Topic: Q1 Skill: RECALL 74) In an OLAP system a measure is (are) a. a data item of interest. b. a report. c. data items that are summed. d. processed data. e. a characteristic of a dimension. Answer: a Diff: 2 Type: MC Page Reference: 259 Topic: Q3 Skill: RECALL 75) To realize a competitive advantage from data an organization must a. collect the data. b. view data as a liability. Copyright © 2014 Pearson Canada Inc.

381


Chapter 8: Decision Making and Business Intelligence

c. use the data to make better decisions. d. view data as an asset. e. analyze the data. Answer: c Diff: 2 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 76) The decision to use batch or real time processing should depend upon a. the nature of the transactions and the needs of the organization. b. the nature of the transactions. c. the needs to the organization. d. the existing infrastructure of the organization. e. the needs to the organization and the existing infrastructure of the organization. Answer: a Diff: 2 Type: MC Page Reference: 258 Topic: Q2 Skill: RECALL 77) Billy Beane is generally credited with introducing a. new methods of scouting players for the National Hockey League. b. scientific and statistical techniques that capture more data for major league baseball. c. market-basket analysis in major leage baseball. d. developing OLTP software. e. real-time processing to business processes Answer: b Diff: 2 Type: MC Page Reference: 260 Copyright © 2014 Pearson Canada Inc.

382


Chapter 8: Decision Making and Business Intelligence

Topic: Q4 Skill: RECALL 78) By sharing knowledge companies can a. improve the decision making of non-experts. b. mine data better. c. foster innovation. d. have more complete information systems. e. automate decision making. Answer: c Diff: 2 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 79) Your local burger joint wants to reap the benefits of improved decision making by using its sales data. In order to do this, it must a. use reporting systems as part of its complete information systems. b. incorporate data-mining products as part of its complete information systems. c. follow best practices and adopt an ERP. d. adopt an expert system into its existing information system. e. adopt knowledge management systems into its existing information system. Answer: b Diff: 3 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 80) An RFM analysis is a a. data-mining system. b. way of recording an individual customer’s spending habits. c. way of analyzing and ranking customers according to their purchasing patterns. Copyright © 2014 Pearson Canada Inc.

383


Chapter 8: Decision Making and Business Intelligence

d. way of recording a customer’s most recent purchases. e. way of analyzing a customer’s most recent purchases. Answer: c Diff: 2 Type: MC Page Reference: 262 Topic: Q4 Skill: RECALL 81) Data-mining techniques include a. supplier relationship management. b. data warehousing. c. data marting. d. market basket analysis. e. customer relationship management. Answer: d Diff: 2 Type: MC Page Reference: 270 Topic: Q7 Skill: RECALL 82) In most cases, data-mining systems are used to make a. assessments. b. predictions. c. solutions. d. decisions. e. relationships. Answer: b Diff: 2 Type: MC Page Reference: 267 Topic: Q7 Copyright © 2014 Pearson Canada Inc.

384


Chapter 8: Decision Making and Business Intelligence

Skill: RECALL 83) ________ systems integrate data from a variety of sources, process that data, and produce and deliver formatted reports to users. a. Data-mining b. Reporting c. Web service d. XML e. RFP Answer: b Diff: 2 Type: MC Page Reference: 264 Topic: Q4 Skill: RECALL 84) Before it can be loaded into the data warehouse, operational data must be extracted and a. sorted. b. filtered. c. dimensioned. d. processed. e. cleaned. Answer: e Diff: 2 Type: MC Page Reference: 265 Topic: Q5 Skill: RECALL 85) A data warehouse contains a special database that stores the ________, which records its source, history, and format of the data. a. dimensional data b. clickstream data Copyright © 2014 Pearson Canada Inc.

385


Chapter 8: Decision Making and Business Intelligence

c. metadata d. media format e. dirty data Answer: c Diff: 3 Type: MC Page Reference: 266 Topic: Q5 Skill: RECALL 86) A data warehouse will usually consist of a. large air-conditioned buildings. b. thousands of boxes of paper files. c. A few fast severs and very large storage devices. d. the same data as the company’s operational data. e. only government related information. Answer: c Diff: 2 Type: MC Page Reference: 265 Topic: Q5 Skill: RECALL 87) Sometimes, large organizations break out ________ from their data warehouses so they can be used for a specific functional area of the organization like marketing or finance. a. special groupings b. Web services c. database servers d. OLAP applications e. data marts Answer: e Diff: 2 Copyright © 2014 Pearson Canada Inc.

386


Chapter 8: Decision Making and Business Intelligence

Type: MC Page Reference: 266 Topic: Q6 Skill: RECALL 88) ________ is a problem that occurs when data-mining is used to create overly complex models that are not suited to making accurate predictions. a. Inconsistent data b. Overfitting c. Model degradation d. Dirty data e. Clean data Answer: b Diff: 3 Type: MC Page Reference: 273 Topic: Q7 Skill: APPLIED 89) It is almost certain that in reality, when you take on a data-mining project, the data will be a. dirty. b. full of viruses. c. formatted properly. d. buggy. e. inconsistent. Answer: a Diff: 2 Type: MC Page Reference: 256 Topic: Q1 Skill: APPLIED 90) Data granularity refers to the degree of summarization or detail. Copyright © 2014 Pearson Canada Inc.

387


Chapter 8: Decision Making and Business Intelligence

Diff: 2 Type: FIB Page Reference: 257 Topic: Q1 Skill: RECALL 91) Customer's web clicking behavior is called clickstream data. Diff: 2 Type: FIB Page Reference: 257 Topic: Q1 Skill: RECALL 92) While data may be collected in OLTP, the data may not be used to improve decision making. We refer to this as the data resource challenge. Diff: 2 Type: FIB Page Reference: 258 Topic: Q3 Skill: RECALL 93) Systems that focus on making data collected in OLTP useful for decision making are often referred to as decision support systems. Diff: 2 Type: FIB Page Reference: 258 Topic: Q3 Skill: RECALL 94) An OLAP report has measures and dimensions. Diff: 2 Type: FIB Page Reference: 258 Topic: Q3 Skill: RECALL 95) Reporting Systems integrate data from multiple sources, and they process those data by sorting, grouping, summing, averaging, and comparing. Diff: 2 Type: FIB Page Reference: 264 Topic: Q4 Skill: RECALL 96) Data-mining systems process data using sophisticated statistical techniques like regression analysis and decision tree analysis. Copyright © 2014 Pearson Canada Inc.

388


Chapter 8: Decision Making and Business Intelligence

Diff: 2 Type: FIB Page Reference: 264 Topic: Q4 Skill: RECALL 97) Knowledge management systems create value from intellectual capital by collecting and sharing human knowledge of products, product uses, best practices, and other critical knowledge with employees, managers, customers, suppliers, and others who need it. Diff: 2 Type: FIB Page Reference: 264 Topic: Q5 Skill: RECALL 98) Expert systems encapsulate the knowledge of human experts in the form of if/then rules. Diff: 2 Type: FIB Page Reference: 264 Topic: Q4 Skill: RECALL 99) The purpose of a(n) data warehouse is to extract and clean data from operational systems and other sources. Diff: 2 Type: FIB Page Reference: 265 Topic: Q5 Skill: RECALL 100) Metadata is data about data. Diff: 1 Type: FIB Page Reference: 266 Topic: Q5 Skill: RECALL 101) A(n) data mart is a data collection that is made to address the needs of a particular business function, problem, or opportunity. Diff: 2 Type: FIB Page Reference: 266 Topic: Q6 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

389


Chapter 8: Decision Making and Business Intelligence

102) Data mining is the application of statistical techniques to find patterns and relationships among data and to classify and predict. Diff: 2 Type: FIB Page Reference: 264 Topic: Q4 Skill: RECALL 103) Cluster analysis is a statistical technique that identify groups of entities that have similar characteristics. Diff: 2 Type: FIB Page Reference: 268 Topic: Q7 Skill: RECALL 104) Regression analysis measures the impact of a set of variables on another variable. Diff: 2 Type: FIB Page Reference: 268 Topic: Q7 Skill: RECALL 105) With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. Diff: 2 Type: FIB Page Reference: 268 Topic: Q7 Skill: RECALL 106) Many organizations create a special facility called a(n) data warehouse by extracting operational data and cleaning it up for more sophisticated data analysis. Diff: M Type: FIB Page Reference: 265 Topic: Q5 Skill: RECALL 107) market basket is a data-mining system which computes correlations of items on past orders to determine items that are frequently purchased together. Diff: 2 Type: FIB Page Reference: 269 Topic: Q7 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

390


Chapter 8: Decision Making and Business Intelligence

108) When creating a data warehouse that will be used for BI, programs first must extract, clean and prepare the operational data. Diff: 2 Type: FIB Page Reference: 265 Topic: Q5 Skill: RECALL 109) When data sets have missing values or invalid entries it is called dirty data. Diff: 2 Type: FIB Page Reference: 256 Topic: Q1 Skill: RECALL 110) If a part number is changed, but the data in the data warehouse does not reflect this change the data is said to be inconsistent. Diff: 2 Type: FIB Page Reference: 256 Topic: Q1 Skill: RECALL 111) Granularity refers to the relative level of detail that data represents. Diff: 2 Type: FIB Page Reference: 257 Topic: Q1 Skill: RECALL 112) If the granularity of the data is too fine, it is easy to make it coarser by summing and combining. Diff: 2 Type: FIB Page Reference: 257 Topic: Q1 Skill: RECALL 113) With unsupervised data mining, data miners do not create a model or hypothesis before running the analysis. Diff: 2 Type: FIB Page Reference: 268 Topic: Q7 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

391


Chapter 8: Decision Making and Business Intelligence

114) Overfitting is the problem of having many data points and generating the same number of equations to predict those points. Diff: 3 Type: FIB Page Reference: 276 Topic: Q7 Skill: RECALL 115) For developing BI applications, it is generally better to have too fine a granularity rather than too coarse. Diff: 3 Type: FIB Page Reference: 257 Topic: Q1 Skill: RECALL 116) A data mart is a subset of a data warehouse that addresses a particular component or functional area of the business. Diff: 2 Type: FIB Page Reference: 266 Topic: Q6 Skill: RECALL 118) There are two general categories of data-mining techniques; supervised and unsupervised. Diff: 2 Type: FIB Page Reference: 268 Topic: Q7 Skill: RECALL 119) Data-mining can be described as "knowledge discovery in databases". Diff: 3 Type: FIB Page Reference: 268 Topic: Q7 Skill: APPLIED 120) Supervised data mining happens when analysts create a data model or hypothesis before running the analysis. Diff: 2 Type: FIB Page Reference: 268 Topic: Q7 Copyright © 2014 Pearson Canada Inc.

392


Chapter 8: Decision Making and Business Intelligence

Skill: RECALL 121) Cluster analysis that identifies groups of entities with similar characteristics is a common unsupervised data-mining technique. Diff: 3 Type: FIB Page Reference: 268 Topic: Q7 Skill: RECALL 122) Regression analysis is the most common kind of supervised data-mining technique. Diff: 3 Type: FIB Page Reference: 268 Topic: Q7 Skill: APPLIED 123) Neural networks are another popular data-mining technique, which were originally based on the physiological analogy of how the neurons in the brain process huge amounts of data. Diff: 3 Type: FIB Page Reference: 269 Topic: Q7 Skill: RECALL 124) Data mining projects are risky because you never know how they will turn out. Even with a good model, bad luck may prevail. Diff: 3 Type: FIB Page Reference: 276 Topic: Q7 Skill: APPLIED 125) What is unsupervised data mining? Answer: In unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Instead, they apply the data mining technique to the data and observe the results. With this method, analysts create hypotheses after the analysis to explain the patterns found. Diff: 2 Type: ES Page Reference: 268 Copyright © 2014 Pearson Canada Inc.

393


Chapter 8: Decision Making and Business Intelligence

Topic: Q7 Skill: RECALL 126) What is supervised data mining? Answer: In supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate the parameters of the model. For example, suppose marketing experts in a communications company believe cell phone usage on weekends is determined by the age of the customer and the number of months the customer has had the cell phone account. A data-mining analyst could then do an analysis that estimates the impact of customer and account age. Diff: 2 Type: ES Page Reference: 268 Topic: Q7 Skill: RECALL 127) What is online transaction processing? Answer: If you are collecting data electronically and processing the transactions online, then you are using an online transaction processing (OLTP) system. Diff: 2 Type: ES Page Reference: 257 Topic: Q2 Skill: RECALL 128) What is online analytic processing? Answer: OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. The remarkable characteristic of OLAP reports is that their format is dynamic. The viewer of the report can change the report's structure—hence the term online. Diff: 2 Copyright © 2014 Pearson Canada Inc.

394


Chapter 8: Decision Making and Business Intelligence

Type: ES Page Reference: 258 Topic: Q3 Skill: RECALL 129) What is clickstream data? Answer: It is possible to capture the customers' clicking behaviour on the Internet. This is clickstream data. Diff: 2 Type: ES Page Reference: 257 Topic: Q1 Skill: RECALL 130) Using specific examples, describe data granularity. Answer: Data granularity refers to the degree of detail in the data. Coarse data are highly summarized; fine data express precise details. Diff: 3 Type: ES Page Reference: 257 Topic: Q1 Skill: APPLIED 131) What are the three assumptions that Ackoff disagreed with? Answer: One of the erroneous assumptions was that managers have no problem making decisions if they get the data they need. Another of the erroneous assumptions was that decisions are poor because managers lack relevant information. Another erroneous assumption Ackoff suggested was that managers are aware of the data they need. Diff: 2 Type: ES Page Reference: 255 Copyright © 2014 Pearson Canada Inc.

395


Chapter 8: Decision Making and Business Intelligence

Topic: Q1 Skill: RECALL 132) What is a data mart? Answer: A data mart is a data collection that is created to address the needs of a particular business function, problem, or opportunity. Diff: M RECALL Type: ES Page Reference: 266 Topic: Q6 133) Describe the data resource challenge. Answer: While data may be collected in OLTP, the data may not be used to improve decision making. We refer to this as the data resource challenge. Diff: 3 Type: ES Page Reference: 258 Topic: Q3 Skill: RECALL 134) Is it better to have data that is too fine or too coarse? Explain. Answer: Generally, it is better to have too fine a granularity than too coarse. If the granularity is too fine, the data can be made coarser by summing and combining. Only analysts' labour and computer processing are required. If the granularity is too coarse, however, there is no way to separate the data into constituent parts. Diff: 2 Type: ES Page Reference: 257 Topic: Q1 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

396


Chapter 8: Decision Making and Business Intelligence

135) What is the purpose of business intelligence? What kind of BI tools are there? Answer: Business intelligence (BI) is a category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions. BI tools include reporting and data mining. Reporting tools are programs that read data from a variety of sources, process that data, produce reports, and deliver those reports to the users who need them. Data-mining tools use statistical techniques to process data in order to find hidden patterns and relationships. Diff: 3 Type: ES Page Reference: 262 Topic: Q4 Skill: APPLIED 136) Operational data may not be suitable for more sophisticated analyses. What are the problems with operational data? What is a data warehouse and how is it designed to go beyond these issues? Answer: Basic reports and simple OLAP analyses can be made directly from operational data. However, operational data may be unsuited for more sophisticated analyses, particularly data mining because there are missing values or inconsistencies with the data. This is why most large companies extract and clean the data and put it into a separate data warehouse. Some dirty data may have illogical entries for gender, phone number, age, etc. Purchased data often have missing values or values that are out of an allowed range. More difficult, to correct is data thta has become inconsistent over time, because it does not reflect changes in the real world, such as new postal codes, area codes, addresses, income levels, etc. For a data-mining application, a few erroneous data points are worse than no data at all, because errors will introduce bias into the analysis. The level of granularity can also be an issue. The analysis can only go to the level of detail at which the data was originally collected. If a company wants to track sales of candy, they must decide what the granularity of the data will be for each item; i.e. will it be by the case, the box, or the individual candy bar. A data warehouse is a separate facility where the data is extracted, cleaned, and integrated into a single format so that it can support these more complex data-mining applications. Diff: 3 Type: ES Page Reference: 265 Topic: Q5 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

397


Chapter 8: Decision Making and Business Intelligence

137) What is meant by supervised and unsupervised data mining? Describe one example of each technique. Answer: Data mining is the application of statistical techniques to find patterns and relationships among data and to classify and predict. It represents a convergence of research in fields such as computer science, statistics, and database design. With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. The data-mining techniques are simply run on the data and the results observed. Cluster analysis is the most common unsupervised technique, since it statistically organizes the data in clusters or groups that share similar characteristics. These may or may not be obvious to the users. Pharmaceutical companies will do this to examine which type of physicians have different prescribing patterns to help them market better to the different groups. With supervised data mining, a model of what factors the users want to test for is developed prior to the analysis. Regression analysis is the most common example of this. It tests a chosen set of variables to see how well they can act as predictors of future behaviour. Diff: 3 Type: ES Page Reference: 268 Topic: Q7 Skill: APPLIED 138) What are some of the obstacles to developing data-mining applications in the real world? Does this mean that data-mining projects should be avoided? Answer: In the real world there are many obstacles to doing a successful data-mining project that one might not expect. In the first place, it must be expected that all data sets will have dirty data in them. A lot of time will have to be spent just cleaning up data sets with missing values, values that are impossible or just unusable data. Data will also have to be integrated from multiple sources and this will take a substantial amount of time. A more severe problem is that the variables considered important at the beginning of the project may not be the ones that are considered crucial at the end of the project. At that point it may be too late to change variables and collect the data to test them. In the same vein, models can be created to fit any data set. This is called overfitting, and while accurate, these models will not be of much use in predicting new cases that come up. Then there is the problem with deploying the resulting analysis. Managers may have too high expectations about the results and if the model has a few bad results in a row purely due to random luck, the users may lose faith in it and abandon it too soon. All this just means that appropriate caution should be taken when developing and implementing them. Diff: 3 Copyright © 2014 Pearson Canada Inc.

398


Chapter 8: Decision Making and Business Intelligence

Type: ES Page Reference: 276 Topic: Q7 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

399


Chapter 9: E-Commerce, Social Networking and Web 2.0

1) E-commerce is the buying and selling of goods and services over public and private computer networks. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 278 Topic: Q1 Skill: RECALL 2) Checking the weather on theweathernetwork.com or yahoo.ca is an example of ecommerce. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 278 Topic: Q1 Skill: RECALL 3) Modern consumers often know more about a product or service than does the person facilitating the sale. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 278 Topic: Q1 Skill: RECALL 4) E-commerce may require interconnectedness of the entire ERP process. a. True b. False Copyright © 2014 Pearson Canada Inc.

400


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer: a Diff: 2 Type: TF Page Reference: 278 Topic: Q1 Skill: RECALL 5) When embarking on e-commerce, companies need not worry about customer security and privacy. a. True b. False Answer: b Type: TF Page Reference: 279 Topic: Q1 6) Merchant companies take title to the goods they sell. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 279 Topic: Q1 Skill: RECALL 7) Nonmerchant companies take title to the goods they sell. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 279 Topic: Q1 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

401


Chapter 9: E-Commerce, Social Networking and Web 2.0

8) Generally speaking, merchant companies include B2C, B2B and B2G enterprises. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 279 Topic: Q1 Skill: RECALL 9) B2C, or business-to-consumer engages in sales between a supplier and a retail customer. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 279 Topic: Q1 Skill: RECALL 10) A manufacturer that sells office goods hardware to city hall over the internet is engaging in B2G commerce. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 279 Topic: Q1 Skill: APPLIED 11) Dell Computer engages in B2B, B2C and B2G online commerce. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

402


Chapter 9: E-Commerce, Social Networking and Web 2.0

Diff: 2 Type: TF Page Reference: 279 Topic: Q1 Skill: APPLIED 12) Online auctions such as e-Bay are the most common form of nonmerchant ecommerce. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 280 Topic: Q1 Skill: RECALL 13) Priceline.com is an example of an electronic exchange used by consumers. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 280 Topic: Q1 Skill: RECALL 14) Disintermediation is the elimination of sales taxes when selling on line. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 280 Topic: Q1 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

403


Chapter 9: E-Commerce, Social Networking and Web 2.0

15) Disintermediation can have the overall effect of increasing margins for manufacturers and lowering consumer prices. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 281 Topic: Q2 Skill: RECALL 16) E-commerce can be used to determine price elasticity. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 281 Topic: Q1 Skill: RECALL 17) Social Capital adds value in four ways: Information, Influence, Employment, Personal reinforcement. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 284 Topic: Q2 Skill: RECALL 18) You gain social capital by adding more friends to your network and strengthening relationships. a. True b. False Copyright © 2014 Pearson Canada Inc.

404


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer: a Diff: 2 Type: TF Page Reference: 285 Topic: Q2 Skill: RECALL 19) The people you know least can contribute the most to your network. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 286 Topic: Q2 Skill: RECALL 20) One advantage of IT is the ability to keep track of many more people and enhance personalization. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 288 Topic: Q2 Skill: RECALL 21) The Web 2.0 business model relies on software licensing to provide software as a service. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 289 Copyright © 2014 Pearson Canada Inc.

405


Chapter 9: E-Commerce, Social Networking and Web 2.0

Topic: Q3 Skill: RECALL 22) Web 2.0 applications need to be installed on the user’s computer before the application can be used. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 289 Topic: Q3 Skill: RECALL 23) Advertising rates can be changed automatically hour by hour under Web 2.0 by using Google’s AdWords. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 291 Topic: Q3 Skill: RECALL 24) When a user modifies Google’s My Maps, this is a Web 2.0 feature called mashups. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 291 Topic: Q3 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

406


Chapter 9: E-Commerce, Social Networking and Web 2.0

25) It could be said that traditional web sites are about participation and Web 2.0 is about publishing. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 291 Topic: Q3 Skill: APPLIED 26) E-commerce can be defined as a. using google to find clothing. b. sending text advertising. c. a store that has a website. d. buying and selling over computer networks. e. online dating. Answer: d Diff: 1 Type: MC Page Reference: 278 Topic: Q1 Skill: RECALL 27) When making a purchase, modern consumers are more likely to a. shop at a physical store. b. use a single information channel. c. know little about the product or service. d. know just as much about the product or service as the sales staff. e. require more help making a purchase decision. Answer: d Diff: 2 Type: MC Page Reference: 278 Copyright © 2014 Pearson Canada Inc.

407


Chapter 9: E-Commerce, Social Networking and Web 2.0

Topic: Q1 Skill: RECALL 28) E-commerce is considered a(n) _____________ of electronic business. a. necessity b. sub-set c. precursor d. cause e. irrelevant factor Answer: b Diff: 1 Type: MC Page Reference: 278 Topic: Q1 Skill: RECALL 29) To be successful, e-commerce will likely require _________________ of the entire enterprise resource planning process. a. showrooming b. interconnectedness c. dismantling d. conversion to SQL e. management understanding Answer: b Diff: 2 Type: MC Page Reference: 278 Topic: Q1 Skill: RECALL 30) Organizations need to ensure that all aspects of the business operate smoothly before a. using an ERP application. b. hiring IT people. c. the enterprise management systems are securely connected to the internet. Copyright © 2014 Pearson Canada Inc.

408


Chapter 9: E-Commerce, Social Networking and Web 2.0

d. selling goods on line. e. the business opens. Answer: c Diff: 2 Type: MC Page Reference: 278 Topic: Q1 Skill: RECALL 31) Merchant companies a. sell goods and services on consignment. b. act as clearing houses or exchanges. c. are a throwback to the 1800’s. d. own the goods they sell. e. sell goods only to government. Answer: d Diff: 2 Type: MC Page Reference: 279 Topic: Q1 Skill: RECALL 32) Nonmerchant companies a. usually don’t need ERP applications. b. engage in disintermediation. c. arrange the sale of goods without actually owning the goods. d. sell services they own. e. do not deal with the public. Answer: c Diff: 2 Type: MC Page Reference: 279 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

409


Chapter 9: E-Commerce, Social Networking and Web 2.0

Skill: RECALL 33) Merchant companies usually consist of a. B2B, B2G, and C2C types of e-commerce. b. B2B, B2G and B2C types of e-commerce c. B2B, B2C and C2C types of e-commerce d. B2C and C2C types of e-commerce e. C2C and B2B types of e-commerce. Answer: b Diff: 2 Type: MC Page Reference: 279 Topic: Q1 Skill: APPLIED 34) In the e-commerce realm, business to consumer applications first captured the attention of a. Revenue Canada b. Dell Computer c. mail-order businesses. d. auction houses e. the auto industry Answer: c Diff: 2 Type: MC Page Reference: 279 Topic: Q1 Skill: RECALL 35) eBay.ca would be an example of a. B2C nonmerchant e-commerce b. B2G merchant e-commerce Copyright © 2014 Pearson Canada Inc.

410


Chapter 9: E-Commerce, Social Networking and Web 2.0

c. B2B merchant e-commerce d. B2G merchant e-commerce e. B2G and B2B nonmerchant e-commerce Answer: a Diff: 3 Type: MC Page Reference: 280 Topic: Q1 Skill: APPLIED 36) An e-commerce nonmerchant that provides goods and services at a stated price and arranges for delivery is known as a. data warehouse b. clearinghouse. c. agent d. B2B mediator e. reseller Answer: b Diff: 3 Type: MC Page Reference: 280 Topic: Q1 Skill: RECALL 37) Electronic exchanges are web sites that a. sell goods and services at a large discount. b. match buyers and sellers. c. allow consumers to bid against one another online. d. provide information for a fee. e. store data from any person or business.

Copyright © 2014 Pearson Canada Inc.

411


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer: b Diff: 2 Type: MC Page Reference: 280 Topic: Q1 Skill: RECALL 38) Priceline.com is an example of a(n) a. cloud based storage service. b. ERP. c. electronic exchange. d. merchant company. e. price elasticity solution. Answer: c Diff: 2 Type: MC Page Reference: 280 Topic: Q1 Skill: RECALL 39) Disintermediation occurs when a. a merchant becomes a nonmerchant. b. governments stop buying services on line. c. electronic exchanges fail to make a match. d. IT systems fail. e. a manufacturer sells directly to the end user. Answer: e Diff: 2 Type: MC Page Reference: 280 Topic: Q1 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

412


Chapter 9: E-Commerce, Social Networking and Web 2.0

40) Surprisingly, disintermediation is giving way in some business models to reintermediation. An example of this is a. Dell.ca b. google.ca c. Expert Systems d. travelocity.ca e. rbauction.com Answer: d Diff: 2 Type: MC Page Reference: 281 Topic: Q1 Skill: RECALL 41) For the consumer, e-commerce improves the flow of a. price information b. database structures c. Business intelligence d. Social Capital e. Physical Capital Answer: a Diff: 1 Type: MC Page Reference: 281 Topic: Q1 Skill: RECALL 42) For the vendor e-commerce produces new information about a. manufacturer’s profits b. price elasticity c. disintermediation d. merchant companies e. nonmerchant companies Copyright © 2014 Pearson Canada Inc.

413


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer: b Diff: 1 Type: MC Page Reference: 281 Topic: Q1 Skill: RECALL 43) Economic factors to be considered by vendors who want to engage in e-commerce include: a. increases in customer service, logistics and manufacturing expenses b. showrooming, lower taxation and customer service expenses c. increased competition and fewer customers d. channel conflict and lower logistics expenses e. showrooming and higher customer service expenses Answer: e Diff: 1 Type: MC Page Reference: 282 Topic: Q1 Skill: RECALL 44) When Dell computers sells to a federal agency this is called a. C2C e-commerce b. B2G e-commerce c. C2G e-commerce d. B2B e-commerce e. Customer Relationship Management Answer: b Diff: 1 Type: MC Page Reference: 279 Topic: Q1 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

414


Chapter 9: E-Commerce, Social Networking and Web 2.0

45) When a cottage owner rents her cottage to another person using kijiji.ca this is an example of a. G2G e-commerce. b. B2B e-commerce. c. C2C e-commerce. d. B2C e-commerce. e. B2G e-commerce. Answer: c Diff: 1 Type: MC Page Reference: 279 Topic: Q1 Skill: RECALL 46) When a consumer looks at a product at a bricks and mortar store, then purchases the product on line this is called a. price conflict . b. online elasticity. c. merchant e-commerce. d. showrooming. e. channel conflict. Answer: d Diff: 1 Type: MC Page Reference: 282 Topic: Q1 Skill: RECALL 47) Future Shop mitigates showrooming by a. not having products in the store that can be purchased online at other stores. b. using high pressure sales tactics in the store. c. discouraging customers from taking pictures of goods. Copyright © 2014 Pearson Canada Inc.

415


Chapter 9: E-Commerce, Social Networking and Web 2.0

d. Online record processing. e. Encouraging customers to browse in person and buy online. Answer: e Diff: 2 Type: MC Page Reference: 283 Topic: Q1 Skill: RECALL 48) According to Nan Lin, social capital is created by a. investing in social relations with the expectations of returns in the marketplace. b. the opening up of a twitter account by a company. c. doing a speech for your department meeting. d. using email to contact your acquaintances. e. any online activity that involves networking. Answer: a Diff: 2 Type: MC Page Reference: 284 Topic: Q2 Skill: RECALL 49) According to Lin, social capital adds value in these ways: a. provides information, gives opportunity to influence, lends social credential, reinforces image. b. increased customer feedback, more effective CRM systems, lower customer acquisition costs. c. greater employee engagement, better long range planning. d. more opportunity to influence, more effective CRM, increased customer feedback in B2C situations. e. increased human capital, lower costs for physical capital, reduced supplier power. Answer: a Diff: 2

Copyright © 2014 Pearson Canada Inc.

416


Chapter 9: E-Commerce, Social Networking and Web 2.0

Type: MC Page Reference: 284 Topic: Q2 Skill: RECALL 50) More opportunities to influence and reinforced image and position are benefits to increase a. social capital. b. advertising. c. value chain management. d. data-mining. e. information flow Answer: a Diff: 2 Type: MC Page Reference: 284 Topic: Q2 Skill: RECALL 51) The value of a social capital varies depending on a network’s a. number of relationships, the strength of those relationships and the resources controlled. b. average age of the members, the interests of the network and the physical location of members. c. relationship strengths, the physical location of members, the age of the members. d. the resources controlled by the network, the age of members, and interests of members e. group analysis of members, strength of relationships, numbers of members. Answer: a Diff: 3 Type: MC Page Reference: 284 Topic: Q2 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

417


Chapter 9: E-Commerce, Social Networking and Web 2.0

52) Contrary to common thinking, network theory suggests that __________________ contributes the most to the growth of social networks. a. strong relationships b. better credentials c. “frenemies” d. weak relationships e. high school relationships Answer: d Diff: 2 Type: MC Page Reference: 285 Topic: Q2 Skill: APPLIED 53) When it comes to social networks, if a company hires sales people, has a strong customer support system, and engages in public relations, the company is building a. a strong brand. b. word of mouth. c. social capital. d. sales leads. e. customer loyalty. Answer: c Diff: 2 Type: MC Page Reference: 286 Topic: Q2 Skill: APPLIED 54) Information systems impact social networking by a. letting us see people with the same qualifications within a company. b. improving search capabilities and reducing the trade-off between richness and reach. c. allowing people to find class reunions, meetings, and jobs. d. being available 24 hours a day for important contacts. e. strengthening weak ties. Copyright © 2014 Pearson Canada Inc.

418


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer: b Diff: 3 Type: MC Page Reference: 288 Topic: Q2 Skill: RECALL 55) The term Web 2.0 was first popularized by a. Tim O’Reilly b. Bill Gates. c. Larry Ellison. d. Andrew Gemino. e. Warren Buffet. Answer: a Diff: 2 Type: MC Page Reference: 288 Topic: Q3 Skill: RECALL 56) Web 2.0 relies on _____________ to drive revenues a. video sales b. software licensing c. information storage d. advertising e. .mpg sales Answer: d Diff: 2 Type: MC Page Reference: 288 Topic: Q3 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

419


Chapter 9: E-Commerce, Social Networking and Web 2.0

57) __________________ are companies that exemplify Web 2.0. a. Google, Microsoft and Oracle b. Microsoft, Intuit, and Youtube c. Microsoft, Sage and Intel d. Sage, Oracle and Java e. Google, Amazon and eBay Answer: e Diff: 1 Type: MC Page Reference: 288 Topic: Q3 Skill: RECALL 58) Web 2.0 applications are a. installed on users’ computers. b. installed on users’ networks. c. installed on users’ computers and networks. d. thin clients. e. seldom updated. Answer: d Diff: 1 Type: MC Page Reference: 289 Topic: Q3 Skill: RECALL 59) On some websites, users can give each other customer support or even participate in the creation of solutions, designs and products. This phenomenon is called a. the web 2.0 solver effect. b. group processing. c. crowdsourcing. d. parallel processing. e. real-time marketing Copyright © 2014 Pearson Canada Inc.

420


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer: c Diff: 2 Type: MC Page Reference: 290 Topic: Q3 Skill: RECALL 60) Crowdsourcing combines ________________, viral marketing, and open-source design. a. thin clients b. social networking c. ERP d. mashups e. licensed software Answer: b Diff: 2 Type: MC Page Reference: 289 Topic: Q3 Skill: RECALL 61) The result of combining outputs from two or more websites is called a. crowdsourcing b. social networking c. B2C e-commerce d. data parsing e. a mashup Answer: e Diff: 2 Type: MC Page Reference: 290 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

421


Chapter 9: E-Commerce, Social Networking and Web 2.0

62) With Web 2.0 advertising rates can be changed a. hour by hour. b. weekly. c. monthly. d. every two months. e. when the contract is renewed. Answer: a Diff: 1 Type: MC Page Reference: 291 Topic: Q3 Skill: RECALL 63) With per click advertising the advertiser only has to pay the host site when a. the customer buys something. b. the customer lands on the host site page. c. the customer asks a question. d. the customer reads the advertisement. e. the customer clicks on the link. Answer: e Diff: 2 Type: MC Page Reference: 291 Topic: Q3 Skill: RECALL 64) AdSense and other similar services use the host organization’s _______________ to insert matching ads. a. postal code b. phone number c. name d. home city e. site content Copyright © 2014 Pearson Canada Inc.

422


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer: e Diff: 1 Type: MC Page Reference: 291 Topic: Q3 Skill: RECALL 65) Google’s My Maps is an example of a(n) a. pay per use application. b. mashup application. c. user downloaded database. d. social network e. weak relationship Answer: b Diff: 1 Type: MC Page Reference: 291 Topic: Q3 Skill: RECALL 66) What Web 3.0 will look like and do is pretty much a. unpredictable. b. a function of internet speed. c. going to rest with google. d. already done by Facebook. e. up to nonmerchant companies. Answer: a Diff: 2 Type: MC Page Reference: 291 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

423


Chapter 9: E-Commerce, Social Networking and Web 2.0

67) By using trackmypizza.com Domino’s has had a(n) _______ increase in online orders. a. 18% b. $2.00 c. 36% d. 100% e. 200% Answer: d Diff: 1 Type: MC Page Reference: 293 Topic: Q4 Skill: RECALL 68) Under Web 2.0 information systems that deal with _____________ still require some level of control. a. AdSense b. social networks c. pizza delivery d. financial or material assets e. placing data into a data warehouse Answer: d Diff: 2 Type: MC Page Reference: 292 Topic: Q3 Skill: RECALL 69) Advertisers can actually purchase search words from Google by using a. AdWords. b. SEO optimization. c. social networks. d. mashups. e. crowdsourcing. Copyright © 2014 Pearson Canada Inc.

424


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer: a Diff: 2 Type: MC Page Reference: 290 Topic: Q3 Skill: RECALL 70) Viral marketing is the term used when a. news is spread by repeated sending of a message from one person to others who repeat the cycle. b. users get tired of the message. c. an ad campaign increases sales less than 2%. d. an ad pops up when the user goes to a new web page. e. drug companies advertise cold medicine. Answer: a Diff: 2 Type: MC Page Reference: 289 Topic: Q3 Skill: RECALL 71) Channel conflict, increased logistics expense, and showrooming are all possible drawbacks of a. e-commerce. b. social networking. c. licensed software. d. having a big store. e. price elasticity. Answer: a Diff: 2 Type: MC Page Reference: 280 Topic: Q1

Copyright © 2014 Pearson Canada Inc.

425


Chapter 9: E-Commerce, Social Networking and Web 2.0

Skill: RECALL 72) Business literature defines ________ types of capital. a. 2 b. 3 c. 4 d. 5 e. 6 Answer: b Diff: 1 Type: MC Page Reference: 284 Topic: Q2 Skill: RECALL 73) Compared to traditional processing, Web 2.0 processing is characterized by a. software as a product, extensive advertising and publishing. b. controlled, fixed interface, viral marketing and software as a free service. c. viral marketing, software as a free service, mashups encouraged. d. product value fixed, user participation, software as a product. e. publishing, organic interfaces, value increases with more users. Answer: c Diff: 3 Type: MC Page Reference: 287 Topic: Q3 Skill: RECALL 74) Compared to Web 2.0 processing, traditional processing is characterized by a. software as a product, extensive advertising and user participation. b. controlled, fixed interface, product value fixed, software as a product. c. viral marketing, software as a free service, mashups encouraged. d. product value fixed, user participation, software as a product. Copyright © 2014 Pearson Canada Inc.

426


Chapter 9: E-Commerce, Social Networking and Web 2.0

e. publishing, organic interfaces, value increases with more users. Answer: b Diff: 3 Type: MC Page Reference: 288 Topic: Q3 Skill: RECALL 75) If a web sites value increases with the number of users and the amount of use, this is a Web 2.0 characteristic called a. the bigger is better effect. b. the mirage effect. c. the network effect. d. the Amazon effect. e. the Google effect. Answer: c Diff: 3 Type: MC Page Reference: 289 Topic: Q3 Skill: RECALL 76) E-commerce is the buying and selling of goods and services over public and private computer networks. Diff: 2 Type: FIB Page Reference: 278 Topic: Q1 Skill: RECALL 77) Merchant companies take title to the goods they sell. Diff: 2 Type: FIB Page Reference: 279 Topic: Q1 Skill: RECALL 78) Nonmerchant companies do not take title to the goods they sell. Copyright © 2014 Pearson Canada Inc.

427


Chapter 9: E-Commerce, Social Networking and Web 2.0

Diff: 2 Type: FIB Page Reference: 279 Topic: Q1 Skill: RECALL 79) Online auctions such as eBay are the most common form of nonmerchant commerce. Diff: 2 Type: FIB Page Reference: 280 Topic: Q1 Skill: RECALL 80) Disintermediation is the elimination intermediaries between vendors and buyers. Diff: Type: FIB Page Reference: 280 Topic: Q1 Skill: RECALL 81) When a user modifies Google’s My Maps, this is a Web 2.0 feature called Mashups. Diff: 2 Type: FIB Page Reference: 291 Topic: Q3 Skill: RECALL 82) E-commerce can be used to determine price elasticity. Diff: 1 Type: FIB Page Reference: 281 Topic: Q1 Skill: RECALL 83) B2C e-commerce concerns sales between a supplier and a retail customer or consumer. Diff: 2 Type: FIB Page Reference: 279 Topic: Q1 Skill: RECALL 84) An e-commerce nonmerchant that provides goods and services at a stated price and arranges for delivery is known as a clearinghouse. Diff: 2 Type: FIB Copyright © 2014 Pearson Canada Inc.

428


Chapter 9: E-Commerce, Social Networking and Web 2.0

Page Reference: 280 Topic: Q1 Skill: RECALL 85) Showrooming occurs when a customer explores a product in a physical store then purchases the product on the internet. Diff: 2 Type: FIB Page Reference: 283 Topic: Q1 Skill: RECALL 86) If a manufacturer decides to sell online and the retailer loses business as a result, this is called channel conflict. Diff: 1 Type: FIB Page Reference: 282 Topic: Q1 Skill: RECALL 87) Electronic exchanges make money by connecting buyers and sellers over the internet and taking a commission from the seller. Diff: 3 Type: FIB Page Reference: 280 Topic: Q1 Skill: RECALL 88) B2B e-commerce refers to sales between companies. Diff: 2 Type: FIB Page Reference: 279 Topic: Q1 Skill: RECALL 89) There are three main types of merchant companies: 1) those that sell directly to consumers; 2) those that sell to companies and: 3) those that sell to government. Diff: 2 Type: FIB Page Reference: 279 Topic: Q1 Skill: RECALL 90) The number of companies engaged in B2B and B2G commerce far exceeds those engaging in B2C commerce. Diff: 3 Copyright © 2014 Pearson Canada Inc.

429


Chapter 9: E-Commerce, Social Networking and Web 2.0

Type: FIB Page Reference: 279 Topic: Q1 Skill: RECALL 91) Online auctions are considered to be nonmerchant e-commerce companies. Diff: 2 Type: FIB Page Reference: 280 Topic: Q1 Skill: APPLIED 92) When a manufacturer decides to sell goods directly online, and “cuts out the middleman”, the manufacturer will likely see an increase in logistics and customer service costs. Diff: 2 Type: FIB Page Reference: 282 Topic: Q1 Skill: APPLIED 93) Social capital is the investment in social relations with the expectation of returns in the marketplace. Diff: 2 Type: FIB Page Reference: 10 Topic: Q3 Skill: RECALL 94) human capital is the investment in human knowledge and skills for future profit. Diff: 2 Type: FIB Page Reference: 284 Topic: Q2 Skill: RECALL 95) Social capital l adds value by providing information, increasing opportunity to influence, increasing social credentials, and reinforcing professional image. Diff: 2 Type: FIB Page Reference: 284 Topic: Q2 Skill: RECALL 96) weak relationships contribute most to the growth of social networks. Diff: 2 Copyright © 2014 Pearson Canada Inc.

430


Chapter 9: E-Commerce, Social Networking and Web 2.0

Type: FIB Page Reference: 285 Topic: Q2 Skill: RECALL 97) Web 2.0 applications do not require an installation on the users’ computers. This type of program is called a thin client. Diff: 2 Type: FIB Page Reference: 289 Topic: Q3 Skill: RECALL 98) More opportunities to influence and reinforced image and position are benefits of increased social capital. Diff: 3 Type: FIB Page Reference: 384 Topic: Q2 Skill: APPLIED 99) Software as a free service is a characteristic of Web 2.0. Diff: 2 Type: FIB Page Reference: 288 Topic: Q3 Skill: RECALL 100) One friend sending a message to many friends who in turn send that message to more friends is a phenomenon known as viral marketing. Diff: 2 Type: FIB Page Reference: 289 Topic: Q3 Skill: RECALL 101) Explain the difference between merchant and nonmerchant companies and give an example of each. Answer:

Diff: 3 Type: ES Page Reference: 279 Copyright © 2014 Pearson Canada Inc.

431


Chapter 9: E-Commerce, Social Networking and Web 2.0

Topic: Q1 Skill: APPLIED 102) List 5 issues facing manufacturers who wish to start selling directly to consumers via e-commerce. Answer:

Diff: 3 Type: ES Page Reference: 282 Topic: Q1, Q2 Skill: RECALL 103) What is showrooming and what is the danger of showrooming to retailers? Answer:

Diff: 2 Type: ES Page Reference: 283 Topic: Q1 Skill: RECALL 104) What is social capital and how does it add value for the individual? Answer:

Diff: 3 Type: ES Page Reference: 284 Topic: Q2 Skill: RECALL 105) Using specific examples, describe how social networks add value to business. Copyright © 2014 Pearson Canada Inc.

432


Chapter 9: E-Commerce, Social Networking and Web 2.0

Answer:

Diff: 3 Type: ES Page Reference: 286 Topic: Q2 Skill: APPLIED 106) What specific benefits does IS and IT bring to social networking. Answer:

Diff: 2 Type: ES Page Reference: 287 Topic: Q2 Skill: APPLIED 107) List 5 characteristics that differ between Web 2.0 to the “traditional” internet. Give your own definition of Web 2.0. Answer:

Diff: 3 Type: ES Page Reference: 288 Topic: Q3 Skill: APPLIED 108) What is a mashup? Give an example of a mashup. Answer:

Copyright © 2014 Pearson Canada Inc.

433


Chapter 9: E-Commerce, Social Networking and Web 2.0

Diff: 2 Type: ES Page Reference: 291 Topic: Q3 Skill: RECALL 109) Describe the term “network effects” and give two instances where network effects are important to business. Answer:

Diff: 3 Type: ES Page Reference: 289 Topic: Q3 Skill: APPLIED 110) Give three examples of how Web 2.0 advertising is more beneficial to companies advertising on the internet compared to traditional internet advertising techniques. Answer:

Diff: 3 Type: ES Page Reference: 291 Topic: Q3 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

434


Chapter 10: Acquiring Information Systems Through Projects

1) Information technology project management (ITPM) is the collection of techniques and methods that project managers use to plan, coordinate, and complete IT projects. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 308 Topic: Q2 Skill: RECALL 2) Business managers are most involved in SDLC during Phase 1 and Phase 2. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 313 Topic: Q5 Skill: APPLIED 3) Systems development is primarily a technical task for programmers and hardware designers. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 313 Topic: Q5 Skill: RECALL 4) In most cases, companies will purchase and customize off-the-shelf information systems. a. True b. False Copyright © 2014 Pearson Canada Inc.

435


Chapter 10: Acquiring Information Systems Through Projects

Answer: a Diff: 2 Type: TF Page Reference: 306 Topic: Q1 Skill: RECALL 5) Studies indicate that information systems projects are often delivered late, over budget and do not fulfill all requirements. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 311 Topic: Q4 Skill: RECALL 6) SDLC is described as a waterfall method, which makes the whole process relatively easy to go back and change a phase once you have begun the next phase. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 320 Topic: Q6 Skill: RECALL 7) Software developers are usually good at planning for vacations, sick days, and other things needed for the project besides writing software. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 328 Copyright © 2014 Pearson Canada Inc.

436


Chapter 10: Acquiring Information Systems Through Projects

Topic: Q7 Skill: RECALL 8) Some systems are so tightly integrated that they cannot be installed in phases. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 318 Topic: Q6 Skill: RECALL 9) Systems development is exclusively a technical task undertaken by programmers. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 314 Topic: Q5 Skill: RECALL 10) The IT industry has over 50 years of experience acquiring and developing information systems, and over those years, methodologies have emerged that successfully deal with systems development. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 313 Topic: Q5 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

437


Chapter 10: Acquiring Information Systems Through Projects

11) Many development methods exist, including rapid application development (RAD), object-oriented systems development (OOD), and extreme programming (XP). a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 313 Topic: Q5 Skill: RECALL 12) The IT industry developed the SDLC in the school of hard knocks. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 310 Topic: Q5 Skill: RECALL 13) Feasibility has four dimensions: cost, schedule, technical, and organizational. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 314 Topic: Q5 Skill: RECALL 14) Commercial-off-the-shelf (COTS) software will never fit organizational requirements exactly. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

438


Chapter 10: Acquiring Information Systems Through Projects

Diff: 2 Type: TF Page Reference: 314 Topic: Q6 Skill: RECALL 15) A test plan consists of sequences of actions that users will take when using the new system. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 318 Topic: Q6 Skill: RECALL 16) “Buy it and customize it” is the most common method for acquiring software applications. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 304 Topic: Q1 Skill: RECALL 17) Acquiring software is the same as acquiring information systems. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 307 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

439


Chapter 10: Acquiring Information Systems Through Projects

Skill: RECALL 18) A project is a temporary endeavour undertaken to create a unique product, service, or result. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 307 Topic: Q2 Skill: RECALL 19) Organizations are looking for business professionals who have knowledge, skills, and personal qualities that will allow them to lead and support the effective and competitive use of information systems. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 308 Topic: Q2 Skill: RECALL 20) Most findings state that the success rate of IT projects is 80%. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 309 Topic: Q4 Skill: RECALL 21) PMBOK was developed by the Project Management Institute. Copyright © 2014 Pearson Canada Inc.

440


Chapter 10: Acquiring Information Systems Through Projects

a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 307 Topic: Q2 Skill: RECALL 22) The SDLC can be described as a 5-phase process. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 312 Topic: Q5 Skill: RECALL 23) Waterfall methods involve a sequence of non-repetitive tasks. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 320 Topic: Q6 Skill: RECALL 24) In an ASP agreement, an organization contracts a vendor to rent applications on a fee for service basis. a. True b. False Answer: a Diff: 2 Type: TF Copyright © 2014 Pearson Canada Inc.

441


Chapter 10: Acquiring Information Systems Through Projects

Page Reference: 321 Topic: Q7 Skill: RECALL 25) The ________ approach is the classic process used to develop information systems. a. extreme programming (XP) b. object-oriented systems development (OOD) c. rapid application development (RAD) d. systems development life cycle (SDLC) e. agile programming (AP) Answer: d Diff: 1 Type: MC Page Reference: 312 Topic: Q4 Skill: RECALL 26) The five phases of the SDLC approach after the initial system definition phase are a. requirements analysis, system definition, component design, implementation, and conversion. b. requirements analysis, implementation, design, and system upgrade. c. requirements analysis, system definition, component design, implementation, and system maintenance. d. requirements analysis, system definition, implementation, design and training. e. requirements analysis, system definition, implementation, component design, and training. Answer: c Diff: 2 Type: MC Page Reference: 312 Topic: Q5 Skill: RECALL 27) The first step of the system definition stage of the SDLC is to Copyright © 2014 Pearson Canada Inc.

442


Chapter 10: Acquiring Information Systems Through Projects

a. talk to users about requirements. b. assess feasibility. c. identify team members. d. determine the schedule and budget for the project. e. define the goals and scope of the new system. Answer: e Diff: 2 Type: MC Page Reference: 313 Topic: Q5 Skill: RECALL 28) ________ refers to whether existing information technology is likely to be able to meet the needs of the new system. a. Cost feasibility b. Technical feasibility c. People feasibility d. Organizational feasibility e. Schedule feasibility Answer: b Diff: 1 Type: MC Page Reference: 312 Topic: Q5 Skill: RECALL 29) To determine if the proposed information system is justified economically, organizations must assess the a. technical feasibility. b. acceptance feasibility. c. schedule feasibility. d. cost feasibility. e. organizational feasibility.

Copyright © 2014 Pearson Canada Inc.

443


Chapter 10: Acquiring Information Systems Through Projects

Answer: d Diff: 2 Type: MC Page Reference: 314 Topic: Q5 Skill: RECALL 30) ________ concerns whether the new information system will fit with the organization's culture, charter, or legal requirements. a. Technical feasibility b. Schedule feasibility c. Organizational feasibility d. People feasibility e. Cost feasibility Answer: c Diff: 1 Type: MC Page Reference: 314 Topic: Q5 Skill: RECALL 31) If the proposed information system violated antitrust laws, this should be discovered in the ________ study of the system definition phase. a. technical feasibility b. regulatory feasibility c. schedule feasibility d. organizational feasibility e. cost feasibility Answer: d Diff: 2 Type: MC Page Reference: 314 Topic: Q5 Skill: APPLIED Copyright © 2014 Pearson Canada Inc.

444


Chapter 10: Acquiring Information Systems Through Projects

32) The primary purpose of the ________ phase of the SDLC approach is to manage the scope of the IT project. a. system definition b. component design c. implementation d. system maintenance e. requirements analysis Answer: e Diff: 2 Type: MC Page Reference: 314 Topic: Q5 Skill: RECALL 33) Alternative system designs are evaluated against the system requirements in the ________ phase of the SDLC approach. a. requirements analysis b. system maintenance c. component design d. implementation e. system definition Answer: c Diff: 2 Type: MC Page Reference: 314 Topic: Q6 Skill: RECALL 34) The initial system definition phase is followed by the ________ phase of the SDLC approach. a. implementation b. component design c. system definition Copyright © 2014 Pearson Canada Inc.

445


Chapter 10: Acquiring Information Systems Through Projects

d. requirements analysis e. system maintenance Answer: d Diff: 2 Type: MC Page Reference: 312 Topic: Q5 Skill: RECALL 35) The set of approved user requirements is the main input into the ________ phase of the SDLC approach. a. component design b. system definition c. requirements analysis d. implementation e. system maintenance Answer: a Diff: 2 Type: MC Page Reference: 312 Topic: Q5 Skill: RECALL 36) Teams of systems analysts and users determine the job descriptions and functions of people who will use the new system in the ________ phase of the SDLC. a. component design b. system definition c. requirements analysis d. implementation e. system maintenance Answer: a Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

446


Chapter 10: Acquiring Information Systems Through Projects

Page Reference: 317 Topic: Q6 Skill: RECALL 37) In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. a. phased b. pilot c. plunge d. big-bang e. parallel Answer: e Diff: 2 Type: MC Page Reference: 318 Topic: Q6 Skill: RECALL 38) A ________ installation is the riskiest because the old system is turned off and the new system is turned on. a. big-bang b. phased c. plunge d. pilot e. parallel Answer: c Diff: 2 Type: MC Page Reference: 319 Topic: Q6 Skill: RECALL 39) The last stage of testing is the ________ test, where future system users try out the new system. Copyright © 2014 Pearson Canada Inc.

447


Chapter 10: Acquiring Information Systems Through Projects

a. acceptance b. beta c. technical d. PQA e. gamma Answer: b Diff: 2 Type: MC Page Reference: 318 Topic: Q6 Skill: RECALL 40) If a company installs and tests only a portion of the new system, then repeatedly installs and tests portions of the new system until it is complete, this known as a ________ conversion. a. phased b. plunge c. parallel d. big-bang e. pilot Answer: a Diff: 2 Type: MC Page Reference: 318 Topic: Q6 Skill: RECALL 41) During the maintenance phase, IS personnel may create a. service packs, new releases and patches. b. plans for database design and related structures. c. component design outlines. d. ways to motivate employees. e. cost and schedule feasibility studies.

Copyright © 2014 Pearson Canada Inc.

448


Chapter 10: Acquiring Information Systems Through Projects

Answer: a Diff: 2 Type: MC Page Reference: 319 Topic: Q6 Skill: RECALL 42) The approach to system conversion whereby a new system that is to be used in more than one business is first implemented in a single unit so that it may be tested and debugged before implementing it in the other business units is called a. plunge. b. pilot. c. phased. d. parallel. e. big-bang. Answer: b Diff: 2 Type: MC Page Reference: 318 Topic: Q6 Skill: RECALL 43) Which of the following is the main activity of the maintenance phase of the SDLC? a. Programming interfaces b. Obtaining requirements c. Installing hardware d. Fixing problems or adapting to changes e. Training Answer: d Diff: 2 Type: MC Page Reference: 319 Topic: Q6 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

449


Chapter 10: Acquiring Information Systems Through Projects

44) Software vendors often bundle large bunches of fixes for low priority problems into groups called a. technical fixes. b. enterprise packs. c. patches. d. service patches. e. service packs. Answer: e Diff: 2 Type: MC Page Reference: 320 Topic: Q6 Skill: RECALL 45) Wallace and Keil identified _______ risks inherent in IT projects. a. 41 b. 52 c. 25 d. 5 e. 21 Answer: b Diff: 2 Type: MC Page Reference: 310 Topic: Q4 Skill: RECALL 46) The single most important criterion for information systems success is a. to ensure that the system definition phase is done correctly. b. to avoid waterfall situations. c. for users to take ownership of their systems. d. to make sure the system is feasible. e. identify the capabilities of the off-the-shelf- software. Copyright © 2014 Pearson Canada Inc.

450


Chapter 10: Acquiring Information Systems Through Projects

Answer: c Diff: 2 Type: MC Page Reference: 311 Topic: Q5 Skill: RECALL 47) The main problem of the SDLC approach to systems development is the ________ nature of the process. This refers to the fact that each phase is meant to be completed and not repeated as the project moves on to the next phase. a. drawn out b. complex c. continuous d. waterfall e. stop-and-start Answer: d Diff: 3 Type: MC Page Reference: 318 Topic: Q6 Skill: RECALL 48) If the requirements analysis process becomes very long and drawn-out that the requirements document is obsolete and too complex, this can lead to the problem of a. unclear specifications. b. analysis paralysis. c. poor documentation. d. schedule conflict. e. lost updates. Answer: b Diff: 2 Type: MC Page Reference: 318 Topic: Q6 Copyright © 2014 Pearson Canada Inc.

451


Chapter 10: Acquiring Information Systems Through Projects

Skill: RECALL 49) Precise estimate costs for IT projects are difficult to develop because a. rapid application development (RAD) changes part way through the project. b. management thinks it is a negotiation between the business and IT. c. programmers look to increase earnings during the process. d. technology is continually changing. e. agile programming is not a fully developed system. Answer: d Diff: 2 Type: MC Page Reference: 311 Topic: Q4 Skill: RECALL 50) System conversion methods include a. plunge, parallel, open, phased’ b. parallel, open, phased, pilot. c. Synchronized, plunge, pilot, parallel. d. open, synchronized, phased, pilot. e. parallel, pilot, plunge, phased. Answer: e Diff: 2 Type: MC Page Reference: 318 Topic: Q6 Skill: RECALL 51) Senior management often justifies reducing the time schedules for system projects by a. saying that they want to reduce the budget. b. saying that the tighter schedules make workers work more efficiently. c. saying that they want to look good to their bosses. d. saying that the workers lack proper motivation. Copyright © 2014 Pearson Canada Inc.

452


Chapter 10: Acquiring Information Systems Through Projects

e. saying that angry employees work better. Answer: b Diff: 3 Type: MC Page Reference: 326 Topic: Q7 Skill: RECALL 52) __________ and business analysts are active throughout the systems development process and play a key role in moving the project through the systems development process. a. Systems analysts b. Programmers c. Developers d. CIO e. Mangers Answer: a Diff: 2 Type: MC Page Reference: 312 Topic: Q5 Skill: RECALL 53) Application service providers are companies that a. perform hardware updates. b. do employee background checks. c. give legal advice. d. provide programmers for in-house development. e. rent software to organizations. Answer: e Diff: 2 Type: MC Page Reference: 321 Topic: Q7 Copyright © 2014 Pearson Canada Inc.

453


Chapter 10: Acquiring Information Systems Through Projects

Skill: RECALL 54) System development is a process for creating and ________ information systems. a. maintaining b. upgrading c. proposing d. programming e. brainstorming Answer: a Diff: 2 Type: MC Page Reference: 312 Topic: Q5 Skill: RECALL 55) The first risk associated with outsourcing IT projects is a. loss of control. b. increased quality. c. non-existent. d. increased costs. e. shorter delivery time. Answer: a Diff: 2 Type: MC Page Reference: 321 Topic: Q7 Skill: RECALL 56) Outsourcing IT services may lead to problems with a. vendor companies increasing prices and/or vendor mismanagement. b. determining a project budget. c. managing changes in technology. d. determining requirements. Copyright © 2014 Pearson Canada Inc.

454


Chapter 10: Acquiring Information Systems Through Projects

e. plunge installation. Answer: a Diff: 2 Type: MC Page Reference: 321 Topic: Q6 Skill: RECALL 57) Applicaton Service Providers ____________ software applications to other companies. a. rent b. outsource c. write outsource d. give e. award Answer: a Diff: 2 Type: MC Page Reference: 323 Topic: Q7 Skill: RECALL 58) Acquiring software is a. a highly involved process. b. the same as acquiring new information systems. c. not the same as acquiring new information systems. d. a difficult process. e. accomplished by the outsourcing group. Answer: c Diff: 3 Type: MC Page Reference: 307 Topic: Q1 Copyright © 2014 Pearson Canada Inc.

455


Chapter 10: Acquiring Information Systems Through Projects

Skill: RECALL 59) Projects often begin with a. resources. b. a schedule. c. a set of goals or objectives. d. a sponsor. e. a project manager. Answer: c Diff: 2 Type: MC Page Reference: 308 Topic: Q2 Skill: RECALL 60) Information technology project management is a a. certification process to create a unique product, service, or result. b. collection of techniques and methods to plan, coordinate, and complete IT projects. c. project management knowledge bank. d. series of rules that regulate IT projects. e. set of best practices from managing technology IT projects. Answer: b Diff: 2 Type: MC Page Reference: 306 Topic: Q2 Skill: RECALL 61) Information Technology Project Management skills are central to the skills needed by organizations to ________ (to) an increasingly complex business environment. a. keep up b. manage c. adapt d. remain competitive in Copyright © 2014 Pearson Canada Inc.

456


Chapter 10: Acquiring Information Systems Through Projects

e. forge ahead in Answer: c Diff: 3 Type: MC Page Reference: 309 Topic: Q2 Skill: RECALL 62) Organizations that understand the ________ before acquiring new applications are more likely to be successful in integrating software compared to organizations that think software equals systems. a. data b. risks c. costs d. business strategy e. threats Answer: c Diff: 2 Type: MC Page Reference: 305 Topic: Q1 Skill: RECALL 63) PMBOK first published in 1996 is now in its ________ edition. a. first b. second c. third d. fourth e. fifth Answer: d Diff: 1 Type: MC Page Reference: 305

Copyright © 2014 Pearson Canada Inc.

457


Chapter 10: Acquiring Information Systems Through Projects

Topic: Q2 Skill: RECALL 64) An example of an information technology project management (ITPM) tool is a. flow charts. b. testing charts. c. PERT charts. d. GIANT charts. e. CRM charts. Answer: c Type: MC Page Reference: 306 Topic: Q2 65) According to PMBOK there are ________ process groups in any project a. seven b. five c. four d. six e. eight Answer: b Diff: 2 Type: MC Page Reference: 306 Topic: Q2 Skill: RECALL 66) The process groups in PMBOK are related to the notion of (a) a. extreme programming. b. agile programming. c. systems development lifecycle. d. prototyping. e. normalization.

Copyright © 2014 Pearson Canada Inc.

458


Chapter 10: Acquiring Information Systems Through Projects

Answer: c Diff: 3 Type: MC Page Reference: 308 Topic: Q2 Skill: APPLIED 67) The process groups in PMBOK can be related to the ________ project management areas. a. 5 b. 6 c. 8 d. 9 e. 7 Answer: d Diff: 2 Type: MC Page Reference: 306 Topic: Q2 Skill: RECALL 68) Systems development often aims at a(n) ________ target. a. intermediary b. stationary c. moving d. progressive e. intermittent Answer: c Diff: 2 Type: MC Page Reference: 309 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

459


Chapter 10: Acquiring Information Systems Through Projects

69) Goals and scope identification usually occur (at the) ________ (of) a project a. during b. start c. beginning d. half way point e. end Answer: c Diff: 2 Type: MC Page Reference: 306 Topic: Q2 Skill: RECALL 70) Employers are looking for individuals who have the knowledge and skills to ________ information technology. a. be comfortable with b. use c. develop d. innovate through e. avoid Answer: d Diff: 2 Type: MC Page Reference: 311 Topic: Q5 Skill: RECALL 71) The single most important criterion for information systems success is for users to take ________ of their systems. a. on the success b. on the use c. on the task of development d. on the growth e. ownership Copyright © 2014 Pearson Canada Inc.

460


Chapter 10: Acquiring Information Systems Through Projects

Answer: e Diff: 2 Type: MC Page Reference: 311 Topic: Q5 Skill: RECALL 72) ______ is the second phase of the SDLC. a. Requirement analysis b. Component design c. Maintenance d. implementation e. System definition Answer: a Diff: 1 Type: MC Page Reference: 310 Topic: Q5 Skill: RECALL 73) ______ is the fourth phase of the SDLC. a. Component design b. Requirement analysis c. Maintenance d. System definition e. Implementation Answer: e Diff: 1 Type: MC Page Reference: 310 Topic: Q5 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

461


Chapter 10: Acquiring Information Systems Through Projects

74) The most common method for acquiring software applications is Customization. Type: FIB Page Reference: 304 Topic: Q1 75) "The time required to perform a task expands to the time available to do it" is ________. a. an old proverb. b. Fubini's Law. c. Moore's Law. d. Jackson's Law. e. Parkinson's Law. Answer: e Diff: 1 Type: MC Page Reference: 325 Topic: Q7 Skill: RECALL 76) A critical aspect throughout the system development process is User involvement. Diff: 2 Type: FIB Page Reference: 312 Topic: Q5 Skill: RECALL 77) In the SDLC, the first major task of the project team is to define the scope and goals of the project. Diff: 2 Type: FIB Page Reference: 312 Topic: Q5 Skill: RECALL 78) It may be necessary to create a(n) data model if the new system will involve a new database or extensive changes to an existing database. Diff: 3 Type: FIB Page Reference: 313 Topic: Q5 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

462


Chapter 10: Acquiring Information Systems Through Projects

79) Project feasibility has four dimensions. Diff: 2 Type: FIB Page Reference: 312 Topic: Q5 Skill: RECALL 80) The primary output of the system definition phase of the SDLC is the project plan. Diff: 3 Type: FIB Page Reference: 311 Topic: Q5 Skill: RECALL 81) Determining the network and operating systems that need to be used would be part of the component design phase of the SDLC. Diff: 3 Type: FIB Page Reference: 314 Topic: Q6 Skill: RECALL 82) An approved set of user requirements is the main output of the requirements analysis phase of the SDLC. Diff: 2 Type: FIB Page Reference: 312 Topic: Q6 Skill: RECALL 83) A(n) test plan describes the correct and incorrect actions that users will take when using the new system. Diff: 3 Type: FIB Page Reference: 316 Topic: Q6 Skill: RECALL 84) System conversion is the process of moving the business activity from the old system to the new system. Diff: 2 Type: FIB Page Reference: 316 Topic: Q6 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

463


Chapter 10: Acquiring Information Systems Through Projects

85) Companies like Oracle often release beta versions of their software for users to test. Diff: 1 Type: FIB Page Reference: 316 Topic: Q6 Skill: RECALL 86) In a(n) pilot installation, the organization implements the entire system on a limited portion of the business. Diff: 1 Type: FIB Page Reference: 316 Topic: Q6 Skill: RECALL 87) The riskiest system conversion from a hardware and software failure point of view is a(n) plunge installation. Diff: 2 Type: FIB Page Reference: 317 Topic: Q6 Skill: RECALL 88) PQA consists of constructing the test plan with the advice and assistance of users. Diff: 2 Type: FIB Page Reference: 316 Topic: Q6 Skill: RECALL 89) Software developers write patches to fix high priority system failures. Diff: 2 Type: FIB Page Reference: 318 Topic: Q6 Skill: RECALL 90) Fixes for hundreds or even thousands of low-priority product problems are applied using a(n) service pack. Diff: 2 Type: FIB Page Reference: 318 Topic: Q6 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

464


Chapter 10: Acquiring Information Systems Through Projects

91) The work of analysis and design is often completed by business analysts and systems analysts. Diff: 2 Type: FIB Page Reference: 312 Topic: Q5 Skill: RECALL 92) The lack of a good model is an important risk to recognize in IT projects. Diff: 2 Type: FIB Page Reference: 309 Topic: Q4 Skill: RECALL 93) System definition is the first phase of the SDLC approach. Diff: 2 Type: FIB Page Reference: 310 Topic: Q5 Skill: RECALL 94) "The time required to perform a task expands to the time available to do it." Diff: 1 Type: FIB Page Reference: 326 Topic: Q7 Skill: RECALL 95) Outsourcing is the process of hiring another organization to perform a service. Diff: 1 Type: FIB Page Reference: 319 Topic: Q7 Skill: RECALL 96) During the implementation phase of the SDLC process, developers construct, test, and install the components of the IS. Diff: 2 Type: FIB Page Reference: 315 Topic: Q6 Skill: RECALL 97) After outsourcing a service, lack of knowledge within the company will make it difficult to bring the outsourced service back in-house. Copyright © 2014 Pearson Canada Inc.

465


Chapter 10: Acquiring Information Systems Through Projects

Diff: 2 Type: FIB Page Reference: 321 Topic: Q7 Skill: RECALL 98) One style of conversion involves shutting down the old system Friday at close of business and starting up the new system Monday at open of business. This is called a plunge installation. Diff: 3 Type: FIB Page Reference: 317 Topic: Q6 Skill: APPLIED 99) With a parallel installation the old system and the new system are run side by side until the new system is tested and fully operational. Diff: 2 Type: FIB Page Reference: 316 Topic: Q6 Skill: RECALL 100) Buy it and customize it is the most common method for acquiring software applications. Diff: 2 Type: FIB Page Reference: 304 Topic: Q1 Skill: RECALL 101) In the SDLC, acquisition begins with a Business planning process that identifies the need for a new system. Diff: 3 Type: FIB Page Reference: 310 Topic: Q5 Skill: RECALL 102) What are the steps to acquire information system. Answer:

Diff: 2 Copyright © 2014 Pearson Canada Inc.

466


Chapter 10: Acquiring Information Systems Through Projects

Type: ES Page Reference: 310 Topic: Q5 Skill: RECALL 103) What is an IT project? Answer: Projects often begin with a scope, or an objective. Projects usually have a start and an end date and temporarily use resources (such as people, office space, and computers) to accomplish the project. Projects often tend to be unique in that they do not happen over and over again but happen only once. Perhaps most importantly, the objective of the project is to accomplish something new, so projects often represent change in an organization. Diff: 2 Type: ES Page Reference: 306 Topic: Q3 Skill: RECALL 104) What are three areas that affect IT project risk? Answer: First it shows that IT project performance has to be evaluated on not only whether the project was on budget and on time (project process performance), but also whether the expected benefits from the project were realized (project product performance). In addition, the model shows two pathways that the authors describe as the "forces of evil" and the "forces of good" in IT projects. Diff: 3 Type: ES Page Reference: 309 Topic: Q4 Skill: RECALL 105) What is ITPM? Answer:

Copyright © 2014 Pearson Canada Inc.

467


Chapter 10: Acquiring Information Systems Through Projects

Information technology project management (ITPM) is the collection of techniques and methods that project managers use to plan, coordinate, and complete IT projects. The tools of ITPM are basically the same tools used in any project management. These tools include planning tools such as work breakdown structures, budgeting methods, graphical scheduling methods such as PERT (Program Evaluation Review Technique) and Gantt charts, risk management techniques, communication planning, and high-tech team development. Diff: 2 Type: ES Page Reference: 306 Topic: Q2 Skill: RECALL 106) Why are project management skills important nowadays? Answer:

Diff: 2 Type: ES Page Reference: 307 Topic: Q2 Skill: RECALL 107) What are the phases of the SDLC? When is it good to use the SDLC and when is it not appropriate? Answer: In the system definition phase, a team will define the new system, assess its feasibility, and begin planning the project. In the requirements analysis phase the specific features and functions of the new system will be determined. Next, each of the five components of the new IS will be designed. The implementation phase is where the new system is built, tested, and conversion from the old to the new occurs. The final phase is the maintenance phase where bugs are fixed and enhancements are made. The SDLC approach is recommended if the system is complex and consists of many modules, because extra care must be applied in documenting requirements and the manner in which components will be integrated, to ensure smooth and successful development. Diff: 3 Type: ES Copyright © 2014 Pearson Canada Inc.

468


Chapter 10: Acquiring Information Systems Through Projects

Page Reference: 309 Topic: Q5 Skill: APPLIED 108) Why is the system definition phase the most important? Why is this phase so difficult to get right? Answer: It is the most important because if the requirements are wrong, the system will be wrong and it will be difficult to correct the system later in the process. It is hard to get right because there are so many competing ideas about what the new system should do. Analysts must interview many users who may not be able to communicate effectively about what they think the new system should be like. Users are usually focused on the tasks they are currently doing at the time of the interview with little thought for tasks at the other times of the quarter. If it is a long project, the requirements may be obsolete and be out of date by the time it comes to implement them. Requirements also tend to focus on hardware and software and forget about the procedures and impact on people. Diff: 3 Type: ES Page Reference: 311 Topic: Q5 Skill: APPLIED 109) What are the different system conversion strategies and when are they appropriate? Answer: There are four different types of system conversion strategies. These include the system pilot, the phased approach, a parallel conversion, and the plunge conversion. In the pilot approach, the organization chooses one department or business unit in which to implement and test the entire system. This reduces the risk by limiting exposure while giving a thorough testing of the system under actual loads and situations. The phased conversion is a way of installing pieces of the new system across the whole organization. Some systems such as ERP and CRM don't lend themselves to this piecemeal approach. The parallel approach is the most secure because both the new and the old system will be run at the same time until the new system is fully tested and debugged. This is quite expensive since the organization will have to bear the costs of running two entire systems, but a good option when security needs are high. The plunge method is the riskiest and is sometimes called the "cold turkey" approach. The old system is turned off and the new one is turned on. This method should only used in the most crucial systems where the old system is totally insufficient and ready to crash at any moment. Diff: 3 Copyright © 2014 Pearson Canada Inc.

469


Chapter 10: Acquiring Information Systems Through Projects

Type: ES Page Reference: 316 Topic: Q6 Skill: APPLIED 110) What are the risks of outsourcing IT systems? Answer:

Diff: 3 Type: ES Page Reference: 320 Topic: Q7 Skill: APPLIED 111) In the opinion of many system developers, both the project manager and the senior management have a "fantasy world" view of project schedules. Why is this and what can be done to alleviate it? Answer: There are many pitfalls to estimating project schedules. On the project developer's end, many software developers are too optimistic and try to schedule projects as if everything will go as planned, which seldom happens. Often they do not schedule time for vacations, sick days, and learning new technologies needed for the project. Even if they come up with a realistic schedule, upper management often reduces the schedule, thinking that a tighter time frame will motivate employees to work more efficiently. If managers have experienced delays in the past, they often mentally add a month or so to the official schedule. As a result, no one really believes the schedule as officially posted. Diff: 3 Type: ES Page Reference: 326 Topic: Q7 Skill: APPLIED 112) Why is it so difficult to estimate the costs of system development? Answer:

Copyright © 2014 Pearson Canada Inc.

470


Chapter 10: Acquiring Information Systems Through Projects

It is hard to estimate the costs of some projects because they may involve aspects that have never been tried before and they may involve more risk. Project development is highly knowledge-intensive. If one key person leaves the job or is unable to perform, the project schedule may become longer. If user requirements are not specified accurately, users may find that the proposed system doesn't solve their problems. So they will need to make lots of changes later in the project, which will increase the cost. They will most likely try to amke the vendor pay for these extras. Diff: 3 Type: ES Page Reference: 309 Topic: Q4 Skill: APPLIED

Copyright © 2014 Pearson Canada Inc.

471


Application Extension 10a: Introduction to Microsoft Project

1) MS Project is a full-service project management process software. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 329 Topic: Q1 Skill: RECALL 2) MS Project is best describes as a spreadsheet product. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 329 Topic: Q1 Skill: RECALL 3) Project provides a variety of screens to capture the full picture of the project. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 329 Topic: Q1 Skill: RECALL 4) It is not difficult to show all aspects of a project in a single screen. a. True b. False Answer: b Diff: 2 Copyright © 2014 Pearson Canada Inc.

472


Application Extension 10a: Introduction to Microsoft Project

Type: TF Page Reference: 329 Topic: Q1 Skill: RECALL 5) The resource view shows all the tasks associated with a project and how long they are expected to last. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 330 Topic: Q1 Skill: RECALL 6) You can create subtasks within the tasks of a project. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 332 Topic: Q2 Skill: RECALL 7) You need to create dependencies when one task can not be completed until another task has been completed. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 332 Topic: Q2 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

473


Application Extension 10a: Introduction to Microsoft Project

8) Dependent tasks are either predecessors or successors. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 332 Topic: Q2 Skill: RECALL 9) Dependencies are reflected in the Gantt chart screen. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 332 Topic: Q2 Skill: RECALL 10) The resource sheet allows you to enter people that will be working on a project to the project. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 334 Topic: Q3 Skill: RECALL 11) Resources cannot be added to the tasks shown in the Gantt chart. a. True b. False Answer: b Copyright © 2014 Pearson Canada Inc.

474


Application Extension 10a: Introduction to Microsoft Project

Diff: 2 Type: TF Page Reference: 335 Topic: Q3 Skill: RECALL 12) The resource usage view would allow a project manager to better control resources like overtime. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 337 Topic: Q3 Skill: RECALL 13) MS Project allows a project manager to control resources. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 334 Topic: Q3 Skill: RECALL 14) MS Project allows a project manager to create tasks. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 331 Topic: Q2 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

475


Application Extension 10a: Introduction to Microsoft Project

15) A Tracking Gantt allows a project manager to track the progress of a project against a baseline. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 330 Topic: Q2 Skill: RECALL 16) MS Project is best described as a ________ product. a. spreadsheet b. database c. presentation d. scheduling e. calendar Answer: b Diff: 1 Type: MC Page Reference: 329 Topic: Q1 Skill: RECALL 17) MS Project stores information about a. budgets, resources, and employee SIN’s. b. resources, tasks, and customer buying history. c. tasks, resources, and work contracts. d. schedules, emails, and budgets. e. budgets, resources, and tasks. Answer: e Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

476


Application Extension 10a: Introduction to Microsoft Project

Page Reference: 329 Topic: Q1 Skill: RECALL 18) The default view of MS Project is the a. resource sheet. b. tasks view. c. budgets view. d. resource usage view. e. Gantt chart view. Answer: e Diff: 2 Type: MC Page Reference: 329 Topic: Q1 Skill: RECALL 19) When you create subtasks the tasks associated with those subtasks automatically get the a. the duration of the longest subtask b. the dependencies of the subtasks c. the total of the subtasks' durations d. the subtasks ancestors e. the predecessors of the subtasks Answer: a Diff: 3 Type: MC Page Reference: 332 Topic: Q2 Skill: RECALL 20) The ________ is located on the far left hand side of the screen. a. quick navigator b. resource sheet Copyright © 2014 Pearson Canada Inc.

477


Application Extension 10a: Introduction to Microsoft Project

c. project window d. navigator e. project navigator Answer: a Diff: 2 Type: MC Page Reference: 334 Topic: Q3 Skill: RECALL 21) MS Project is a full-service project management software because it focuses on a. organizing tasks. b. providing access to project documentation. c. managing schedules. d. tracking employee hours. e. providing support for the project management process. Answer: e Diff: 3 Type: MC Page Reference: 329 Topic: Q1 Skill: APPLIED 22) In the Gantt chart the arrows that point to the bars indicate a. incomplete tasks. b. activities. c. resources. d. dependencies between activities. e. complete tasks. Answer: d Diff: 2 Type: MC Page Reference: 330 Copyright © 2014 Pearson Canada Inc.

478


Application Extension 10a: Introduction to Microsoft Project

Topic: Q1 Skill: RECALL 23) In the resource view you see ________ available to the project a. people b. equipment c. information technology d. money e. facilities Answer: a Diff: 2 Type: MC Page Reference: 330 Topic: Q1 Skill: RECALL 24) The resource usage view allows the project manager to check a. projected versus actual costs. b. time to completion. c. all of the tasks. d. all of the sub-tasks. e. expected work date and hours for an employee. Answer: e Diff: 2 Type: MC Page Reference: 330 Topic: Q1 Skill: RECALL 25) All project management begins with a. an annual budget. b. an understanding of project management. c. an understanding of the scheduling application. Copyright © 2014 Pearson Canada Inc.

479


Application Extension 10a: Introduction to Microsoft Project

d. an understanding of the tasks that need to be accomplished. e. availability of resources. Answer: d Diff: 2 Type: MC Page Reference: 331 Topic: Q2 Skill: RECALL 26) Subtasks are created and undone using the ________ keys. a. ctrl b. arrow c. alt d. tab e. shift Answer: d Diff: 2 Type: MC Page Reference: 332 Topic: Q2 Skill: RECALL 27) A predecessor is a a. task that must happen at the same time as another task. b. resource that must be used before another resource. c. task that must happen before another task. d. task that must happen after another task. e. view in MS Project. Answer: c Diff: 1 Type: MC Page Reference: 332 Topic: Q2 Copyright © 2014 Pearson Canada Inc.

480


Application Extension 10a: Introduction to Microsoft Project

Skill: RECALL 28) Dependencies are crucial for a. scheduling tasks. b. creating predecessors. c. creating successors. d. creating meaningful schedules. e. scheduling resources. Answer: e Diff: 2 Type: MC Page Reference: 330 Topic: Q1 Skill: APPLIED 29) The data entry in the resource sheet is the same as for the a. calendar. b. resource usage sheet. c. tracking Gantt chart. d. task usage sheet. e. Gantt chart. Answer: e Diff: 2 Type: MC Page Reference: 334 Topic: Q3 Skill: RECALL 30) MS Project is a full-service project management process software. Diff: 1 Type: FIB Page Reference: 329 Topic: Q1 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

481


Application Extension 10a: Introduction to Microsoft Project

31) MS Project is best described as a(n) database product. Diff: 2 Type: FIB Page Reference: 329 Topic: Q1 Skill: RECALL

32) It is difficult to show all the aspects of a project in a single screen. Diff: 2 Type: FIB Page Reference: 329 Topic: Q1 Skill: RECALL

33) Dependency happens when some tasks cannot be completed until other tasks are completed. Diff: 3 Type: FIB Page Reference: 332 Topic: Q2 Skill: RECALL 34) Dependencies are reflected in the Gantt chart screen. Diff: 2 Type: FIB Page Reference: 333 Topic: Q2 Skill: RECALL

35) MS Project allows a project manager to control resources. Diff: 2 Type: FIB Page Reference: 334 Topic: Q3 Skill: RECALL

36) All project management begins with an understanding of the tasks that need to be accomplished. Diff: 2 Type: FIB Page Reference: 331 Copyright © 2014 Pearson Canada Inc.

482


Application Extension 10a: Introduction to Microsoft Project

Topic: Q2 Skill: RECALL

37) MS Project is a sophsiticated relational database that stores information about tasks, resources, schedules, baselines, and budgets. Diff: 2 Type: FIB Page Reference: 331 Topic: Q1 Skill: RECALL

38) Task duration times are based on the time needs of subtasks. Diff: 3 Type: FIB Page Reference: 331 Topic: Q2 Skill: RECALL

39) The resource usage view shows how active each of your project members will be over the course of the project. Diff: 2 Type: FIB Page Reference: 335 Topic: Q3 Skill: RECALL 40) Why is MS Project considered a full-service product? Answer: It provides strong support for the project management process. It has a large number of tools to manage projects and is able to store and show information about tasks, resources, schedules, baselines, and budgets. It also has screens that focus on one or two specific aspects of projects at a time. Diff: 3 Type: ES Page Reference: 329 Topic: Q1 Skill: RECALL 41) What is the advantage of using a Gantt chart? Copyright © 2014 Pearson Canada Inc.

483


Application Extension 10a: Introduction to Microsoft Project

Answer: A Gantt chart lists all the tasks associated with projects along with the sub tasks associated with each task. It includes task durations and a calendar of tasks based on on the duration of the sub tasks and the resources used in the sub tasks. A Gantt chat allows one to see the tasks that are happening and how much further the project has to go before completion. Diff: 3 Type: ES Page Reference: 330 Topic: Q1 Skill: APPLIED 42) What is a dependency between two tasks? Answer: Dependency happens when one task can not be completed until other tasks are completed. One task becomes a predecessor and the other the successor. Diff: 3 Type: ES Page Reference: 330 Topic: Q1 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

484


Chapter 11: Structure, Governance and Ethics

1) Competitive strategy is supported through activities in the value chain, which consist of collection of business processes supported by information systems. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 347 Topic: Q3 Skill: RECALL 2) Competitive strategy is supported by operational plans. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 347 Topic: Q3 Skill: APPLIED 3) The triple bottom line for organizations includes measuring profitability, social performance and employee satisfaction. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 356 Topic: Q8 Skill: RECALL 4) The Zachman framework describes competitive forces in an industry. a. True b. False Answer: b Copyright © 2014 Pearson Canada Inc.

485


Chapter 11: Structure, Governance and Ethics

Diff: 2 Type: TF Page Reference: 348 Topic: Q3 Skill: RECALL 5) John Zachman developed the Zachman framework while he worked for IBM. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 348 Topic: Q3 Skill: RECALL 6) The Zachman framework divides systems into two dimensions: one is based on six reasons for communication; the other is based on stakeholder groups. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 348 Topic: Q3 Skill: RECALL 7) The matching of organizational objectives with IT architecture takes advantage of IT capabilities as they develop. a. True b. False Answer: a Diff: 3 Type: TF Page Reference: 349 Topic: Q4 Copyright © 2014 Pearson Canada Inc.

486


Chapter 11: Structure, Governance and Ethics

Skill: RECALL 8) Alignment is the matching of business objectives with IT architecture. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 349 Topic: Q4 Skill: RECALL 9) Bill 198 is commonly known as Budget Measures Act. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 351 Topic: Q5 Skill: RECALL 10) Bill 198 is commonly known as the Sarbanes-Oxley Act. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 351 Topic: Q5 Skill: RECALL 11) The Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 90 000 professionals. a. True b. False Copyright © 2014 Pearson Canada Inc.

487


Chapter 11: Structure, Governance and Ethics

Answer: a Diff: 2 Type: TF Page Reference: 352 Topic: Q6 Skill: RECALL 12) The purpose of an information systems audit is to verify organizations’ information systems policies and procedures. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 352 Topic: Q6 Skill: RECALL 13) An IT architecture is like a plan for a city that lays out the street network. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 347 Topic: Q3 Skill: RECALL 14) Green IT practices include using the “sleep” mode of your computer, recycling of computers, and buying energy-efficient electronics. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 356 Copyright © 2014 Pearson Canada Inc.

488


Chapter 11: Structure, Governance and Ethics

Topic: Q8 Skill: APPLIED 15) For business organizations, governance is often designed to work toward the development of consistent, cohesive management policies and verifiable internal processes. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 350 Topic: Q5 Skill: RECALL 16) Effectively managing information systems to support business objectives is an easy process. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 347 Topic: Q3 Skill: RECALL 17) An enterprise architects's job is to plan and manage an organization's information systems. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 345 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

489


Chapter 11: Structure, Governance and Ethics

18) IT architecture has many standards. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 348 Topic: Q3 Skill: RECALL 19) Wal-Mart spends more that the industry average on information technology. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 349 Topic: Q4 Skill: RECALL 20) Supporting business objectives with appropriate IT investments is a critical part of IT management. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 349 Topic: Q4 Skill: RECALL 21) The need to report and disclose IS operational information will require all employees to become familiar with the issues facing IT management. a. True b. False Copyright © 2014 Pearson Canada Inc.

490


Chapter 11: Structure, Governance and Ethics

Answer: a Diff: 2 Type: TF Page Reference: 353 Topic: Q6 Skill: RECALL 22) E-cycling is one of the most important issues in green IT. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 356 Topic: Q8 Skill: RECALL 23) Green IT means using information technology resources to better support the triple bottom line. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 356 Topic: Q8 Skill: RECALL 24) Whistle blowers have shown us that it is quite acceptable to "do what your boss says" or “do what your system tells you” when it comes to ethical situations a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 355 Copyright © 2014 Pearson Canada Inc.

491


Chapter 11: Structure, Governance and Ethics

Topic: Q7 Skill: RECALL 25) Information systems ethics is about a. people involved in the system. b. money involved in the system. c. software involved in the system. d. hardware involved in the system. e. PIPEDA. Answer: a Diff: 2 Type: MC Page Reference: 354 Topic: Q7 Skill: RECALL 26) Which of the following are sets of ethical principles? a. Sarbanes-Oxley Act b. GAAP c. IFRS d. Canada's Charter of Rights and Freedoms e. The Budget Measures Act Answer: d Diff: 2 Type: MC Page Reference: 354 Topic: Q7 Skill: RECALL 27) The ongoing process which involves fitting IT architecture to business objective is called a. Sarbanes-Oxley Act. b. IT Strategy. c. alignment. Copyright © 2014 Pearson Canada Inc.

492


Chapter 11: Structure, Governance and Ethics

d. Zachman Framework. e. governance. Answer: c Diff: 2 Type: MC Page Reference: 349 Topic: Q4 Skill: RECALL 28) The ___________ department usually manages the computers, computer centres, networks, and communication media. a. IT b. finance c. operations d. legal e. CIO’s Answer: c Diff: 2 Type: MC Page Reference: 341 Topic: Q1 Skill: RECALL 29) In an ideal world, the information systems that a company uses would support the ________ of the company a. strategy b. information technology c. business ethics d. data collection e. online transaction processing Answer: a Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

493


Chapter 11: Structure, Governance and Ethics

Page Reference: 347 Topic: Q3 Skill: RECALL 30) The Canadian legislation that is similar to the Sarbanes-Oxley Act in the US is the a. Budget Measures Act. b. Financial Regulations Act. c. Business Measures Act. d. Business Code Act. e. CSox Act. Answer: a Diff: 2 Type: MC Page Reference: 351 Topic: Q5 Skill: RECALL 31) The Zachman framework divides systems into two dimensions: one is based on reasons for communication and the other is based on stakeholder groups. Diff: 1 Type: FIB Page Reference: 348 Topic: Q3 Skill: RECALL 32) Which of the following are in the stakeholder groups listed in the Zachman framework? a. Owner, planner, designer, government, worker b. Worker, government, designer, planner, owner c. Designer, the public, planner, owner, worker d. Planner, government, shareholder, worker, designer e. Shareholder, planner, designer, builder, worker Answer: e Diff: 3 Type: MC Page Reference: 348 Copyright © 2014 Pearson Canada Inc.

494


Chapter 11: Structure, Governance and Ethics

Topic: Q3 Skill: APPLIED 33) Sarbanes-Oxley and Bill 198 apply to a. COBIT b. computer based information systems c. income taxes d. publicly traded companies. e. privately held Canadian corporations. Answer: d Diff: 2 Type: MC Page Reference: 351 Topic: Q5 Skill: RECALL 34) Under Bill 198 both management and the ______________ face criminal liability if internal controls are defective. a. planner b. designer c. employees d. external auditor e. president Answer: d Diff: 2 Type: MC Page Reference: 351 Topic: Q5 Skill: APPLIED 35) Which of the following is the most important indicator of alignment? a. Return on investment in IT b. Investment level in IT c. Communication among IT executives Copyright © 2014 Pearson Canada Inc.

495


Chapter 11: Structure, Governance and Ethics

d. Communication between IT and business executives e. Funding of IT Answer: d Diff: 2 Type: MC Page Reference: 350 Topic: Q4 Skill: RECALL 36) The term ________ suggests some committee or political party has the ability to decide on expectations for performance, to authorize appropriate resources and power to meet expectation, and perhaps eventually to verify whether expectation have been met. a. architecture b. alignment c. governance d. process redesign e. management Answer: c Diff: 2 Type: MC Page Reference: 350 Topic: Q5 Skill: RECALL 37) The focus of an ________ is placed on the information resources that are used to collect, store, process, and retrieve information. a. security audit b. information systems audit c. external audit d. information technology audit e. internal audit Answer: b Diff: 2

Copyright © 2014 Pearson Canada Inc.

496


Chapter 11: Structure, Governance and Ethics

Type: MC Page Reference: 352 Topic: Q6 Skill: RECALL 38) Most jobs in the ICT industry require a mix of ________________ and technical skills. a. selling b. programming c. financial d. legal e. interpersonal Answer: e Diff: 1 Type: MC Page Reference: 344 Topic: Q2 Skill: RECALL 39) The ________ certification is recognized globally and has been earned by more than 90 000 professionals. Members have job titles like is auditor, consultant, IS security professional, regulator, chief information officer, and internal auditor. a. Certified Systems Auditor (CSA) b. COBIT Auditor c. Certified Auditor (CA) d. Systems Auditor (SA) e. Certified Information Systems Auditor (CISA) Answer: e Diff: 3 Type: MC Page Reference: 352 Topic: Q6 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

497


Chapter 11: Structure, Governance and Ethics

40) COBIT stands for a. Common Observations for Information Technology. b. Control Objectives for Information and Related Technology. c. Common Objectives for Business Information Technology. d. Control Objectives for Information Technology. e. Control Objects for Information Technology. Answer: b Diff: 2 Type: MC Page Reference: 352 Topic: Q6 Skill: RECALL 41) What is the relationship between an organization’s competitive strategy and information system planning? Answer: An organization’s competitive strategy is supported through activities in the value chain, which consists of a collection of business processes supported by information systems. That is, information systems should help organizations achieve that strategy. Diff: 3 Type: ES Page Reference: 347 Topic: Q3 Skill: RECALL 42) The IT structure is like a a. city building. b. city plan. c. enterprise project. d. enterprise design. e. governmental design. Answer: b Diff: 3 Copyright © 2014 Pearson Canada Inc.

498


Chapter 11: Structure, Governance and Ethics

Type: MC Page Reference: 347 Topic: Q3 Skill: APPLIED Objective: ski 43) What is information technology architecture? a. A set of photographs of all an organization's existing hardware. b. A basic framework for all the computers, systems, and information management that support organizational services. c. An IT plan that incorporates all an organization's existing IT investments. d. A diagram of all an organization's servers. e. A diagram of all an organization's networks. Answer: b Diff: 2 Type: MC Page Reference: 347 Topic: Q3 Skill: RECALL 44) Alignment is not only about planning and building frameworks, but also about a. effectiveness in productivity. b. effectiveness in communication. c. efficiency in productivity. d. effectiveness in governance. e. efficiency in computing. Answer: b Diff: 2 Type: MC Page Reference: 350 Topic: Q4 Skill: APPLIED 45) The function of COBIT is to Copyright © 2014 Pearson Canada Inc.

499


Chapter 11: Structure, Governance and Ethics

a. provide a framework for SDLC. b. enforce the law on corporate IT governance. c. lobbying on behalf of the IT industry. d. help organizations get the best from their IT invesments. e. draft legislation. Answer: d Diff: 2 Type: MC Page Reference: 352 Topic: Q6 Skill: RECALL 46) What is the role of the ISACA? a. Providing a set of tools and guidelines for whistleblowers b. Enforcing the law on corporate IT governance c. Providing a framework for best IT practices d. Enforcing the control of IT standards e. Developing knowledge and standards relating to IT audits and IS governance. Answer: e Diff: 3 Type: MC Page Reference: 352 Topic: Q6 Skill: RECALL 47) Why should business professionals care about IS governance? a. It is required by law. b. It increases job performance. c. It covers envrinomental issues. d. Actually, only the board of directors should care about IS governance. e. It enhances firm reputation. Answer: a Diff: 3 Copyright © 2014 Pearson Canada Inc.

500


Chapter 11: Structure, Governance and Ethics

Type: MC Page Reference: 353 Topic: Q6 Skill: RECALL 48) Moving downward in the Zachman framework provides a higher levels of a. outsourcing. b. feasibility. c. perspectives. d. detail. e. alignment. Answer: d Diff: 2 Type: MC Page Reference: 348 Topic: Q3 Skill: RECALL 49) Though it may seem obvious, one of the hardest things to do when planning how your organization will use information systems is to a. export applications to a Web platform. b. align IS with organizational strategy. c. outsource some of the functions. d. get quotes from vendors. e. develop the business strategy. Answer: b Diff: 3 Type: MC Page Reference: 349 Topic: Q4 Skill: APPLIED 50) The triple bottom line includes a. energy efficiency, recycling, and hazardous materials measures. Copyright © 2014 Pearson Canada Inc.

501


Chapter 11: Structure, Governance and Ethics

b. financial, IT, and HR measures. c. stock, social, and environmental performance. d. financial, social, and environmental performance. e. shareholder, financial, and social measures. Answer: d Diff: 2 Type: MC Page Reference: 356 Topic: Q8 Skill: RECALL 51) Part of Green IT means using IT to support (the) a. energy star programs. b. triple bottom line. c. people and the environment. d. environment. e. energy efficiency programs. Answer: b Diff: 3 Type: MC Page Reference: 356 Topic: Q8 Skill: APPLIED 52) If all computers sold in the USA where energy star rated, the energy savings per year would be a. equivalent to 4 million vehicles. b. $3 billion. c. $5 billion. d. equivalent to 3.5 million houses. e. $2 billion. Answer: e Diff: 2 Copyright © 2014 Pearson Canada Inc.

502


Chapter 11: Structure, Governance and Ethics

Type: MC Page Reference: 356 Topic: Q8 Skill: RECALL 53) Companies involved in the ________ industry face government regulatory restrictions. a. energy star b. e-energy c. e-waste d. technology governance e. paper recycling Answer: c Diff: 2 Type: MC Page Reference: 356 Topic: Q8 Skill: RECALL 54) E-cycling should be considered in a company's IS ________ procedures. a. ethics b. buying c. alignment d. auditing e. planning Answer: d Diff: 3 Type: MC Page Reference: 356 Topic: Q8 Skill: APPLIED 55) EPEAT is a tool based on ________ criteria that measure a product's efficiency and sustainability attributes. Copyright © 2014 Pearson Canada Inc.

503


Chapter 11: Structure, Governance and Ethics

a. 27 b. 30 c. 24 d. 25 e. 28 Answer: e Diff: 2 Type: MC Page Reference: 356 Topic: Q8 Skill: RECALL 56) If described in one wod, IS ethics are about understanding our a. thoughts. b. thinking. c. wishing. d. culture. e. choices. Answer: e Diff: 2 Type: MC Page Reference: 354 Topic: Q7 Skill: RECALL 57) In terms of ethics, advances in information technology bring about new ________ for an organization. a. choices b. understandings c. problems d. risks e. opportunities Answer: a Copyright © 2014 Pearson Canada Inc.

504


Chapter 11: Structure, Governance and Ethics

Diff: 3 Type: MC Page Reference: 354 Topic: Q7 Skill: APPLIED 58) Information systems audits focus on a. deficiencies in information systems reporting. b. hardware and software. c. how well information systems align with business strategies. d. the information resources used to collect, retrieve, store, and process information. e. financial and account records. Answer: d Diff: 3 Type: MC Page Reference: 352 Topic: Q6 Skill: RECALL 59) In Canada, ________ has an agreement with ISACA to recognize a designated specialist in information systems auditing. a. CASB b. CGA c. CICA d. CMA e. CSA Answer: c Diff: 1 Type: MC Page Reference: 352 Topic: Q6 Skill: RECALL 60) Graduating business students can be successful in the ICT industry, if they are Copyright © 2014 Pearson Canada Inc.

505


Chapter 11: Structure, Governance and Ethics

a. keeping up to date with information systems knowledge. b. intimately familiar with the SOX Act. c. ignoring information systems. d. intimately familiar with the details of COBIT e. familiar with issues facing information technology and can communicate. Answer: e Diff: 3 Type: MC Page Reference: 344 Topic: Q2 Skill: APPLIED 61) One reason that governance is important is a. to ensure that an organization's internal processes can't be verified. b. to maintain the benefits of an organization's IT investments. c. to develop reporting structures and review processes d. to develop inconsistent management policies. e. to ensure that an organization produces good results while working to avoid bad results. Answer: e Diff: 2 Type: MC Page Reference: 350 Topic: Q5 Skill: APPLIED 62) One example of internal controls is a. leaving all financial decisions to the sole discretion of the CFO. b. having budgets that aren't reconciled against the plan. c. allowing a single individual to complete the payment cycle in a payment system. d. relying solely on a computerized accounting system to make payments. e. the separation of duties for authorizing and making payments. Answer: e Copyright © 2014 Pearson Canada Inc.

506


Chapter 11: Structure, Governance and Ethics

Diff: 3 Type: MC Page Reference: 351 Topic: Q5 Skill: APPLIED 63) Successful companies find ways to share knowledge and ________ between the IT department and the business functions. a. frustrations b. information c. people d. data e. plans Answer: a Diff: 2 Type: MC Page Reference: 350 Topic: Q4 Skill: RECALL 64) The challenge in developing systems that effectively support business objectives include a. a required understanding of the business process. b. a required understanding of the business process and the technological architecture of underlying information systems. c. a required understanding of the business process and information management. d. a required understanding of the technological architecture of underlying information systems. e. a required understanding of information management. Answer: b Diff: 3 Type: MC Page Reference: 347 Topic: Q3

Copyright © 2014 Pearson Canada Inc.

507


Chapter 11: Structure, Governance and Ethics

Skill: RECALL 65) In developing architecture a(n) _______________ must consider things like organizational objectives, information flows, databases and supporting technology. a. CISA b. test engineer c. Zachman blackbelt d. CIO e. enterprise architect Answer: e Diff: 3 Type: MC Page Reference: 347 Topic: Q3 Skill: RECALL 66) Wal-Mart's main strategy is a. to pursue a product differentiation strategy. b. to focus on being a low price retailer. c. to focus on being a "high tech" retailer. d. to focus on a specific niche market. e. to pursue a strategy that focuses on partnering with other retailers. Answer: b Diff: 2 Type: MC Page Reference: 349 Topic: Q4 Skill: RECALL 67) According to Reich and Benbasat (1996), effective alignment occurred in organizations that developed a climate of supporting a. the sharing of domain knowledge and common business practices. b. the sharing of domain knowledge. c. common business practices. Copyright © 2014 Pearson Canada Inc.

508


Chapter 11: Structure, Governance and Ethics

d. information management innovation. e. common business practices and information management innovation. Answer: a Diff: 3 Type: MC Page Reference: 349 Topic: Q4 Skill: RECALL 68) IS governance is primarily associated with a. information management of an organization. b. legal compliance with the Budget Measures Act. c. Improving the benefits of an organization’s IT investment in the long run. d. social and environmental performance of an organization. e. the duties of the CIO. Answer: c Diff: 2 Type: MC Page Reference: 350 Topic: Q5 Skill: RECALL 69) Bill 198 affects mainly a. production systems b. operational information systems. c. databases. d. data warehouses. e. accounting information systems. Answer: e Diff: 2 Type: MC Page Reference: 351 Topic: Q5 Copyright © 2014 Pearson Canada Inc.

509


Chapter 11: Structure, Governance and Ethics

Skill: RECALL 70) IS governance in the future will require that all ________ have input into important IS decisions. a. shareholders b. stakeholders c. management personnel d. C-Suite members e. board members Answer: b Diff: 1 Type: MC Page Reference: 352 Topic: Q5 Skill: RECALL 71) ISACA has become a leader in a. IT alignment. b. financial and accounting audits. c. developing new information systems. d. IT audits and IT governance. e. IS architecture development. Answer: d Diff: 2 Type: MC Page Reference: 352 Topic: Q6 Skill: RECALL 72) A financial audit can be defined as an examination and verification of a company’s financial and accounting records by an accredited professional. Diff: 1 Type: FIB Page Reference: 352 Topic: Q6 Copyright © 2014 Pearson Canada Inc.

510


Chapter 11: Structure, Governance and Ethics

Skill: RECALL 73) The Zachman framework is one of the most popular IT architecture frameworks. Diff: 1 Type: FIB Page Reference: 348 Topic: Q3 Skill: RECALL 74) IT architecture is a plan for all the computers, systems, and information management in a firm. Diff: 1 Type: FIB Page Reference: 347 Topic: Q3 Skill: RECALL 75) A model such as Porter's Five Forces can help to determine the competitive strategy for an organization. Diff: 2 Type: FIB Page Reference: 347 Topic: Q3 Skill: RECALL 76) Effectively managing information systems to support business objectives is a difficult process. Diff: 3 Type: FIB Page Reference: 347 Topic: Q3 Skill: RECALL 77) Stakeholder groups in the Zachman framework include planner, owner, designer, builder, implementer, and worker. Diff: 3 Type: FIB Page Reference: 348 Topic: Q3 Skill: RECALL 78) A(n) information systems audit is analogous to a financial audit. Diff: 3 Type: FIB Page Reference: 352 Topic: Q6 Copyright © 2014 Pearson Canada Inc.

511


Chapter 11: Structure, Governance and Ethics

Skill: RECALL 79) The development of a(n) enterprise architecture can be critical when organizations are considering significant change. Diff: 3 Type: FIB Page Reference: 348 Topic: Q3 Skill: RECALL 80) The first step in understanding how business objectives can be supported by information systems is by defining the IS architecture. Diff: 3 Type: FIB Page Reference: 348 Topic: Q3 Skill: RECALL 81) A firm that matches its organizational objectives with its IT architecture is said to be in alignment. Diff: 3 Type: FIB Page Reference: 349 Topic: Q4 Skill: RECALL 82) To align organizational strategy with information systems, you need to match the IT architecture with organizational objectives. Diff: 3 Type: FIB Page Reference: 349 Topic: Q4 Skill: RECALL 83) Bill 198 is known as the Budget Measure Act. Diff: 1 Type: FIB Page Reference: 351 Topic: Q5 Skill: RECALL 84) The SOX act and Bill 198 both require management to create internal controls sufficient to produce reliable financial statements and to protect an organization's assets Diff: 3 Type: FIB Page Reference: 351 Copyright © 2014 Pearson Canada Inc.

512


Chapter 11: Structure, Governance and Ethics

Topic: Q5 Skill: RECALL 85) An example of internal controls would be the separation of duties and authorities. Diff: 3 Type: FIB Page Reference: 351 Topic: Q5 Skill: RECALL 86) The goal of IS governance is to improve the benefits of an organization's IT investments over time. Diff: 2 Type: FIB Page Reference: 351 Topic: Q5 Skill: RECALL 87) IT can no longer appear to be a(n) black box to the organization's external stakeholders. Diff: 3 Type: FIB Page Reference: 351 Topic: Q5 Skill: RECALL 88) Situations created by companies like Enron and Worldcom where instrumental in the creation of the Sarbanes-Oxley Act in the USA. Diff: 2 Type: FIB Page Reference: 351 Topic: Q5 Skill: RECALL 89) Companies adopt COBIT's framework in order to follow industry best practices. Diff: 2 Type: FIB Page Reference: 352 Topic: Q6 Skill: APPLIED 90) As a CIO, one of your primary responsibilities is to make sure that your information systems are aligned with your business objectives. Diff: 3 Type: FIB Page Reference: 342 Copyright © 2014 Pearson Canada Inc.

513


Chapter 11: Structure, Governance and Ethics

Topic: Q1 Skill: APPLIED 91) Green IT allows an organization to improve its triple bottom line. Diff: 2 Type: FIB Page Reference: 356 Topic: Q8 Skill: RECALL 92) In many instances green IT is simply a common sense approach. Diff: 2 Type: FIB Page Reference: 356 Topic: Q8 Skill: RECALL 93) When you use the sleep mode on your computer, you provide a(n) energy savings to your company. Diff: 2 Type: FIB Page Reference: 356 Topic: Q8 Skill: RECALL 94) A Green IT plan should include a plan on how to e-cycle old electronics. Diff: 1 Type: FIB Page Reference: 356 Topic: Q8 Skill: RECALL 95) In general, laptops use less power than desktop computer. Diff: 1 Type: FIB Page Reference: 356 Topic: Q8 Skill: RECALL 96) What is alignment? Answer: MIS researchers have suggested that alignment should be viewed as an ongoing process: fitting IT architecture to business objectives is a challenge that continually evolves. The alignment process works to take advantage of IT capabilities as they develop while at the same time maintaining a balance between business objectives and IT architecture. What Copyright © 2014 Pearson Canada Inc.

514


Chapter 11: Structure, Governance and Ethics

is important to recognize is that what works for one organization as a balance may not work for another. Alignment depends on business goals, the organizational context, and the state of IT architecture in an organization. Diff: 2 Type: ES Page Reference: 349 Topic: Q4 Skill: RECALL 97) What is the Zachman Framework? Answer: The Zachman framework was conceived by John Zachman at IBM in the 1980s. The framework divides systems into two dimensions: one is based on six reasons for communication (what—data, how—function, where—network, who—people, when— time, why—motivation), the other is based on stakeholder groups (Planner, Owner, Designer, Builder, implementor, and Worker). The intersection of these two dimensions helps to provide a relatively holistic view of the enterprise. Diff: 2 Type: ES Page Reference: 348 Topic: Q3 Skill: RECALL 98) What is information systems governance? Answer: Governance suggests some committee or political party has the ability to decide on expectations for performance, to authorize appropriate resources and power to meet expectations, and perhaps eventually to verify whether expectations have been met. In publicly traded organizations, one purpose of governance is to ensure, on the behalf of shareholders of a firm, that an organization produces good results while working to avoid bad results. For business organizations, governance is often designed to work toward the development of consistent, cohesive management policies and verifiable internal processes. Managing at a corporate level often involves establishing the way in which boards oversee a corporation, and establishing the rules that apply to issues such as sourcing, privacy, security, and internal investments. The goal of IS governance is to improve the benefits of an organization's IT investment over time. Reporting structures and review processes can be established and can work over a period of time to improve Copyright © 2014 Pearson Canada Inc.

515


Chapter 11: Structure, Governance and Ethics

quality, reduce service costs and delivery time, reduce IT risks, and better support business processes. Diff: 2 Type: ES Page Reference: 350 Topic: Q5 Skill: RECALL 99) Why is information systems governance important? Answer: The increased need to report and disclose IS operational information will require employees at all levels of an organization to become more familiar with the issues facing information technology management. While this familiarity comes at a cost, the increased exposure to IT issues should improve the ability of organizations to use information technology more effectively and efficiently. An argument can be made that the result of increased reporting compliance should be improved alignment between organizational strategy and business objectives. Since compliance issues will remain for the foreseeable future, business students across all functions will improve from increased knowledge of IT issues. Diff: 3 Type: ES Page Reference: 350 Topic: Q5 Skill: APPLIED 100) What are Information System Ethics? Answer: It may seem as through there are few limits to the use of information technology and information systems to develop competitive advantage. But there are limits. For example, certain uses of IT may be against the law, and illegal behaviour has legal consequences. Another important limit for future business students to recognize is the limits placed on behaviour by ethics. Actions may not be illegal but they may be unethical. It is important to understand the difference. Diff: 3 Type: ES Page Reference: 353 Copyright © 2014 Pearson Canada Inc.

516


Chapter 11: Structure, Governance and Ethics

Topic: Q7 Skill: RECALL 101) What are the three factors that make up the triple bottom line? Answer: 1) Financial performance 2) Social performance 3) Environmental performance Diff: 2 Type: ES Page Reference: 356 Topic: Q8 Skill: RECALL 102) How does government regulation of e-waste affect a company that uses technology? Answer: Government regulation of e-waste means that the disposal of technology is and will become more difficult than it has in the past. With these regulations in place companies using technology will need to plan not only for acquisition of technology but also for its disposal. Diff: 3 Type: ES Page Reference: 356 Topic: Q8 Skill: APPLIED 103) What factors have brought IS governance and governance in general to the forefront of business planning? Answer: The action of companies like Enron and Worldcom along with their auditing firms in the late 1990s and early part of this century have brought corporate actions under the scrutiny of the government and the public in general. Legislation, criminal charges, and civil legal actions have made companies consider their actions more closely than ever before. Many organizations' boards of directors have mandated strong governance policies based on the fear of criminal and personal liability. Copyright © 2014 Pearson Canada Inc.

517


Chapter 11: Structure, Governance and Ethics

Diff: 3 Type: ES Page Reference: 352 Topic: Q6 Skill: RECALL 104) If your company agrees to collaborate on a supply chain relationship with another firm. During the collaboration, you discover by mistake, they have given you access to all their inventory and sales data. You look at this and find that you can see the prices and quantities of products they are buying from all their other suppliers. This can give you an enormous advantage in competing for their business. What should you do? Answer: Many of the choices fall between unethical and illegal. One thing that you should keep in mind is that you want to establish a long-term relationship with this partner. Price is only one factor in influencing their decision to work with you. You could gather a little information here and there; enough that would enable you to know when to raise and lower your prices in order to beat out your competition. That you have unauthorized access even through their mistake could be construed as illegal or unethical at best. You should keep in mind that all systems like this will have an audit function. Once it is discovered the system has bugs in it, a good DBA can easily go in and uncover any unusual queries and data access (such as yours). So take the ethical and legal way from the beginning and prove to be an honest and trustworthy business partner from the very beginning. By revealing the security flaws in their system, it is likely that they will reward you with a closer and more profitable relationship in the long run. Diff: 3 Type: ES Page Reference: 353 Topic: Q7 Skill: APPLIED 105) What does the task of aligning business objectives with information systems entail? Answer: The main task is that of creating an information systems architecture that fully supports the business objectives of the organization. There is a need to make sure that business strategy, organizational strategy, and information strategy are balanced with one another and that each is supportive of the other. Diff: 3 Type: ES Copyright © 2014 Pearson Canada Inc.

518


Chapter 11: Structure, Governance and Ethics

Page Reference: 349 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

519


Chapter 12: Managing Information Security and Privacy

1) Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data, such as account numbers. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 369 Topic: Q3 Skill: RECALL 2) Spoofing is a technique for intercepting computer communications. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 369 Topic: Q3 Skill: RECALL 3) People who intentionally gain unauthorized access to computer systems are called hackers. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 370 Topic: Q3 Skill: RECALL 4) Drive-by sniffers take computers with wireless connections through an area and search for unprotected wireless networks. a. True b. False Copyright © 2014 Pearson Canada Inc.

520


Chapter 12: Managing Information Security and Privacy

Answer: a Diff: 1 Type: TF Page Reference: 369 Topic: Q3 Skill: RECALL 5) Denial of service always occurs because of malicious attacks on the system. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 370 Topic: Q3 Skill: RECALL 6) When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests, this is called a denial of service attack. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 370 Topic: Q3 Skill: RECALL 7) Any action, device, procedure, technique, or other measure that reduces a system's vulnerability to a threat is a safeguard. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 371 Copyright © 2014 Pearson Canada Inc.

521


Chapter 12: Managing Information Security and Privacy

Topic: Q3 Skill: RECALL 8) Despite warnings, users have a tendency to write their passwords on sticky notes next to the computer. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 372 Topic: Q4 Skill: RECALL 9) Smart cards are convenient and easy to use since they don't require any PIN numbers for authentication. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 372 Topic: Q4 Skill: RECALL 10) A retinal scan would be considered a biometric authentication technique. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 372 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

522


Chapter 12: Managing Information Security and Privacy

11) Biometric authentication has been around for some time, and because of weaknesses is not likely to see much usage in the future. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 372 Topic: Q4 Skill: RECALL 12) Technical safeguards involve the hardware and software components of an information system. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 371 Topic: Q4 Skill: RECALL 13) Malware protection is an example of a technical safeguard. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 371 Topic: Q4 Skill: RECALL 14) Encryption is one of several technical safeguards. a. True b. False Answer: a Copyright © 2014 Pearson Canada Inc.

523


Chapter 12: Managing Information Security and Privacy

Diff: 2 Type: TF Page Reference: 371 Topic: Q4 Skill: RECALL 15) Malware is used in denial of service attacks. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 371 Topic: Q3 Skill: RECALL 16) Most anti-malware programs check e-mail attachments for malware code. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 374 Topic: Q4 Skill: RECALL 17) Data safeguards are designed to protect computer networks. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 374 Topic: Q5 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

524


Chapter 12: Managing Information Security and Privacy

18) To protect against lost or sabotaged encryption keys, a trusted party should keep a copy of the key. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 374 Topic: Q5 Skill: RECALL 19) Even if a potential new hire will not have access to sensitive data and systems, they should be extensively screened for security purposes. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 376 Topic: Q6 Skill: RECALL 20) Care must be taken when terminating employees because they may take harmful and malicious actions. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 376 Topic: Q6 Skill: RECALL 21) Hardened web sites use special versions of the operating systems and functions that are not required by the application. a. True Copyright © 2014 Pearson Canada Inc.

525


Chapter 12: Managing Information Security and Privacy

b. False Answer: a Diff: 3 Type: TF Page Reference: 378 Topic: Q6 Skill: RECALL 22) Help desks have not been the source of many security problems in the past. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 380 Topic: Q6 Skill: RECALL 23) If you ever receive notification that your password has been reset when you did not request a reset, immediately contact your IS department. a. True b. False Answer: a Diff: 1 Type: TF Page Reference: 380 Topic: Q6 Skill: RECALL 24) The best safeguard against a natural disaster is to have a safe location. a. True b. False Answer: a Diff: 2 Type: TF Page Reference: 383 Copyright © 2014 Pearson Canada Inc.

526


Chapter 12: Managing Information Security and Privacy

Topic: Q7 Skill: RECALL 25) Following a disaster, hot sites provide office space, but customers themselves must come and provide and install the equipment needed to continue operations. a. True b. False Answer: b Diff: 3 Type: TF Page Reference: 383 Topic: Q7 Skill: RECALL 26) Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization. a. True b. False Answer: b Diff: 1 Type: TF Page Reference: 384 Topic: Q8 Skill: RECALL 27) Backup and recovery, passwords, and encryption are human safeguards. a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 371 Topic: Q3 Skill: RECALL 28) Bloggers have not yet had much of an impact on the main stream media. Copyright © 2014 Pearson Canada Inc.

527


Chapter 12: Managing Information Security and Privacy

a. True b. False Answer: b Diff: 2 Type: TF Page Reference: 391 Topic: Q6 Skill: RECALL 29) About ninety percent of all viruses are spread via a. spreadsheets. b. AOL. c. technology. d. network worms. e. email. Answer: e Diff: 1 Type: MC Page Reference: 373 Topic: Q4 Skill: RECALL 30) Since most organizations are protected by a(n) ________, it is not surprising that most viruses spread via e-mail. a. data dictionary b. antivirus program c. biometric authentication device d. firewall e. white-hat hacker Answer: d Diff: 3 Type: MC Page Reference: 374 Topic: Q4 Copyright © 2014 Pearson Canada Inc.

528


Chapter 12: Managing Information Security and Privacy

Skill: RECALL 31) Be sure and purchase your antispyware program from a(n) ________ vendor, because some free programs in the past were actually malware programs in disguise. a. reasonable b. reputable c. entrepreneurial d. inexpensive e. illegitimate Answer: b Diff: 2 Type: MC Page Reference: 373 Topic: Q4 Skill: RECALL 32) Users should scan their computers with anti-malware programs at least a. once a year. b. biannually. c. once a week. d. daily. e. once a month. Answer: c Diff: 2 Type: MC Page Reference: 373 Topic: Q4 Skill: RECALL 33) ________, which are the patterns that exist in malware code, should be downloaded and updated frequently. a. Software updates b. Service packs c. Malware patterns Copyright © 2014 Pearson Canada Inc.

529


Chapter 12: Managing Information Security and Privacy

d. Network patches e. Malware definitions Answer: e Diff: 2 Type: MC Page Reference: 373 Topic: Q4 Skill: RECALL 34) It is possible for some malware to install itself on your computer by you doing nothing more than opening a(n) a. web page. b. file. c. e-mail d. computer. e. account. Answer: a Diff: 2 Type: MC Page Reference: 374 Topic: Q4 Skill: RECALL 35) Organizations should protect sensitive data by storing it in ________ form. a. compressed b. secure c. digital d. encrypted e. standardized Answer: d Diff: 2 Type: MC Page Reference: 374 Copyright © 2014 Pearson Canada Inc.

530


Chapter 12: Managing Information Security and Privacy

Topic: Q5 Skill: RECALL 36) Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party called a(n) a. key account. b. white-hat hacker. c. key escrow. d. authentication certifier. e. control account. Answer: c Diff: 3 Type: MC Page Reference: 374 Topic: Q5 Skill: RECALL 37) The purpose of a(n) ________ is to protect databases and other organizational data. a. data warehouse b. data security group c. operations group d. data safeguard e. steering committee Answer: d Diff: 2 Type: MC Page Reference: 374 Topic: Q5 Skill: RECALL 38) Organizations should store at least some of the _______________ of the database contents off the premises, possibly in a remote location. a. backups b. company information Copyright © 2014 Pearson Canada Inc.

531


Chapter 12: Managing Information Security and Privacy

c. malware definitions d. smaller parts Answer: a Diff: 2 Type: MC Page Reference: 375 Topic: Q5 Skill: RECALL 39) ________ to (for) the physical computers that run the DBMS and all devices that store database data should be carefully controlled. a. References b. Access c. Design plans d. Connections e. Documentation Answer: b Diff: 2 Type: MC Page Reference: 375 Topic: Q5 Skill: RECALL 40) ________ safeguards involve the people and procedure components of information systems. a. Human b. Data c. Technical d. Malware e. Firewall Answer: a Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

532


Chapter 12: Managing Information Security and Privacy

Page Reference: 375 Topic: Q6 Skill: RECALL 41) In order to prioritize their activities and protect an organization from possible risk and loss, security personnel must document the position ________ of all employees. a. riskiness b. data access c. controls d. level e. sensitivity Answer: e Diff: 3 Type: MC Page Reference: 375 Topic: Q6 Skill: RECALL 42) ________ considerations should be part of the hiring process. a. Weight b. Position c. Gender d. Age e. Security Answer: e Diff: 1 Type: MC Page Reference: 376 Topic: Q6 Skill: RECALL 43) A company should clearly define the security ________ for each position. a. accounts b. levels Copyright © 2014 Pearson Canada Inc.

533


Chapter 12: Managing Information Security and Privacy

c. responsibilities d. backups e. safeguards Answer: c Diff: 2 Type: MC Page Reference: 376 Topic: Q6 Skill: RECALL 44) When an employee is terminated, system administrators should receive advance notice so they can a. plan for security changes. b. get the employees computer. c. remove accounts and passwords. d. fight over the person's office. e. plan a termination party. Answer: c Diff: 2 Type: MC Page Reference: 377 Topic: Q6 Skill: RECALL 45) The best way to safeguard a web site from public users is to ________ the web site against an attack. a. secure b. prepare c. defend d. harden e. update Answer: d Diff: 3 Copyright © 2014 Pearson Canada Inc.

534


Chapter 12: Managing Information Security and Privacy

Type: MC Page Reference: 378 Topic: Q6 Skill: RECALL 46) Some of the biggest security threats are from ________ employees. a. disinterested b. disgruntled c. self-motivated d. happy e. contrarian Answer: b Diff: 1 Type: MC Page Reference: 374 Topic: Q5 Skill: RECALL 47) The existence of ________ user accounts is a serious security threat. a. unused b. network c. meta d. employee e. modified Answer: a Diff: 2 Type: MC Page Reference: 378 Topic: Q6 Skill: RECALL 48) ________ are the primary means of authentication. a. Encrypted keys b. Network administrators Copyright © 2014 Pearson Canada Inc.

535


Chapter 12: Managing Information Security and Privacy

c. Passwords d. Single sign-on e. Facial scans Answer: c Diff: 1 Type: MC Page Reference: 374 Topic: Q5 Skill: RECALL 49) Because they kept giving out passwords to users who claimed to have forgotten them, ________ were a serious security risk in the organization. a. interns b. help desks c. data administrators d. executives e. developers Answer: b Diff: 2 Type: MC Page Reference: 380 Topic: Q6 Skill: RECALL 50) Firewalls produce ________ of their activities, which include lists of all dropped packets, and attempts to gain unauthorized access. a. programs b. logs c. graphics d. calls e. accounts Answer: b Diff: 3 Copyright © 2014 Pearson Canada Inc.

536


Chapter 12: Managing Information Security and Privacy

Type: MC Page Reference: 381 Topic: Q6 Skill: RECALL 51) Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment. a. central b. air-conditioned c. high-tech d. fire-resistant e. easily accessible Answer: d Diff: 2 Type: MC Page Reference: 383 Topic: Q7 Skill: RECALL 52) A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster. a. web farm b. development site c. cold site d. hot site e. server farm Answer: d Diff: 2 Type: MC Page Reference: 383 Topic: Q7 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

537


Chapter 12: Managing Information Security and Privacy

53) When an employee notices a virus on his machine, the ________ plan should specify what to do. a. antivirus b. security c. technology d. company e. incident response Answer: e Diff: 3 Type: MC Page Reference: 384 Topic: Q7 Skill: RECALL 54) A(n) ________ is someone who pretends to be a legitimate company and sends email requesting confidential data. a. hacker b. phisher c. spoofer d. hawker e. employee Answer: b Diff: 2 Type: MC Page Reference: 369 Topic: Q3 Skill: RECALL 55) ________ is a technique for intercepting computer communications. a. Spoofing b. Hacking c. Pretexting d. Phishing e. Sniffing Copyright © 2014 Pearson Canada Inc.

538


Chapter 12: Managing Information Security and Privacy

Answer: e Diff: 3 Type: MC Page Reference: 369 Topic: Q3 Skill: RECALL 56) In order to intercept communications on ________ networks, drive-by sniffers simply drive or walk around with computers with wireless connections. a. commercial b. LAN c. wireless d. ISP e. WAN Answer: c Diff: 3 Type: MC Page Reference: 369 Topic: Q3 Skill: RECALL 57) ________________ is one of the fastest-growing crimes in Canada because it is relatively easy to do. a. phishing b. Hacking c. Spoofing d. PIPEDA e. Identity theft Answer: e Diff: 2 Type: MC Page Reference: 366 Topic: Q1

Copyright © 2014 Pearson Canada Inc.

539


Chapter 12: Managing Information Security and Privacy

Skill: RECALL 58) A hacker can launch a denial of service attack against a web server by ________ it with millions of bogus service requests. a. programming b. flooding c. denying d. hacking e. probing Answer: b Diff: 2 Type: MC Page Reference: 370 Topic: Q3 Skill: RECALL 59) Passwords have weaknesses because users often choose simple passwords, which ________ systems can easily guess. a. security b. intrusion c. antivirus d. malware e. biometric Answer: b Diff: 3 Type: MC Page Reference: 372 Topic: Q4 Skill: RECALL 60) A(n) ________ card has a microchip on it that is loaded with identifying data. a. smart b. debit c. credit Copyright © 2014 Pearson Canada Inc.

540


Chapter 12: Managing Information Security and Privacy

d. ATM e. identity Answer: a Diff: 3 Type: MC Page Reference: 372 Topic: Q4 Skill: RECALL 61) Users often resist biometric identification because they feel it is a. expensive. b. ineffective. c. too technical. d. invasive. e. hard to use. Answer: d Diff: 2 Type: MC Page Reference: 372 Topic: Q4 Skill: RECALL 62) The web site _______________________ lists simple things to do to lower your risk of identity theft. a. www.wordpress.com b. www.google.ca c. www.safecanada.com d. www.priv.gc.da e. www.equifax.com Answer: c Diff: 2 Type: MC Page Reference: 367 Copyright © 2014 Pearson Canada Inc.

541


Chapter 12: Managing Information Security and Privacy

Topic: Q2 Skill: RECALL 63) PIPEDA stands for a. Personal Information Protection and Electronic Disclosure Act. b. Personal Information Protection and Effective Disclosures Act. c. Personal Information Protection and Electronic Disclosures Act. d. Personal Information Protection and Electronic Documents Act. e. Personal Information Protection and Electronic Disclosure Actions. Answer: d Diff: 2 Type: MC Page Reference: 369 Topic: Q3 Skill: RECALL 64) PIPEDA gives individuals the right to know why an organization is ________ their personal information. a. collecting and disclosing b. collecting and changing c. collecting, using or disclosing d. changing e. using and disclosing Answer: c Diff: 3 Type: MC Page Reference: 369 Topic: Q3 Skill: RECALL 65) According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ___________ personal information. a. using b. safeguarding Copyright © 2014 Pearson Canada Inc.

542


Chapter 12: Managing Information Security and Privacy

c. disclosing d. collecting e. maintaining Answer: b Diff: 3 Type: MC Page Reference: 369 Topic: Q3 Skill: APPLIED 66) The popularity and efficacy of search engines like Google have created a source of a. entertainment. b. inadvertent information disclosure. c. phishing. d. pretexting. e. sniffing. Answer: b Diff: 2 Type: MC Page Reference: 369 Topic: Q3 Skill: RECALL 67) If you suspect an organization has inappropriately disclosed your personal information to a 3rd party, you can lodge a complaint with a. Industry Canada b. RCMP c. the local police. d. Revenue Canada. e. Office of the Privacy Commissioner of Canada. Answer: e Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

543


Chapter 12: Managing Information Security and Privacy

Page Reference: 367 Topic: Q2 Skill: RECALL 68) Security policy establishment is the responsibility of a. middle managers. b. the CEO. c. corporate lawyers. d. senior management. e. the IT department. Answer: d Diff: 2 Type: MC Page Reference: 371 Topic: Q3 Skill: RECALL 69) Adware is ________ than spyware. a. more serious b. less annoying c. more malicious d. more benign e. harder to get rid of Answer: d Diff: 3 Type: MC Page Reference: 373 Topic: Q4 Skill: RECALL 70) After installing anti-virus and antispyware, what is the best way to avoid malware? a. Encrypt your work b. Give your friend your passwords. Copyright © 2014 Pearson Canada Inc.

544


Chapter 12: Managing Information Security and Privacy

c. Shut the computer down at the end of the day. d. Open all email by double clicking. e. Don’t open email attachments from unknown sources. Answer: e Diff: 3 Type: MC Page Reference: 373 Topic: Q4 Skill: APPLIED 71) ________ is an organization-wide function that is in charge of developing data policies and enforcing data standards. a. Data contents protection b. Data safeguarding c. Data integrity d. Data administration e. Data rights administration Answer: d Diff: 2 Type: MC Page Reference: 374 Topic: Q5 Skill: RECALL 72) User accounts should be given (the) ________ to perform their jobs a. least possible privileges needed b. most possible privileges needed c. administrator privileges d. user privileges e. company standard privileges Answer: a Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

545


Chapter 12: Managing Information Security and Privacy

Page Reference: 375 Topic: Q6 Skill: RECALL 73) Enforcement consists of ________ interdependent factors. a. 4 b. 2 c. 5 d. 3 e. 6 Answer: d Diff: 2 Type: MC Page Reference: 378 Topic: Q6 Skill: RECALL 74) Hardening is actually a(n) ________ safeguard. a. technical b. security c. data d. human e. accountability Answer: a Diff: 3 Type: MC Page Reference: 378 Topic: Q6 Skill: RECALL 75) A company establishes data rights and responsibilities and educates employees on how to backup and recover the database. But, The company still needs to address the ___________ safeguards. a. inadvertent Copyright © 2014 Pearson Canada Inc.

546


Chapter 12: Managing Information Security and Privacy

b. security c. human d. data e. technical Answer: e Diff: 3 Type: MC Page Reference: 371 Topic: Q3 Skill: APPLIED 76) A security incident reporting plan should ________ all incident reports. a. centralize b. generalize c. standardize d. decentralize e. prioritize Answer: a Diff: 2 Type: MC Page Reference: 384 Topic: Q8 Skill: RECALL 77) When an incident is reported, ________ is (are) of the essence. a. the response b. preparation c. speed d. a systematic approach e. actions Answer: c Diff: 2 Type: MC Copyright © 2014 Pearson Canada Inc.

547


Chapter 12: Managing Information Security and Privacy

Page Reference: 384 Topic: Q8 Skill: RECALL 78) The sources of security problems are human error, malicious activity, and disasters. Diff: 1 Type: FIB Page Reference: 368 Topic: Q3 Skill: RECALL

79) Pretexting is the same as spoofing in the world of malicious computer activities. Diff: 1 Type: FIB Page Reference: 369 Topic: Q3 Skill: RECALL 80) E-mail spoofing, where a hacker uses e-mail to pretend to be someone else, is another name for phishing. Diff: 1 Type: FIB Page Reference: 369 Topic: Q3 Skill: RECALL 81) IP spoofing occurs when an intruder uses another site's IP address as if it were their own. Diff: 2 Type: FIB Page Reference: 369 Topic: Q3 Skill: RECALL 82) Unauthorized data disclosure can occur by simple human error when someone inadvertently releases data in violation of a policy. Diff: 1 Type: FIB Page Reference: 368 Topic: Q3 Skill: RECALL 83) Phishing is an example of unauthorized data disclosure. Diff: 2 Copyright © 2014 Pearson Canada Inc.

548


Chapter 12: Managing Information Security and Privacy

Type: FIB Page Reference: 369 Topic: Q3 Skill: RECALL 84) A(n) phisher is an operation or person that spoofs legitimate companies in an attempt to illegally capture credit card or bank account numbers. Diff: 2 Type: FIB Page Reference: 369 Topic: Q3 Skill: RECALL 85) When someone calls and pretends to be from a credit card company in order to check the validity of your credit card number, they are most likely engaging in pretexting. Diff: 2 Type: FIB Page Reference: 369 Topic: Q3 Skill: RECALL 86) Phishing is usually initiated via a(n) e-mail. Diff: 2 Type: FIB Page Reference: 369 Topic: Q3 Skill: RECALL 87) Sometimes, just opening a web page can install malware on your computer. Diff: 2 Type: FIB Page Reference: 374 Topic: Q4 Skill: RECALL 88) With wired networks, sniffing requires a(n) physical connection to the network. Diff: 2 Type: FIB Page Reference: 369 Topic: Q3 Skill: RECALL 89) Sniffing is a technique for intercepting computer communications. Diff: 2 Type: FIB Page Reference: 369 Copyright © 2014 Pearson Canada Inc.

549


Chapter 12: Managing Information Security and Privacy

Topic: Q3 Skill: RECALL 90) Drive-by sniffers simply take computers with wireless connections through an area and search for unprotected networks. Diff: 2 Type: FIB Page Reference: 279 Topic: Q1 Skill: RECALL 91) Hacking occurs when a person gains unauthorized access to a computer system. Diff: 1 Type: FIB Page Reference: 370 Topic: Q3 Skill: RECALL 92) By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or web server resulting in a(n) denial of service. Diff: 3 Type: FIB Page Reference: 370 Topic: Q3 Skill: RECALL 93) A computer worm is a program that infiltrates networks and generates so much artificial traffic that it virtually shuts down the network for legitimate traffic. Diff: 2 Type: FIB Page Reference: 370 Topic: Q3 Skill: RECALL 94) An organization's security program has three components: senior management involvement, safeguards, and an incident response. Diff: 2 Type: FIB Page Reference: 370 Topic: Q3 Skill: RECALL 95. A(n) smart card has a microchip, which is loaded with authenticating data. Diff: 1 Type: FIB Page Reference: 372 Copyright © 2014 Pearson Canada Inc.

550


Chapter 12: Managing Information Security and Privacy

Topic: Q4 Skill: RECALL 96) A(n) PIN must be entered when using a smart card in order to provide authentication. Diff: 1 Type: FIB Page Reference: 372 Topic: Q4 Skill: RECALL 97) Fingerprints and facial features are used to provide authentication for biometric security devices. Diff: 1 Type: FIB Page Reference: 372 Topic: Q4 Skill: RECALL 98) Operating systems today have the capability to authenticate users to multiple networks and servers. Diff: 3 Type: FIB Page Reference: 372 Topic: Q4 Skill: RECALL 99) Some new operating systems offer a feature called single sign-on, which remembers your data once you enter it the first time and authenticates you to other machines in the network. Diff: 2 Type: FIB Page Reference: 372 Topic: Q4 Skill: RECALL 100) Spyware programs can be installed on the user's computer without the user's knowledge or permission. Diff: 2 Type: FIB Page Reference: 373 Topic: Q4 Skill: RECALL 101) One aspect of security programs is how an organization establishes controls that provide checks and balances for the people in charge of sensitive data and applications. Diff: 3 Copyright © 2014 Pearson Canada Inc.

551


Chapter 12: Managing Information Security and Privacy

Type: FIB Page Reference: 369 Topic: Q3 Skill: APPLIED 102) Enforcement consists of three interdependent factors: (1) responsibility, (2) accountability and (3) compliance. Diff: 2 Type: FIB Page Reference: 376 Topic: Q5 Skill: APPLIED 103) What is an unauthorized data disclosure? Answer: Unauthorized data disclosure can occur by human error when someone inadvertently releases data in violation of policy. An example at a university would be a new department administrator who posts student names, numbers, and grades in a public place, when the releasing of names and grades violates provincial law. Another example is employees who unknowingly or carelessly release proprietary data to competitors or to the media. Diff: 2 Type: ES Page Reference: 368 Topic: Q3 Skill: RECALL 104) What is pretexting? Answer: Pretexting occurs when someone deceives by pretending to be someone else. A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers: "I'm checking your MasterCard number; it begins 5181. Can you verify the rest of the number?" All MasterCard numbers start with 5181; the caller is attempting to steal a valid number. Diff: 2 Type: ES Page Reference: 369 Topic: Q3 Skill: RECALL Copyright © 2014 Pearson Canada Inc.

552


Chapter 12: Managing Information Security and Privacy

105) What is phishing? Answer: Phishing is a technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, social insurance numbers, account passwords, and so forth. Phishing compromises legitimate brands and trademarks. Diff: 2 Type: ES Page Reference: 369 Topic: Q3 Skill: RECALL 106) What is spoofing? Answer: Spoofing is another term for someone pretending to be someone else. If you pretend to be your professor, you are spoofing your professor. IP spoofing occurs when an intruder uses another site's IP address as if it were that other site. Email spoofing is a synonym for phishing. Diff: 2 Type: ES Page Reference: 369 Topic: Q3 Skill: RECALL 107) What is sniffing? Answer: Sniffing is a technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network. With wireless networks, no such connection is required: drive-by sniffers simply take computers with wireless connections through an area and search for unprotected wireless networks. Diff: 2 Type: ES Page Reference: 369 Topic: Q3 Copyright © 2014 Pearson Canada Inc.

553


Chapter 12: Managing Information Security and Privacy

Skill: RECALL 108) What are the three general sources of IS security threats? Which one is the most dangerous? Which one is the easiest to plan for? Answer: The three sources of security threats are from human errors, malicious activities, and natural disasters. The most dangerous in terms of losses to corporations is still without a doubt, human error, though the potential cost of hackers can be significantly higher. It is easiest to plan for natural disasters because much of this involves just planning for the right location. Diff: 3 Type: ES Page Reference: 368 Topic: Q3 Skill: APPLIED 109) Unauthorized data disclosure is a major type of security problem. How do the different sources of threats exploit this problem? Answer: Unauthorized data disclosure can occur through human error, hacker activity, and from natural disasters. There have been a number of cases where companies have mistakenly released customer names on Web sites and through other means. More serious is the growth in the number of phishers who pretend to be someone else and send e-mail messages trying to get access to credit card and bank account data. Some versions of this are called pretexting, spoofing, e-mail spoofing, and IP spoofing. Sniffing is a technique where hackers intercept regular network and wireless network traffic. Sensitive data may also be inadvertently released during a natural disaster crisis. Diff: 3 Type: ES Page Reference: 368 Topic: Q3 Skill: APPLIED 110) What is a denial of service security problem? How does this result from actions by the various sources of security threats? Answer: Copyright © 2014 Pearson Canada Inc.

554


Chapter 12: Managing Information Security and Privacy

For telecommunications applications and especially Web sites, there is a significant risk that servers are so overwhelmed with service requests, that they cannot serve legitimate requests. A denial of service can be the result of human error by inadvertently running applications that are too complicated for the network or by too many users making requests at the same time. Hackers have written programs such as network worms that are designed to exploit this flaw and shut networks down by flooding the networks with traffic. Some crime organizations have been known to try to extort money from firms by threatening to do this. Natural disasters can cause networks to go down, also resulting in a denial of service. Diff: 3 Type: ES Page Reference: 370 Topic: Q3 Skill: APPLIED 111) What is a technical safeguard? Describe two of these. Answer: Technical safeguards involve the hardware and software components of an information system and how they can be used to prevent security problems. Smart cards are like credit cards but they have chips on them that hold a lot more data than the magnetic strips. This data is used to identify the user who is required to enter a PIN in order to be authenticated. Biometric authentication is similar except that it uses unique personal characteristics such as fingerprints, retinal scans, or facial features that can be scanned by a computer and matched in a database. This technology is still in the early stages of adoption, but holds a lot of promise for the future. Diff: 3 Type: ES Page Reference: 371 Topic: Q3 Skill: RECALL 112) What is the idea of a single sign-on for multiple systems? What are the benefits and negatives associated with single-sign on? Answer: Some advanced operating systems and applications such as enterprise portals, require users to login once and then have the ability to store this information and login the user into any other servers or applications that are part of the allowed network of servers. Users like this because it reduces the time and annoyance of having to remember a whole Copyright © 2014 Pearson Canada Inc.

555


Chapter 12: Managing Information Security and Privacy

bunch of different passwords for each server and application. It also reduces the amount of time the password is traveling the network and so reduces the probability that it will be intercepted. The only bad thing is when a hacker does get in, the damage can be much more severe since there are no safeguards in place once the hacker is into the system. Diff: 3 Type: ES Page Reference: 372 Topic: Q4 Skill: APPLIED 113) What is meant by the term "malware"? How can we safeguard against it? Answer: Short for malicious software, malware is software designed specifically to damage or disrupt a system. Malware can be a virus, spyware, adware, or a Trojan horse. Sometimes you don't even know you have it on your machine. If your machine gets really slow and has an inordinate number of pop-ups and suspicious changes to the browser homepage or taskbar, then you probably have some form of malware. The most obvious safeguard is to install antivirus and anti-spyware programs. Be careful to get one from a reputable vendor, since malware has been disguised as antivirus programs that you can get for free. Once installed you should set it to scan your computer frequently, at least once a week. To keep it current you must frequently update your malware definitions. Be sure that you don't open any e-mail attachments from unknown e-mail addresses, since this is the most common way to get malware on your computer. Diff: 3 Type: ES Page Reference: 372 Topic: Q4 Skill: RECALL

Copyright © 2014 Pearson Canada Inc.

556


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.